咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是21-30 订阅
排序:
Research on Lightweight Sensing technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年 第12期12卷 20678-20694页
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering State Key Laboratory of Mobile Communication Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China
Channel state information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
5G Ultra-Dense Network Fingerprint Positioning Method Based on Matrix Completion
收藏 引用
China communications 2023年 第3期20卷 105-118页
作者: Yuexia Zhang Chong Liu Key Laboratory of Information and Communication Systems Ministry of Information IndustryBeijing Information Science and Technology UniversityBeijing 100101China Key Laboratory of Modern Measurement and Control Technology Ministry of EducationBeijing Information Science and Technology UniversityBeijing 100101China
The problem of high-precision indoor positioning in the 5G era has attracted more and more attention.A fingerprint location method based on matrix completion(MC-FPL)is proposed for 5G ultradense networks to overcome t... 详细信息
来源: 评论
Foresight Scenarios for Protecting Human Autonomy in IoT: A Comparative Study of Expert and End-User Perspectives  13
Foresight Scenarios for Protecting Human Autonomy in IoT: A ...
收藏 引用
13th International Conference on the Internet of Things, IoT 2023
作者: Ystgaard, Kaja Fjørtoft Lein, Silje Kløften De Moor, Katrien Department of Information Security and Communication Technology Norwegian University of Science and Technology Norway
This article presents a comparative study, from a multi-stakeholder perspective, aimed at defining future scenarios that safeguard human autonomy in the context of IoT technologies. The research utilizes a systematic ... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论
Fuzzing:Progress,Challenges,and Perspectives
收藏 引用
Computers, Materials & Continua 2024年 第1期78卷 1-29页
作者: Zhenhua Yu Zhengqi Liu Xuya Cong Xiaobo Li Li Yin Institute of Systems Security and Control College of Computer Science and TechnologyXi'an University of Science and TechnologyXi'an710054China School of Mathematics and Information Science Baoji University of Arts and SciencesBaoji721013China Institute of Systems Engineering Macao University of Science and TechnologyTaipaMacaoChina
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software *** feeds potentially syntactically or semantically malformed test data to a target program to mi... 详细信息
来源: 评论
Delayed interference-based broadband optical chaos generation in a mutual coupled RSOA and DFB system
收藏 引用
Optics Letters 2025年 第10期50卷 3381-3384页
作者: Qian, Jiahao Jiang, Ning Li, Anran Zhang, Yiqun Xu, Bingjie Huang, Wei Qiu, Kun School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Tianfu Jiangxi Laboratory Chengdu641419 China National Key Laboratory of Security Communication Chengdu610041 China
In this Letter, a delayed interference (DI)-based chaos generation scheme in a mutually coupled system consisting of a reflective semiconductor optical amplifier (RSOA) and a distributed feedback (DFB) semiconductor l... 详细信息
来源: 评论
Research on privacy information retrieval model based on hybrid homomorphic encryption
收藏 引用
Cybersecurity 2024年 第4期7卷 52-61页
作者: Wei-tao Song Guang Zeng Wen-zheng Zhang Dian-hua Tang Science and Technology on Communication Security Laboratory.Chengdu 610041 China Zhejiang University Hangzhou 311200China PLA SSF Information Engineering University Zhengzhou 450000China College of Computer Science and Technology National University of Defense TechnologyChangsha 410073China
The computational complexity of privacy information retrieval protocols is often linearly related to database *** the database size is large,the efficiency of privacy information retrieval protocols is relatively *** ... 详细信息
来源: 评论
Hyperledger fabric platform for healthcare trust relations—Proof-of-Concept
收藏 引用
Blockchain(Research and Applications) 2023年 第4期4卷 63-74页
作者: Aleksandar Nedakovic Anton Hasselgren Katina Kralevska Danilo Gligoroski Department of Information Security and Communication Technology Norwegian University of Science and Technology(NTNU)7034 TrondheimNorway Department of Neuromedicine and Movement Science Norwegian University of Science and Technology(NTNU)7034 TrondheimNorway
In recent years,blockchain technologies have expanded from the finance field to other areas that rely on trustbased *** healthcare industry represents one such area,as digital transformation disrupts relationships bet... 详细信息
来源: 评论
Usage of Cybersecurity Standards in Operational technology Systems  19th
Usage of Cybersecurity Standards in Operational Technology...
收藏 引用
19th International Workshop on Data Privacy Management, DPM 2024, 8th International Workshop on Cryptocurrencies and Blockchain technology, CBT 2024 and 10th Workshop on the security of Industrial control Systems and of Cyber-Physical Systems, CyberICPS 2024 which were held in conjunction with the 29th European Symposium on Research in Computer security, ESORICS 2024
作者: Kannelønning, Kristian Katsikas, Sokratis Department of Information Security and Communication Technology NTNU - Norwegian University of Science and Technology Postboks 191 Gjøvik2802 Norway
The escalating frequency of cyber attacks against industrial installations over the past decade underscores the growing imperative to fortify cybersecurity in organizations. The advent of Industry 4.0 has interconnect... 详细信息
来源: 评论
Extended Abstract - Alternative Taxation Scheme for controlling Rebound Effects in Streaming Services
Extended Abstract - Alternative Taxation Scheme for Controll...
收藏 引用
ICT4S 2023 Doctoral Symposium, Demonstrations and Posters Track and Workshops;co-located with 9th International Conference on information and communications technology for Sustainability, ICT4S 2023
作者: Szalkowski, Gabriel Andy Audestad, Jan Arild Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway
Digital technologies have a strong influence in our entertainment choices. Streaming services stand out in this aspect. Due to competition and environmental reasons, they may improve the efficiency of their services, ... 详细信息
来源: 评论