咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是171-180 订阅
排序:
Bayesian Framework for Multi-User Cooperative Radio SLAM
Bayesian Framework for Multi-User Cooperative Radio SLAM
收藏 引用
IEEE International Symposium on Personal, Indoor and Mobile Radio communications (PIMRC)
作者: Hang Que Jie Yang Tao Du Shuqiang Xia Chao-Kai Wen Shi Jin National Mobile Communications Research Laboratory Southeast University Nanjing China Frontiers Science Center for Mobile Information Communication and Security Southeast University Nanjing China Key Laboratory of Measurement and Control of Complex Systems of Engineering Ministry of Education Southeast University Nanjing China ZTE Corporation Shenzhen China State Key Laboratory of Mobile Network and Mobile Multimedia Technology Shenzhen China Institute of Communications Engineering National Sun Yat-sen University Kaohsiung Taiwan
The advancement of millimeter-wave communication technology heralds new sensing capabilities. By leveraging channel multipath parameter estimates, we can harness simultaneous localization and mapping (SLAM) for precis... 详细信息
来源: 评论
A 3-D Printed Ka-Band Waveguide Bandpass Filter With Quasi-Elliptic Response
A 3-D Printed Ka-Band Waveguide Bandpass Filter With Quasi-E...
收藏 引用
International Symposium on Antennas, Propagation and EM Theory (ISAPE)
作者: Fan Zhang Lili Xu Jianqiang Zhang Pulong Nan Xiaofan Jin Gaofeng Pan Science and Technology on Communication Information Security Control Laboratory JiaxingZhejiangChina314033 Huawei Technologies Co. Ltd Shenzhen Guangdong China
A Ka-band quasi-elliptic bandpass filter (BPF) based on stereolithography apparatus (SLA) 3-D printing technique is proposed. The filter consists of four coupled resonators with three direct couplings between adjacent... 详细信息
来源: 评论
Understanding the Dynamics of DNNs Using Graph Modularity
arXiv
收藏 引用
arXiv 2021年
作者: Lu, Yao Yang, Wen Zhang, Yunzhe Chen, Zuohui Chen, Jinyin Xuan, Qi Wang, Zhen Yang, Xiaoniu Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China Northwestern Polytechnical University Xi’an710072 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
There are good arguments to support the claim that deep neural networks (DNNs) capture better feature representations than the previous hand-crafted feature engineering, which leads to a significant performance improv... 详细信息
来源: 评论
TSGN: Transaction Subgraph Networks Assisting Phishing Detection in Ethereum
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Jinhuan Chen, Pengtao Xu, Xinyao Wu, Jiajing Shen, Meng Xuan, Qi Yang, Xiaoniu Institute of Cyberspace Security College of Information Engineering Zhejiang University of Technology Hangzhou310023 China School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China School of Cyberspace Science and Technology Beijing Institute of Technology Beijing100081 China Shenzhen518066 China PCL Research Center of Networks and Communications Peng Cheng Laboratory Shenzhen518000 China Utron Technology Company Ltd. Hangzhou310056 China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China
Due to the decentralized and public nature of the Blockchain ecosystem, the malicious activities on the Ethereum platform impose immeasurable losses for the users. Existing phishing scam detection methods mostly rely ... 详细信息
来源: 评论
Joint Delay and Maintenance Optimization for Spectrum Handoff in Cognitive Radio Networks Using Binary Shuffled Frog Leaping Algorithm  19
Joint Delay and Maintenance Optimization for Spectrum Handof...
收藏 引用
19th IEEE International Conference on communication technology, ICCT 2019
作者: Jiang, Jianjun Zheng, Shilian Science and Technology on Communication Information Security Control Laboratory Jiaxing China
In cognitive radio networks, when a primary user reoccupies the channel, cognitive radios (CRs) need to vacate the channel and reestablish a link on some other channel to avoid interference to primary users, resulting... 详细信息
来源: 评论
Modulation Recognition of Underwater Acoustic communication Signals Based on Joint Feature Extraction
Modulation Recognition of Underwater Acoustic Communication ...
收藏 引用
2019 IEEE International Conference on Signal, information and Data Processing, ICSIDP 2019
作者: Ge, Yizhou Zhang, Xin Zhou, Qing Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China No.36 Research Institute of CETC Jiaxing314000 China School of Marine Science and Technology Northwestern Polytechnical University Xi'an710072 China
Recently, the research on modulation identification of underwater acoustic (UWA) communication signals has attracted much attention. It is a challenge to identify the modulation of underwater acoustic communication si... 详细信息
来源: 评论
Defend Against Jamming Attacks Using Deep Reinforcement Learning
Defend Against Jamming Attacks Using Deep Reinforcement Lear...
收藏 引用
International Symposium on Antennas, Propagation and EM Theory (ISAPE)
作者: Weiguo Shen Wei Wang Hu Jin Weifeng Zhang Science and Technology on Communication Information Security Control Laboratory China National University of Defense Technology China Jiaxing University China Jiaxing Deep Intelligence Technology Co. LTD China
Cognitive radio network has the learning ability to adjust transmission behavior to adapt to dynamic electromagnetic environment, and it has become a research hotspot in the field of the new generation of intelligent ... 详细信息
来源: 评论
An Optimized Method of Packet Loss Rate under Backup Path Protection in OBS Network
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1746卷
作者: Aodong Meng Yucheng Chen Jiahao Dai Yongqun Chen Science and Technology on Communication Information Security Control Laboratory Jiaxing China No.36 Research Institute of CETC Jiaxing China
In order to calculate the packet loss rate in OBS network, this paper proposes a method, which performs good in both accuracy and rapidity, based on Erlang B formula to estimate the packet loss probability in OBS netw...
来源: 评论
Distributed Blanket Jamming Resource Scheduling for Satellite Navigation Based on Particle Swarm Optimization and Genetic Algorithm  20
Distributed Blanket Jamming Resource Scheduling for Satellit...
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Luo, Zhaoyi Deng, Min Yao, Zhiqiang Leng, Xiaofan Chen, Yongqi Information Security Control Laboratory Science and Technology on Communication Jiaxing China Xiangtan University's Centre for Intelligent Navigation and Remote Sensing Research Xiangtan China Xiangtan University Xiangtan China
Jamming technology for satellite navigation has been widely used in some fields. The distributed jamming system contains a large number of jamming sources. How to schedule the limited resources efficiently to fully ut... 详细信息
来源: 评论
Quantum proof and high-speed privacy amplification for quantum key distribution
收藏 引用
Physical Review Applied 2025年 第5期23卷 054004-054004页
作者: Bing-Qi Yan Jun-Bin Wu Fan Fan Bing-Jie Xu Xiao-Ling Zhang Min Gu Key Laboratory of Atomic and Subatomic Structure and Quantum Control (Ministry of Education) Guangdong Basic Research Center of Excellence for Structure and Fundamental Interactions of Matter School of Physics South China Normal University Guangzhou 510006 China Guangdong Provincial Key Laboratory of Quantum Engineering and Quantum Materials Guangdong-Hong Kong Joint Laboratory of Quantum Matter South China Normal University Guangzhou 510006 China Quantum Science Center of Guangdong-HongKong-Macao Greater Bay Area (Guangdong) Shenzhen 518000 China School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu 610041 China
Privacy amplification (PA) is a vital step in the postprocessing stage of quantum key distribution, which can extract a secure key from a source partially leaked to the environment. We propose a PA scheme that uses th... 详细信息
来源: 评论