咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 640 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 511 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 363 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 96 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 86 篇 光学工程
    • 77 篇 生物工程
    • 53 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 30 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 278 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 16 篇 institute of cyb...
  • 16 篇 school of inform...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 shilian zheng

语言

  • 1,343 篇 英文
  • 59 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1436 条 记 录,以下是781-790 订阅
排序:
Prediction of exosomal piRNAs based on deep learning for sequence embedding with attention mechanism
Prediction of exosomal piRNAs based on deep learning for seq...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yajun Liu Yulian Ding Aimin Li Rong Fei Xie Guo Fangxiang Wu Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an University of Technology Xi'an China Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada Shaanxi Key Laboratory of Complex System Control and Intelligent Information Processing Xi'an University of Technology Xi'an China Department of Computer Science Department of Mechanical Engineering Division of Biomedical Engineering University of Saskatchewan Saskatoon Canada
PIWI-interacting RNAs (piRNAs) are a type of small non-coding RNAs which bind with the PIWI proteins to exert biological effects in various regulatory mechanisms. A growing amount of evidence reveals that exosomal piR... 详细信息
来源: 评论
A Deep Exploration of BitLocker Encryption and security Analysis
A Deep Exploration of BitLocker Encryption and Security Anal...
收藏 引用
International Conference on communication technology (ICCT)
作者: Cheng Tan Lijun Zhang Liang Bao Science and Technology on Communication Security Laboratory Chengdu Key Lab of Information Network Security Ministry of Public Security Shanghai China
Due to the popularity of Windows system, BitLocker is widely used as a built-in disk encryption tool. As a commercial application, the design of BitLocker has to consider a capability of disaster recovery, which helps... 详细信息
来源: 评论
Parallel in-memory wireless computing
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Cong Ruan, Gong-Jie Yang, Zai-Zheng Yangdong, Xing-Jian Li, Yixiang Wu, Liang Ge, Yingmeng Zhao, Yichen Pan, Chen Wei, Wei Wang, Li-Bo Cheng, Bin Zhang, Zaichen Zhang, Chuan Liang, Shi-Jun Miao, Feng Institute of Brain-inspired Intelligence National Laboratory of Solid State Microstructures School of Physics Collaborative Innovation Center of Advanced Microstructures Nanjing University Nanjing China National Mobile Communications Research Laboratory Southeast University Frontiers Science Center for Mobile Information Communication and Security Southeast University Purple Mountain Laboratories Nanjing China Institute of Interdisciplinary Physical Sciences School of Science Nanjing University of Science and Technology Nanjing China Nanjing Drum Tower Hospital The Affiliated Hospital of Nanjing University Medical School Nanjing China
Parallel wireless digital communication with ultralow power consumption is critical for emerging edge technologies such as 5G and Internet of Things. However, the physical separation between digital computing units an... 详细信息
来源: 评论
A Classification–Detection Approach of COVID-19 Based on Chest X-ray and CT by Using Keras Pre-Trained Deep Learning Models
收藏 引用
Computer Modeling in Engineering & sciences 2020年 第11期125卷 579-596页
作者: Xing Deng Haijian Shao Liang Shi Xia Wang Tongling Xie School of Computer Science Jiangsu University of Science and TechnologyZhenjiang212003China School of Automation Key Laboratory of Measurement and Control for CSEMinistry of EducationSoutheast UniversityNanjing210096China School of Computer Science and Communication Engineering Jiangsu UniversityZhenjiang212003China School of Information Science and Technology Nantong UniversityNantong226019China Department of Electrical and Computer Engineering National University of Singapore117583Singapore The People’s Hospital of RUGAO Nantong226500China
The Coronavirus Disease 2019(COVID-19)is wreaking havoc around the world,bring out that the enormous pressure on national health and medical staff *** of the most effective and critical steps in the fight against COVI... 详细信息
来源: 评论
STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles
arXiv
收藏 引用
arXiv 2022年
作者: Cheng, Pengzhou Han, Mu Li, Aoxue Zhang, Fengwei The Department of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai201100 China The School of Computer Science and Communication Engineering Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Jiangsu University Zhenjiang212013 China The School of Automotive and Traffic Engineering Jiangsu University Zhenjiang212013 China The Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen518000 China
Intrusion detection is an important defensive measure for automotive communications security. Accurate frame detection models assist vehicles to avoid malicious attacks. Uncertainty and diversity regarding attack meth... 详细信息
来源: 评论
Fault Detection Method for Insulators Using Improved YOLOv4
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2022年 第4期7卷 818-834页
作者: Zhao, Li-Quan Jiang, Zi-Cong Teng, Zi-Ming Jia, Yan-Fei Key Laboratory of Modern Power System Simulation and Control & Renewable Energy Technology Ministry of Education Northeast Electric Power University 168 Changchun Road Jilin132012 China Graduate school of Information Science and Electrical Engineering Kyushu University Fukuoka819-0395 Japan College of information and communication Jilin University Changchun130012 China School of Electrical and Information Engineering Beihua University Jilin132013 China
A defective insulator detection method based on improved You Only Look Once version 4 (YOLOv4) is proposed to improve the precision of defective insulator detection. This method designs a dual-branch attention block b... 详细信息
来源: 评论
Compacting deep neural networks for internet of things: Methods and applications
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Ke Ying, Hanbo Dai, Hong-Ning Li, Lin Peng, Yuangyuang Guo, Keyi Yu, Hongfang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China Science and Technology on Electronic Information Control Laboratory Chengdu China School of Communication and Information Engineering University of Electronic Science and Technology of China Chengdu China Faculty of Information Technology Macau University of Science and Technology China Courant Institute of Mathematical Science New York University New York United States
Deep Neural Networks (DNNs) have shown great success in completing complex tasks. However, DNNs inevitably bring high computational cost and storage consumption due to the complexity of hierarchical structures, thereb... 详细信息
来源: 评论
Efficient Channel Estimation for Millimeter Wave and Terahertz Systems Enabled by Integrated Super-resolution Sensing and communication
arXiv
收藏 引用
arXiv 2024年
作者: Xu, Jingran Wang, Huizhi Zeng, Yong Xu, Xiaoli Wu, Qingqing Yang, Fei Chen, Yan Jamalipour, Abbas The National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing210096 China The Purple Mountain Laboratories Nanjing211111 China Department of Electronic Engineering Shanghai Jiao Tong University Shanghai200240 China The Wireless Technology Lab. 2012 Lab Shanghai Huawei Technologies Co. Ltd. Shanghai201206 China The School of Electrical and Computer Engineering The University of Sydney CamperdownNSW2006 Australia
Integrated super-resolution sensing and communication (ISSAC) has emerged as a promising technology to achieve extremely high precision sensing for those key parameters, such as the angles of the sensing targets. In t... 详细信息
来源: 评论
SAR Image Processing and Target Detection Based on 2D Singularity Power Spectrum in Time-frequency Domain
SAR Image Processing and Target Detection Based on 2D Singul...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Junye Li Gang Xiong Baigang Huang School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai China Science and Technology on Communication Information Security Control Laboratory Jiaxing China
A method for SAR image processing and target detection based on two-dimensional singularity power spectrum (2D-SPS) in time-frequency domain is proposed in this paper. Firstly, the two-dimensional pseudo Wigner-Ville ... 详细信息
来源: 评论
Practical security analysis of a continuous-variable quantum random-number generator with a noisy local oscillator
收藏 引用
Physical Review A 2020年 第1期102卷 012422-012422页
作者: Weinan Huang Yichen Zhang Ziyong Zheng Yang Li Bingjie Xu Song Yu State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing 100876 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu 610041 China
A quantum random-number generator (QRNG) can theoretically generate unpredictable random numbers with perfect devices and is an ideal and secure source of random numbers for cryptography. However, the practical implem... 详细信息
来源: 评论