咨询与建议

限定检索结果

文献类型

  • 795 篇 会议
  • 640 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,436 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 945 篇 工学
    • 511 篇 计算机科学与技术...
    • 400 篇 软件工程
    • 363 篇 信息与通信工程
    • 241 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 96 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 86 篇 光学工程
    • 77 篇 生物工程
    • 53 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 30 篇 土木工程
    • 30 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 278 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 165 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of cyber ...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of inform...
  • 17 篇 university of el...
  • 16 篇 institute of cyb...
  • 16 篇 school of inform...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 shilian zheng

语言

  • 1,343 篇 英文
  • 59 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory"
1436 条 记 录,以下是821-830 订阅
排序:
Mainlobe Jamming Suppression Via Independent Component Analysis for Polarimetric SIMO Radar
Mainlobe Jamming Suppression Via Independent Component Analy...
收藏 引用
Sensor Array and Multichannel Signal Processing Workshop
作者: Mengmeng Ge Guolong Cui Zhenghong Zhang Lin Zhou Xianxiang Yu Feng Yang Lingjiang Kong School of Information and Communication Engineering University of Electronic Science and Technology of China Science and Technology on Electronic Information Control Laboratory Chengdu China
The presence of mainlobe jamming will significantly reduce the radar detection capabilities. Conventional independent component analysis (ICA)-based methods will suffer from the ineffectiveness when the angle of the t... 详细信息
来源: 评论
Top-down and bottom-up approaches to video Quality of Experience studies;overview and proposal of a new model
arXiv
收藏 引用
arXiv 2023年
作者: Koniuch, Kamil Baraković, Sabina Husić, Jasmina Baraković De Moor, Katrien Janowski, Lucjan Wierzchoń, Michal Institute of Communication Technologies AGH University of Science and Technology Cracow Poland Faculty of Traffic and Communications University of Sarajevo Sarajevo Bosnia and Herzegovina Zmaja od Bosne bb Sarajevo71000 Bosnia and Herzegovina Faculty of Electrical Engineering University of Sarajevo Sarajevo Bosnia and Herzegovina Zmaja od Bosne bb Sarajevo71000 Bosnia and Herzegovina Department of Information Security and Communication Technology Norwegian University of Science and Technology Trondheim Norway Consciousness Lab Institute of Psychology Jagiellonian University Kraków Poland Centre for Brain Research Jagiellonian University Kraków Poland Jagiellonian Human-Centered Artificial Intelligence Laboratory Jagiellonian University Kraków Poland
Modern video streaming services require quality assurance of the presented audiovisual material. Quality assurance mechanisms allow streaming platforms to provide quality levels that are considered sufficient to yield... 详细信息
来源: 评论
Enhancing Deep Reinforcement Learning: A Tutorial on Generative Diffusion Models in Network Optimization
arXiv
收藏 引用
arXiv 2023年
作者: Du, Hongyang Zhang, Ruichen Liu, Yinqiu Wang, Jiacheng Lin, Yijing Li, Zonghang Niyato, Dusit Kang, Jiawen Xiong, Zehui Cui, Shuguang Ai, Bo Zhou, Haibo Kim, Dong In The School of Computer Science and Engineering The Energy Research Institute @ NTU Interdisciplinary Graduate Program Nanyang Technological University Singapore The School of Computer Science and Engineering Nanyang Technological University Singapore The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China The School of Information and Communication Engineering University of Electronic Sciences and Technology of China Chengdu China The School of Automation Guangdong University of Technology China The Pillar of Information Systems Technology and Design Singapore University of Technology and Design Singapore Shenzhen China The State Key Laboratory of Rail Traffic Control and Safety Beijing Jiaotong University Beijing100044 China School of Electronic Science and Engineering Nanjing University Jiangsu Nanjing210093 China The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of
Generative Diffusion Models (GDMs) have emerged as a transformative force in the realm of Generative Artificial Intelligence (GenAI), demonstrating their versatility and efficacy across various applications. The abili... 详细信息
来源: 评论
Classification and Recognition of Underwater Target Based on MFCC Feature Extraction
Classification and Recognition of Underwater Target Based on...
收藏 引用
IEEE International Conference on Signal Processing, communications and Computing (ICSPCC)
作者: Yuze Tong Xin Zhang Yizhou Ge School of Marine Science and Technology Northwestern Polytechnical University Xi’an China Science and Technology on Communication Information Security Control Laboratory NO.36 Research Institute of CETC Jiaxing China
The key to underwater target recognition is to extract the effective features of underwater target radiation noise. This paper presents an effective method for underwater target recognition and classification by extra... 详细信息
来源: 评论
Unified Authentication Scheme for IoT Blockchain Based on PUF
Unified Authentication Scheme for IoT Blockchain Based on PU...
收藏 引用
IEEE International Conference on Big Data and Cloud Computing (BdCloud)
作者: Dawei Li Yingxian Song Lixin Zhang Di Liu Baoquan Ma Zhenyu Guan School of Cyber Science and Technology Beihang University Beijing China National Engineering Laboratory for Industry Control System Information Security Technology Beijing China National Computer System Enginering Research Institute of China Beijing China
The number of global Internet of Things devices has increased rapidly and has a wide range of application markets. Access authentication methods for massive heterogeneous IoT devices are complicated, and central serve... 详细信息
来源: 评论
Capacity Maximization for FAS-assisted Multiple Access Channels
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Hao Wong, Kai-Kit New, Wee Kiat Ghadi, Farshad Rostami Zhou, Gui Murch, Ross Chae, Chan-Byoung Zhu, Yongxu Jin, Shi The Department of Electronic and Electrical Engineering University College London LondonWC1E7JE United Kingdom Yonsei Frontier Laboratory Yonsei University Seoul03722 Korea Republic of Erlangen91054 Germany Hong Kong University of Science and Technology Clear Water Bay Hong Kong The School of Integrated Technology Yonsei University Seoul03722 Korea Republic of The School of Engineering University of Warwick Coventry United Kingdom The Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China
This paper investigates a multiuser millimeter-wave (mmWave) uplink system in which each user is equipped with a multi-antenna fluid antenna system (FAS) while the base station (BS) has multiple fixed-position antenna... 详细信息
来源: 评论
Network security Situation Awareness technology Based on Multi-source Heterogeneous Data
Network Security Situation Awareness Technology Based on Mul...
收藏 引用
2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020
作者: Zhang, Daojuan Qian, Kexiang Wang, Wenhui Fang, Fuyang Wang, Chonghua Luo, Xi State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Co. Ltd Beijing China Information Science Academy China Electronics Technology Group Corporation Beijing China Department of Security Technology China Industrial Control Systems Cyber Emergency Response Team Beijing China Cyber Space Institute of Advanced Technology Guangzhou University Guangzhou China
With the development of information technology, the scale of the network continues to expand, and the security issues continue to increase. The complexity of the network security situation is increasing and the import... 详细信息
来源: 评论
Multi-objective particle swarm optimization with adaptive strategies for feature selection
收藏 引用
Swarm and Evolutionary Computation 2021年 62卷 100847-100847页
作者: Han, Fei Chen, Wen-Tao Ling, Qing-Hua Han, Henry School of Computer Science and Communication Engineering Jiangsu University ZhenjiangJiangsu212013 China Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace ZhenjiangJiangsu212013 China School of Computer Science Jiangsu University of Science and Technology ZhenjiangJiangsu212003 China Department of Computer and Information Sciences Fordham University NY48105 United States
Feature selection is a multi-objective optimization problem since it has two conflicting objectives: maximizing the classification accuracy and minimizing the number of the selected features. Due to the lack of select... 详细信息
来源: 评论
Safeguarding Next Generation Multiple Access Using Physical Layer security Techniques: A Tutorial
arXiv
收藏 引用
arXiv 2024年
作者: Lv, Lu Xu, Dongyang Hu, Rose Qingyang Ye, Yinghui Yang, Long Lei, Xianfu Wang, Xianbin Kim, Dong In Nallanathan, Arumugam The State Key Laboratory of Integrated Services Networks Xidian University Xi’an710071 China The School of Information and Communications Engineering Xi’an Jiaotong University Xi’an710049 China The Department of Electrical and Computer Engineering Utah State University LoganUT84322 United States The Shaanxi Key Laboratory of Information Communication Network and Security Xi’an University of Posts & Telecommunications Xi’an710121 China The School of Information Science and Technology Southwest Jiaotong University Chengdu610031 China The Department of Electrical and Computer Engineering Western University LondonONN6A 5B9 Canada The Department of Electrical and Computer Engineering Sungkyunkwan University Suwon16419 Korea Republic of School of Electronic Engineering and Computer Science Queen Mary University of London E1 4NS United Kingdom
Driven by the ever-increasing requirements of ultrahigh spectral efficiency, ultra-low latency, and massive connectivity, the forefront of wireless research calls for the design of advanced next generation multiple ac... 详细信息
来源: 评论
A Analysis of Attack and Defense Mobile Ad Hoc Network Based on OPNET
A Analysis of Attack and Defense Mobile Ad Hoc Network Based...
收藏 引用
2019 International Conference on Advanced Material Research and Processing technology, AMRPT 2019
作者: Dai, Jiahao Xu, Xiaofeng Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing China China Electronic Group Corporation No.36 Institute Zhejiang Jiaxing China
Due to the broadcast nature of wireless communications, the damage to mobile ad hoc networks is becoming more and more common. We propose a network stability model that can effectively reflect the network performance ... 详细信息
来源: 评论