咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是671-680 订阅
排序:
Cross-Layer security for Semantic communications: Metrics and Optimization
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Lingyi Wu, Wei Zhou, Fuhui Qin, Zhijin Wu, Qihui College of Science Nanjing University of Posts and Telecommunications Nanjing210003 China College of Communication and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China National Mobile Communications Research Laboratory Southeast University Nanjing210096 China Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation China College of Electronic and Information Engineering Nanjing University of Aeronautics and Astronautics Nanjing210000 China Department of Electronic Engineering Tsinghua University Beijing100084 China Beijing National Research Center for Information Science and Technology Beijing China The State Key Laboratory of Space Network and Communications Beijing China
Different from traditional secure communication that focuses on symbolic protection at the physical layer, semantic secure communication requires further attention to semantic-level task performance at the application... 详细信息
来源: 评论
Learned Intelligent Recognizer with Adaptively Customized RIS Phases in communication Systems
Learned Intelligent Recognizer with Adaptively Customized RI...
收藏 引用
Future communications and Networks (FCN), International Conference on
作者: Yixuan Huang Jie Yang Chao-Kai Wen Shuqiang Xia Xiao Li Shi Jin National Mobile Communications Research Laboratory Southeast University Nanjing China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Institute of Communications Engineering National Sun Yat-sen University Kaohsiung Taiwan ZTE Corporation Shenzhen China State Key Laboratory of Mobile Network and Mobile Multimedia Shenzhen China
This study presents an advanced wireless system that embeds target recognition within reconfigurable intelligent surface (RIS)-aided communication systems, powered by cuttingedge deep learning innovations. Such a syst... 详细信息
来源: 评论
Geometric Dilution of Precision for Far-Distance TDOA Location of Shortwave
Geometric Dilution of Precision for Far-Distance TDOA Locati...
收藏 引用
information communication Technologies Conference (ICTC)
作者: Xin Yang Yun-Xia Ye No.36 Research Institute of CETC Jiaxing Zhejiang China No.36 Research Institute of CETC Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang China
A method of time difference of arrival (TDOA) location for shortwave signal source by four receiving stations is introduced. The precision of time difference and the Geometric Dilution of Precision (GDOP) of TDOA loca... 详细信息
来源: 评论
Color Image Encryption Based on Interferenceless Coded Aperture Correlation Holography Polarization Imaging
SSRN
收藏 引用
SSRN 2024年
作者: Yu, Xuelian Li, Jia Qi, Zhongcai Zhang, Huifeng Niu, Jia Sun, Yanqian Li, Xiufang Qu, Bo Heilongjiang Provincial Key Laboratory of Quantum Control School of Measurement and Communication Engineering Harbin University of Science and Technology Harbin150080 China Shanxi Key Laboratory of Quantum Information and Quantum Optoelectronic Devices School of Physics Xi’an Jiaotong University Xi’an710049 China Daheng New Epoch Technology Inc. Beijing100085 China Harbin Xinguang Optics-Electronics Technology Co. Ltd. Harbin150028 China
A color image encryption scheme is proposed, which employs the interferenceless coded aperture correlation holography (I-COACH) system in conjunction with polarization encoding. This method encrypts all three channels... 详细信息
来源: 评论
Reconfigurable Metagrating Enabled by Shape Memory Polymers
Reconfigurable Metagrating Enabled by Shape Memory Polymers
收藏 引用
IEEE MTT-S International Microwave Workshop Series on Advanced Materials and Processes for RF and THz Applications (IMWS-AMP)
作者: Sidi Wang Kai Feng Jianjia Yi Key Laboratory of Integrated Services Network Xidian University Xi’an China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China School of Information and Communications Engineering Xi’an Jiaotong University Xi’an China State Key Laboratory of Millimeter Waves Southeast University Nanjing China
We propose and demonstrate a shape-controlled metagrating with adjustable energy distribution based on shape memory Polymers (SMPs). The design consists of a capacitance printed on the top of the FR4 substrate, SMPs s... 详细信息
来源: 评论
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
arXiv
收藏 引用
arXiv 2023年
作者: Duan, Xiaolong Li, Bin Yin, Zhaoxia Zhang, Xinpeng Luo, Bin Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China School of Computer Science Fudan University Shanghai200433 China
Transmitting images for communication on social networks has become routine, which is helpful for covert communication. The traditional steganography algorithm is unable to successfully convey secret information since... 详细信息
来源: 评论
Enhancement of sensitivity in low-temperature quantum thermometry via reinforcement learning
收藏 引用
Physical Review A 2024年 第4期109卷 042417-042417页
作者: Qing-Shou Tan Xulin Liu Lan Xu Wei Wu Le-Man Kuang Key Laboratory of Hunan Province on Information Photonics and Freespace Optical Communication College of Physics and Electronics Hunan Institute of Science and Technology Yueyang 414000 China School of Physics and Chemistry Hunan First Normal University Changsha 410205 China Key Laboratory of Theoretical Physics of Gansu Province and Lanzhou Center for Theoretical Physics Lanzhou University Lanzhou 730000 China Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics and Synergetic Innovation Center for Quantum Effects and Applications Hunan Normal University Changsha 410081 China Synergetic Innovation Academy for Quantum Science and Technology Zhengzhou University of Light Industry Zhengzhou 450002 China
We present a quantum thermometry method utilizing a probe-meter system and leveraging reinforcement learning (RL) to enhance sensitivity at low temperatures. Temperature information is exclusively obtained by coupling... 详细信息
来源: 评论
RSAFormer: A method of polyp segmentation with region self-attention transformer
收藏 引用
Computers in Biology and Medicine 2024年 172卷 108268-108268页
作者: Yin, Xuehui Zeng, Jun Hou, Tianxiao Tang, Chao Gan, Chenquan Jain, Deepak Kumar García, Salvador School of Software Engineering Chongqing University of Posts and Telecommunications Chongqing400065 China School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Intelligent Control and Optimization for Industrial Equipment of Ministry of Education Dalian University of Technology Dalian116024 China Symbiosis Institute of Technology Symbiosis International University Pune412115 India Department of Computer Science and Artificial Intelligence Andalusian Research Institute in Data Science and Computational Intelligence University of Granada Granada18071 Spain
Colonoscopy has attached great importance to early screening and clinical diagnosis of colon cancer. It remains a challenging task to achieve fine segmentation of polyps. However, existing State-of-the-art models stil... 详细信息
来源: 评论
How Far Should We Look Back to Achieve Effective Real-Time Time-Series Anomaly Detection?
arXiv
收藏 引用
arXiv 2021年
作者: Lee, Ming-Chang Lin, Jia-Chun Gran, Ernst Gunnar Department of Information Security and Communication Technology Norwegian University of Science and Technology Gjøvik2815 Norway Simula Research Laboratory Fornebu1364 Norway
Anomaly detection is the process of identifying unexpected events or abnormalities in data, and it has been applied in many different areas such as system monitoring, fraud detection, healthcare, intrusion detection, ... 详细信息
来源: 评论
A bio-inspired microwave wireless system for constituting passive and maintenance-free IoT networks
收藏 引用
National science Review 2025年 第02期 300-314页
作者: Buyun Yu Hong-Qin Wang Lu Ju Ke-Xin Hou Zhi-Da Xiao Jun-Lin Zhan Chao Zhang Hao Chen Binghao Wang Zhen-Guo Liu Ying-Shi Guan Cheng-Hui Li Tie Jun Cui Wei-Bing Lu State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast University Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and Security Southeast University State Key Laboratory of Coordination Chemistry School of Chemistry and Chemical EngineeringCollaborative Innovation Center of Advanced MicrostructuresNanjing University School of Electronic Science and Engineering Southeast University School of Chemistry and Chemical Engineering Southeast University
With the rapid expansion of wireless networks, the deployment and long-term maintenance of distributed microwave terminals have become increasingly challenging. To address these issues, we present a bio-inspired micro...
来源: 评论