咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 637 篇 期刊文献

馆藏范围

  • 1,431 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 510 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,337 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1431 条 记 录,以下是411-420 订阅
排序:
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Zhejiang University of Technology Institute of Cyberspace Security College of Information Engineering Hangzhou310023 China ZJUT Binjiang Institute of Artificial Intelligence Hangzhou310056 China Fudan University Adaptive Networks and Control Lab Department of Electronic Engineering School of Information Science and Technology Shanghai200433 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510006 China Beijing Institute of Technology School of Cyberspace Science and Technology Beijing100081 China Shenzhen518066 China National Key Laboratory of Electromagnetic Space Security Jiaxing314033 China
Due to the decentralized and public nature of the blockchain ecosystem, malicious activities on the Ethereum platform impose immeasurable losses on users. At the same time, the transparency of cryptocurrency transacti... 详细信息
来源: 评论
Dunhuang murals image inpainting method based on fusion classification pre-training model
Dunhuang murals image inpainting method based on fusion clas...
收藏 引用
Culture-Oriented science and technology (CoST), International Conference on
作者: Hui Ren Chengya Zhang Ke Sun Chenyu Ye School of Information and Communication Engineering Communication University of China Beijing China Key Laboratory of Audiovisual Technology and Intelligent Control System Ministry of Culture and Tourism Beijing China Beijing Key Laboratory of Modern Performing Arts Technology Beijing China School of Engineering and Applied Science University of Pennsylvania PA USA
Murals are an important part of China’s cultural heritage. Because of their age, Dunhuang murals have suffered from discoloration, fading and damage. With the development of computer image restoration technology, dig... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
NumbOD: A Spatial-Frequency Fusion Attack Against Object Detectors
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Bowen Song, Yufei Yu, Zhifei Hu, Shengshan Wan, Wei Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the advancement of deep learning, object detectors (ODs) with various architectures have achieved significant success in complex scenarios like autonomous driving. Previous adversarial attacks against ODs have be... 详细信息
来源: 评论
A Note on Basis of Lattice and Successive Minimal Vectors
SSRN
收藏 引用
SSRN 2024年
作者: Zhu, Chaoxi Zhao, Wei Zhao, Jianrong Zhou, Zhengchun National Key Laboratory of Security Communication Chengdu610041 China School of Economic Mathematics Southwestern University of Finance and Economics Chengdu610074 China School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China
Let L ∈ 2 be a lattice of 2-dimension. The conclusion "the shortest vector s1 (under the supremum norm) in L\{0} and the second shortest vector s2 (the shortest vector in L\{ns1|n ∈ }) form a base of L" is... 详细信息
来源: 评论
Multi-view infrared small target recognition based on YOLOv5
Multi-view infrared small target recognition based on YOLOv5
收藏 引用
Chinese Automation Congress (CAC)
作者: Hua Gong Shasha Liu Song Guan Kuaikuai Yu Fang Liu College of Science Shengyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjing China
In order to improve the recognition accuracy of small infrared targets in complex environment, a SyluInfrared dataset is built by taking multi-view infrared images with the Frock TiX600 infrared thermal imager. Seven ... 详细信息
来源: 评论
Joint Computation Offloading and Resource Allocation for LEO Satellite Networks Using Hierarchical Multi-Agent Reinforcement Learning
收藏 引用
IEEE Transactions on Cognitive communications and Networking 2024年
作者: Lai, Junyu Liu, Huashuo Xu, Guoyao Jiang, Weiwei Wang, Xiong Jiang, Dingde University of Electronic Science and Technology of China School of Aeronautics and Astronautics China Aircraft Swarm Intelligent Sensing and Cooperative Control Key Laboratory of Sichuan Province Chengdu611731 China University of Electronic Science and Technology of China School of Aeronautics and Astronautics Chengdu611731 China Ministry of Education Key Laboratory of Universal Wireless Communications China Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing100876 China University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China
The integration of edge computing with LEO satellite broadband networks (LSBNs) offers a transformative potential, yet remains underexplored in the optimization of joint computation offloading and resource allocation ... 详细信息
来源: 评论
Infrared Target Detection Based on the Fusion of Mask R-CNN and Image Enhancement Network
Infrared Target Detection Based on the Fusion of Mask R-CNN ...
收藏 引用
Chinese Automation Congress (CAC)
作者: Fang Liu Song Guan Kuaikuai Yu Hua Gong College of Science Shengyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjing China
In this paper, we focus on the problem of the infrared image detection. Aiming at the problem of the low contrast of the infrared images, an adaptive gamma transformation algorithm (AGT) is established to intelligentl... 详细信息
来源: 评论
IoT ETEI: End-to-End IoT Device Identification Method
IoT ETEI: End-to-End IoT Device Identification Method
收藏 引用
IEEE Conference on Dependable and Secure Computing
作者: Feihong Yin Li Yang Yuchen Wang Jiahao Dai Xidian University Xi'an China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
The past decades have seen the rapid development of Internet of Things (IoT) in various domains. Identifying the IoT devices connected to the network is a crucial aspect of network security. However, existing work on ... 详细信息
来源: 评论
Semi-LDPC Convolutional Codes:Construction and Low-Latency Windowed List Decoding
收藏 引用
Journal of communications and information Networks 2021年 第4期6卷 411-419页
作者: Qianfan Wang Suihua Cai Li Chen Xiao Ma School of Electronics and Communication Engineering Sun Yat-sen UniversityGuangzhou 510006China School of Computer Science and Engineering Sun Yat-sen UniversityGuangzhou 510006China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen UniversityGuangzhou 510006China School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China
This paper presents a new coding scheme called semi-low-density parity-check convolutional code(semi-LDPC-CC),whose parity-check matrix consists of both sparse and dense sub-matrices,a feature distinguished from the c... 详细信息
来源: 评论