咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是61-70 订阅
排序:
Beyond Theory: Investigating the Practical Feasibility of Confidential Computing  20
Beyond Theory: Investigating the Practical Feasibility of Co...
收藏 引用
20th International Conference on Frontiers of information technology, FIT 2023
作者: Ettesvoll, Edward Rognerud Schule, Leon Camill Mudassar Yamin, Muhammad Imran, Ali Shariq Norwegian University of Science and Technology Department of Information Security and Communication Technology Gjovik Norway Norwegian University of Science and Technology Department of Computer Science Gjovik Norway
Confidential Computing (CC) is a fairly new concept encompassing technologies designed to safeguard data during processing, playing a crucial role in data protection throughout its lifecycle. In this paper, we address... 详细信息
来源: 评论
Model-based deep learning for fiber bundle infrared image restoration
收藏 引用
Defence technology(防务技术) 2023年 第9期27卷 38-45页
作者: Bo-wen Wang Le Li Hai-bo Yang Jia-xin Chen Yu-hai Li Qian Chen Chao Zuo Jiangsu Key Laboratory of Spectral Imaging and Intelligent Sense Nanjing University of Science and TechnologyNanjingJiangsu Province210094China Smart Computational Imaging(SCI)Laboratory Nanjing University of Science and TechnologyNanjingJiangsu Province210094China Science and Technology on Electro-Optical Information Security Control Lab Tianjin300308China
As the representative of flexibility in optical imaging media,in recent years,fiber bundles have emerged as a promising architecture in the development of compact visual *** to tackling the problems of universal honey... 详细信息
来源: 评论
Adaptive Time Slot Resource Allocation in SWIPT IoT Networks
收藏 引用
Computer Modeling in Engineering & sciences 2023年 第9期136卷 2787-2813页
作者: Yunong Yang Yuexia Zhang Zhihai Zhuo Key Laboratory of Information and Communication Systems Ministry of Information IndustryBeijing Information Science and Technology UniversityBeijing100101China Key Laboratory of ModernMeasurement&Control Technology Ministry of EducationBeijing Information Science&Technology UniversityBeijing100101China Beijing Advanced Innovation Center for Future Blockchain and Privacy Computing Beijing100101China
The rapid advancement of Internet of Things(IoT)technology has brought convenience to people’s lives;however further development of IoT faces serious challenges,such as limited energy and shortage of network spectrum... 详细信息
来源: 评论
Influence of Physical Parameters on Echo Spectrum of Underwater Target
Influence of Physical Parameters on Echo Spectrum of Underwa...
收藏 引用
2024 OES China Ocean Acoustics, COA 2024
作者: Chen, Yunfei Yu, Dapeng Jia, Bing Wang, Zhenshan Yong, Jintao Wang, Yanjie School of Information and Communication Engineering Dalian University of Technology Dalian China Science and Technology on Underwater Test and Control Laboratory Dalian China
The elastic scattering features of the underwater target scattering wave depend on the physical parameters of the target, such as the material and structure. Intuitively evaluating the influence of the elastic scatter... 详细信息
来源: 评论
Flexible and wearable battery-free backscatter wireless communication system for colour imaging
收藏 引用
npj Flexible Electronics 2024年 第1期8卷 761-769页
作者: Jun-Lin Zhan Wei-Bing Lu Cong Ding Zhen Sun Bu-Yun Yu Lu Ju Xin-Hua Liang Zhao-Min Chen Hao Chen Yong-Hao Jia Zhen-Guo Liu Tie-Jun Cui State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast UniversityNanjing 210096China Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China College of Electronic and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 211106China
Wireless imaging,equippedwith ultralow power wireless communications and energy harvesting(EH)capabilities,have emerged as battery-free and sustainable ***,the challenge of implementing wireless colour imaging in wear... 详细信息
来源: 评论
Standard and RL-controled Tabu Search Algorithms Comparison in Capacitated Vehicle Routing Problem Solving  20th
Standard and RL-Controled Tabu Search Algorithms Comparison...
收藏 引用
20th International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2025
作者: Bronicki, Jan Nowak, Piotr Faculty of Mechanical Engineering Wroclaw University of Science and Technology Wroclaw Poland Department of Control Systems and Mechatronics Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
The Capacitated Vehicle Routing Problem (CVRP) is a key logistics and computer science problem where a vehicle with limited capacity must deliver orders efficiently while minimizing costs. Traditional exact methods st... 详细信息
来源: 评论
Research on Radar Anti-deceptive-jamming Method based on Characterization  16
Research on Radar Anti-deceptive-jamming Method based on Cha...
收藏 引用
16th International Conference on Signal Processing Systems, ICSPS 2024
作者: Lei, Lei Jiang, Meiqiu Li, JiaChen Guo, Shisheng Cui, Guolong Xia, Bijun Zhu, Lei School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Electromagnetic Space Security Chengdu China
Deceptive jamming plays an increasingly important role in radar electronic countermeasures, and there is an urgent need to study new radar anti-deceptive jamming methods. In this paper, four characteristic factors, na... 详细信息
来源: 评论
Dynamic Charging and Path Planning for UAV-Powered Rechargeable WSNs Using Multi-Agent Deep Reinforcement Learning
收藏 引用
IEEE Transactions on Automation science and Engineering 2025年 22卷 15610-15626页
作者: Betalo, Mesfin Leranso Leng, Supeng Seid, Abegaz Mohammed Abishu, Hayla Nahom Erbad, Aiman Bai, Xiaoshan Shenzhen University College of Mechatronics and Control Engineering Shenzhen518060 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Hamad Bin Khalifa University Division of Information and Computing Technology College of Science and Engineering Doha Qatar Shenzhen University College of Mechatronics and Control Engineering National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Unmanned Aerial Vehicle (UAV)-powered 5G/6G networks integrated with rechargeable wireless sensor networks (RWSNs) offer promising solutions for extending system lifetime, collecting data, and providing computing serv... 详细信息
来源: 评论
DFT-SPREAD COMBINED WITH PTS METHOD TO REDUCE THE PAPR IN RADCOM SYSTEM  10
DFT-SPREAD COMBINED WITH PTS METHOD TO REDUCE THE PAPR IN RA...
收藏 引用
10th International Symposium on Test Automation and Instrumentation, ISTAI 2024
作者: Zhi, Ruxin Quart, Cong Xu, Zhan Yang, Xiaolong Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing China Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Beijing Information Science and Technology University Beijing China
In radar communication integration (RADCOM) systems based on orthogonal frequency division multiplexing (OFDM) technology, high peak to average power ratio (PAPR) is one of the main factors affecting system performanc... 详细信息
来源: 评论
Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fingerprint Recognition via Multi-phase Meta Task Adaptation  18th
Meta-RFF: Few-Shot Open-Set Incremental Learning for RF Fin...
收藏 引用
18th International Conference on Wireless Artificial Intelligent Computing Systems and Applications, WASA 2024
作者: Li, Taotao Wen, Zhenyu Jiang, Yuting Wang, Jian Su, Jie Hong, Zhen Yu, Li He, Shibo The Institute of Cyberspace Security and the College of Information Engineering Zhejiang University of Technology Hangzhou China University of Science and Technology of China Hefei China College of Control Science and Technology Zhejiang University Hangzhou China
RF fingerprinting (RFF) is a non-encrypted authentication technique that provides an additional layer of security for wireless devices, which has a promising application. However, existing RFF recognition techniques t... 详细信息
来源: 评论