咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是51-60 订阅
排序:
Coastal Regions Sea Surface Salinity Retrieval of SMAP MISSION Based on Light Gradient Boosting Model
Coastal Regions Sea Surface Salinity Retrieval of SMAP MISSI...
收藏 引用
2024 Photonics and Electromagnetics Research Symposium, PIERS 2024
作者: Song, Haoming Zhang, Yifan Zhang, Biao Lv, Yanfang Zhang, Lanjie Ministry of Information Industry Beijing Information Science and Technology University Key Laboratory of Information and Communication Systems China Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement and Control Technology China
Sea surface salinity (SSS) as an important indicator of ocean water circulation, affects global ecology and climate change. However, the accuracy of L-band satellite sea surface salinity retrieval products has been se... 详细信息
来源: 评论
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
A Dynamic and Secure Join Query Protocol for Multi-User Environment in Cloud Computing
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第2期13卷 512-525页
作者: Li, Hongjun He, Debiao Feng, Qi Yang, Xiaolin Luo, Qingcai Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University School of Cyber Science and Engineering Wuhan430072 China Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network & Information Security Ministry of Education Shandong Computer Science Center Jinan250014 China National Key Laboratory of Security Communication Chengdu610041 China Inspur Cloud Information Technology Company Ltd. Shandong Jinan250000 China Inspur Academy of Science and Technology Shandong Jinan250101 China
The development of cloud computing needs to continuously improve and perfect the privacy-preserving techniques for the user’s confidential data. Multi-user join query, as an important method of data sharing, allows m... 详细信息
来源: 评论
A deep learning model for classifying the thoughts of multiple individuals based on visual event  4
A deep learning model for classifying the thoughts of multip...
收藏 引用
4th IEEE International Conference on Electrical, Computer, and Energy Technologies, ICECET 2024
作者: Luvsansambuu, Uurtsaikh Tserendondog, Tengis Bat-Erdene, Munkbayar Amar, Batmunkh School of Information and Communication Technology Mongolian University of Science and Technology Dept. of Electronics Ulaanbaatar14191 Mongolia SICT Mongolian University of Science and Technology Dept. of Information Network and Security Ulaanbaatar14919 Mongolia
In numerous research studies, it is revealed that the accuracy of EEG classification depends on how well subjects can accurately reproduce thoughts. The main question was: Who can use it? Is it restricted to individua... 详细信息
来源: 评论
Target-Before-Detect Algorithm for Passive MIMO Radar Based on Improved Particle Filter
Target-Before-Detect Algorithm for Passive MIMO Radar Based ...
收藏 引用
2022 Global Conference on Robotics, Artificial Intelligence and information technology, GCRAIT 2022
作者: Zhou, Yawen Zhu, Jiawei Song, Tingsong Yao, Siyi Lai, Rui Guo, Yuning School of Electronic Science and Technology University Chengdu China Information Security Control Laboratory Science and Technology on Communication Jiaxing China
In order to improve the target detection performance of passive multiple-input-multiple-output (PMR) radar system, a Target-Before-Detect (TBD) algorithm based on improved particle filter is proposed in this paper. As... 详细信息
来源: 评论
Minimum dispersion beamforming using modified conjugate gradient method
Minimum dispersion beamforming using modified conjugate grad...
收藏 引用
2021 International Conference on Electronic information Engineering and Computer communication, EIECC 2021
作者: Song, Jinyang Wang, Wei Chen, Yan Science and Technology on Communication Information Security Control Laboratory China Cetc 36 Zhejiang Jiaxing China
In order to solve linear constraint minimize dispersion problem in beamforming with non-Gaussian signals or noise, this paper proposed a real time adaptive beamforming technique based on modified conjugate gradient (M... 详细信息
来源: 评论
Employing a CNN Detector to Identify AI-Generated Images and Against Attacks on AI Systems  1
Employing a CNN Detector to Identify AI-Generated Images and...
收藏 引用
1st International Conference on Cryptography and information security, VCRIS 2024
作者: Truong, Phi-Ho Nguyen, Tien-Dung Truong, Xuan-Hung Nguyen, Nhat-Hai Pham, Duy-Trung Vietnam Academy of Cryptography Techniques Department of Information Security Viet Nam School of Information and Communication Technology Hanoi University of Science and Technology Viet Nam Binh Thuan Provincial Police Department of Cyber Security Viet Nam
The advancement of artificial intelligence (AI) technology has made Generative AI a significant concern for many. This technology generates fake images through highly complex algorithms. It involves a detailed analysi... 详细信息
来源: 评论
Research and Implementation of Credit Investigation Sharing Platform Based on Double Blockchain
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5193-5211页
作者: Han Yanyan Wei Wanqi Dou Kaili Li Peng College of Information Engineering Xidian UniversityXi’an710071China Department of Electronic and Communication Engineering Beijing Electronic Science and Technology InstituteBeijing100070China Department of Cyberspace Security Beijing Electronic Science and Technology InstituteBeijing100070China
As the development of the modern economy is increasingly insep-arable from credit support,the traditional credit investigation mode has yet to meet this *** of the difficulties in conventional credit data sharing amon... 详细信息
来源: 评论
PMB filter based distributed tracking of multiple extended targets under different resolutions  100
PMB filter based distributed tracking of multiple extended t...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Li, Yue Gao, Lin Wei, Ping Li, Wanchun Zhang, Huaguo Mu, Hao University of Electronic Science and Technology of China School of Information and Communication Engineering China National Key Laboratory of Electromagnetic Space Security China
A key feature of extended target (ET) is that it can produce multiple measurements, thus providing detailed information such as size, orientation. However, due to the measurement number decrease, the ET tends to be a ... 详细信息
来源: 评论
Container-Based IoT Architectures: Use Case for Visual Person Counting  5
Container-Based IoT Architectures: Use Case for Visual Perso...
收藏 引用
5th Symposium of the Norwegian AI Society, NAIS 2023
作者: Veiga, Tiago Asad, Hafiz Areeb Kraemer, Frank Alexander Bach, Kerstin Department of Computer Science Norwegian University of Science and Technology Trondheim Norway Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway
The design and deployment of combined Internet-of-Things (IoT) and Artificial Intelligence (AI) solutions present several challenges, some of which are handled by modular logical models for the flow of data and contai... 详细信息
来源: 评论