咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 637 篇 期刊文献

馆藏范围

  • 1,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 510 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,337 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1431 条 记 录,以下是351-360 订阅
排序:
RIS-aided Single-frequency 3D Imaging by Exploiting Multi-view Image Correlations
arXiv
收藏 引用
arXiv 2024年
作者: Huang, Yixuan Yang, Jie Wen, Chao-Kai Jin, Shi The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education The Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China The Institute of Communications Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan The National Mobile Communications Research Laboratory The Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China
Retrieving range information in three-dimensional (3D) radio imaging is particularly challenging due to the limited communication bandwidth and pilot resources. To address this issue, we consider a reconfigurable inte... 详细信息
来源: 评论
An image enhancement algorithm based on multi-scale Retinex theory to improve the images quality of sensors  12
An image enhancement algorithm based on multi-scale Retinex ...
收藏 引用
SPIE 12th International Symposium on Multispectral Image Processing and Pattern Recognition, MIPPR 2023
作者: Li, Yiyao Chen, Zhong Sun, Wenyuan School of Journalism and Communication Central China Normal University Luoyu Road 152 Wuhan China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Luoyu Road 1037 Wuhan China National Key Laboratory of Science and Technology on Multi-spectral Information Processing Luoyu Road 1037 Wuhan China Key Laboratory of Ministry of Education for Image Processing and Intelligent Control Luoyu Road 1037 Wuhan China Central China Normal University Library Luoyu Road 152 Wuhan China
Nowadays, image recognition plays a pivotal role in acquiring data via sensors. However, the adaptability of traditional algorithms is hindered by the unpredictable nature of open environments, varying sensor quality,... 详细信息
来源: 评论
Blockage-Resilient Integrated Sensing and communication in mmWave Networks: Multi-View Collaboration and Efficient Task Allocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Cui, Yue Ding, Haichuan Ma, Ying Li, Xuanheng Zhang, Haixia Fang, Yuguang Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Beijing Institute of Technology School of Information and Electronics Beijing100081 China Dalian University of Technology School of Information and Communication Engineering Dalian116023 China Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Shandong University Shandong Provincial Key Laboratory of Wireless Communication Technologies School of Control Science and Engineering Jinan250061 China City University of Hong Kong Department of Computer Science Hong Kong Hong Kong
Integrated sensing and communication (ISAC) has emerged as a promising technology for future millimeter wave (mmWave) networks. However, the susceptibility of mmWave signals to blockages poses considerable challenges ... 详细信息
来源: 评论
Motion Estimation and Signal Integration Method for High-Speed Target Detection With Airborne Bistatic Radar
Motion Estimation and Signal Integration Method for High-Spe...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Zerui Zhang Xiaolong Li Fan Yang Mingxing Wang Jie Gu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Electromagnetic Space Security Southwest China Research Institute of Electronic Equipment Chengdu China
This paper addresses the motion estimation and signal integration problem for high speed target detection with airborne bistatic radar, where the range migration (RM) and Doppler frequency migration (DFM) induced by t... 详细信息
来源: 评论
UAV-NIDD: A Dynamic Dataset for Cybersecurity and Intrusion Detection in UAV Networks
收藏 引用
IEEE Transactions on Network science and Engineering 2025年
作者: Hadi, Hassan Jalil Cao, Yue Khan, Muhammad Khurram Ahmad, Naveed Hu, Yulin Fu, Chao Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430073 China King Saud University Center of Excellence in Information Assurance Riyadh Saudi Arabia Prince Sultan University College of Computer and Information Science Riyadh Saudi Arabia Wuhan University School of Electronic Information China Information and Communication Technology Co. LtdChina China
Unmanned Aerial Vehicles (UAVs) are necessary for numerous tasks but are vulnerable to cyber threats due to their widespread use and connectivity. The lack of a comprehensive dataset necessitates the development of ef... 详细信息
来源: 评论
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network  6
GraphEye: A Novel Solution for Detecting Vulnerable Function...
收藏 引用
6th IEEE International Conference on Data science in Cyberspace, DSC 2021
作者: Zhou, Li Huang, Minhuan Li, Yujun Nie, Yuanping Li, Jin Liu, Yiwei School Of Information And Communication Engineering University Of Electronic Science And Technology Of China Chengdu China National Key Laboratory Of Science And Technology On Information System Security Beijing China School Of Computer Science And Engineering University Of Electronic Science And Technology Of China Chengdu China
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying o... 详细信息
来源: 评论
A Quantum Temporal Difference Learning Method Based on Quantum World Model
A Quantum Temporal Difference Learning Method Based on Quant...
收藏 引用
IEEE Conference on Global communications (GLOBECOM)
作者: Peigen Zeng Ying He F. Richard Yu Jianbo Du College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts and Telecommunications Xi’an China School of Information Technology Carleton University Ottawa Canada
Based on quantum parallelism theory and quantum phenomena such as superposition and entanglement, quantum reinforcement learning (QRL) has the potential to surpass classical reinforcement learning (RL). Although some ... 详细信息
来源: 评论
MGTN: Multi-scale Graph Transformer Network for 3D Point Cloud Semantic Segmentation
MGTN: Multi-scale Graph Transformer Network for 3D Point Clo...
收藏 引用
IEEE Visual communications and Image Processing (VCIP)
作者: Da Ai Siyu Qin Zihe Nie Hui Yuan Ying Liu Xi’an Key Laboratory of Image Processing Technology and Applications for Public Security Xi’an University of Posts and Telecommunications Xi’an China School of Communication and Information Engineering Xi’an University of Posts and Telecommunications Xi’an China School of Control Science and Engineering Shandong University Jinan China
The structural similarity of point clouds presents challenges in accurately recognizing and segmenting semantic information at the demarcation points of complex scenes or objects. In this study, we propose a multi-sca... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
Byzantine-Robust Federated Learning Framework via a Server-Client Defense Mechanisms
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Song, Anxiao Zhang, Tao Cheng, Ke Cao, Yang Zhu, Xinghui Shen, Yulong Xidian University School of Computer Science and Technology Xi’an China Shaanxi Key Laboratory of Network and System Security Shaanxi Xi’an710071 China Xidian University School of Computer Science and Technology Shaanxi Xi’an710071 China Xi’an University of Posts and Telecommunications Shaanxi Key Laboratory of Information Communication Network and Security Shaanxi Xi’an710121 China Institute of Science Tokyo Department of Computer Science Tokyo Japan
Federated Learning (FL), a distributed machine learning (ML) framework, is susceptible to Byzantine attacks since the attacker can manipulate clients' local data or models to compromise the performance of the glob... 详细信息
来源: 评论