咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是91-100 订阅
排序:
Personalized Federated Learning for Heterogeneous Residential Load Forecasting
收藏 引用
Big Data Mining and Analytics 2023年 第4期6卷 421-432页
作者: Xiaodong Qu Chengcheng Guan Gang Xie Zhiyi Tian Keshav Sood Chaoli Sun Lei Cui the Shanxi Key Laboratory of Advanced Control and Equipment Intelligence Taiyuan University of Science and TechnologyTaiyuan 030024China the Faculty of Engineering and Information Technology University of Technology SydneyUltimo 2007Australia the Centre for Cyber Security Research and Innovation Deakin UniversityMelbourne 3125Australia the School of Computer Science and Technology Taiyuan University of Science and TechnologyTaiyuan 030024China
Accurate load forecasting is critical for electricity production,transmission,and *** learning(DL)model has replaced other classical models as the most popular prediction ***,the deep prediction model requires users t... 详细信息
来源: 评论
Mainlobe DRFM Jamming Suppression via Blind Source Separation Using Tensor Decomposition  8
Mainlobe DRFM Jamming Suppression via Blind Source Separatio...
收藏 引用
8th International Conference on Signal and Image Processing, ICSIP 2023
作者: Dong, Luxin Wang, Bing Pan, Bunian Kong, Yukai Yu, Xianxiang Cui, Guolong University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Science and Technology on Electronic Information Control Laboratory Chengdu610036 China
This paper deals with the suppression problem of mainlobe digital radio frequency memory (DRFM) jamming especially for intra-pulse slice forwarding jamming for phased array radar. A novel mainlobe DRFM jamming suppres... 详细信息
来源: 评论
Classification of Deforestation Factors in 6G Satellite Forest Images  5th
Classification of Deforestation Factors in 6G Satellite Fore...
收藏 引用
5th EAI International Conference on 6G for Future Wireless Networks, 6GN 2022
作者: Li, Yuhai Sun, Yuxin Meng, Xianglong Xi, Liang Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300300 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
The terrestrial satellite network will play an essential role in 6G. Through the satellite system, people can obtain a lot of ground image information to process tasks and feedback. Forest resource is an essential res... 详细信息
来源: 评论
security and Privacy for VR in non-entertainment sectors: a practice-based study of the challenges, strategies and gaps
Security and Privacy for VR in non-entertainment sectors: a ...
收藏 引用
Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW), IEEE Conference on
作者: Camille Sivelle David Palma Katrien De Moor Department of Information Security and Communication Technology Norwegian University of Science and Technology
The adoption of Extended Reality (XR) for non-entertainment use cases, such as healthcare, industry or education, raises new security and privacy (S&P) concerns. Despite an emerging focus on these aspects in the l... 详细信息
来源: 评论
6G Network Traffic Intrusion Detection Using Multiresolution Auto-encoder and Feature Matching Discriminator  5th
6G Network Traffic Intrusion Detection Using Multiresolution...
收藏 引用
5th EAI International Conference on 6G for Future Wireless Networks, 6GN 2022
作者: Li, Yuhai Sun, Yuxin He, Dong Xi, Liang Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300300 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
With the development of 6G technology, security and privacy have become extremely important in the face of larger network traffic bandwidth. An effective intrusion detection system can deal with the network attacks. D... 详细信息
来源: 评论
Blockchain state channels with compact states through the use of RSA accumulators
收藏 引用
Blockchain(Research and Applications) 2023年 第1期4卷 71-89页
作者: Lydia Negka Angeliki Katsika Georgios Spathoulas Vassilis Plagianakos Department of Computer Science and Biomedical Informatics University of Thessaly2-4 Papasiopoulou st.Lamia35131Greece Department of Information Security and Communication Technology Norwegian University of Science and Technology(NTNU)Mail Box 191GjøvikNO-2815Norway
One of the major concerns regarding currently proposed public blockchain systems relates to the feasible transaction processing *** is common for such systems to limit this rate to maintain the required levels of secu... 详细信息
来源: 评论
Vector Approximate Message Passing with Sparse Bayesian Learning for Gaussian Mixture Prior
收藏 引用
China communications 2023年 第5期20卷 57-69页
作者: Chengyao Ruan Zaichen Zhang Hao Jiang Jian Dang Liang Wu Hongming Zhang National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China Purple Mountain Laboratories No.9 Mozhou East RoadNanjing 211111China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
Compressed sensing(CS)aims for seeking appropriate algorithms to recover a sparse vector from noisy linear ***,various Bayesian-based algorithms such as sparse Bayesian learning(SBL)and approximate message passing(AMP... 详细信息
来源: 评论
Phishing detection on Ethereum via transaction subgraphs embedding
IET Blockchain
收藏 引用
IET Blockchain 2023年 第4期3卷 194-203页
作者: Lv, Haifeng Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology WuZhou University Wuzhou China
With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective... 详细信息
来源: 评论
An Explainable Deep Learning-based Approach for Multivariate Time Series Anomaly Detection in IoT  20
An Explainable Deep Learning-based Approach for Multivariate...
收藏 引用
20th International Conference on Frontiers of information technology, FIT 2023
作者: Toor, Aafan Ahmad Lin, Jia-Chun Gran, Ernst Gunnar Lee, Ming-Chang Department of Information Security and Communication Technology Gjovik Norway Electrical Engineering and Mathematical Sciences Department of Computer Science Bergen Norway
Detecting anomalies from Internet of Things (IoT) data is important for a smooth flow of events. Timely detection of anomalies and raising alarms can help avoid any potential health and safety hazards in an IoT enviro... 详细信息
来源: 评论
Detection of PFCP Protocol Based on Fuzz Method  2
Detection of PFCP Protocol Based on Fuzz Method
收藏 引用
2nd International Conference on Computer, control and Robotics, ICCCR 2022
作者: Cao, Yebei Chen, Yucheng Zhou, Wenan Science and Technology on Communication Information Security Control Laboratory Jiaxing China School of Computer Science Beijing University of Posts and Telecommunications Beijing China
5G as a widely used mobile network, its security is of great significance. PFCP protocol is one of the important protocols that introduced into 5G core network, After the analysis of PFCP protocol and its security thr... 详细信息
来源: 评论