咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 638 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 946 篇 工学
    • 511 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,339 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1433 条 记 录,以下是441-450 订阅
排序:
Radar Sea Clutter Modeling and Reconstruction Based on Statistical Singularity Power Spectrum  5
Radar Sea Clutter Modeling and Reconstruction Based on Stati...
收藏 引用
5th IEEE International Conference on Signal and Image Processing, ICSIP 2020
作者: Xiong, Gang Huang, Baigang Science and Technology on Communication Information Security Control Lab. Jiaxing China Shanghai Key Lab. for Intelligent Sensing and Recognition Sjtu Shanghai China No.36 Research Institute of Cetc Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In this paper, the radar clutter reconstruction model based on singularity power spectrum (SPS) and instantaneous singularity exponent (ISE) is proposed. The proposed ISE-SPS model consists of power measure channel an... 详细信息
来源: 评论
Constraint-Pareto Dominance and Diversity Enhancement Strategy based Evolutionary Algorithm for Solving Constrained Multiobjective Optimization Problems
收藏 引用
IEEE Transactions on Evolutionary Computation 2025年
作者: Liu, Zhe Han, Fei Ling, Qinghua Han, Henry Jiang, Jing Jiangsu University School of Computer Science and Communication Engineering Zhenjiang212013 China Hefei Comprehensive National Science Center Anhui Energy Laboratory Institute of Energy China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Zhenjiang212013 China Jiangsu University of Science and Technology School of Computer Science Zhenjiang212003 China Baylor University School of Engineering and Computer Science Waco76798 United States Anqing Normal University School of Computer and Information Anqing246011 China
The utilization of both constrained and unconstrained-based optimization for solving constrained multi-objective optimization problems (CMOPs) has become prevalent among recently proposed constrained multiobjective ev... 详细信息
来源: 评论
Integrated high-performance error correction for continuous-variable quantum key distribution
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Chuang Li, Yang Ma, Li Yang, Jie Huang, Wei Sun, Ao Wang, Heng Luo, Yujie Li, Yong Chen, Ziyang Lau, Francis C.M. Zhang, Yichen Yu, Song Guo, Hong Xu, Bingjie National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China College of Computer Science Chongqing University Chongqing400044 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Center for Quantum Information Technology Peking University Beijing100871 China Department of Electronic and Information Engineering Hong Kong Polytechnic University Hong Kong State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China
An integrated error-correction scheme with high throughput, low frame errors rate (FER) and high reconciliation efficiency under low signal to noise ratio (SNR) is one of the major bottlenecks to realize high-performa... 详细信息
来源: 评论
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论
Towards Few-shot Inductive Link Prediction on Knowledge Graphs: A Relational Anonymous Walk-guided Neural Process Approach
arXiv
收藏 引用
arXiv 2023年
作者: Zhao, Zicheng Luo, Linhao Pan, Shirui Nguyen, Quoc Viet Hung Gong, Chen School of Computer Science and Engineering Nanjing University of Science and Technology China Jiangsu Key Laboratory of Image and Video Understanding for Social Security China Department of Data Science and AI Monash University Australia School of Information and Communication Technology Griffith University Australia Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education
Few-shot inductive link prediction on knowledge graphs (KGs) aims to predict missing links for unseen entities with few-shot links observed. Previous methods are limited to transductive scenarios, where entities exist... 详细信息
来源: 评论
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Liu, Yajun Ding, Yulian Li, Aimin Fei, Rong Guo, Xie Wu, Fangxiang Xi'an University of Technology Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China University of Saskatchewan Division of Biomedical Engineering Saskatoon Canada Xi'an University of Technology Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an China University of Saskatchewan Division of Biomedical Engineering Department of Computer Science Department of Mechanical Engineering Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
Secure communication of Active RIS Assisted NOMA Networks
arXiv
收藏 引用
arXiv 2024年
作者: Li, Xuehua Pei, Yingjie Yue, Xinwei Liu, Yuanwei Ding, Zhiguo The Key Laboratory of Information and Communication Systems Ministry of Information Industry The Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing100101 China The School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China The School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom Department of Electrical Engineering and Computer Science Khalifa University Abu Dhabi United Arab Emirates
As a revolutionary technology, reconfigurable intelligent surface (RIS) has been deemed as an indispensable part of the 6th generation communications due to its inherent ability to regulate the wireless channels. Howe... 详细信息
来源: 评论
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsourcing Testing DApps in Industrial control Through Trusted Smart Community and Lock Mechanism
SAMOC: Enabling Atomic Invocations for Cross-chain Crowdsour...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and communications (TrustCom)
作者: Weiguo Huang Yong Ding Jun Li Yujue Wang Hai Liang Changsong Yang Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Engineering Research Center of Industrial Internet Security and Blockchain Guilin University of Electronic Technology Guilin China Lion Rock Labs of Cyberspace Security Institute of Cyberspace Technology HKCT Institute for Higher Education China China Industrial Control Systems Cyber Emergency Response Team Beijing China Hangzhou Innovation Institute of Beihang University Hangzhou China
Crowdsourcing testing leverages extensive user participation to identify and fix potential issues in industrial control software, ensuring its security and reliability. Decentralized applications (DApps) can utilize b... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar... 详细信息
来源: 评论
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms
收藏 引用
Computer Systems science & Engineering 2022年 第10期43卷 87-102页
作者: Safaa El-Gazar Walid El-Shafai Ghada El-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed Abd-Elnaby Fathi E.Abd El-Samie Department of Electrical Engineering Faculty of EngineeringEgyptian-Russian UniversityCairoEgypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Security Engineering Laboratory Department of Computer SciencePrince Sultan UniversityRiyadh11586Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic EngineeringMenoufia UniversityMenouf32952Egypt Department of Computer Engineering College of Computers and Information TechnologyTaif UniversityTaif21944Saudi Arabia Department of Information Technology College of Computer and Information SciencesPrincess Nourah Bint Abdulrahman UniversityRiyadh84428Saudi Arabia
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last *** achieves safe access to systems using biometrics instead of the traditional *** utilization of a biometric in it... 详细信息
来源: 评论