咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是651-660 订阅
排序:
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China The Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China The Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
Modeling Building Method of Lissajous Figure Reversal Period Based on the Group Quantization Phase Processing
收藏 引用
Chinese Journal of Electronics 2019年 第3期28卷 551-558页
作者: DU Baoqiang LI Songlin SUN Xiyan FU Qiang School of Electronic Information Engineering Zhengzhou University of Light Industry School of Information and Communication Guilin University of Electronic Technology Science and Technology on Electronic Information Control Laboratory
To deeply understand the essential relationship between two different-frequency signals and explore the phase synchronization law in frequency standard comparison, a novel modeling building method of Lissajous figure ... 详细信息
来源: 评论
LESSON: Multi-Label Adversarial False Data Injection Attack for Deep Learning Locational Detection
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Jiwei Shen, Chao Wang, Buhong Xia, Xiaofang Zhang, Meng Lin, Chenhao Li, Qian Ministry of Education Key Laboratory for Intelligent Networks and Network Security School of Cyber Science and Engineering Xi’an Jiaotong University Xi’an China Air Traffic Control and Navigation College Air Force Engineering University Xi’an China Information and Navigation College Air Force Engineering University Xi’an China School of Computer Science and Technology Xidian University Xi’an China
—Deep learning methods can not only detect false data injection attacks (FDIA) but also locate attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep learning vulnerabilities have be... 详细信息
来源: 评论
Two-Stage Task Planning Based on Resource Interchange in Space information Networks  15th
Two-Stage Task Planning Based on Resource Interchange in Spa...
收藏 引用
15th EAI International Conference on communications and Networking, ChinaCom 2020
作者: Liu, Runzi Li, Jing Ji, Xiang Wu, Weihua Zhou, Di Zhang, Yan School of Information and Control Engineering Xi’an University of Architecture and Technology Xi’an710055 China School of Telecommunications Engineering Xidian University Xi’an710071 China Science and Technology on Communication Networks Laboratory CETC the 54th Research Institute Shijiazhuang050081 China
The high computational complexity and the mismatch between the space-time distribution of tasks and resources raise great challenges on task planning in space information networks (SINs). This paper studies the task p... 详细信息
来源: 评论
Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Yuanyu Zheng, Zhumeng He, Ji Zhao, Shuangrui Qu, Qianyue Shen, Yulong Jiang, Xiaohong School of Computer Science and Technology Xidian University Shaanxi Xi’an China Shannxi Key Laboratory of Network and System Security China Beijing Sunwise Information Technology Ltd Beijing Institute of Control Engineering Beijing China Division of Information Science Graduate School of Science and Technology Nara Institute of Science and Technology Nara Ikoma Japan School of Systems Information Science Future University Hakodate Hokkaido Hakodate Japan
While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jammi... 详细信息
来源: 评论
EWT: Efficient Wavelet-Transformer for Single Image Denoising
arXiv
收藏 引用
arXiv 2023年
作者: Li, Juncheng Cheng, Bodong Chen, Ying Gao, Guangwei Zeng, Tieyong The School of Communication & Information Engineering Shanghai University Shanghai China Jiangsu Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing China The School of Computer Science and Technology Xidian University Xian China The Department of Cyberspace Security Beijing Electronic Science & Technology Institute Beijing China The Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China The Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China The Department of Mathematics The Chinese University of Hong Kong New Territories Hong Kong
Transformer-based image denoising methods have achieved encouraging results in the past year. However, it must uses linear operations to model long-range dependencies, which greatly increases model inference time and ... 详细信息
来源: 评论
Driving Performance Analysis for Connected Vehicle Platoons: Velocity Perturbation and Fuel Consumption
Driving Performance Analysis for Connected Vehicle Platoons:...
收藏 引用
IEEE International Conference on Unmanned Systems (ICUS)
作者: Yihan Zhao Xuting Duan Jianshan Zhou Long Zhang State Key Lab of Intelligent Transportation System Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control School of Transportation Science and Engineering Beihang University Beijing China State Key Lab of Intelligent Transportation System Beijing Key Laboratory for Cooperative Vehicle Infrastructure Systems and Safety Control Zhongguancun Laboratory School of Transportation Science and Engineering Beihang University Beijing China National Key Laboratory of Science and Technology on Information System Security Institute of Systems Engineering Beijing China
Vehicle platoon is one of the concrete manifestations of multi-vehicle cooperative control and intelligent transportation. However, the velocity perturbation in the driving process will bring about stability and safet...
来源: 评论
Multi-Functional Beamforming Design for Integrated Sensing, communication, and Computation
收藏 引用
IEEE Transactions on communications 2024年
作者: Zhao, Yapeng Wu, Qingqing Chen, Wen Zeng, Yong Liu, Ruiqi Mei, Weidong Hou, Fen Ma, Shaodan Shanghai Jiao Tong University Department of Electronic Engineering 200240 China University of Macau State Key Laboratory of Internet of Things for Smart City 999078 China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China ZTE Corporation State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen518057 China University of Electronic Science and Technology of China National Key Laboratory of Wireless Communications Chengdu611731 China University of Macau Department of Electrical and Computer Engineering 999078 China
Integrated sensing and communication (ISAC) systems may face a heavy computation burden since the sensory data needs to be further processed. This paper studies a novel system that integrates sensing, communication, a... 详细信息
来源: 评论
A Novel Consecutive Artificial Noise Secrecy Enhancing Scheme for RIS Aided MIMO System With Imperfect CSI
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Shang, Pingping Tao, Zhuofan Xie, Zhonghui Huang, Min Sui, He Li, Jun Hai, Han Hubei University of Technology School of Electrical and Electronic Engineering Wuhan430068 China Hubei University of Technology Hubei Key Laboratory for High-efficiency Utilization of Solar Energy and Operation Control of Energy Storage System Wuhan430068 China Civil Aviation University of China College of Aeronautical Engineering Tianjin300399 China Guangzhou University School of Electronics and Communication Engineering Guangzhou510006 China Donghua University College of Information Science and Technology Shanghai201620 China
Reconfigurable intelligent surface (RIS) is a technology with great promise, which is widely used in wireless networks to improve the coverage and enhance the performance. However, security concerns pose a major chall... 详细信息
来源: 评论
Contrast enhancement of optical videoscope images
收藏 引用
Iran Journal of Computer science 2023年 第3期6卷 261-275页
作者: Ammar, Reda Aboshosha, Sahar El-Hag, Noha A. Saifeldeen, Reda El-Shafai, Walid El-Banby, Ghada M. Ashiba, Huda I. Khalaf, Ashraf A. M. Elazm, Atef Abou El-Rabaie, El-Sayed M. Abd El-Samie, Fathi E. El-Safrawey, Amir Department of Electronics and Electrical Communications Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electronics and Electrical Comm. Faculty of Engineering Minia University Minya Egypt Department of Management of Information Systems Higher Institute of Commercial Science El-Mahala El-Kobra Egypt Department of Industrial Electronics and Control Engineering Faculty of Electronic Engineering Menoufia University Menouf 32952 Egypt Department of Electronics and Electrical Communications Engineering Bilbis Higher Institute of Engineering Sharqia Bilbis Egypt Security Engineering Laboratory Computer Science Department Prince Sultan University Riyadh 11586 Saudi Arabia Department of Information Technology College of Computer and Information Sciences Princess Nourah Bint Abdulrahman University P.O. Box 84428 Riyadh 11671 Saudi Arabia
The videoscope (VS) images have poor quality and low contrast. Hence, in this paper, three proposed frameworks to improve the quality of VS images are presented. The first framework depends on contrast-limited adaptiv... 详细信息
来源: 评论