咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 638 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 946 篇 工学
    • 511 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,339 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1433 条 记 录,以下是111-120 订阅
排序:
Channel and space-based joint rate allocation algorithm
Channel and space-based joint rate allocation algorithm
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dayong Wang Chao Yuan Yu Sun Xin Lu Hui Guo Frederic Dufaux Ce Zhu Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University Chongqing Key Laboratory of Image Cognition Chongqing University of Posts and Telecommunications China Department of Computer Science University of Central Arkansas Faculty of Computing Engineering and Media (CEM) De Montfort University UK Université Paris-Saclay CNRS CentraleSupélec Laboratoire Des Signaux et Systèmes France School of Information and Communication Engineering University of Electronic Science and Technology of China
Rate control is a critical component for image and video compression Particularly under limited network bandwidth conditions, bitrate control is essential to ensure efficient image transmission by effectively allocati... 详细信息
来源: 评论
Software design for high-speed data capture
Software design for high-speed data capture
收藏 引用
2014 2nd International Conference on Mechatronics, Robotics and Automation, ICMRA 2014
作者: Zhang, Wei Feng Science and Technology on Communication Information Security Control Laboratory Jiangnan Electronic Communication Institute Jiaxing Zhejiang China
10G Ethernet technology has been widely used in modern high speed communication system. As a result, program design for high-speed data capture on 10G Ethernet, as the first and important step in network monitor and a... 详细信息
来源: 评论
Sub-Sample High-Resolution TOA Estimation Algorithm for LTE Downlink  9
Sub-Sample High-Resolution TOA Estimation Algorithm for LTE ...
收藏 引用
2017 9th IEEE International Conference on communication Software and Networks (ICCSN 2017)
作者: Huijie Zhu Jiawei Zhu Bin Jiang Science and Technology on Communication Information Security Control Laboratory No. 36 Research Institute of China Electronics Technology Group Corporation
This paper presents a novel super-resolution time of arrive(TOA) estimation algorithm, which utilizes the primary synchronization signal(PSS) in LTE downlink. Unlike the conventional coherent detection algorithm with ... 详细信息
来源: 评论
Cognitive radio adaptation for power consumption minimization using biogeography-based optimization
收藏 引用
Chinese Physics B 2016年 第12期25卷 499-506页
作者: 齐佩汉 郑仕链 杨小牛 赵知劲 School of Telecommunications Engineering Xidian University Xi'an 710071 China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China School of Telecommunications Hangzhou Dianzi University Hangzhou 310018 China
Adaptation is one of the key capabilities of cognitive radio, which focuses on how to adjust the radio parameters to optimize the system performance based on the knowledge of the radio environment and its capability a... 详细信息
来源: 评论
Uplink control information Based Clustered Access and Discontinuous Reception Management for mMTC
收藏 引用
IEEE communications Letters 2025年
作者: Wang, Shao-Di Wang, Chang-Long Wang, Hui-Ming Zhou, Feng Leung, Victor C. M. Xidian University Key Laboratory of Electronic Information Countermeasure and Simulation Technology of Ministry of Education Xi’an710071 China Xi’an Jiaotong University School of Information and Communication Engineering Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an710049 China Shenzhen MSU BIT University Artificial Intelligence Research Institute Shenzhen518172 China Shenzhen University College of Computer Science and Software Engineering Shenzhen518060 China The University of British Columbia Department of Electrical and Computer Engineering VancouverBCV6T 1Z4 Canada
Uplink control information (UCI) and discontinuous reception (DRX) play important roles for massive machine type communication (mMTC). Despite their standalone significance, a conspicuous gap exists in comprehensively... 详细信息
来源: 评论
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
收藏 引用
China communications 2018年 第2期15卷 190-208页
作者: Jin Li Jinfu Chen Minhuan Huang Minmin Zhou Wanggen Xie Zhifeng Zeng Shujie Chen Zufa Zhang National key laboratory of science and technology on information system security Beijing institute of system engineering School of Computer Science and Communication Engineering Jiangsu University
Software an important way to vulnerability mining is detect whether there are some loopholes existing in the software, and also is an important way to ensure the secu- rity of information systems. With the rapid devel... 详细信息
来源: 评论
Generative Adversarial Network-Based Electromagnetic Signal Classification: A Semi- Supervised Learning Framework
收藏 引用
China communications 2020年 第10期17卷 157-169页
作者: Huaji Zhou Licheng Jiao Shilian Zheng Lifeng Yang Weiguo Shen Xiaoniu Yang Key Laboratory of Intelligent Perception and Image Understanding of Ministry of Education School of Artificial IntelligenceXidian UniversityXi'an 710071China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033China
Generative adversarial network(GAN)has achieved great success in many fields such as computer vision,speech processing,and natural language processing,because of its powerful capabilities for generating realistic *** ... 详细信息
来源: 评论
Fast Fourier single-pixel imaging based on Sierra–Lite dithering algorithm
收藏 引用
Chinese Physics B 2019年 第6期28卷 189-194页
作者: Zhen-Yu Liang Zheng-Dong Cheng Yan-Yan Liu Kuai-Kuai Yu Yang-Di Hu National University of Defense Technology State Key Laboratory of Pulsed Power Laser TechnologyHefei 230037China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin 300000China
The single-pixel imaging(SPI) technique is able to capture two-dimensional(2 D) images without conventional array sensors by using a photodiode. As a novel scheme, Fourier single-pixel imaging(FSI) has been proven cap... 详细信息
来源: 评论
MILP-aided bit-based division property for ARX ciphers
收藏 引用
science China(information sciences) 2018年 第11期61卷 229-231页
作者: Ling SUN Wei WANG Ru LIU Meiqin WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Science and Technology on Communication Security Laboratory No.30 Research Institute of China Electronics Technology Group Corporation State Key Laboratory of Cryptology
Division property, which was proposed by Todo [1]at EUROCRYPT 2015, is a new technique to detect integral property. It could explicitly depict the hidden properties between the traditional ALL and BALANCE properties i... 详细信息
来源: 评论
Energy-Efficient Trajectory Design and Unsupervised Clustering for UAV-Aided Fair Data Collections with Dense Ground Users
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Song, Dan Zhai, Xiangping Bryce Liu, Xin Liu, Zhiquan Tan, Chee Wei Li, Congduan Sun Yat-sen University School of Electronics and Communication Engineering Shenzhen518107 China Huangpu Customs District P.R.China Guangdong Provincial Key Laboratory of Intelligent Port Security Inspection Guangzhou510700 China Nanjing University of Aeronautics and Astronautics College of Computer Science and Technology Nanjing211106 China Dalian University of Technology School of Information and Communication Engineering Dalian116024 China 54th Research Institute of CECT Shijiazhuang050081 China Jinan University College of Cyber Security Guangzhou510632 China Nanyang Technological University Nanyang Ave Singapore Singapore
In remote or high-demand wireless cellular networks, efficient data collection from ground users (GUs) with fixed infrastructure poses a significant challenge. Unmanned aerial vehicles (UAVs) have emerged as a promisi... 详细信息
来源: 评论