咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是391-400 订阅
排序:
A lightweight and high-precision approach for bulky JavaScript engines fuzzing
A lightweight and high-precision approach for bulky JavaScri...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and communications (TrustCom)
作者: Lianpei Zhou Xi Xiao Guangwu Hu Hao Li Xiangbo Wu Tao Zhou International Graduate School Tsinghua University Shenzhen China School of Computer Science Shenzhen Institute of Information Technology Shenzhen Guangdong China Science and Technology on Communication Networks Laboratory Shijiazhuang China Guangdong Provincial Key Laboratory of Cyber and Information Security Vulnerability Research Guangzhou China
Traditional coverage-based fuzzing gives equal attention to every part of a code. Despite much progress, we observe that existing schemes still not comprehensively use the coverage feedback mechanism when fuzzing bulk... 详细信息
来源: 评论
The Design of A Wide Bandwidth Tightly Coupled Array Antenna
The Design of A Wide Bandwidth Tightly Coupled Array Antenna
收藏 引用
IEEE Asia-Pacific Conference on Antennas and Propagation (APCAP)
作者: Feng-Si Xie Li-Li Sheng Guo Liu Wei-ping Cao School of Information and Communication GuiLin University of Electronic Technology Guilin China School of Information and Communication GuiLin University of Aerospace Technology Guilin China Science and Technology on Electronic Information Control Laboratory School of Information and Communication Chengdu China
We present a wideband Tightly Coupled Dipole Array (TCDA) with integrated balun and novel parasitic superstrate capable structure. The Array achieves over 7:1 bandwidth (0.25-1.81GHz) with VSWR < 3. The height of t... 详细信息
来源: 评论
Secure Vehicular Visible Light communications via STAR-RIS: Secrecy Capacity Evaluation
Secure Vehicular Visible Light Communications via STAR-RIS: ...
收藏 引用
communications and Networking (MeditCom), IEEE International Mediterranean Conference on
作者: Aicha Meghraoui Mohamed L. Tayebi Mokhtar Besseghier Tu Dac Ho LTTNS Laboratory University of Djillali Liabes Sidi bel Abbes Algeria University of Mustapha Stambouli Mascara Algeria Department of Information Security and Communication Technology Norwegian University of Science and Technology Department of Electrical Engineering UiT The Arctic University of Norway
This paper evaluates the performance of secrecy capacity, it is expressed as the difference between the channel capacity for the intended user and the channel capacity for the eavesdropper, in vehicle to vehicle (V2V)... 详细信息
来源: 评论
Secrecy Performance Analysis of Multi-Functional RIS-Assisted NOMA Networks
arXiv
收藏 引用
arXiv 2024年
作者: Pei, Yingjie Ni, Wanli Xu, Jin Yue, Xinwei Tao, Xiaofeng Niyato, Dusit School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Department of Electronic Engineering Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing100084 China Key Laboratory of Information and Communication Systems Ministry of Information Industry China Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing102206 China College of Computing and Data Science Nanyang Technological University Singapore639798 Singapore
Although reconfigurable intelligent surface (RIS) can improve the secrecy communication performance of wireless users, it still faces challenges such as limited coverage and double-fading effect. To address these issu... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Secure Rate-Splitting Multiple Access Transmissions in LMS Systems
arXiv
收藏 引用
arXiv 2023年
作者: He, Minjue Zhao, Hui Miao, Xiaqing Wang, Shuai Pan, Gaofeng Science and Technology on Electronic Information Control Laboratory Chengdu610043 China Communication Systems Department EURECOM Sophia Antipolis06410 France School of Information and Electronics Beijing Institute of Technology Beijing100081 China
This letter investigates the secure delivery performance of the rate-splitting multiple access scheme in land mobile satellite (LMS) systems, considering that the private messages intended by a terminal can be eavesdr... 详细信息
来源: 评论
Research on Lightweight Sensing technology Based on Single-Antenna Multicarrier
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jiang, Yu Zhu, Di Wang, Jiadong Hu, Aiqun Southeast University School of Cyber Scienc and Engineering Purple Mountain Laboratories Nanjing210096 China Key Laboratory of Computer Network Technology of Jiangsu Province Nanjing210096 China Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Southeast University School of Cyber Science and Engineering Nanjing210096 China Southeast University School of Cyber Science and Engineering School of Information Science and Engineering Nanjing210096 China Southeast University State Key Laboratory of Mobile Communication Nanjing210096 China
Channel State information (CSI) serves as a critical indicator of wireless signal conditions and is widely regarded by researchers for its sensitivity in detecting changes within the channel. However, traditional sens... 详细信息
来源: 评论
RainGaugeNet: CSI-Based Sub-6 GHz Rainfall Attenuation Measurement and Classification for ISAC Applications
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yan Yang, Jie Huang, Yixuan Yang, Tao Wen, Chao-Kai Jin, Shi The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Frontiers Science Center for Mobile Information Communication and Security Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing210096 China The National Engineering Research Center of Water Resources Efficient Utilization and Engineering Safety Institute of Water Science and Technology Hohai University Nanjing210098 China The Institute of Communications Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan The National Mobile Communications Research Laboratory Southeast University Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China
Rainfall impacts daily activities and can lead to severe hazards such as flooding. Traditional rainfall measurement systems often lack granularity or require extensive infrastructure. While the attenuation of electrom... 详细信息
来源: 评论
Research On Multi - Target Data Association and Location Algorithm Based On Passive Multi - Sensor System
Research On Multi - Target Data Association and Location Alg...
收藏 引用
International Conference on Wavelet Active Media technology and information Processing (ICWAMTIP)
作者: Yao Siyi Xu Jianliang Shen Weiguo Wang Li Li Wanchun School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Communication Information Security Control Laboratory Jiaxing PRC
In this paper, the multi-target positioning research is carried out on the basis of a passive multi-sensor reconnaissance system, which requires an algorithm to solve the problem of multi-target data association and p... 详细信息
来源: 评论
GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention Network
arXiv
收藏 引用
arXiv 2022年
作者: Zhou, Li Li, Yujun Li, Jin Huang, Minhuan Nie, Yuanping Liu, Yiwei School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China National Key Laboratory of Science and Technology on Information System Security Chengdu China National Key Laboratory of Science and Technology on Information System Security Beijing China
With the continuous extension of the Industrial Internet, cyber incidents caused by software vulnerabilities have been increasing in recent years. However, software vulnerabilities detection is still heavily relying o... 详细信息
来源: 评论