咨询与建议

限定检索结果

文献类型

  • 262 篇 会议
  • 91 篇 期刊文献

馆藏范围

  • 353 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 228 篇 工学
    • 125 篇 信息与通信工程
    • 105 篇 计算机科学与技术...
    • 83 篇 软件工程
    • 74 篇 电子科学与技术(可...
    • 29 篇 电气工程
    • 27 篇 仪器科学与技术
    • 21 篇 控制科学与工程
    • 19 篇 生物工程
    • 12 篇 材料科学与工程(可...
    • 11 篇 机械工程
    • 11 篇 网络空间安全
    • 7 篇 土木工程
    • 6 篇 光学工程
    • 6 篇 建筑学
    • 6 篇 船舶与海洋工程
    • 6 篇 航空宇航科学与技...
    • 6 篇 安全科学与工程
    • 4 篇 化学工程与技术
  • 110 篇 理学
    • 59 篇 数学
    • 31 篇 物理学
    • 19 篇 生物学
    • 19 篇 统计学(可授理学、...
    • 12 篇 系统科学
    • 7 篇 化学
    • 3 篇 地球物理学
  • 36 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 10 篇 图书情报与档案管...
    • 6 篇 工商管理
  • 9 篇 军事学
    • 6 篇 军队指挥学
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 农学

主题

  • 15 篇 simulation
  • 15 篇 feature extracti...
  • 14 篇 deep learning
  • 14 篇 bandwidth
  • 14 篇 cognitive radio
  • 13 篇 modulation
  • 8 篇 signal to noise ...
  • 8 篇 metamaterials
  • 8 篇 receivers
  • 8 篇 heuristic algori...
  • 7 篇 interference
  • 7 篇 algorithm design...
  • 7 篇 microstrip anten...
  • 7 篇 clustering algor...
  • 7 篇 sensors
  • 6 篇 optimization
  • 6 篇 time-frequency a...
  • 6 篇 location awarene...
  • 6 篇 security
  • 6 篇 estimation

机构

  • 180 篇 science and tech...
  • 43 篇 science and tech...
  • 16 篇 institute of cyb...
  • 15 篇 no.36 research i...
  • 14 篇 the 36th researc...
  • 12 篇 dept. of microwa...
  • 11 篇 college of infor...
  • 9 篇 school of commun...
  • 8 篇 the science and ...
  • 7 篇 science and tech...
  • 7 篇 college of under...
  • 6 篇 no.36 research i...
  • 6 篇 university of el...
  • 6 篇 school of softwa...
  • 5 篇 state key labora...
  • 5 篇 no.36 research i...
  • 5 篇 school of inform...
  • 5 篇 school of comput...
  • 5 篇 electronic engin...
  • 5 篇 shenzhen researc...

作者

  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 20 篇 xiaoniu yang
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 14 篇 shilian zheng
  • 13 篇 zheng shilian
  • 13 篇 zhu huijie
  • 11 篇 wang lijun
  • 11 篇 lijun wang
  • 11 篇 huijie zhu
  • 10 篇 xiaofeng xu
  • 9 篇 huaji zhou
  • 9 篇 wang wei
  • 9 篇 jiahao dai
  • 8 篇 wenhua ye
  • 8 篇 dai jiahao
  • 8 篇 weiguo shen
  • 8 篇 jiang bin
  • 8 篇 huan li

语言

  • 330 篇 英文
  • 15 篇 中文
  • 8 篇 其他
检索条件"机构=Science and Technology on Communication Information Security Control Laboratory NO.36"
353 条 记 录,以下是41-50 订阅
排序:
A Single-Observer Passive Location Algorithm Base on Weighted Least Squares Criterion
A Single-Observer Passive Location Algorithm Base on Weighte...
收藏 引用
International Conference on communication technology (ICCT)
作者: Jiang Bin Lu An'nan You Mingyi Lou Caiyi Ye Yunxia Huang Kai Shi Binhua Communication Information Security Control Laboratory No.36 Research Institute of CETC Jiaxing Jiaxing China
Passive location system that locates “silent” targets using an non-cooperative opportunistic source (also called external illuminator) is great importance in a variety of applications. To solve the problem of using ... 详细信息
来源: 评论
Defense of Signal Modulation Classification Attack Based on GAN  7th
Defense of Signal Modulation Classification Attack Based on ...
收藏 引用
7th China National Conference on Big Data and Social Computing, BDSC 2022
作者: Zhu, Jiawei Liu, Yuhang Xu, Dongwei Yang, Hao Xuan, Qi Wang, Shunling Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Institute of Cyberspace Security Zhejiang University of Technology Hangzhou310023 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China
Although deep learning has been broadly used in all kinds of domains and has also achieved very good performance, it is obvious that deep learning is very vulnerable to be attacked shown by extensive researches (e.g. ... 详细信息
来源: 评论
A Collaborative Jamming Algorithm Based on Multi-UAV Scheduling  23
A Collaborative Jamming Algorithm Based on Multi-UAV Schedul...
收藏 引用
23rd IEEE International Conference on communication technology, ICCT 2023
作者: Jiang, Yixin Zhou, Lingyun Tang, Yijia Tu, Ya Liu, Chunhong Shi, Qingjiang Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China School of Software Engineering Tongji University Shanghai201804 China Shenzhen Research Institute of Big Data Shenzhen518172 China
In this paper, we consider the problem of multi-unmanned aerial vehicles' (UAVs), scheduling for cooperative jamming, where UAVs equipped with directional antennas perform collaborative jamming tasks against sever... 详细信息
来源: 评论
Weak Signal Detection based on Beta Divergence  24
Weak Signal Detection based on Beta Divergence
收藏 引用
24th IEEE International Workshop on Signal Processing Advances in Wireless communications, SPAWC 2023
作者: Liu, Jiahao Liu, Haoxuan Pu, Wenqiang Zhou, Rui You, Ming-Yi Shi, Qingjiang Science and Technology on Communication Information Security Control Laboratory Jiaxing China The Chinese University of HongKong Shenzhen Research Institute of Big Data Shenzhen China Tongji University School of Software Engineering Shanghai China
Among different electromagnetic spectrum monitoring tasks, a fundamental one is detecting the presence of weak communication signal under non-cooperative setting. Various detection methods have been studied in the lit... 详细信息
来源: 评论
An Optimal Beamforming Model for Aperture-Level Phased Array Full-Duplex  13
An Optimal Beamforming Model for Aperture-Level Phased Array...
收藏 引用
13th International Conference on Microwave and Millimeter Wave technology, ICMMT 2021
作者: Chen, Jiarui Chen, Shunyang Huang, Xiaoguo Zhang, Qi Zhu, Menglei Science And Technology On Communication Information Security Control Laboratory Jiaxing314033 China
Full-duplex, which aims to simultaneously transmitting and receiving over the same band, together with phased array antennas play fundamental roles in next-generation wireless communication systems. The combination of... 详细信息
来源: 评论
Modulation technology in Cross-Domain Magnetic Induction communication
Modulation Technology in Cross-Domain Magnetic Induction Com...
收藏 引用
IEEE International Conference on Signal Processing, communications and Computing (ICSPCC)
作者: Ruoxue Cheng Xin Zhang Xiaoming Qi Xiaoji Zhang Yizhou Ge School of Marine Science and Technology Northwestern Polytechnical University Xi'an China Control Laboratory Science and Technology on Communication Information Security Jiangxi China
The research on technology of cross-domain communication, which spans air and sea domains, has been widely concerned. As an emerging cross-domain communication technology, magnetic induction (MI) communication boasts ... 详细信息
来源: 评论
Analysis of Frequency Offset for Satellite Navigation Receiver Using Carrier-Aided Code Tracking Loop  20
Analysis of Frequency Offset for Satellite Navigation Receiv...
收藏 引用
20th IEEE International Conference on communication technology, ICCT 2020
作者: Gao, Teng Wang, Lijun Jin, Xiaofan No.36 Research Institute of Cetc Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Carrier-aided code tracking loop is widely used in satellite navigation receivers. This kind of loop structure can reduce code tracking noise by narrowing the bandwidth of code tracking loop. The performance of carrie... 详细信息
来源: 评论
Cross-receiver specific emitter identification based on deep adversarial neural network with separated batch normalization  3
Cross-receiver specific emitter identification based on deep...
收藏 引用
3rd International Conference on Computer science and communication technology, ICCSCT 2022
作者: Huang, Keju Jiang, Bin Yang, Junan Wang, Jian Hu, Pengjiang Li, Yiming Shao, Kun Zhao, Dongxing College of Electronic Engineering National University of Defense Technology Hunan Changsha China Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing314000 China
Specific emitter identification (SEI) is the approach to identify emitter individuals using received wireless signals. Despite the fact that deep learning has been successfully applied in SEI, the performance is still... 详细信息
来源: 评论
Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method
收藏 引用
China communications 2021年 第12期18卷 94-107页
作者: Shilian Zheng Linhui Ye Xuanye Wang Jinyin Chen Huaji Zhou Caiyi Lou Zhijin Zhao Xiaoniu Yang Science and Technology on Communication Information Security Control Laboratory Jiaxing314000China College of Information Engineering Zhejiang University of TechnologyHangzhou310012China Institute of Cyberspace Security Zhejiang University of TechnologyHangzhou310012China School of Communication Engineering Hangzhou Dianzi UniversityHangzhou310018China
The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been *** this paper,we propose primary user adversarial attack(PUAA)to verify the robustness ... 详细信息
来源: 评论
An Anti-jamming Intelligent Decision-Making Method for Multi-user communication Based on Deep Reinforcement Learning  22
An Anti-jamming Intelligent Decision-Making Method for Multi...
收藏 引用
22nd IEEE International Conference on communication technology, ICCT 2022
作者: Zhang, Lan Ma, Liang Tian, Feng Liang, Tianyi Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China The 36th Research Institution of China Electronics Technology Group Corporation Jiaxing341000 China Nanjing University of Posts and Telecommunications Nanjing210023 China
In order to effectively cope with the external malicious jamming from jammers and avoid mutual interference caused by competitive channels among users, an intelligent antijamming decision-making method based on deep r... 详细信息
来源: 评论