咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 640 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 511 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 363 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 96 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 86 篇 光学工程
    • 77 篇 生物工程
    • 53 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 30 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 278 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 16 篇 institute of cyb...
  • 16 篇 school of inform...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 shilian zheng

语言

  • 1,343 篇 英文
  • 59 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1436 条 记 录,以下是791-800 订阅
排序:
High-rate discrete-modulated continuous-variable quantum key distribution with composable security
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Mingze Pan, Yan Li, Junhui Wang, Heng Fan, Lu Shao, Yun Li, Yang Huang, Wei Yu, Song Xu, Bingjie Zhang, Yichen Yang, Jie Pi, Yaodi Ye, Ting Sun, Ao Jiang, Lin Yan, Lianshan Pan, Wei National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Center for Information Photonics & Communications School of Information Science and Technology Southwest Jiaotong University Sichuan Chengdu611756 China
Discrete modulation represents a practical and device-friendly solution for high speed transmission in continuous-variable quantum key distribution (CV-QKD), offering high compatibility with coherent optical communica... 详细信息
来源: 评论
Improving Fast Adversarial Training with Prior-Guided Knowledge
arXiv
收藏 引用
arXiv 2023年
作者: Jia, Xiaojun Zhang, Yong Wei, Xingxing Wu, Baoyuan Ma, Ke Wang, Jue Cao, Xiaochun State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China AI Lab Tencent Inc. Shenzhen518000 China Institute of Artificial Intelligence Beihang University Beijing100191 China Shenzhen518172 China The School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences Beijing100049 China School of Cyber Science and Technology Sun Yat-sen University Shenzhen Campus Shenzhen518107 China
Fast adversarial training (FAT) is an efficient method to improve robustness. However, the original FAT suffers from catastrophic overfitting, which dramatically and suddenly reduces robustness after a few training ep... 详细信息
来源: 评论
Low Frequency Wide Bandwidth Antenna Design Using the Concept of Lumped Elements Integration  9
Low Frequency Wide Bandwidth Antenna Design Using the Concep...
收藏 引用
9th IEEE Asia-Pacific Conference on Antennas and Propagation, APCAP 2020
作者: Xia, Yinfeng Wang, Yanyan Li, Yingsong Xue, Wei Ye, Qiubo Harbin Engineering University College of Information and Communication Engineering Harbin China Science and Technology on Complex System Control Intelligent Agent Cooperation Laboratory Beijing100074 China Jimei University School of Information Engineering Xiamen361021 China
In this paper, we will propose a super wide bandwidth low frequency antenna with a compact size for HF, VHF and UHF applications. The developed low frequency antenna consists of coplanar guide feeding structure, sleev... 详细信息
来源: 评论
Channel Estimation for FAS-assisted Multiuser mmWave Systems
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Hao Zhou, Gui Wong, Kai-Kit New, Wee Kiat Wang, Chao Chae, Chan-Byoung Murch, Ross Jin, Shi Zhang, Yangyang The Department of Electronic and Electrical Engineering University College London LondonWC1E7JE United Kingdom Yonsei Frontier Laboratory Yonsei University Seoul03722 Korea Republic of Erlangen91054 Germany The Integrated Service Networks Laboratory Xidian University Xi’an710071 China School of Integrated Technology Yonsei University Seoul03722 Korea Republic of Hong Kong University of Science and Technology Clear Water Bay Hong Kong The Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Kuang-Chi Science Limited Hong Kong
This letter investigates the challenge of channel estimation in a multiuser millimeter-wave (mmWave) time-division duplexing (TDD) system. In this system, the base station (BS) uses a multi-antenna uniform linear arra... 详细信息
来源: 评论
Weapon Target Assignment for Surface-to-air Defense with an Improved Reinforcement Genetic Algorithm
Weapon Target Assignment for Surface-to-air Defense with an ...
收藏 引用
Chinese Automation Congress (CAC)
作者: Hua Gong Dalong Liu Yong Zhang Ke Xu School of Science Shenyang Ligong University Shenyang China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
Decision optimization in surface-to-air defense and coordinated weapon target assignment can improve the defense effect and the utilization rate of weapons. Considering the constraints of weapon capability, a multi-ta... 详细信息
来源: 评论
Dynamic Threat Assessment of Air multi-target Based on DBN-TOPSIS Method
Dynamic Threat Assessment of Air multi-target Based on DBN-T...
收藏 引用
Chinese Automation Congress (CAC)
作者: Hua Gong Xiaoye Yu Yong Zhang Fang Liu School of Science Shenyang Ligong University Shenyang China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
In the traditional air target threat assessment, only quantitative threat degree is considered, and the target threat range assessment is missing. Aiming at the problem, a comprehensive dynamic threat assessment metho... 详细信息
来源: 评论
Exploring Inconsistent Knowledge Distillation for Object Detection with Data Augmentation
arXiv
收藏 引用
arXiv 2022年
作者: Liang, Jiawei Liang, Siyuan Liu, Aishan Ma, Ke Li, Jingzhi Cao, Xiaochun School of Computer Science and Engineering Sun Yat-Sen University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China NLSDE Beihang University China Institute of Dataspace Hefei China School of Electronic Electrical and Communication Engineering University of Chinese Academy of Sciences China School of Cyber Science and Technology Sun Yat-Sen University China
Knowledge Distillation (KD) for object detection aims to train a compact detector by transferring knowledge from a teacher model. Since the teacher model perceives data in a way different from humans, existing KD meth... 详细信息
来源: 评论
Deterministic bulk-boundary correspondences for skin and edge modes in a general two-band non-Hermitian system
收藏 引用
Physical Review Research 2022年 第4期4卷 043222-043222页
作者: Chong Hou Lingfang Li Shihua Chen Yi Liu Luqi Yuan Yiqi Zhang Zhenhua Ni School of Physics and Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing 211189 China Purple Mountain Laboratories Nanjing 211111 China Shanghai Key Lab of Modern Optical System University of Shanghai for Science and Technology Shanghai 200093 China CAS Center for Excellence in Ultra-Intense Laser Science Shanghai 201800 China State Key Laboratory of Advanced Optical Communication Systems and Networks School of Physics and Astronomy Shanghai Jiao Tong University Shanghai 200240 China Key Laboratory for Physical Electronics and Devices of the Ministry of Education & Shaanxi Key Lab of Information Photonic Technique School of Electronic Science and Engineering Faculty of Electronic and Information Engineering Xi'an Jiaotong University Xi'an 710049 China
In isolated Hermitian systems, the bulk-boundary correspondence is generally thought of as a compelling principle guiding the occurrence of robust edge states through the topological invariants of the bulk. However, i... 详细信息
来源: 评论
EMO: Edge Model Overlays to Scale Model Size in Federated Learning
arXiv
收藏 引用
arXiv 2025年
作者: Wu, Di He, Weibo Feng, Wanglei Wen, Zhenyu Qian, Bin Varghese, Blesson School of Computer Science University of St Andrews United Kingdom Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology China University of Science and Technology of China China State Key Laboratory of Industrial Control Technology Zhejiang University China
Federated Learning (FL) trains machine learning models on edge devices with distributed data. However, the computational and memory limitations of these devices restrict the training of large models using FL. Split Fe... 详细信息
来源: 评论
Ground-to-air-Defense Firepower Assignment Decision Based on Non-cooperative Game
Ground-to-air-Defense Firepower Assignment Decision Based on...
收藏 引用
Chinese Automation Congress (CAC)
作者: Hua Gong Mengya Cui Yong Zhang Wenjuan Sun School of Science Shenyang Ligong University Shenyang China School of Automation and Electrical Engineering Shenyang Ligong University Shenyang China Science and Technology on Electro-Optical Information Security Control Laboratory Tianjin China
The key problem of ground-to-air defense is how to make accurate and effective firepower assignment decision for attacking targets. A multi-objective optimization model of ground-to-air defense firepower assignment is... 详细信息
来源: 评论