咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是461-470 订阅
排序:
An Ultra-fast Quantum Random Number Generation Scheme Based on Laser Phase Noise
arXiv
收藏 引用
arXiv 2023年
作者: Yang, Jie Wu, Mei Zhang, Yichen Liu, Jinlu Fan, Fan Li, Yang Huang, Wei Wang, Heng Pan, Yan Su, Qi Bian, Yiming Jiang, Haoyuan Dou, Jiayi Yu, Song Xu, Bingjie Luo, Bin Guo, Hong State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Cryptology Beijing100878 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Electronics Center for Quantum Information Technology Peking University Beijing100871 China
Based on the intrinsic random property of quantum mechanics, quantum random number generators allow for access of truly unpredictable random sequence and are now heading towards high performance and small miniaturizat... 详细信息
来源: 评论
DarkSAM: fooling segment anything model to segment nothing  24
DarkSAM: fooling segment anything model to segment nothing
收藏 引用
Proceedings of the 38th International Conference on Neural information Processing Systems
作者: Ziqi Zhou Yufei Song Minghui Li Shengshan Hu Xianlong Wang Leo Yu Zhang Dezhong Yao Hai Jin National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Cluster and Grid Computing Lab and School of Computer Science and Technology Huazhong University of Science and Technology School of Cyber Science and Engineering Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System and Services Computing Technology and System Lab and Hubei Engineering Research Center on Big Data Security and Hubei Key Laboratory of Distributed System Security and School of Cyber Science and Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
An Anti-jamming Intelligent Decision-Making Method for Multi-user communication Based on Deep Reinforcement Learning
An Anti-jamming Intelligent Decision-Making Method for Multi...
收藏 引用
International Conference on communication technology (ICCT)
作者: Lan Zhang Liang Ma Feng Tian Tianyi Liang Science and Technology on Communication Information Security Control Laboratory Jiaxing China The 36th Research Institution of China Electronics Technology Group Corporation Jiaxing China Nanjing University of Posts and Telecommunications Nanjing China
In order to effectively cope with the external malicious jamming from jammers and avoid mutual interference caused by competitive channels among users, an intelligent antijamming decision-making method based on deep r... 详细信息
来源: 评论
Fast Coding Mode Decision for Intra Prediction in VVC SCC
收藏 引用
IEEE Transactions on Broadcasting 2025年 第2期71卷 506-516页
作者: Dayong Wang Weihong Liu Zeyu Zhou Xin Lu Jinhua Liu Hui Guo Ce Zhu Chongqing Key Laboratory on Big Data for Bio Intelligence Chongqing University of Posts and Telecommunications Chongqing China Guangxi Key Laboratory of Machine Vision and Intelligent Control Wuzhou University Wuzhou China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing China School of Cybersecurity Chengdu University of Information Technology Chengdu China School of Computer Science and Informatics De Montfort University Leicester U.K. School of Digital Technology Industry Shangrao Normal University Shangrao China Glasgow College and the School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China
Currently, screen content video applications are widely used in our daily lives. As the latest Screen Content Coding (SCC) standard, Versatile Video Coding (VVC) SCC employs a quad-tree plus nested multi-type tree (QT... 详细信息
来源: 评论
Research on Secure communication Methods for High-Speed Cross-Network Data Exchange
Research on Secure Communication Methods for High-Speed Cros...
收藏 引用
Electronic information Engineering and Computer communication (EIECC), International Conference on
作者: Yao Zhang Yitao Chen Jiujiang Fei Guojun Peng Rong Su Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Wuhan China Wuhan Maritime Communication Research Institute Wuhan China Wuhan Railway Vocational College of Technology Wuhan China
This paper introduces the application requirements for high-speed secure communication across networks, the fundamental principles of cross-network data exchange, and its implementation. Based on high-speed switch tec... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论
Joint Radar-communication Beamforming for CRB-Based Target Localization
Joint Radar-Communication Beamforming for CRB-Based Target L...
收藏 引用
IEEE Conference on Vehicular technology (VTC)
作者: Tianhao Mao Jie Yang Le Liang Shi Jin National Mobile Communications Research Laboratory Southeast University Nanjing China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing China Purple Mountain Laboratories Nanjing China
This paper studies the beamformer design for an integrated sensing and communication system where simultaneous communication for multiple downlink users and bistatic sensing for a point target are realized. Firstly, t... 详细信息
来源: 评论
Towards improving detection performance for malware with a correntropy-based deep learning method
收藏 引用
Digital communications and Networks 2021年 第4期7卷 570-579页
作者: Xiong Luo Jianyuan Li Weiping Wang Yang Gao Wenbing Zhao School of Computer and Communication Engineering University of Science and Technology BeijingBeijing100083China Beijing Key Laboratory of Knowledge Engineering for Materials Science Beijing100083China Beijing Intelligent Logistics System Collaborative Innovation Center Beijing101149China China Information Technology Security Evaluation Center Beijing100085China Department of Electrical Engineering and Computer Science Cleveland State UniversityClevelandOH44115USA
With the rapid development of Internet of Things(IoT)technologies,the detection and analysis of malware have become a matter of concern in the industrial application of Cyber-Physical System(CPS)that provides various ... 详细信息
来源: 评论
Combined Field Integral Equation Using Multibranch RWG Functions for Electromagnetic Scattering from Piecewise Homogeneous Dielectric Objects with Junctions
收藏 引用
IEEE Antennas and Wireless Propagation Letters 2025年
作者: Dong, Zhiwen Chen, Xinlei Gao, Fan Gu, Changqing Li, Zhuo Yang, Wu Lu, Weibing Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Key Laboratory of Radar Imaging and Microwave Photonics Nanjing211106 China Nanjing University of Aeronautics and Astronautics College of Electronic and Information Engineering Key Laboratory of Radar Imaging and Microwave Photonics Key Laboratory of Inlet and Exhaust System Technology Nanjing211106 China Southeast University State Key Laboratory of Millimeter Waves Nanjing210096 China Southeast University State Key Laboratory of Millimeter Waves School of Information Science and Engineering Nanjing210096 China Southeast University Center for Flexible RF Technology MOE Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing210096 China
A new method that utilizes multibranch Rao-Wilton-Glisson (MB-RWG) functions and the electric and magnetic current combined field integral equations (JMCFIE) is proposed for analyzing piecewise homogeneous dielectric ... 详细信息
来源: 评论
Analysis of Attack Effectiveness Evaluation of AD hoc Networks based on Rough Set Theory
Analysis of Attack Effectiveness Evaluation of AD hoc Networ...
收藏 引用
International Conference on Computational Intelligence and security
作者: Jiahao Dai Yongqun Chen Science and Technology on Communication Information Security Control Laboratory China Electronic Corporation NO.36 Institute Jiaxing China
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a... 详细信息
来源: 评论