咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 430 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 270 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 100 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 生物医学工程(可授...
  • 398 篇 理学
    • 215 篇 数学
    • 136 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 146 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 9 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 33 篇 feature extracti...
  • 30 篇 deep learning
  • 30 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 17 篇 accuracy
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 internet of thin...

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 47 篇 xu bingjie
  • 42 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 24 篇 yang jie
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 20 篇 bingjie xu
  • 19 篇 pi yaodi
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,053 篇 英文
  • 39 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1116 条 记 录,以下是131-140 订阅
排序:
Efficient Two-Party Authentication Key Agreement Protocol Using Reconciliation Mechanism from Lattice  5th
Efficient Two-Party Authentication Key Agreement Protocol Us...
收藏 引用
5th International Conference on security and Privacy in New Computing Environments, SPNCE 2022
作者: Wang, Jinhua Chen, Ting Liu, Yanyan Zhou, Yu Dong, XinFeng Science and Technology on Communication Security Laboratory Sichuan Chengdu610041 China
It is crucial and challenging to design a quantum-secure and efficient authentication key agreement scheme for IoT. The reasons are that not only there are various security requirements need to meet, but also communic... 详细信息
来源: 评论
High-speed implementation of privacy amplification for continuous-variable quantum key distribution  7
High-speed implementation of privacy amplification for conti...
收藏 引用
Quantum and Nonlinear Optics VII 2020
作者: Luo, Yujie Li, Yang Yang, Jie Ma, Li Huang, Wei Xu, Bingjie Science and Technology 011 Security Communication Laboratory Institute of Southwestern Communication Chengdu610093 China
Privacy amplification (PA) is an essential process for high-speed and real-time implementation of a continuous-variable quantum key distribution (CV-QKD) system. Tins work focuses on the improvement of the performance... 详细信息
来源: 评论
Primary User Adversarial Attacks on Deep Learning-Based Spectrum Sensing and the Defense Method
收藏 引用
China communications 2021年 第12期18卷 94-107页
作者: Shilian Zheng Linhui Ye Xuanye Wang Jinyin Chen Huaji Zhou Caiyi Lou Zhijin Zhao Xiaoniu Yang Science and Technology on Communication Information Security Control Laboratory Jiaxing314000China College of Information Engineering Zhejiang University of TechnologyHangzhou310012China Institute of Cyberspace Security Zhejiang University of TechnologyHangzhou310012China School of Communication Engineering Hangzhou Dianzi UniversityHangzhou310018China
The spectrum sensing model based on deep learning has achieved satisfying detection per-formence,but its robustness has not been *** this paper,we propose primary user adversarial attack(PUAA)to verify the robustness ... 详细信息
来源: 评论
Bit Stream Oriented Enumeration Tree Pruning Algorithm
收藏 引用
Journal of Shanghai Jiaotong university(science) 2011年 第5期16卷 567-570页
作者: 邱卫东 金凌 杨小牛 杨红娃 School of Information Security Engineering Shanghai Jiaotong University National Science and Technology on Communication Information Security Control Laboratory No. 36 Institute of China Electronics Technology Group Corporation
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an... 详细信息
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
science China(Information sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
Deep Spectrum Prediction in High Frequency communication Based on Temporal-Spectral Residual Network
收藏 引用
China communications 2018年 第9期15卷 25-34页
作者: Ling Yu Jin Chen Yuming Zhang Huaji Zhou Jiachen Sun College of Communications Engineering Army Engineering University of PLA Nanjing 210000 China Science and Technology on Communication Information Security Control Laboratory Jiaxing 314033 China
High frequency(HF) communication is widely spread due to some merits like easy deployment and wide communication coverage. Spectrum prediction is a promising technique to facilitate the working frequency selection and... 详细信息
来源: 评论
An Optimal Beamforming Model for Aperture-Level Phased Array Full-Duplex  13
An Optimal Beamforming Model for Aperture-Level Phased Array...
收藏 引用
13th International Conference on Microwave and Millimeter Wave technology, ICMMT 2021
作者: Chen, Jiarui Chen, Shunyang Huang, Xiaoguo Zhang, Qi Zhu, Menglei Science And Technology On Communication Information Security Control Laboratory Jiaxing314033 China
Full-duplex, which aims to simultaneously transmitting and receiving over the same band, together with phased array antennas play fundamental roles in next-generation wireless communication systems. The combination of... 详细信息
来源: 评论
A secure and high-performance multi-controller architecture for software-defined networking
收藏 引用
Frontiers of Information technology & Electronic Engineering 2016年 第7期17卷 634-646页
作者: Huan-zhao WANG Peng ZHANG Lei XIONG Xin LIU Cheng-chen HU Department of Computer Science and Technology Xi'an Jiaotong UniversityXi'an 710059China Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory Shijiazhuang 050081China MOE Key Laboratory for Intelligent Networks and Network Security Xi'an Jiaotong UniversityXi'an 710049China
Controllers play a critical role in software-defined networking(SDN).However,existing singlecontroller SDN architectures are vulnerable to single-point failures,where a controller's capacity can be saturated by fl... 详细信息
来源: 评论
More practical power analysis attack on LFSR based stream ciphers
收藏 引用
Journal of Information and Computational science 2012年 第12期9卷 3517-3527页
作者: Jia, Yanyan Hu, Yupu Zhang, Wenzheng Department of Computer Science Xi'an University of Science and Technology Xi'an 710054 China Laboratory of Computer Networks and Information Security Xidian University Xi'an 710071 China Science and Technology on Communication Security Laboratory The 30th Research Institute of China Electronics Technology Group Corporation Chengdu 610041 China
Power analysis attack is a powerful cryptanalytic technique aiming to extract the secret data from a cryptographic device by collecting and analyzing power consumption traces. In this paper, we present a practical pow... 详细信息
来源: 评论
A Tutorial on Movable Antennas for Wireless Networks
收藏 引用
IEEE communications Surveys and Tutorials 2025年
作者: Zhu, Lipeng Ma, Wenyan Mei, Weidong Zeng, Yong Wu, Qingqing Ning, Boyu Xiao, Zhenyu Shao, Xiaodan Zhang, Jun Zhang, Rui National University of Singapore Department of Electrical and Computer Engineering 117583 Singapore National Key Laboratory of Wireless Communications Chengdu611731 China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China Purple Mountain Laboratories Nanjing211111 China Shanghai Jiao Tong University Department of Electronic Engineering Shanghai200240 China Beihang University School of Electronic and Information Engineering Beijing100191 China University of Waterloo Department of Electrical and Computer Engineering WaterlooONN2L 3G1 Canada Beijing Institute of Technology State Key Laboratory of CNS/ATM Miit Key Laboratory of Complex-field Intelligent Sensing Beijing100081 China The Chinese University of HongKong School of Science and Engineering Shenzhen Research Institute of Big Data Guangdong Shenzhen518172 China
Movable antenna (MA) has been recognized as a promising technology to enhance the performance of wireless communication and sensing by enabling antenna movement. Such a significant paradigm shift from conventional fix... 详细信息
来源: 评论