咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是601-610 订阅
排序:
ISAC Prototype System for Multi-Domain Cooperative communication Networks
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Jie Que, Hang Tao, Du Liang, Le Li, Xiao Wen, Chao-Kai Jin, Shi The Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing210096 China The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China The Institute of Communications Engineering National Sun Yat-sen University Kaohsiung80424 Taiwan
Future wireless networks are poised to transform into integrated sensing and communication (ISAC) networks, unlocking groundbreaking services such as digital twinning. To harness the full potential of ISAC networks, i... 详细信息
来源: 评论
Efficient Verification of Stabilizer Code Subspaces with Local Measurements
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Congcong Yu, Xutao Zhang, Zaichen Xu, Ping Wang, Kun State Key Lab of Millimeter Waves Southeast University Nanjing211189 China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Hefei National Laboratory Hefei230088 China
We address the task of verifying whether a quantum computer, designed to be protected by a specific stabilizer code, correctly encodes the corresponding logical qubits. To achieve this, we develop a general framework ... 详细信息
来源: 评论
GHZ-W Genuinely Entangled Subspace Verification with Adaptive Local Measurements
arXiv
收藏 引用
arXiv 2024年
作者: Zheng, Congcong Xu, Ping Wang, Kun Zhang, Zaichen State Key Lab of Millimeter Waves Southeast University Nanjing211189 China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha410073 China Hefei National Laboratory Hefei230088 China Purple Mountain Laboratories Nanjing211111 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China
Genuinely entangled subspaces (GESs) are valuable resources in quantum information science. Among these, the three-qubit GHZ-W GES, spanned by the three-qubit Greenberger-Horne-Zeilinger (GHZ) and W states, is a unive... 详细信息
来源: 评论
Spatially Coupled 5G LDPC Codes via Superposition
Spatially Coupled 5G LDPC Codes via Superposition
收藏 引用
IEEE Conference on Wireless communications and Networking
作者: Jiayi Yang Qianfan Wang Zhiyuan Tan Congduan Li Xiao Ma School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China Huawei Technologies Co. Ltd. Shanghai China School of Electronics and Communication Engineering Sun Yat-sen University Shenzhen China
We propose in this paper to enhance the 5G low-density parity-check (LDPC) codes by transmitting the codewords in a block Markov superposition transmission (BMST) manner, resulting in a class of spatially coupled LDPC... 详细信息
来源: 评论
Demand Response Scheme: Achieving Sustainability in Distributed Data Processing
Demand Response Scheme: Achieving Sustainability in Distribu...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Xueying Zhai Yunfeng Peng Xiuping Guo Liang Zhang Wei Zhang School of Computer and Communication Engineering University of Science and Technology Beijing Beijing China School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Guizhou Key Laboratory of Electric Power Big Data Guizhou Institute of Technology Guizhou China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China
The rapid development of Internet of Things (IoT) technology has driven the intelligent transformation of various industries, including manufacturing, agriculture, and healthcare, etc., significantly enhancing their m... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China Shenzhen518066 China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518000 China Utron Technology Company Ltd. Hangzhou310056 China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Due to the decentralized and public nature of the Blockchain ecosystem, the malicious activities on the Ethereum platform impose immeasurable losses for the users. Existing phishing scam detection methods mostly rely ... 详细信息
来源: 评论
Dynamic Tracking of Ship Course with Limited Input Based on ZG control and Bivariate S-Function
Dynamic Tracking of Ship Course with Limited Input Based on ...
收藏 引用
第34届中国控制与决策会议
作者: Shengmian Xie Yunong Zhang Jinjin Guo Mengling Xiao School of Information and Communication Engineering Guangzhou Maritime University Guangdong Key Laboratory of Modern Control Technology School of Computer Science and Engineering Sun Yat-sen University
The nonlinear control system of ship is complex,which is a focus of research and key core of dynamic *** the input of the actual system is often restricted by the physical constraints of the actuator and energysaving ... 详细信息
来源: 评论
Efficient multimodal cancelable biometric system based on steganography and cryptography
收藏 引用
Iran Journal of Computer science 2023年 第2期6卷 109-121页
作者: Salama, Gerges M. El-Gazar, Safaa Nassar, Rana M. El-Shafai, Walid Khalaf, Ashraf A. M. El-Banby, Ghada M. Hamed, Hesham F. A. El-Samie, Fathi E. Abd Department of Electrical Engineering Faculty of Engineering Minia University Minia 61111 Egypt Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Security Engineering Laboratory Department of Computer Science Prince Sultan University Riyadh 11586 Saudi Arabia Department of Industrial Electronics and Control Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electrical Engineering Faculty of Engineering Egyptian-Russian University Cairo Egypt Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University Riyadh 84428 Saudi Arabia
Due to the development of hacking programs, it has become easy to penetrate systems. Hence, there is a need for strong security mechanisms. The use of traditional passwords has become insufficient to secure systems. B... 详细信息
来源: 评论
Global Spatial-Temporal information-based Residual ConvLSTM for Video Space-Time Super-Resolution
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Fu, Congrui Yuan, Hui Jiang, Shiqi Zhang, Guanghui Shen, Liquan Hamzaoui, Raouf Center of Experimental Teaching China Shandong University School of Control Science and Engineering China Ministry of Education Key Laboratory of Machine Intelligence and System Control China Shandong University School of software Shandong Jinan China Shandong University School of Computer Science and Technology China Shanghai University School of Communication and Information Engineering Shanghai China De Montfort University School of Engineering and Sustainable Development LeicesterLE1 9BH United Kingdom
By converting low-frame-rate, low-resolution videos into high-frame-rate, high-resolution ones, space-time video super-resolution techniques can enhance visual experiences and facilitate more efficient information dis... 详细信息
来源: 评论
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Similarity Computation Model Based on Optimised SBERT
SMGC-SBERT: A Multi-Feature Fusion Chinese Short Text Simila...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Shuo Zhao Qiliang Gu Jianqiang Zhang Gongpeng Song Qin Lu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Shandong Branch of China Mobile Communication Group Design Institute Co. Jinan China
Chinese short text similarity computation stands as a pivotal task within natural language processing, garnering significant attention. However, existing models grapple with limitations in handling intricate semantic ... 详细信息
来源: 评论