咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是371-380 订阅
排序:
Study on Fluctuation Characteristics of Acoustic Signals under Density Layered Fluid Disturbance
Study on Fluctuation Characteristics of Acoustic Signals und...
收藏 引用
IEEE/OES China Ocean Acoustics (COA)
作者: Jintao Yong Yunfei Chen Zhenshan Wang Bing Jia Rui Wang Shiqi Mo Science and Technology on Underwater Test and Control Laboratory Dalian China College of Underwater Acoustic Engineering Harbin Engineering University Harbin China College of Information and Communication Engineering Dalian University of Technology Dalian China
This study investigates the fluctuation characteristics of acoustic signals in the presence of flow field perturbations within density-stratified fluids through laboratory simulation experiments. A density stratificat... 详细信息
来源: 评论
Coastal SEA Surface Salinity Retrieval Analysis from SMAP Mission using Machine Learning
Coastal SEA Surface Salinity Retrieval Analysis from SMAP Mi...
收藏 引用
IEEE International Symposium on Geoscience and Remote Sensing (IGARSS)
作者: YanFang Lv YiFan Zhang JingYi Liu LanJie Zhang Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing China Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Key Laboratory of Microwave Remote Sensing National Space Science Center Chinese Academy of Sciences Beijing China
Sea surface salinity (SSS) plays an essential role in the study of global climate change. Especially, high accuracy coastal SSS is of great significance for marine aquaculture and other aspects. SMAP is a high resolut...
来源: 评论
An Enhanced Neuron Attribution-Based Attack Via Pixel Dropping
An Enhanced Neuron Attribution-Based Attack Via Pixel Droppi...
收藏 引用
IEEE International Conference on Image Processing
作者: Zhi Lin Anjie Peng Hui Zeng Kaijun Wu Wenxin Yu Southwest University of Science and Technology Sichuan MY China Engineering Research Center of Digital Forensics Ministry of Education Nanjing University of Information Science & Technology Jiangsu NJ China Science and Technology on Communication Security Laboratory Sichuan CD China
Convolutional neural networks (CNNs) are vulnerable to adversarial examples (AEs). Existing feature-level attacks explore the neuron importance to distort the intrinsic object-aware features which are shareable among ...
来源: 评论
An Adaptive Power Allocation Scheme for Mini-UAV Tracking with Distributed Radar in Dense Urban Environment  10
An Adaptive Power Allocation Scheme for Mini-UAV Tracking wi...
收藏 引用
10th International Conference on control, Automation and information sciences, ICCAIS 2021
作者: Cao, Ziyi Yuan, Ye Yi, Wei Chen, Linxiu University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu China Science and Technology on Complex System Control and Intelligent Agent Cooperation Laboratory Beijing China
In this paper, a new power allocation scheme of the distributed radar system is proposed for mini-UAV tracking tasks in urban environments, considering the influence of the building occlusion on the probability of det... 详细信息
来源: 评论
Distributed Multi-Sensor Multi-View Fusion of PHD Filter for Maneuvering Targets
Distributed Multi-Sensor Multi-View Fusion of PHD Filter for...
收藏 引用
2021 CIE International Conference on Radar, Radar 2021
作者: Peng, Cong Chai, Lei Yi, Wei Chen, Linxiu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Complex System Control and Intelligent Agent Cooperation Laboratory Beijing China
This paper addresses the problem of maneuvering multi-target tracking by a network of sensors having different and limited fields of view (FoV s). Each local sensor runs the Gaussian Mixture Probability Hypothetical D... 详细信息
来源: 评论
MISA: Unveiling the Vulnerabilities in Split Federated Learning
MISA: Unveiling the Vulnerabilities in Split Federated Learn...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Wei Wan Yuxuan Ning Shengshan Hu Lulu Xue Minghui Li Leo Yu Zhang Hai Jin School of Cyber Science and Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University Cluster and Grid Computing Lab
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users’ devices. The former excels in...
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
Securely Fine-tuning Pre-trained Encoders Against Adversaria...
收藏 引用
IEEE Symposium on security and Privacy
作者: Ziqi Zhou Minghui Li Wei Liu Shengshan Hu Yechao Zhang Wei Wan Lulu Xue Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
Why Does Little Robustness Help? A Further Step Towards Unde...
收藏 引用
IEEE Symposium on security and Privacy
作者: Yechao Zhang Shengshan Hu Leo Yu Zhang Junyu Shi Minghui Li Xiaogeng Liu Wei Wan Hai Jin National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University School of Software Engineering Huazhong University of Science and Technology Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology
Adversarial examples for deep neural networks (DNNs) are transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectures. Although a bun... 详细信息
来源: 评论
Optimizing multi-input scheduling for fuzzing test using Bayesian algorithm weight optimization
Optimizing multi-input scheduling for fuzzing test using Bay...
收藏 引用
10th International Symposium on Test Automation & Instrumentation (ISTAI 2024)
作者: Junzhe Fang Liyong Wang Haojie Ji Teng Guo Te Hu Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing People's Republic of China Zaozhuang Network Security Guarantee Center Zaozhuang People's Republic of China
As a major software testing method, fuzzing has the potential to enhance testing coverage and detect a great number of software vulnerabilities in complex code programs. The current fuzzy testing for multiple input pa...
来源: 评论
Joint Optimization of Uplink Spectrum Efficiency and UAV Trajectory in Cell-Free UAV Networks
Joint Optimization of Uplink Spectrum Efficiency and UAV Tra...
收藏 引用
IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom) Green Computing and communications (GreenCom)
作者: Jian He Chunyu Pan Qian Chen The Key Laboratory of Information and Communication Systems Ministry of Information Industry and the Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China School of Architecture and Transportation Engineering Guilin University of Electronic Technology Guilin China
The flexible mobility characteristics of unmanned aerial vehicle (UAV) lead to frequent handover and inter cell interference issues in traditional cellular based UAV assisted communication systems. Establishing cell-f...
来源: 评论