咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 653 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 960 篇 工学
    • 515 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 369 篇 信息与通信工程
    • 243 篇 电子科学与技术(可...
    • 162 篇 电气工程
    • 99 篇 控制科学与工程
    • 91 篇 光学工程
    • 89 篇 仪器科学与技术
    • 77 篇 生物工程
    • 55 篇 机械工程
    • 50 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 32 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 564 篇 理学
    • 281 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 87 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 49 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 27 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 35 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,353 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1448 条 记 录,以下是201-210 订阅
排序:
The autocorrelation distribution of balanced Boolean function
收藏 引用
Frontiers of Computer science 2013年 第2期7卷 272-278页
作者: Yu ZHOU Weiguo ZHANG Juan LI Xinfeng DONG Guozhen XIAO Science and Technology on Communication Security Laboratory China Chengdu 610041 State Key Laboratory of Integrated Service Networks Xidian UniversityChina Xi'an 710071 Foreign Language Department Emei Campus Southwest Jiaotong University China Emei 614202 State Key Laboratory of Information Security Chinese Academy of SciencesChina Beijing 100093
The global avalanche characteristics (the sum- of-squares indicator and the absolute indicator) measure the overall avalanche characteristics of a cryptographic Boolean function. Sung et al. (1999) gave the lower ... 详细信息
来源: 评论
Load Feedback-Based Resource Scheduling and Dynamic Migration-Based Data Locality for Virtual Hadoop Clusters in OpenStack-Based Clouds
收藏 引用
Tsinghua science and technology 2017年 第2期22卷 149-159页
作者: Dan Tao Zhaowen Lin Bingxu Wang School of Electronic and Information Engineering Beijing Jiaotong UniversityBeijing 100044China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing 210003China Network and Information Center Institute of Network TechnologyScience and Technology on Information Transmission and Dissemination in Communication Networks LaboratoryNational Engineering Laboratory for Mobile Network SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
With cloud computing technology becoming more mature, it is essential to combine the big data processing tool Hadoop with the Infrastructure as a Service(Iaa S) cloud platform. In this study, we first propose a new ... 详细信息
来源: 评论
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach
收藏 引用
Computers, Materials & Continua 2021年 第12期69卷 2903-2916页
作者: Jia-Shun Zhang Gang Xu Xiu-Bo Chen Haseeb Ahmad Xin Liu Wen Liu Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Inner Mongolia University of Science&Technology School of Information EngineeringBaotou014010China State Key Laboratory of Media Convergence and Communication Communication University of China School of Computer Science and Cybersecurity Communication University of China Key Laboratory of Convergent Media and Intelligent Technology Communication University of China Ministry of EducationBeijing102204China
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr... 详细信息
来源: 评论
Design and simulation of a S-band high gain antenna with metamaterial lens
Design and simulation of a S-band high gain antenna with met...
收藏 引用
2011 Cross Strait Quad-Regional Radio science and Wireless technology Conference, CSQRWC 2011
作者: Huang, Shuai Yang, Cheng Hua, Jun Wu, Qun Dept. of Microwave Engineering Harbin Institute of Technology Harbin 150001 China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China
The patch antenna with metamaterial lens can effectively enhance the gain of the antenna. A new type of metamaterial lens is proposed in this paper, it is easy to distinguish as double negative metamaterial, presentin... 详细信息
来源: 评论
Cognitive Method Discussion on communication Jamming Intelligent Decision  2020
Cognitive Method Discussion on Communication Jamming Intelli...
收藏 引用
2020 International Conference on Aviation Safety and information technology, ICASIT 2020
作者: Jin, Hu Shen, Weiguo Zhao, Fan Science and Technology on Communication Information Security Control Laboratory Research Institute Jiaxing China Electronic Countermeasure Institute National University of Defense Technology Hefei China
The application of reconfigurable, programmable and cognitive radio technologies in communication systems has put forward new requirements for communication jamming decision. In this paper, the overall scheme of cogni... 详细信息
来源: 评论
Code rate estimation and code sequence retrieval of the binary phase-coded radar signal using further autocorrelation analysing
Code rate estimation and code sequence retrieval of the bina...
收藏 引用
2019 International Conference on communications, information System, and Computer Engineering, CISCE 2019
作者: Jiang, Bin Li, Jie Yang, Xiaohong Zhu, Jun Xiong, Ying Tang, Bin Science and Technology on Communication Information Security Control Laboratory 36th Research Institute of CETC Jiaxing China University of Electronic Science and Technology of China Chengdu China
The binary phase-coded radar signal code rate estimation and code sequence retrieval are important in EW and ELINT. In this paper, the statistical autocorrelation function of the binary phase-coded radar signal is stu... 详细信息
来源: 评论
Swing error phase modulation jamming method of airborne SAR
Swing error phase modulation jamming method of airborne SAR
收藏 引用
2019 International Conference on communications, information System, and Computer Engineering, CISCE 2019
作者: Li, Jie Jiang, Bin Liang, Wenyan Zhu, Jun Xiong, Ying Tang, Bin Science and Technology on Communication Information Security Control Laboratory 36th Research Institute of CETC Jiaxing China University of Electronic Science and Technology of China Chengdu China
A new airborne synthetic aperture radar (SAR) jamming-swing error phase modulation jamming is presented. The method uses the swing error of the line-of-sight SAR during the motion of the airborne SAR and modulate the ... 详细信息
来源: 评论
Bitstream protocol classification mechanism based on feature extraction
Bitstream protocol classification mechanism based on feature...
收藏 引用
2019 International Conference on Networking and Network Applications, NaNA 2019
作者: Wang, Wei Bai, Binbin Wang, Yichuan Hei, Xinhong Zhang, Li Science and Technology on Communication Information Security Control Laboratory No.36 Research Institution of CETC China College of Computer Science and Engineering Xi'An University of Technology Xi'an China
In recent years, with the continuous expansion of network communication scale, the types of niche protocols and various proprietary communication protocols are increasing day by day, but botnet and various network att... 详细信息
来源: 评论
Direct multi-hop time synchronization with constructive interference
Direct multi-hop time synchronization with constructive inte...
收藏 引用
11th ACM/IEEE Conference on information Processing in Sensing Networks, IPSN'12
作者: Wang, Yin Pan, Gaofeng Huang, Zhiyu MOE Key Lab. for Information System Security School of Software TNLIST China Science and Technology on Communication Information Security Control Laboratory China Institute of Software Chinese Academy of Sciences China
Multi-hop time synchronization in wireless sensor networks (WSNs) is often time-consuming and error-prone due to random time-stamp delays for MAC layer access and unstable clocks of intermediate nodes. Constructive in... 详细信息
来源: 评论
A Review of Intelligent Configuration and Its security for Complex Networks
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 920-947页
作者: Yue ZHAO Bin YANG Fei TENG Xianhua NIU Ning HU Bo TIAN Science and Technology on Communication Security Laboratory School of Computer and Information Engineering Chuzhou University School of Computing and Artificial Intelligence Southwest Jiaotong University School of Computer and Software Engineering Xihua University Cyberspace Institute of Advanced Technology Guangzhou University
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur... 详细信息
来源: 评论