咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 638 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 946 篇 工学
    • 511 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,339 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1433 条 记 录,以下是381-390 订阅
排序:
Analysis of Frequency Offset for Satellite Navigation Receiver Using Carrier-Aided Code Tracking Loop  20
Analysis of Frequency Offset for Satellite Navigation Receiv...
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Gao, Teng Wang, Lijun Jin, Xiaofan No.36 Research Institute of Cetc Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Carrier-aided code tracking loop is widely used in satellite navigation receivers. This kind of loop structure can reduce code tracking noise by narrowing the bandwidth of code tracking loop. The performance of carrie... 详细信息
来源: 评论
Deep Feature Surgery: Towards Accurate and Efficient Multi-Exit Networks
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Cheng Chen, Yao Luo, Qiuyang Lu, Ye Li, Tao Zhang, Yuzhi Sun, Yufei Zhang, Le College of Software Nankai University China College of Computer Science Nankai University China National University of Singapore Singapore School of Information and Communication Engineering University of Electronic Science and Technology of China China HAIHE Lab of ITAI China Tianjin Key Laboratory of Network and Data Security Technology China Key Laboratory of Data and Intelligent System Security Ministry of Education
Multi-exit network is a promising architecture for efficient model inference by sharing backbone networks and weights among multiple exits. However, the gradient conflict of the shared weights results in sub-optimal a... 详细信息
来源: 评论
A Method of Shadowsocks(R) Traffic Identification Based on Protocol Analysis  21
A Method of Shadowsocks(R) Traffic Identification Based on P...
收藏 引用
21st IEEE International Conference on communication technology, ICCT 2021
作者: Luo, Jie Bao, Liang Ni, Lvlin The 30th Research Institute of China Electronics Technology Group Corporation Science and Technology on Communication Security Laboratory Sichuan Chengdu China The Third Research Institute of Ministry of Public Security Key Lab of Information Network Security of Ministry of Public Security Shanghai China
Shadowsocks (R) is a proxy software based on Socks5, which is the collective name of Shadowsocks and Shadowsocks (R). In order to improves the shortcomings of other softwares breaking internet censorship, Shadowsocks ... 详细信息
来源: 评论
Simultaneous wireless information and power transfer transmitting architecture based on asynchronous space-time-coding digital metasurface[Invited]
收藏 引用
Chinese Optics Letters 2023年 第8期21卷 17-22页
作者: 祁振杰 戴俊彦 王思然 周群焰 唐万恺 王凯岑 张澎 刘硕 李龙 程强 崔铁军 State Key Laboratory of Millimeter Waves Southeast UniversityNanjing 210096China Institute of Electromagnetic Space Southeast UniversityNanjing 210096China Frontiers Science Center for Mobile Information Communication and Security Southeast UniversityNanjing 210096China National Mobile Communications Research Laboratory Southeast UniversityNanjing 210096China National Key Laboratory of Electromagnetic Information Control and Effects Shenyang 110035China Key Laboratory of High-Speed Circuit Design and EMC of Ministry of Education Xidian UniversityXi'an 710071China
Simultaneous wireless information and power transfer(SWIPT)architecture is commonly applied in wireless sensors or Internet of Things(IoT)devices,providing both wireless power sources and communication ***,the traditi... 详细信息
来源: 评论
High Precision Translational Compensation for Ultrahigh Resolution ISAR
High Precision Translational Compensation for Ultrahigh Reso...
收藏 引用
International Symposium on Antennas, Propagation and EM Theory (ISAPE)
作者: Lichao Yang Science and Technology on Communication Information Security Control Laboratory No. 36 Research Institute of CETC
In recent years, due to the emergence of ultrahigh resolution (UHR) radar systems, the bandwidth of radar has been increasing. However, conventional imaging algorithms have difficulties in the translational compensati... 详细信息
来源: 评论
Interference Coordination technology of Ultra Dense Deployment Based on Clustering Algorithm
Interference Coordination Technology of Ultra Dense Deployme...
收藏 引用
IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS)
作者: Haoyuan Wang Yue Tian Wenda Li Fujian Key Laboratory of Communication Network and Information Processing Xiamen University of Technology Xiamen China Department of Security and Crime Science University College London London United Kingdom
A clustering algorithm based Ultra Dense Deployment is proposed to address the problem of establishing a reasonable interference model and allocating ABS reasonably to minimize interference and maximize throughput in ...
来源: 评论
Joint Vehicle Pairing, Spectrum Assignment and Power control for Sum-Rate Maximization in NOMA-Based V2X Underlaid Cellular Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Xue, Tong Zhang, Haixia Ding, Hui Yuan, Dongfeng Shandong University of Science and Technology College of Electronic and Information Engineering Shandong Qingdao266590 China Shandong Key Laboratory of Intelligent Communication and Sensing-Computing Integration Shandong Jinan250061 China Shandong University School of Control Science and Engineering Shandong Jinan250061 China
Vehicle-to-everything (V2X) underlaid cellular networks in underlaid mode suffers catastrophic co-channel interference caused by spectrum sharing, results in a reduced system sum-rate. To cope with this, this work stu... 详细信息
来源: 评论
Link reliability prediction for long-range underwater acoustic communications between gliders
Link reliability prediction for long-range underwater acoust...
收藏 引用
2021 IEEE/CIC International Conference on communications in China, ICCC Workshops 2021
作者: Zhang, Lan Feng, W. Li, Jianlong Zhu, Huijie Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China Research Institution of China Electronics Technology Group Corporation Jiaxing341000 China Zhejiang University Ocean College Zhoushan316021 China Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China
Channel modeling and the prediction of the reliability of acoustic link is the key to a successful deployment of underwater acoustic networks (UAN). In this paper, we build a Bellhop-based simulation framework driven ... 详细信息
来源: 评论
Edge Node Cooperation and Resource Sharing in Mobile Edge Computing
Edge Node Cooperation and Resource Sharing in Mobile Edge Co...
收藏 引用
International Conference on Wireless communications and Signal Processing (WCSP)
作者: Anqi Meng Xiaozheng Gao Yuting Huang Zhan Xu Jiadong Shang Key Laboratory of Modern Measurement and Control Technology Ministry of Education Beijing Information Science and Technology University Beijing China Key Laboratory of Information and Communication Systems Ministry of Information Industry Beijing Information Science and Technology University Beijing China School of Information and Electronics Beijing Institute of Technology Beijing China Beijing Institute of Remote Sensing Equipment Beijing China
As edge computing undergoes ongoing development propelled by the advancements in Internet of Things and mobile communication technologies, the issue of edge node cooperation and resource sharing needs to be investigat...
来源: 评论
Domain Generalization for Cross-Receiver Radio Frequency Fingerprint Identification
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Ying Li, Qiang Liu, Hongli Yang, Liu Yang, Jian School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu611731 China Beijing Institute of Technology Beijing100081 China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing100083 China
Radio Frequency Fingerprint Identification (RFFI) technology uniquely identifies emitters by analyzing unique distortions in the transmitted signal caused by non-ideal hardware. Recently, RFFI based on deep learning m... 详细信息
来源: 评论