咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 430 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 270 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 100 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 生物医学工程(可授...
  • 398 篇 理学
    • 215 篇 数学
    • 136 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 146 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 9 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 33 篇 feature extracti...
  • 30 篇 deep learning
  • 30 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 17 篇 accuracy
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 internet of thin...

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 47 篇 xu bingjie
  • 42 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 24 篇 yang jie
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 20 篇 bingjie xu
  • 19 篇 pi yaodi
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,053 篇 英文
  • 39 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Communication Security Laboratory"
1116 条 记 录,以下是11-20 订阅
排序:
On l-th NMDS Codes∗
收藏 引用
Chinese Journal of Electronics 2025年 第3期23卷 454-457页
作者: Hongxi Tong Wenhai Chen Fei Yu Department of Mathematics Shanghai University Shanghai China Science and Technology on Communication Security Laboratory Chengdu China
Linear codes with Singleton defects equivalent to 0, 1, 2 are studied, and they have good properties. They are called MDS codes, NMDS codes, NNMDS cdoes, respectively. In this paper, we study linear codes with large S... 详细信息
来源: 评论
DETCP: Self-Detoxifying Language Models With Contrastive Pairs
DETCP: Self-Detoxifying Language Models With Contrastive Pai...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Liu, Dianqing Liu, Yi Guo, Junbo Mao, Zhendong School of Cyberspace Security University of Science and Technology of China Hefei China State Key Laboratory of Communication Content Cognition People's Daily Online Beijing China
Influenced by context such as tone, emotion and demographic, pre-trained language models may generate harmful text, which limits their widespread application. While detoxifying language models seeks to reduce the like... 详细信息
来源: 评论
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
Radio Signal Modulation Pattern Recognition Based on Time-Frequency Adaptive Decomposition and Hybrid Neural Network
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Dai, Shaogang Xu, Jianwei Zhou, Huaji Hangzhou Dianzi University School of communication engineering Hangzhou310018 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314000 China
Automatic modulation classification of electromagnetic signals has an important role in the field of signal processing. The current methods for identifying the modulation pattern of radio signals mainly used end-to-en... 详细信息
来源: 评论
Vertin: Fast, communication-friendly and Key-compact secure inference system for NNs and LLMs
收藏 引用
Journal of Information security and Applications 2025年 91卷
作者: Bie, Xin Liu, Zhenhua Liang, Han School of Mathematics and Statistics Xidian University Xi'an710071 China Science and Technology on Communication Security Laboratory Chengdu610041 China
Existing secure inference schemes based on function secret sharing (FSS) allow the client to obtain inference results while protecting the client's inputs, the server's neural networks (NNs), and large languag... 详细信息
来源: 评论
Delayed interference-based broadband optical chaos generation in a mutual coupled RSOA and DFB system
收藏 引用
Optics Letters 2025年 第10期50卷 3381-3384页
作者: Jiahao Qian Ning Jiang Anran Li Yiqun Zhang Bingjie Xu Wei Huang Kun Qiu School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu 611731 China Tianfu Jiangxi Laboratory Chengdu 641419 China National Key Laboratory of Security Communication Chengdu 610041 China
In this Letter, a delayed interference (DI)-based chaos generation scheme in a mutually coupled system consisting of a reflective semiconductor optical amplifier (RSOA) and a distributed feedback (DFB) semiconductor l... 详细信息
来源: 评论
Toward Universal Belief Propagation Decoding for Short Binary Block Codes
收藏 引用
IEEE Journal on Selected Areas in communications 2025年 第4期43卷 1135-1152页
作者: Shen, Yifei Li, Zongyao Ren, Yuqing Boutillon, Emmanuel Balatsoukas-Stimming, Alexios Zhang, Chuan You, Xiaohu Burg, Andreas Telecommunications Circuits Laboratory Lausanne1015 Switzerland Southeast University LEADS National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing211189 China Southeast University Purple Mountain Laboratories Nanjing211189 China Université Bretagne Sud Lab-STICC CNRS UMR 6285 Lorient56100 France Eindhoven University of Technology Department of Electrical Engineering Eindhoven5600 MB Netherlands
Belief propagation (BP) decoding has been recognized for its capacity-approaching performance and high throughput when decoding long low-density parity-check (LDPC) codes. However, the application of BP decoding for s... 详细信息
来源: 评论
Performance Limits of Shadowing Effects-Based Passive Target Localization Assisted by Active Sensor Calibration via Visible Light Positioning
收藏 引用
IEEE Transactions on communications 2025年
作者: Bao, Xu Zhou, Jiawei Zhang, Licheng The School of Computer Science and Communication Engineering Jiangsu University Zhenjiang212013 China The Jiangsu Key Laboratory of Security Technology for Industrial Cyberspace Zhenjiang212013 China
In this paper, we aim at exploring the performance limits of passive indoor target localization utilizing multiple light-emitting diode (LED) transmitters embedded into the ceiling and multiple photodiode (PD) sensors... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
OS-SEI: Open-Set Specific Emitter Identification Based on Outlier Exposure and Label Smoothing
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wang, Juzhen Wang, Hanhong Wang, Wei Zha, Haoran Hangzhou Dianzi University School of Communication Engineering Hangzhou310018 China Binjiang Institute of Artificial Intelligence of Zhejiang University of Technology Hangzhou310052 China Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China Harbin Engineering University College of Information and Communication Engineering Harbin150009 China
Specific Emitter Identification (SEI), based on the inevitable hardware imperfections of emitters, plays a crucial role in physical layer security, independent of upper-layer cryptographic methods. In recent years, SE... 详细信息
来源: 评论