咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 638 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 946 篇 工学
    • 511 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,339 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1433 条 记 录,以下是531-540 订阅
排序:
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
Contrastive Learning-Based Generic Audio-to-Lyrics Alignment
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Zhenkun Jin Shuai Huang Xin Nie Xinlei Zhou Yuanyuan Yi Gefei Zhou Wuhan Business UIniversity Wuhan China Wuhan Research Institute of Posts and Telecommunications Wuhan China Hubei Key Laboratory of Distributed System Security Wuhan China Hubei Engineering Research Center on BigData Security Wuhan China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China School of Journalism and Information Communication Huazhong University of Science and Technology Wuhan China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
In this research, we tackled the complex task of aligning audio and lyrics content automatically. This task entails the precise matching of lyrics with the corresponding audio segments in songs, necessitating the coor...
来源: 评论
Ground-to-air Defense Firepower Assignment Decision Based on Non-cooperative Game
Ground-to-air Defense Firepower Assignment Decision Based on...
收藏 引用
2021 China Automation Congress, CAC 2021
作者: Gong, Hua Cui, Mengya Zhang, Yong Sun, Wenjuan School of Science Shenyang Ligong University Shenyang110159 China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang110159 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
The key problem of ground-to-air defense is how to make accurate and effective firepower assignment decision for attacking targets. A multi-objective optimization model of ground-to-air defense firepower assignment is... 详细信息
来源: 评论
Weapon Target Assignment for Surface-to-air Defense with an Improved Reinforcement Genetic Algorithm
Weapon Target Assignment for Surface-to-air Defense with an ...
收藏 引用
2021 China Automation Congress, CAC 2021
作者: Gong, Hua Liu, Dalong Zhang, Yong Xu, Ke School of Science Shenyang Ligong University Shenyang110159 China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang110159 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
Decision optimization in surface-to-air defense and coordinated weapon target assignment can improve the defense effect and the utilization rate of weapons. Considering the constraints of weapon capability, a multi-ta... 详细信息
来源: 评论
Semisupervised Encrypted Traffic Identification Based on Auxiliary Classification Generative Adversarial Network
收藏 引用
Computer Systems science & Engineering 2021年 第12期39卷 373-390页
作者: Jiaming Mao Mingming Zhang Mu Chen Lu Chen Fei Xia Lei Fan ZiXuan Wang Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information and Telecommunication BranchNanJing210003China Institute of Information and Communication Global Energy Interconnection Research InstituteState Grid Key Laboratory of Information and Network SecurityNanjing210003China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Broadband Wireless Communication Technology Engineering Research Center of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
The rapidly increasing popularity of mobile devices has changed the methods with which people access various network services and increased net-work traffic *** the past few decades,network traffic identification has ... 详细信息
来源: 评论
Dynamic Threat Assessment of Air multi-target Based on DBN-TOPSIS Method
Dynamic Threat Assessment of Air multi-target Based on DBN-T...
收藏 引用
2021 China Automation Congress, CAC 2021
作者: Gong, Hua Yu, Xiaoye Zhang, Yong Liu, Fang School of Science Shenyang Ligong University Shenyang110159 China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang110159 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin300308 China
In the traditional air target threat assessment, only quantitative threat degree is considered, and the target threat range assessment is missing. Aiming at the problem, a comprehensive dynamic threat assessment metho... 详细信息
来源: 评论
Seamless Decision-Making in the Big Data Era: A Modular Approach to Integrating IoT, Cloud Computing, and Data Lakes
Seamless Decision-Making in the Big Data Era: A Modular Appr...
收藏 引用
International Conference on Electrical, communication, and Computer Engineering (ICECCE)
作者: Mohamed Zemmouri Fatma Zohra Laalam Okba Kazar Yassine Himeur Adel Oulefki Chahrazad Toumi Wathiq Mansoor Shadi Attala Artificial Intelligence and Information Technologies Laboratory Faculty of New Information and Communication Technologies Kasdi Merbah Ouargla University Ouargla Algeria Department of Computer Science - LINFI Laboratory Mohamed Khider University Biskra Algeria Department of Information Systems and Security - College of Information Technology United Arab Emirate University Abu Dhabi United Arab Emirates College of Engineering and Information Technology University of Dubai Dubai UAE Department of Computer Science University of Sharjah Sharjah United Arab Emirates
The integration of big data with cutting-edge technologies like IoT and Cloud Computing has profoundly influenced various aspects of modern life, including everyday service processes. To facilitate data-driven decisio...
来源: 评论
Pruning CNN based on Combinational Filter Deletion
Pruning CNN based on Combinational Filter Deletion
收藏 引用
Annual Conference of Industrial Electronics Society
作者: Wenli Huang Xiujie Wang Zhihong Zhao Li Su Shuai Sui Jinjun Wang School of Electronic and Information Engineering Ningbo University of Technology Ningbo China Science and Technology on Communication Networks Laboratory Shijiazhuang China Research Institute of Intelligent Control and Systems Harbin Institute of Technology Harbin China School of Electronics and Information Engineering Ningbo University of Technology Ningbo China Liaoning University of Technology Jinzhou China Institute of Artificial Intelligence and Robotic Xi’an Jiaotong University Xi’an China
Network pruning is a figurative model compression technique designed to lighten and accelerate neural network models. Most existing pruning methods prioritize the selection of filters by their importance or apply regu... 详细信息
来源: 评论
GPU-accelerated multipath clutter cancellation algorithm for dtmb-based passive radar
GPU-accelerated multipath clutter cancellation algorithm for...
收藏 引用
2020 International Conference on Engineering Management of communication and technology, EMCTECH 2020
作者: Bu, Zirong Zhu, Huijie Qian, Jiachuan Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China No. 36 Research Institute of China Electronics Technology Group Corporation Jiaxing314033 China
In order to extract the target echo in the monitoring channel, the direct wave and the clutter should be suppressed in the signal processing of the passive radar. The batch version of the Extensive Cancellation Algori... 详细信息
来源: 评论
Design Compact YOLO based Network for Small Target Detection on Infrared Image
Design Compact YOLO based Network for Small Target Detection...
收藏 引用
Chinese Automation Congress (CAC)
作者: Shuang Liu Zhicheng Liu Yuhai Li Wancheng Liu Chenyang Ge Longjun Liu Institute of Artificial Intelligence and Robotics (IAIR) Xi’an Jiaotong University Xi’an China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
most YOLO object detection neural networks prefer to focus on traditional RGB image, but previous studies rarely consider special YOLO network with compact architecture for infrared image. In this paper, we analyze or... 详细信息
来源: 评论
Secrecy Outage Probability Analysis for Downlink RIS-NOMA Networks with On-Off control
arXiv
收藏 引用
arXiv 2024年
作者: Pei, Yingjie Yue, Xinwei Yi, Wenqiang Liu, Yuanwei Li, Xuehua Ding, Zhiguo Key Laboratory of Information and Communication Systems Ministry of Information Industry Key Laboratory of Modern Measurement & Control Technology Ministry of Education Beijing Information Science and Technology University Beijing100101 China School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom Department of Electrical Engineering Princeton University Princeton United States School of Electrical and Electronic Engineering The University of Manchester Manchester United Kingdom
Reconfigurable intelligent surface (RIS) has been regarded as a promising technology since it has ability to create the favorable channel conditions. This paper investigates the secure communications of RIS assisted n... 详细信息
来源: 评论