咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 653 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,448 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 960 篇 工学
    • 515 篇 计算机科学与技术...
    • 402 篇 软件工程
    • 369 篇 信息与通信工程
    • 243 篇 电子科学与技术(可...
    • 162 篇 电气工程
    • 99 篇 控制科学与工程
    • 91 篇 光学工程
    • 89 篇 仪器科学与技术
    • 77 篇 生物工程
    • 55 篇 机械工程
    • 50 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 35 篇 材料科学与工程(可...
    • 32 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 564 篇 理学
    • 281 篇 数学
    • 213 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 87 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 168 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 61 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 49 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 27 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 35 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,353 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1448 条 记 录,以下是291-300 订阅
排序:
Classification of Deforestation Factors in 6G Satellite Forest Images  5th
Classification of Deforestation Factors in 6G Satellite Fore...
收藏 引用
5th EAI International Conference on 6G for Future Wireless Networks, 6GN 2022
作者: Li, Yuhai Sun, Yuxin Meng, Xianglong Xi, Liang Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300300 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
The terrestrial satellite network will play an essential role in 6G. Through the satellite system, people can obtain a lot of ground image information to process tasks and feedback. Forest resource is an essential res... 详细信息
来源: 评论
6G Network Traffic Intrusion Detection Using Multiresolution Auto-encoder and Feature Matching Discriminator  5th
6G Network Traffic Intrusion Detection Using Multiresolution...
收藏 引用
5th EAI International Conference on 6G for Future Wireless Networks, 6GN 2022
作者: Li, Yuhai Sun, Yuxin He, Dong Xi, Liang Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300300 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
With the development of 6G technology, security and privacy have become extremely important in the face of larger network traffic bandwidth. An effective intrusion detection system can deal with the network attacks. D... 详细信息
来源: 评论
Modulation recognition of composite modulation signal based on two-fold digital receiver and goodness of fit test
Modulation recognition of composite modulation signal based ...
收藏 引用
2021 IEEE International Conference on Electronic technology, communication and information, ICETCI 2021
作者: Lijun, Wang Yu, Han Pan, Zhou Hongfang, Ge Lei, Shen Science and Technology on Communication Information Security Control Laboratory Jiaxing China The 36th Research Institute of China Electronics Technology Group Corporation Jiaxing China School of Communication Engineering Hangzhou Dianzi University Hangzhou China
Aiming at the modulation recognition problem of mixed signal set {BPSK, QPSK, BPSK-FM, QPSK-FM} with unknown parameters, this paper proposes a modulation recognition algorithm based on two-fold PLL (phase locked loop)... 详细信息
来源: 评论
Specific primary user sensing for wireless security in IEEE 802.22 network
Specific primary user sensing for wireless security in IEEE ...
收藏 引用
International Symposium on communications and information Technologies (ISCIT)
作者: Zhenxing Luo Caiyi Lou Shichuan Chen Shilian Zheng Shaowei Li Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is... 详细信息
来源: 评论
Multiway Dynamic Trust Chain Model on Virtual Machine for Cloud Computing
收藏 引用
China communications 2016年 第7期13卷 83-91页
作者: Jie Zhu Guoyuan Lin Fucheng You Huaqun Liu Chunru Zhou School of Computer Science and Technology China University of Mining&TechnologyXuzhou 221116China State Key Laboratory for Novel Software Technology hosted at Nanjing University Nanjing 210093China Information Engineering School of Beijing Institute of Graphic Communication Beijing 102600China Beijing Key Laboratory of Signal and Information Processing for High-end Printing Equipment Beijing Institute of Graphic CommunicationBeijing 100026China Information Security Center Beijing University of Posts and TelecommunicationsBeijing 100876China Nanjing University of Information Science&Technology Nanjing 210044China
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the *** secure the factors,a multiway dynamic trust chain transfer model was proposed on t... 详细信息
来源: 评论
Joint Delay and Maintenance Optimization for Spectrum Handoff in Cognitive Radio Networks Using Binary Shuffled Frog Leaping Algorithm
Joint Delay and Maintenance Optimization for Spectrum Handof...
收藏 引用
International Conference on communication technology (ICCT)
作者: Jianjun Jiang Shilian Zheng Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In cognitive radio networks, when a primary user reoccupies the channel, cognitive radios (CRs) need to vacate the channel and reestablish a link on some other channel to avoid interference to primary users, resulting... 详细信息
来源: 评论
Wideband spectrum sensing in modulated wideband converter based cognitive radio system
Wideband spectrum sensing in modulated wideband converter ba...
收藏 引用
International Symposium on communications and information Technologies (ISCIT)
作者: Shilian Zheng Xiaoniu Yang Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Wideband spectrum sensing is a fundamental problem in cognitive radio networks. In this paper, a wideband spectrum sensing procedure which consists of four steps, i.e., coarse support recovery, fine binary detection, ... 详细信息
来源: 评论
Distributed consensus algorithms for decision fusion based cooperative spectrum sensing in cognitive radio
Distributed consensus algorithms for decision fusion based c...
收藏 引用
International Symposium on communications and information Technologies (ISCIT)
作者: Shilian Zheng Xiaoniu Yang Caiyi Lou Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Spectrum sensing is one of the fundamental problems for cognitive radio. In cognitive radio networks, cognitive radios can cooperatively sense the spectrum to detect the presence of primary users with higher sensitivi... 详细信息
来源: 评论
A Study on Resource Allocation for Mobile Edge Computing-Assisted Industrial Iot
A Study on Resource Allocation for Mobile Edge Computing-Ass...
收藏 引用
2023 International Conference on Networks, communications and Intelligent Computing, NCIC 2023
作者: Lu, Jie Zhang, Yuexia Li, Junjie Ministry of Information Industry Beijing Information Science and Technology University Key Laboratory of Information and Communication Systems Beijing China Control Technology Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement Beijing China
Since the advancement of mobile communication technology, traditional industries are gradually transforming and upgrading, which leads to problems such as insufficient computing resources and excessive energy consumpt... 详细信息
来源: 评论
An Analysis of Routing Simulation technology of Unmanned Cluster Based on OPNET  1
收藏 引用
3rd EAI International Conference on Artificial Intelligence for communications and Networks, AICON 2021
作者: Dai, Jiahao Wang, Yuhui Zhu, Huijie Ren, Yongji Science and Technology on Communication Information Security Control Laboratory Harbin China China Electronic Corporation NO. 36 Institute Zhejiang Jiaxing China Naval Aviation University Changzhi China
The military strategic guideline under the new situation points out that the base point of future war preparation is to win the informationized war mainly from the direction of unmanned cluster. Routing protocol is an... 详细信息
来源: 评论