咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是11-20 订阅
排序:
Latency minimization for multiuser computation offloading in fog-radio access networks
收藏 引用
Digital communications and Networks 2025年 第1期11卷 160-171页
作者: Wei Zhang Shafei Wang Ye Pan Qiang Li Jingran Lin Xiaoxiao Wu School of Information and Communication Engineering University of Electronic Science and Technology of ChinaChengdu611731China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing100089China
Recently,the Fog-Radio Access Network(F-RAN)has gained considerable attention,because of its flexible architecture that allows rapid response to user *** this paper,computational offloading in F-RAN is considered,wher... 详细信息
来源: 评论
A Defective Ground Structure Design for Reducing Coupling between Microstrip Antenna Arrays
收藏 引用
Progress in Electromagnetics Research C 2025年 151卷 123-130页
作者: Xu, Junhao Wang, Yafei Wang, Xiaozhe Li, Zhensong Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing100101 China Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing100101 China
In order to reduce the coupling between dense antenna arrays in multiple input multiple output (MIMO) systems, this paper proposes a method to reduce the coupling between microstrip antenna arrays by utilizing a defec... 详细信息
来源: 评论
A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles
收藏 引用
Computers, Materials & Continua 2024年 第7期80卷 567-585页
作者: Feng Zhao Hongtao Ding Chunhai Li Zhaoyu Su Guoling Liang Changsong Yang Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
The Internet of Vehicles(IoV)is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the ***,due to the open and variable nature o... 详细信息
来源: 评论
Digital Twins for Incident Detection and Response  19th
Digital Twins for Incident Detection and Response
收藏 引用
19th International Conference on Research Challenges in information science, RCIS 2025
作者: Kampourakis, Konstantinos E. Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik2802 Norway
Digital Twin (DT) technology is revolutionizing critical infrastructure (CI) sectors by enabling real-time monitoring, predictive analytics, and dynamic decision-making. However, this increased interconnectivity and c... 详细信息
来源: 评论
Identifying Sexual Predators in Chats Using SVM and Feature Ensemble
Identifying Sexual Predators in Chats Using SVM and Feature ...
收藏 引用
2023 International Conference on Emerging Trends in Networks and Computer communications, ETNCC 2023
作者: Fauzi, Muhammad Ali Wolthusen, Stephen Yang, Bian Bours, Patrick Yeng, Prosper Department of Information Security and Communication Technology Gjovik Norway Norwegian University of Science and Technology Department of Information Security and Communication Technology Gjovik Norway
Cyber grooming is a compelling problem worldwide nowadays since people spend most of their time online. All of the reports strongly suggested that it becomes very urgent to tackle the online child grooming problem in ... 详细信息
来源: 评论
Resilient Distributed Kalman Filtering Against Malicious Cyber Attacks
收藏 引用
IEEE Transactions on Aerospace and Electronic Systems 2025年 第3期61卷 7610-7625页
作者: Xia, Wei Zhou, Mengqing University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Xinjiang University School of Computer Science and Technology School of Cyberspace Security Ürümqi830046 China
In this work, we consider the resilient distributed Kalman filtering (RDKF) for adversarial networks in the presence of different malicious cyber attacks, and develop an RDKF algorithm to enhance the network estimatio... 详细信息
来源: 评论
UoCAD: An Unsupervised Online Contextual Anomaly Detection Approach for Multivariate Time Series from Smart Homes  9
UoCAD: An Unsupervised Online Contextual Anomaly Detection A...
收藏 引用
9th International Conference on Internet of Things, Big Data and security, IoTBDS 2024
作者: Toor, Aafan Ahmad Lin, Jia-Chun Lee, Ming-Chang Gran, Ernst Gunnar Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway
In the context of time series data, a contextual anomaly is considered an event or action that causes a deviation in the data values from the norm. This deviation may appear normal if we do not consider the timestamp ... 详细信息
来源: 评论
A Re-transmission Algorithm for Phasor Data Concentrators for Resilience Enhancement of State Estimation  19th
A Re-transmission Algorithm for Phasor Data Concentrators f...
收藏 引用
19th International Conference on Critical information Infrastructures security, CRITIS 2024
作者: Wright, James G. Wolthusen, Stephen D. Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway Department of Information Security Royal Holloway University of London London United Kingdom
To maintain the current safety standards expected within power grids whilst incorporating new functionalities, such as distributed power generation, an increase in the precision of control and sensing devices is ... 详细信息
来源: 评论
Few-shot electromagnetic signal classification:A data union augmentation method
收藏 引用
Chinese Journal of Aeronautics 2022年 第9期35卷 49-57页
作者: Huaji ZHOU Jing BAI Yiran WANG Licheng JIAO Shilian ZHENG Weiguo SHEN Jie XU Xiaoniu YANG School of Artificial Intelligence Xidian UniversityXidian UniversityXi'an 710071China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China
Deep learning has been fully verified and accepted in the field of electromagnetic signal classification. However, in many specific scenarios, such as radio resource management for aircraft communications, labeled dat... 详细信息
来源: 评论
Energy Efficiency Maximization for Cooperative NOMA with Hardware Impairments
收藏 引用
China communications 2024年 第12期21卷 80-91页
作者: Wang Zhengqiang Chang Ruifei Wan Xiaoyu Fan Zifu Duo Bin School of Communication and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China College of Computer Science and Cyber Security Chengdu University of TechnologyChengdu 610059China
The massive connectivity and limited energy pose significant challenges to deploy the enormous devices in energy-efficient and environmentally friendly in the Internet of Things(IoT).Motivated by these challenges,this... 详细信息
来源: 评论