咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 642 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,438 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 947 篇 工学
    • 512 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 365 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 152 篇 电气工程
    • 97 篇 控制科学与工程
    • 89 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 556 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 24 篇 training
  • 23 篇 optimization
  • 23 篇 accuracy
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,344 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1438 条 记 录,以下是751-760 订阅
排序:
Modulation Signal Recognition Based on Feature Fusion and Residual CNN in Fractal Noise Background
Modulation Signal Recognition Based on Feature Fusion and Re...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Di Chen Gang Xiong Baigang Huang Lijun Wang Science and Technology on Communication Information Security Control Laboratory No.36 Research Institute of Cetc Jiaxing China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University China Institute of Navigation and Sensing Shanghai Jiao Tong University China
In this paper, a modulated signal recognition method based on feature fusion and ResCNN (FF-ResCNN) under generalized fractal noise background is proposed. Firstly, in the feature extraction and fusion part, consideri... 详细信息
来源: 评论
A Fast Method for Shortest-Path Cover Identification in Large Complex Networks
收藏 引用
Computers, Materials & Continua 2020年 第5期63卷 705-724页
作者: Qiang Wei Guangmin Hu Chao Shen Yunfei Yin School of Information and Communication Engineering University of Electronic Science and Technology of ChinaChengdu611731China National Key Laboratory of Science and Technology on Blind Signal Processing Chengdu610041China MOE Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong UniversityXi’an710049China The Electronic Engineering Department Universidad de SevillaSeville41004Spain School of Astronautics Harbin Institute of TechnologyHarbin150001China
Fast identifying the amount of information that can be gained by measuring a network via shortest-paths is one of the fundamental problem for networks exploration and ***,the existing methods are time-consuming for ev... 详细信息
来源: 评论
An Indoor Wi-Fi Positioning Approach optimized by Virtual Node
An Indoor Wi-Fi Positioning Approach optimized by Virtual No...
收藏 引用
International Conference on Computers, communications, and Systems (ICCCS)
作者: Jie-tai Wang Xiao-niu Yang Zhen-xing Luo School of Mathematics and Information Engineering Jiaxing University Jiaxing China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In the indoor positioning application based on the Wi-Fi range-based positioning algorithm, on the one hand, due to the characteristics of the wireless propagation model, the final position of the node calculated by t... 详细信息
来源: 评论
Rapid Maize Seedling Detection Based on Receptive-Field and Cross-Dimensional information Interaction
Rapid Maize Seedling Detection Based on Receptive-Field and ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Fengqi Hao Shulei Zhu Dexin Ma Xiangjun Dong Hoiio Kong Xia Liu Chunhua Mu Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Faculty of Data Science City University of Macau Macau China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China Communication College Qingdao Agricultural University Qingdao China National Engineering Laboratory of Wheat and Maize/Key Laboratory of Biology and Genetic Improvement of Maize in Northern Yellow-huai River Plain Ministry of Agriculture Maize Research Institute Shandong Academy of Agricultural Sciences Jinan China
The seedling stage is important in the growth and development of maize, and it is also a critical period that affects maize yield and quality. Accurately recognizing this stage of maize is challenging, as current maiz... 详细信息
来源: 评论
A Honeypot-enabled SDN-based Selector for Industrial Device Access control
A Honeypot-enabled SDN-based Selector for Industrial Device ...
收藏 引用
IEEE International Conference on Data science in Cyberspace (DSC)
作者: Jun Li Chunhui Wang Zhenyu Li Yong Ding Cyber Emergency Response Team CHINA Industrial Control Systems Beijing China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Cryptography and Information Security Guilin China
At present, there are a large number of cyber-attacks in global networks, which pose a serious threat to critical infrastructure and cause a large number of potential security risks. In this paper, we discussed the hy... 详细信息
来源: 评论
SFNet: Stage Spatial Attention and Feature Waterfall Fusion for Mathematical Document Text Line Detection
SFNet: Stage Spatial Attention and Feature Waterfall Fusion ...
收藏 引用
IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
作者: Chang Liu Jiaxin Liu Yong Zhang Lei Huang University of Electronic Science and Technology of China Chengdu Sichuan China Science and Technology on Electro-Optical Information Security Control LaboratoryTianjinChina300308 China Sichuan College of Architectural Technology Deyang Sichuan China
Text line detection is an important technique in layout analysis. Due to the existence of non-text areas and the change of formula height, text line detection in mathematical documents has always been a huge challenge... 详细信息
来源: 评论
M-to-N Backdoor Paradigm: A Multi-Trigger and Multi-Target Attack to Deep Learning Models
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Linshan Hua, Zhongyun Li, Yuhong Zheng, Yifeng Zhang, Leo Yu School of Computer Science and Technology Harbin Institute of Technology Guangdong Shenzhen518055 China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies Guangdong Shenzhen518055 China Xiaohongshu Technology Co. Ltd. Shanghai China School of Information and Communication Technology Griffith University Gold Coast SouthportQLD4215 Australia
Deep neural networks (DNNs) are vulnerable to backdoor attacks, where a backdoored model behaves normally with clean inputs but exhibits attacker-specified behaviors upon the inputs containing triggers. Most previous ... 详细信息
来源: 评论
Accelerating NATO Transformation with SnTEE: Experiments with Network security Function Virtualization in Coalition Networks
Accelerating NATO Transformation with SnTEE: Experiments wit...
收藏 引用
International Conference on Military communications and information Systems (ICMCIS)
作者: Roberto Rigolin F. Lopes Johannes F. Loevenich Konrad Wrona Paulo H. L. Rettore Jerry Falkcrona Joseph Mathews Nils Nordbotten Bogdan Vasilache Thorsten Lampe Olwen L. Worthington Juha Röning Secure Communications & Information (SIX) Thales Deutschland Ditzingen Germany Department of Mathematics/Computer Science University of Osnabrück Osnabrück Germany NATO Cyber Security Centre The Hague Netherlands Military University of Technology Warsaw Poland Communication Systems (KOM) Fraunhofer FKIE Bonn Germany Cyber Defence and C2 Technology Swedish Defence Research Agency Linköping Sweden Information Technology Division U.S. Naval Research Laboratory Washington DC USA Thales Norway Oslo Norway WonderBit B.V. Almere The Netherlands Defence Science and Technology Laboratory (Dstl) UK Ministry of Defence London United Kingdom Information Technology and Electrical Engineering University of Oulu Oulu Finland
This paper introduces a virtual laboratory for experiments with cybersecurity functions in coalition networks. The motivation comes from the NATO Allied Command Transformation (ACT) initiative on science and Technolog...
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
science China(information sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
Channel Estimation Based on Lorentzian Adaptive Algorithm in a-stable Noise Environment  9
Channel Estimation Based on Lorentzian Adaptive Algorithm in...
收藏 引用
9th IEEE Asia-Pacific Conference on Antennas and Propagation, APCAP 2020
作者: Cherednichenko, Aleksey Huang, Xinqi Wang, Yanyan Li, Yingsong Harbin Engineering University College of Information and Communication Engineering Harbin150001 China Science and Technology on Complex System Control Intelligent Agent Cooperation Laboratory Beijing100074 China
This paper presented a p-norm constraint Lorentzian adaptive algorithm to estimate the sparse multi-path channel ina-stable noise environment. We derived the proposed algorithm based on the Lagrange multiplier method ... 详细信息
来源: 评论