咨询与建议

限定检索结果

文献类型

  • 1,496 篇 会议
  • 1,054 篇 期刊文献
  • 9 册 图书

馆藏范围

  • 2,559 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,645 篇 工学
    • 985 篇 计算机科学与技术...
    • 778 篇 软件工程
    • 599 篇 信息与通信工程
    • 319 篇 电子科学与技术(可...
    • 254 篇 电气工程
    • 219 篇 控制科学与工程
    • 138 篇 生物工程
    • 129 篇 仪器科学与技术
    • 126 篇 光学工程
    • 111 篇 机械工程
    • 90 篇 网络空间安全
    • 80 篇 安全科学与工程
    • 72 篇 化学工程与技术
    • 67 篇 生物医学工程(可授...
    • 65 篇 动力工程及工程热...
    • 51 篇 材料科学与工程(可...
    • 43 篇 航空宇航科学与技...
  • 893 篇 理学
    • 465 篇 数学
    • 295 篇 物理学
    • 180 篇 统计学(可授理学、...
    • 154 篇 生物学
    • 96 篇 系统科学
    • 92 篇 化学
  • 315 篇 管理学
    • 211 篇 管理科学与工程(可...
    • 114 篇 图书情报与档案管...
    • 79 篇 工商管理
  • 84 篇 医学
    • 72 篇 临床医学
    • 67 篇 基础医学(可授医学...
    • 44 篇 公共卫生与预防医...
  • 67 篇 法学
    • 48 篇 社会学
  • 35 篇 军事学
  • 26 篇 经济学
  • 22 篇 农学
  • 7 篇 教育学
  • 7 篇 艺术学
  • 6 篇 文学
  • 1 篇 哲学

主题

  • 74 篇 feature extracti...
  • 55 篇 deep learning
  • 49 篇 simulation
  • 49 篇 training
  • 45 篇 accuracy
  • 43 篇 internet of thin...
  • 43 篇 security
  • 38 篇 protocols
  • 36 篇 optimization
  • 36 篇 authentication
  • 35 篇 bandwidth
  • 35 篇 computational mo...
  • 35 篇 machine learning
  • 34 篇 real-time system...
  • 31 篇 semantics
  • 29 篇 data models
  • 28 篇 quantum cryptogr...
  • 26 篇 monitoring
  • 25 篇 wireless communi...
  • 25 篇 blockchain

机构

  • 177 篇 science and tech...
  • 89 篇 school of inform...
  • 63 篇 science and tech...
  • 62 篇 department of in...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 32 篇 purple mountain ...
  • 26 篇 department of in...
  • 25 篇 school of inform...
  • 24 篇 school of comput...
  • 23 篇 school of inform...
  • 23 篇 department of in...
  • 23 篇 key laboratory o...
  • 22 篇 school of comput...
  • 22 篇 school of cyber ...
  • 22 篇 school of cyber ...
  • 21 篇 institute of cyb...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 kralevska katina
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 18 篇 lin jia-chun
  • 17 篇 xuan qi
  • 17 篇 lee ming-chang
  • 16 篇 shu feng
  • 16 篇 jiang yuming
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun

语言

  • 2,118 篇 英文
  • 375 篇 其他
  • 66 篇 中文
  • 3 篇 日文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 朝鲜文
检索条件"机构=Science and Technology on Communication Information Security Control"
2559 条 记 录,以下是81-90 订阅
排序:
Typhoon Wind Speed Retrieval from HY-2C Microwave Radiometer Based on LightGBM
Typhoon Wind Speed Retrieval from HY-2C Microwave Radiometer...
收藏 引用
2024 Photonics and Electromagnetics Research Symposium, PIERS 2024
作者: Dai, Xuchen Zhang, Biao Zhang, Yifan Zhang, Lanjie Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing100101 China Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement and Control Technology Beijing100101 China
In this paper, the sea surface wind speed (SSWS) retrieval accuracy for HaiYang-2C (HY-2C) passive microwave radiometer under the severe weather such as typhoon is evaluated. Based on the observation data of HY-2C, th... 详细信息
来源: 评论
Aspects of Measurement Data Acquisition and Optimisation in the Energy Transformation of Industrial Facilities  21st
Aspects of Measurement Data Acquisition and Optimisation in ...
收藏 引用
21st Polish control Conference, PCC 2023
作者: Korus, Lukasz Jablonski, Andrzej Faculty of Information and Communication Technology Department of Control Systems and Mechatronics Wroclaw University of Science and Technology Wroclaw Poland
This article deals with the problem of energy management, understood as the effort to minimise the energy consumption in the industrial facilities by continuous improvement approach. Due to the fact that multi-level D... 详细信息
来源: 评论
Multi-objective Optimization in COVID19 Mitigation  21st
Multi-objective Optimization in COVID19 Mitigation
收藏 引用
21st Polish control Conference, PCC 2023
作者: Rafajlowicz, Wojciech Department of Control Systems and Mechatronics Faculty of Information and Communication Technology Wroclaw University of Science and Technology Wroclaw Poland
In this paper an optimization approach to decision process in COVID-19 mitigation is presented. The model is explained along with short information about multiobjective optimization. Finally results are shown on the t... 详细信息
来源: 评论
Optimizing mmWave UAV Networks: Mobility-Aware Deployment and Resource Allocation  100
Optimizing mmWave UAV Networks: Mobility-Aware Deployment an...
收藏 引用
100th IEEE Vehicular technology Conference, VTC 2024-Fall
作者: Li, Sicong Yoshii, Kazutoshi Shimamoto, Shigeru Ho, Tu Dac Waseda University Dept. of Communications and Computer Engineering Tokyo Japan Norwegian University of Science and Technology Dept. of Information Security and Communication Technology Trondheim Norway
Application of Unmanned Aerial Vehicles (UAVs) as small airborne base stations is gradually becoming a research hotspot in the field of wireless communications. With the flexible deployment, wide coverage and low cost... 详细信息
来源: 评论
Survivability Assessment of 5G Network Slicing During Massive Outages  13
Survivability Assessment of 5G Network Slicing During Massiv...
收藏 引用
13th International Workshop on Resilient Networks Design and Modeling, RNDM 2023
作者: Gajić, Marija Lange, Stanislav Vatten, Trond Furdek, Marija Heegaard, Poul E. Ntnu - Norwegian University of Science and Technology Department of Information Security and Communication Technology Norway Chalmers University of Technology Department of Electrical Engineering Sweden
Mobile networks support variety of heterogeneous services, including the emergency and mission-critical ones. The next generation of mobile networks introduces the concept of network slicing where different services c... 详细信息
来源: 评论
Multi-Party Privacy Policy Management in the Context of Health Monitoring: An Exploratory Study  23
Multi-Party Privacy Policy Management in the Context of Heal...
收藏 引用
8th International Conference on Sustainable information Engineering and technology, SIET 2023
作者: Sun, Luyi Yeng, Prosper Fauzi, Muhammad Ali Khatiwada, Pankaj Yang, Bian Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Faculty of Computer Science Brawijaya University Malang Indonesia
There is an increasing number of assisted living technologies and health monitoring systems to provide electronic health services and help patients and the elderly stay at home longer. It ensures users' safety and... 详细信息
来源: 评论
Radio Signal Modulation Pattern Recognition Based on Time-Frequency Adaptive Decomposition and Hybrid Neural Network
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Dai, Shaogang Xu, Jianwei Zhou, Huaji Hangzhou Dianzi University School of communication engineering Hangzhou310018 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China
Automatic modulation classification of electromagnetic signals has an important role in the field of signal processing. The current methods for identifying the modulation pattern of radio signals mainly used end-to-en... 详细信息
来源: 评论
Cybersecurity Awareness for Small and Medium-Sized Enterprises (SMEs): Availability and Scope of Free and Inexpensive Awareness Resources  1
收藏 引用
8th Workshop on the security of Industrial control Systems and of Cyber-Physical Systems, CyberICPS 2022, 6th International Workshop on security and Privacy Requirements Engineering, SECPRE 2022, 4th Workshop on security, Privacy, Organizations, and Systems Engineering, SPOSE 2022, 3rd Cyber-Physical security for Critical Infrastructures Protection, CPS4CIP 2022, 2nd International Workshop on Cyber Defence Technologies and Secure communications at the Network Edge, CDT and SECOMANE 2022, 1st International Workshop on Election Infrastructure security, EIS 2022 and 1st International Workshop on System security Assurance, SecAssure 2022 held in conjunction with 27th European Symposium on Research in Computer security, ESORICS 2022
作者: Chaudhary, Sunil Gkioulos, Vasileios Goodman, David Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Trust in Digital Life Brussels Belgium
Small and medium-sized enterprises (SMEs) are considered the backbone of Europe’s economy. However, SMEs are often bounded by resource constraints that also limit their cybersecurity posture. In such circumstances, S... 详细信息
来源: 评论
Hate Speech Detection in Code-Mixed Datasets using Pretrained Embeddings and Transformers
Hate Speech Detection in Code-Mixed Datasets using Pretraine...
收藏 引用
2024 International Conference on Frontiers of information technology, FIT 2024
作者: Sohail, Tooba Aiman, Atiqa Hashmi, Ehtesham Imran, Ali Shariq Daudpota, Sher Muhammad Yayilgan, Sule Yildirim Department of Computer Science Sukkur IBA University Sukkur Pakistan Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik Norway Department of Computer Science Norwegian University of Science and Technology Gjøvik Norway
Social media platforms are more accessible than needed in this digital era. People are given the freedom to express their thoughts, their emotions, and their opinions. And this freedom is being exploited negatively. I... 详细信息
来源: 评论
Detecting and Corrupting Convolution-based Unlearnable Examples  39
Detecting and Corrupting Convolution-based Unlearnable Examp...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Li, Minghui Wang, Xianlong Yu, Zhifei Hu, Shengshan Zhou, Ziqi Zhang, Longling Zhang, Leo Yu School of Software Engineering Huazhong University of Science and Technology China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Convolution-based unlearnable examples (UEs) employ class-wise multiplicative convolutional noise to training samples, severely compromising model performance. This fire-new type of UEs have successfully countered all...
来源: 评论