咨询与建议

限定检索结果

文献类型

  • 803 篇 会议
  • 651 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,455 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 965 篇 工学
    • 522 篇 计算机科学与技术...
    • 405 篇 软件工程
    • 369 篇 信息与通信工程
    • 244 篇 电子科学与技术(可...
    • 155 篇 电气工程
    • 104 篇 控制科学与工程
    • 90 篇 仪器科学与技术
    • 88 篇 光学工程
    • 77 篇 生物工程
    • 57 篇 机械工程
    • 50 篇 网络空间安全
    • 44 篇 动力工程及工程热...
    • 42 篇 安全科学与工程
    • 39 篇 化学工程与技术
    • 36 篇 材料科学与工程(可...
    • 32 篇 航空宇航科学与技...
    • 31 篇 土木工程
    • 29 篇 生物医学工程(可授...
  • 563 篇 理学
    • 280 篇 数学
    • 211 篇 物理学
    • 121 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 52 篇 化学
    • 46 篇 系统科学
  • 166 篇 管理学
    • 110 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 36 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 25 篇 training
  • 24 篇 bandwidth
  • 24 篇 optimization
  • 23 篇 accuracy
  • 22 篇 semantics
  • 21 篇 cognitive radio
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 16 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 34 篇 state key labora...
  • 34 篇 science and tech...
  • 33 篇 science and tech...
  • 25 篇 purple mountain ...
  • 23 篇 key laboratory o...
  • 21 篇 school of cyber ...
  • 20 篇 key laboratory o...
  • 20 篇 school of inform...
  • 19 篇 hubei key labora...
  • 18 篇 national mobile ...
  • 18 篇 school of comput...
  • 18 篇 state key labora...
  • 17 篇 university of el...
  • 17 篇 national enginee...
  • 17 篇 hubei engineerin...

作者

  • 35 篇 yang jie
  • 33 篇 xu bingjie
  • 29 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 yu song
  • 21 篇 jin shi
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 zhang leo yu
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 hu shengshan
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 wen chao-kai

语言

  • 1,327 篇 英文
  • 92 篇 其他
  • 37 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Science and Technology on Communication Information Security Control Laboratory"
1455 条 记 录,以下是241-250 订阅
排序:
External Attention Mechanism-Based Modulation Classification
External Attention Mechanism-Based Modulation Classification
收藏 引用
2022 International Conference on Scientific Computation and Applied Statistics, ICSCAS 2022
作者: Tao, Xueying Shao, Huaizong Li, Qiang Pan, Ye Fu, Zhongqi School of Information and Communication Engineering University of Electronic Science and Technology of China Chengdu China Laboratory of Electromagnetic Space Cognition and Intelligent Control Beijing China Peng Cheng Laboratory Shenzhen China
This paper considers the modulation classification of radio frequency (RF) signals. An external attention mechanism-based convolution neural network (EACNN) is proposed. Thanks to the external attention layers, the EA... 详细信息
来源: 评论
An Asymmetric Channel Attack Monitoring Method for Round-Trip Fiber Time Synchronization System
An Asymmetric Channel Attack Monitoring Method for Round-Tri...
收藏 引用
European Frequency and Time Forum (EFTF)
作者: Xuesong Xu Yichen Zhang Hailong Xu Yiming Bian Yang Li Bingjie Xu Song Yu State Key Laboratory of Information Photonics and Optical Communications School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing China Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu China
We present a method for monitoring potential asymmetric channel attacks within a round-trip fiber time synchronization system. This is achieved by observing and tracking the time difference at the remote end. Experime... 详细信息
来源: 评论
Angle-Based SLAM on 5G mmWave Systems: Design, Implementation, and Measurement
收藏 引用
IEEE Internet of Things Journal 2023年 第20期10卷 17755-17771页
作者: Yang, Jie Wen, Chao-Kai Xu, Jing Que, Hang Wei, Haikun Jin, Shi Southeast University Sch. of Automat. and the Frontiers Science Center for Mobile Information Communication and Security Nanjing210096 China National Sun Yat-sen University Institute of Communications Engineering Kaohsiung804 Taiwan Southeast University National Mobile Communications Research Laboratory Nanjing210096 China Southeast University Key Laboratory of Measurement and Control of CSE Ministry of Education School of Automation Nanjing210096 China
Simultaneous localization and mapping (SLAM) is a key technology that provides user equipment (UE) tracking and environment mapping services, enabling the deep integration of sensing and communication. The millimeter-... 详细信息
来源: 评论
PB-UAP: Hybride Universal Adversarial Attack for Image Segmentation
PB-UAP: Hybride Universal Adversarial Attack for Image Segme...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Yufei Song Ziqi Zhou Minghui Li Xianlong Wang Hangtao Zhang Menghao Deng Wei Wan Shengshan Hu Leo Yu Zhang Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology School of Computer Science and Technology Huazhong University of Science and Technology School of Software Engineering Huazhong University of Science and Technology School of Information and Communication Technology Griffith University
With the rapid advancement of deep learning, the model robustness has become a significant research hotspot, i.e., adversarial attacks on deep neural networks. Existing works primarily focus on image classification ta... 详细信息
来源: 评论
Improving key rates by tighter information reconciliation leakage estimation for quantum key distribution
arXiv
收藏 引用
arXiv 2025年
作者: Mao, Hao-Kun Yang, Bo Qiao, Yu-Cheng Yan, Bing-Ze Zhao, Qiang Xu, Bing-Jie Li, Qiong School of Cyberspace Science Faculty of Computing Harbin Institute of Technology Harbin150080 China Guangxi Key Lab Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China School of Information Engineering Zhejiang Ocean University Zhoushan316022 China Science and Technology on Security Communication Laboratory Institute of Southwestern Communication Chengdu610041 China
Previous research has aimed to precisely estimate information leakage to improve the secure key rate (SKR) and maximum transmission distance in quantum key distribution (QKD). However, existing methods repeatedly cons... 详细信息
来源: 评论
A 3-D Printed Ka-Band Waveguide Bandpass Filter With Quasi-Elliptic Response  13
A 3-D Printed Ka-Band Waveguide Bandpass Filter With Quasi-E...
收藏 引用
13th International Symposium on Antennas, Propagation and EM Theory, ISAPE 2021
作者: Zhang, Fan Xu, Lili Zhang, Jianqiang Nan, Pulong Jin, Xiaofan Pan, Gaofeng Science and Technology on Communication Information Security Control Laboratory Zhejiang Jiaxing314033 China Huawei Technologies Co. Ltd Guangdong Shenzhen518063 China
A Ka-band quasi-elliptic bandpass filter (BPF) based on stereolithography apparatus (SLA) 3-D printing technique is proposed. The filter consists of four coupled resonators with three direct couplings between adjacent... 详细信息
来源: 评论
Research on Space-Time Block Code technology in MIMO System  7
Research on Space-Time Block Code Technology in MIMO System
收藏 引用
7th International Conference on Computer and communications, ICCC 2021
作者: Pan, Conglin Chen, Si Wu, Wei Qian, Jiachuan Wang, Lijun No.36 Research Institute of CETC Science and Technology On Communication Information Security Control Laboratory Jiaxing China School of Electronic and Optical Engineering Nanjing University of Science and Technology Nanjing China
MIMO technology has been widely used in the telecommunication systems nowadays, and the space-time coding is a key part of MIMO technology. A good coding scheme can exploit the spatial diversity to correct the error w... 详细信息
来源: 评论
Modulation Recognition Based on Lightweight Residual Network via Binary Quantization  7
Modulation Recognition Based on Lightweight Residual Network...
收藏 引用
7th International Conference on Computer and communications, ICCC 2021
作者: Ji, Heng Xu, Wangyang Gan, Lu Xu, Zhengwu Science and Technology On Communication Information Security Control Laboratory Jiaxing314000 China University of Electronic Science and Technology of China Chengdu611731 China Yibin Institute of UESTC Yibin643000 China
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c... 详细信息
来源: 评论
Modulation Recognition Based on Lightweight Residual Network via Hybrid Pruning  7
Modulation Recognition Based on Lightweight Residual Network...
收藏 引用
7th International Conference on Computer and communications, ICCC 2021
作者: Ji, Heng Xu, Wangyang Gan, Lu Xu, Zhengwu Science and Technology On Communication Information Security Control Laboratory Jiaxing314000 China University of Electronic Science and Technology of China Chengdu611731 China Yibin Institute of UESTC Yibin643000 China
Signal modulation recognition is an important and complicated problem in spectrum monitoring. In recent years, many advanced deep learning methods have been proposed for this problem. However, the high computational c... 详细信息
来源: 评论
Research on PDCCH Channel in 5G NR System
Research on PDCCH Channel in 5G NR System
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Tianyi, Liang Huijie, Zhu Science and Technology on Communication Information Security Control Laboratory Jiaxing314033 China No.36 Research Institute of China Electronics Technology Group Corporation Jiaxing314033 China
In the 5th Generation Mobile communication technology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink control Informa... 详细信息
来源: 评论