咨询与建议

限定检索结果

文献类型

  • 685 篇 会议
  • 430 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,116 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 718 篇 工学
    • 445 篇 计算机科学与技术...
    • 346 篇 软件工程
    • 270 篇 信息与通信工程
    • 154 篇 电子科学与技术(可...
    • 100 篇 电气工程
    • 58 篇 网络空间安全
    • 53 篇 控制科学与工程
    • 51 篇 生物工程
    • 49 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 安全科学与工程
    • 28 篇 光学工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 19 篇 动力工程及工程热...
    • 15 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 生物医学工程(可授...
  • 398 篇 理学
    • 215 篇 数学
    • 136 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 56 篇 生物学
    • 31 篇 系统科学
    • 30 篇 化学
  • 146 篇 管理学
    • 98 篇 管理科学与工程(可...
    • 56 篇 图书情报与档案管...
    • 27 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 20 篇 法学
    • 13 篇 社会学
  • 15 篇 医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 经济学
  • 9 篇 农学
  • 3 篇 艺术学
  • 2 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 33 篇 feature extracti...
  • 30 篇 deep learning
  • 30 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 26 篇 semantics
  • 24 篇 protocols
  • 21 篇 authentication
  • 17 篇 accuracy
  • 16 篇 bandwidth
  • 16 篇 encryption
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 12 篇 internet of thin...

机构

  • 184 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 25 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 47 篇 xu bingjie
  • 42 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 wang heng
  • 24 篇 yang jie
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 20 篇 bingjie xu
  • 19 篇 pi yaodi
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 14 篇 fei yu

语言

  • 1,053 篇 英文
  • 39 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1116 条 记 录,以下是51-60 订阅
排序:
Energy Efficiency Optimization of IRS-Aided Multiuser MISO Underlay EH-CR communication Systems By Using PER-SD3 Method
收藏 引用
IEEE Transactions on Cognitive communications and Networking 2025年
作者: Wang, Jun Pei, Hai Yang, Liang Hu, Jinsong Wu, Liang Shu, Feng Fuzhou University College of Electrical Engineering and Automation Fuzhou350108 China Fuzhou University Mechanical and Electrical Engineering Practice Center Fuzhou350108 China Fuzhou University College of Physics and Information Engineering Fuzhou China Southeast University National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and Security Nanjing210006 China Hainan University School of Information and Communication Engineering Haikou570228 China Nanjing University of Science and Technology School of Electronic and Optical Engineering Nanjing210094 China
With the increasing demand of wireless communication, the data rates supported by wireless communication technology are required to be higher, which also leads to the shortage of spectrum resources. Cognitive radio (C... 详细信息
来源: 评论
Practical continuous-variable quantum key distribution with feasible optimization parameters
收藏 引用
science China(Information sciences) 2023年 第8期66卷 80-91页
作者: Li MA Jie YANG Tao ZHANG Yun SHAO Jinlu LIU Yujie LUO Heng WANG Wei HUANG Fan FAN Chuang ZHOU Liangliang ZHANG Shuai ZHANG Yichen ZHANG Yang LI Bingjie XU Science and Technology on Communication Security Laboratory Institute of Southwestern Communication State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications
Continuous-variable quantum key distribution(CV-QKD) offers an approach to achieve a potential high secret key rate(SKR) in metropolitan areas. There are several challenges in developing a practical CV-QKD system from... 详细信息
来源: 评论
Spatially Coupled 5G LDPC Codes via Superposition
Spatially Coupled 5G LDPC Codes via Superposition
收藏 引用
IEEE Conference on Wireless communications and Networking
作者: Jiayi Yang Qianfan Wang Zhiyuan Tan Congduan Li Xiao Ma School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China Huawei Technologies Co. Ltd. Shanghai China School of Electronics and Communication Engineering Sun Yat-sen University Shenzhen China
We propose in this paper to enhance the 5G low-density parity-check (LDPC) codes by transmitting the codewords in a block Markov superposition transmission (BMST) manner, resulting in a class of spatially coupled LDPC... 详细信息
来源: 评论
Decoy-state method for quantum-key-distribution-based quantum private query
收藏 引用
science China(Physics,Mechanics & Astronomy) 2022年 第4期65卷 41-48页
作者: Bin Liu Shuang Xia Di Xiao Wei Huang Bingjie Xu Yang Li College of Computer Science Chongqing UniversityChongqing 400044China Science and Technology on Communication Security Laboratory Institute of Southwestern CommunicationChengdu 610041China
The quantum private query(QPQ)is a quantum solution for the symmetrically private information retrieval *** study the security of quantum-key-distribution-based QPQ with weak coherent *** result shows that multiphoton... 详细信息
来源: 评论
Research on the Construction of a Novel Cyberspace security Ecosystem
收藏 引用
Engineering 2018年 第1期4卷 47-52页
作者: Xiao-Niu Yang Wei Wang Xiao-Feng Xu Guo-Rong Pang Chun-Lei Zhang Science and Technology on Communication Information Security Control Laboratory Jiaxing Zhejiang 314033 China Science and Technology on Electro-Optical Information Security Control Laboratory Tianfin 300300 China
Given the challenges facing the cyberspace of the nation, this paper presents the tripartite theory of cyberspace, based on the status quo of cyberspace. Corresponding strategies and a research architecture are propos... 详细信息
来源: 评论
Joint Beamforming Design for Integrated Sensing and communication Systems with Hybrid-Colluding Eavesdroppers
收藏 引用
IEEE Transactions on communications 2025年
作者: Liu, Meiding Zhou, Zhengchun Shi, Qiao Li, Guyue Liu, Zilong Fan, Pingzhi Lee, Inkyu Southwest Jiaotong University School of Information Science and Technology Chengdu611756 China Key Laboratory of Analytical Mathematics and Applications China Southeast University School of Cyber Science and Engineering Nanjing210096 China Purple Mountain Laboratories for Network and Communication Security Nanjing210096 China University of Essex School of Computer Science and Electronics Engineering ColchesterCO4 3SQ United Kingdom Southwest Jiaotong University Key Laboratory of Information Coding and Transmission Chengdu611756 China Korea University School of Electrical Engineering Seoul02841 Korea Republic of
In this paper, we consider the physical layer security (PLS) problem for integrated sensing and communication (ISAC) systems in the presence of hybrid-colluding eavesdroppers, where an active eavesdropper (AE) and a p... 详细信息
来源: 评论
Toward a further understanding of bit-based division property
收藏 引用
science China(Information sciences) 2017年 第12期60卷 277-279页
作者: Ling SUN Meiqin WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Science and Technology on Communication Security Laboratory State Key Laboratory of Cryptology P.O.Box 5159
The division property of a multiset,which is a generalization of the integral property,was proposed by Todo[1]at EUROCRYPT *** division property can precisely depict the implicit properties between ALL and BALANCE pro... 详细信息
来源: 评论
A Distributed Self-Tallying Electronic Voting System Using the Smart Contract
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 1063-1076页
作者: Jingyu YAO Bo YANG Tao WANG Wenzheng ZHANG School of Computer Science Shaanxi Normal University State Key Laboratory of Integrated Services Networks Xidian University Science and Technology on Communication Security Laboratory
For electronic voting(e-voting) with a trusted authority, the ballots may be discarded or tampered, so it is attractive to eliminate the dependence on the trusted party. An e-voting protocol, where the final voting re... 详细信息
来源: 评论
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
收藏 引用
science China(Information sciences) 2018年 第3期61卷 228-230页
作者: Lixue SUN Chunxiang XU Mingwu ZHANG Kefei CHEN Hongwei LI Center for Cyber Security School of Computer Science and EngineeringUniversity of Electronic Science and Technology of China School of Computer Science Hubei University of Technology School of Science Hangzhou Normal University Laboratory of Science and Technology on Communication Security
Public key encryption with keyword search(PEKS)enables one to search encrypted data containing some keyword without decrypting the data in public key *** et al.[1]introduced the notion of PEKS,but later Byun et al.[2]... 详细信息
来源: 评论
Constructions of vectorial Boolean functions with good cryptographic properties
收藏 引用
science China(Information sciences) 2016年 第11期59卷 233-234页
作者: Luyang LI Weiguo ZHANG State Key Laboratory of Integrated Services Networks Xidian University Science and Technology on Communication Security Laboratory
Dear editor,Vectorial Boolean functions play an important role in designing certain stream cipher schemes,such as filtering generators and nonlinear *** be used in the aforementioned schemes,vectorial Boolean function... 详细信息
来源: 评论