咨询与建议

限定检索结果

文献类型

  • 687 篇 会议
  • 424 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,112 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 717 篇 工学
    • 445 篇 计算机科学与技术...
    • 345 篇 软件工程
    • 270 篇 信息与通信工程
    • 156 篇 电子科学与技术(可...
    • 97 篇 电气工程
    • 58 篇 网络空间安全
    • 54 篇 控制科学与工程
    • 49 篇 生物工程
    • 48 篇 仪器科学与技术
    • 34 篇 机械工程
    • 29 篇 光学工程
    • 29 篇 安全科学与工程
    • 22 篇 材料科学与工程(可...
    • 21 篇 化学工程与技术
    • 20 篇 动力工程及工程热...
    • 14 篇 土木工程
    • 13 篇 航空宇航科学与技...
    • 13 篇 生物医学工程(可授...
    • 12 篇 建筑学
  • 396 篇 理学
    • 215 篇 数学
    • 137 篇 物理学
    • 83 篇 统计学(可授理学、...
    • 54 篇 生物学
    • 30 篇 化学
    • 30 篇 系统科学
  • 143 篇 管理学
    • 96 篇 管理科学与工程(可...
    • 55 篇 图书情报与档案管...
    • 26 篇 工商管理
  • 30 篇 军事学
    • 25 篇 军队指挥学
  • 21 篇 法学
    • 14 篇 社会学
  • 13 篇 医学
  • 11 篇 经济学
  • 8 篇 农学
  • 3 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 35 篇 quantum cryptogr...
  • 32 篇 feature extracti...
  • 29 篇 deep learning
  • 29 篇 security
  • 28 篇 cryptography
  • 26 篇 simulation
  • 25 篇 semantics
  • 24 篇 protocols
  • 22 篇 authentication
  • 17 篇 encryption
  • 16 篇 bandwidth
  • 16 篇 accuracy
  • 16 篇 privacy
  • 15 篇 cognitive radio
  • 15 篇 modulation
  • 15 篇 software
  • 15 篇 training
  • 15 篇 heuristic algori...
  • 14 篇 optimization
  • 13 篇 machine learning

机构

  • 185 篇 science and tech...
  • 179 篇 science and tech...
  • 50 篇 science and tech...
  • 42 篇 science and tech...
  • 32 篇 state key labora...
  • 26 篇 school of comput...
  • 23 篇 school of inform...
  • 21 篇 purple mountain ...
  • 20 篇 no.30 research i...
  • 19 篇 state key labora...
  • 18 篇 hubei key labora...
  • 18 篇 school of inform...
  • 18 篇 school of cyber ...
  • 17 篇 school of comput...
  • 17 篇 science and tech...
  • 17 篇 china electronic...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...
  • 16 篇 hubei engineerin...
  • 15 篇 services computi...

作者

  • 48 篇 xu bingjie
  • 43 篇 huang wei
  • 38 篇 li yang
  • 28 篇 zhang yichen
  • 25 篇 yang jie
  • 25 篇 wang heng
  • 23 篇 hua jun
  • 22 篇 yang xiaoniu
  • 22 篇 pan yan
  • 21 篇 shao yun
  • 20 篇 yu song
  • 19 篇 pi yaodi
  • 19 篇 bingjie xu
  • 18 篇 xiaoniu yang
  • 17 篇 zhao yue
  • 17 篇 wu qun
  • 15 篇 xuan qi
  • 15 篇 wu kaijun
  • 15 篇 lijun zhang
  • 15 篇 zhang wenzheng

语言

  • 1,046 篇 英文
  • 42 篇 其他
  • 24 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Science and Technology on Security Communication Laboratory"
1112 条 记 录,以下是81-90 订阅
排序:
Flexible and wearable battery-free backscatter wireless communication system for colour imaging
收藏 引用
npj Flexible Electronics 2024年 第1期8卷 761-769页
作者: Jun-Lin Zhan Wei-Bing Lu Cong Ding Zhen Sun Bu-Yun Yu Lu Ju Xin-Hua Liang Zhao-Min Chen Hao Chen Yong-Hao Jia Zhen-Guo Liu Tie-Jun Cui State Key Laboratory of Millimeter Waves School of Information Science and EngineeringSoutheast UniversityNanjing 210096China Center for Flexible RF Technology Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China College of Electronic and Information Engineering Nanjing University of Aeronautics and AstronauticsNanjing 211106China
Wireless imaging,equippedwith ultralow power wireless communications and energy harvesting(EH)capabilities,have emerged as battery-free and sustainable ***,the challenge of implementing wireless colour imaging in wear... 详细信息
来源: 评论
First demonstration of an 8-node Mbps quantum access network based on passive optical distribution network facilities
First demonstration of an 8-node Mbps quantum access network...
收藏 引用
Frontiers in Optics + Laser science 2023, FiO, LS 203: Part of Frontiers in Optics + Laser science 2023
作者: Bian, Yiming Pan, Yan Ma, Li Wang, Heng Dou, Jiayi Pi, Yaodi Yang, Jie Li, Yang Huang, Wei Yu, Song Zhang, Yichen Xu, Bingjie State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China
Quantum access network with 8 nodes and a secret key rate of over 6 Mbps per user is firstly demonstrated using passive optical distribution network facilities, paving the way of high-performance and scalable quantum-... 详细信息
来源: 评论
Experimental demonstration of 4-user quantum access network based on passive optical network  49
Experimental demonstration of 4-user quantum access network ...
收藏 引用
49th European Conference on Optical communications, ECOC 2023
作者: Pan, Yan Bian, Yiming Wang, Heng Dou, Jiayi Shao, Yun Pi, Yaodi Ye, Ting Yang, Jie, 2 Li, Yang Huang, Wei Yu, Song Zhang, Yichen Xu, Bingjie Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing100876 China
A 4-user high-compatibility quantum access network using coherent states is experimentally demonstrated based on passive optical network. The achieved average secret key rate is around 4.1 Mbps between the transmitter... 详细信息
来源: 评论
Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges  5th
Sharding Technologies in Blockchain: Basics, State of the...
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Zhang, Luyi Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Li, Chunhai Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Hangzhou Innovation Institute Beihang University Hangzhou310052 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Information and Communication Guilin University of Electronic Technology Guilin541004 China
Sharding is one of the key technologies of blockchain scalable characteristics widely used in cryptocurrencies, Internet of Things, supply chain management and other fields. It can achieve high performance scaling wit... 详细信息
来源: 评论
A multi-party logistic regression using the Adam method
A multi-party logistic regression using the Adam method
收藏 引用
Computer, Big Data and Artificial Intelligence (ICCBD+AI), International Conference on
作者: Zongze Li Chaoxi Zhu Wei Zhao Xiaopeng Yu Science and Technology on Communication Security Laboratory Chengdu China
Secure Multi-Party Computation (MPC) allows multi-party to jointly compute a function while ensuring data security and computation correctness. Nowadays, due to the lack of trust among data holders, various inconvenie... 详细信息
来源: 评论
Data security Storage Scheme For UAV Cluster Based On Distributed Storage
Data Security Storage Scheme For UAV Cluster Based On Distri...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Wu, Kaijun Tian, Bo Wang, Xue Science and Technology on Communication Security Laboratory Chengdu610041 China No.30 Research Institute of China Electronics Technology Group Corporation Chengdu610041 China China Electronics Technology Cyber Security Co. Ltd Chengdu610041 China
UAVs have been widely used in various fields such as emergency rescue and disaster relief, weather detection, scientific research measurement, aerial surveying and mapping, and military reconnaissance. The concept of ... 详细信息
来源: 评论
The Design Method of Micro-Unit Cryptographic Service Framework
The Design Method of Micro-Unit Cryptographic Service Framew...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Qi Zhao Bo Tian Yiming Liu Science and Technology on Communication Security Laboratory Chengdu China
In order to adapt to the rapid development of information technology in the digital age, it is necessary to build a general cryptographic service delivery capability to provide security protection for data exchange in...
来源: 评论
Multi-scale network for single image deblurring based on ensemble learning module
收藏 引用
Multimedia Tools and Applications 2025年 第11期84卷 9045-9064页
作者: Wu, WenBo Pan, Yun Su, Na Wang, JingTao Wu, ShaoChuan Xu, ZeKun Yu, YouJian Liu, YaPeng State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China School of Computer and Cyberspace Security Communication University of China Beijing100024 China School of Electronics and Information Engineering Harbin Institute of Technology Harbin150080 China College of Computer and Control Engineering Northeast Forestry University Harbin150040 China School of Computer and Information Engineering Tianjin Chengjian University Tianjin300384 China School of Computer Science and Technology Anhui University Hefei230601 China
In this paper, we have identified two primary issues with current multi-scale image deblurring methods. On the one hand, the blurring scale is ignored. On the other hand, the context information of images is not fully... 详细信息
来源: 评论
Boosting Transferability of Adversarial Example via an Enhanced Euler's Method  48
Boosting Transferability of Adversarial Example via an Enhan...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2023
作者: Peng, Anjie Lin, Zhi Zeng, Hui Yu, Wenxin Kang, Xiangui Southwest University of Science and Technology MY Sichuan621010 China Science and Technology on Communication Security Laboratory CD Sichuan610041 China Sun Yat-sen University School of Computer Science and Engineering Guangzhou510275 China
Adversarial examples are intentionally designed images to force convolution neural networks to give error classification outputs. Existing attacks have constructed transferable adversarial examples from the base attac... 详细信息
来源: 评论
On Searching Dynamic Feedback with Carry Shift Registers Having Sparse Switches
On Searching Dynamic Feedback with Carry Shift Registers Hav...
收藏 引用
International Conference on communication technology (ICCT)
作者: Sen Hou Yue Cao Science and Technology on Communication Security Laboratory Chengdu China
A bitstring generator is proposed by transferring from one feedback with carry shift register (FCSR) to another under control of an (external) signal, and it is called a dynamic feedback with carry shift register (DFC...
来源: 评论