咨询与建议

限定检索结果

文献类型

  • 794 篇 会议
  • 638 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,433 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 946 篇 工学
    • 511 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 364 篇 信息与通信工程
    • 240 篇 电子科学与技术(可...
    • 151 篇 电气工程
    • 97 篇 控制科学与工程
    • 88 篇 仪器科学与技术
    • 87 篇 光学工程
    • 77 篇 生物工程
    • 54 篇 机械工程
    • 48 篇 网络空间安全
    • 42 篇 安全科学与工程
    • 41 篇 动力工程及工程热...
    • 36 篇 化学工程与技术
    • 34 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 31 篇 航空宇航科学与技...
    • 29 篇 生物医学工程(可授...
  • 555 篇 理学
    • 279 篇 数学
    • 207 篇 物理学
    • 119 篇 统计学(可授理学、...
    • 86 篇 生物学
    • 50 篇 化学
    • 46 篇 系统科学
  • 164 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 59 篇 图书情报与档案管...
    • 35 篇 工商管理
  • 47 篇 医学
    • 39 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 25 篇 公共卫生与预防医...
  • 24 篇 法学
  • 24 篇 军事学
  • 12 篇 经济学
  • 11 篇 农学
  • 4 篇 文学
  • 4 篇 艺术学
  • 2 篇 教育学

主题

  • 39 篇 simulation
  • 38 篇 feature extracti...
  • 35 篇 deep learning
  • 26 篇 quantum cryptogr...
  • 24 篇 bandwidth
  • 23 篇 optimization
  • 23 篇 accuracy
  • 23 篇 training
  • 21 篇 cognitive radio
  • 21 篇 semantics
  • 20 篇 computational mo...
  • 20 篇 heuristic algori...
  • 19 篇 security
  • 17 篇 modulation
  • 17 篇 machine learning
  • 16 篇 object detection
  • 16 篇 signal to noise ...
  • 16 篇 neural networks
  • 16 篇 protocols
  • 15 篇 estimation

机构

  • 177 篇 science and tech...
  • 63 篇 science and tech...
  • 59 篇 school of inform...
  • 43 篇 science and tech...
  • 34 篇 science and tech...
  • 33 篇 state key labora...
  • 33 篇 science and tech...
  • 32 篇 science and tech...
  • 25 篇 purple mountain ...
  • 24 篇 key laboratory o...
  • 21 篇 key laboratory o...
  • 18 篇 national mobile ...
  • 18 篇 hubei key labora...
  • 18 篇 state key labora...
  • 18 篇 school of cyber ...
  • 17 篇 university of el...
  • 17 篇 school of inform...
  • 17 篇 school of inform...
  • 16 篇 institute of cyb...
  • 16 篇 national enginee...

作者

  • 33 篇 yang jie
  • 32 篇 xu bingjie
  • 28 篇 zhang yichen
  • 26 篇 huang wei
  • 25 篇 yang xiaoniu
  • 23 篇 li yang
  • 22 篇 hua jun
  • 22 篇 xiaoniu yang
  • 21 篇 jin shi
  • 20 篇 yu song
  • 19 篇 yue xinwei
  • 16 篇 xuan qi
  • 16 篇 bingjie xu
  • 16 篇 wu qun
  • 15 篇 wang heng
  • 14 篇 zhan xu
  • 14 篇 wang wei
  • 14 篇 zhang leo yu
  • 14 篇 wen chao-kai
  • 14 篇 xu zhan

语言

  • 1,339 篇 英文
  • 60 篇 其他
  • 34 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=The Science and Technology on Communication Information Security Control Laboratory"
1433 条 记 录,以下是61-70 订阅
排序:
Decoy-state quantum-key-distribution-based quantum private query with error tolerance bound
收藏 引用
Physical Review A 2024年 第5期109卷 052442-052442页
作者: Bin Liu Zhonghao Liang Wei Huang Fei Gao Jiayi Yuan Bingjie Xu College of Computer Science The State Key Laboratory of Networking and Switching Technology Center for Network and Information Science and Technology on Communication Security Laboratory Institute of Southwestern Communication Chengdu 610041 China
Quantum private query (QPQ) faces many challenges in practical applications. At present, some scholars have made substantial work on overcoming channel loss, channel noise, and nonideal light sources, respectively. Ho... 详细信息
来源: 评论
A Robust and Scalable One-PUF-to-Many Authentication and Key Agreement Scheme for Mobile communication Network
A Robust and Scalable One-PUF-to-Many Authentication and Key...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Wang, Yiteng Ren, Zhe Wang, Wei School of Cyber Engineering Xidian University Xi'an China The 36th Research Institute of China Electronics Technology Group Corporation Science and Technology on Communication Information Security Control Laboratory Jiaxing China
Under the multi-cloud environment of mobile communication networks, unattended terminals would possibly be involved in different tasks. For the network security, terminals should be authenticated by cloud service prov... 详细信息
来源: 评论
Sharding Technologies in Blockchain: Basics, State of the Art, and Challenges  5th
Sharding Technologies in Blockchain: Basics, State of the...
收藏 引用
5th International Conference on Blockchain and Trustworthy Systems, BlockSys 2023
作者: Zhang, Luyi Wang, Yujue Ding, Yong Liang, Hai Yang, Changsong Li, Chunhai Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Hangzhou Innovation Institute Beihang University Hangzhou310052 China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen518055 China School of Information and Communication Guilin University of Electronic Technology Guilin541004 China
Sharding is one of the key technologies of blockchain scalable characteristics widely used in cryptocurrencies, Internet of Things, supply chain management and other fields. It can achieve high performance scaling wit... 详细信息
来源: 评论
Vector Approximate Message Passing with Sparse Bayesian Learning for Gaussian Mixture Prior
收藏 引用
China communications 2023年 第5期20卷 57-69页
作者: Chengyao Ruan Zaichen Zhang Hao Jiang Jian Dang Liang Wu Hongming Zhang National Mobile Communications Research Laboratory Frontiers Science Center for Mobile Information Communication and SecuritySoutheast UniversityNanjing 210096China Purple Mountain Laboratories No.9 Mozhou East RoadNanjing 211111China School of Artificial Intelligence Nanjing University of Information Science and TechnologyNanjing 210044China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
Compressed sensing(CS)aims for seeking appropriate algorithms to recover a sparse vector from noisy linear ***,various Bayesian-based algorithms such as sparse Bayesian learning(SBL)and approximate message passing(AMP... 详细信息
来源: 评论
On the Performance of NOMA Over Coded Caching in Cache-Aided Wireless Network  8
On the Performance of NOMA Over Coded Caching in Cache-Aided...
收藏 引用
8th IEEE International Conference on Network Intelligence and Digital Content, IC-NIDC 2023
作者: Ma, Yuanyuan Zhi, Ruxin Xu, Zhan Ministry of Information Industry Beijing Information Science and Technology University Key Laboratory of Information and Communication Systems Beijing100101 China Ministry of Education Beijing Information Science and Technology University Key Laboratory of Modern Measurement and Control Technology Beijing100101 China
This paper centers around the examination of a downlink system comprising of a base station (BS) located at the center of a circular cell. Within this cell, we find cache-equipped users uniformly distributed. Our aim ... 详细信息
来源: 评论
100 km Discrete-Modulated Continuous-Variable Quantum Key Distribution Using Probabilistic Shaped 16QAM
100 km Discrete-Modulated Continuous-Variable Quantum Key Di...
收藏 引用
2024 Asia communications and Photonics Conference, ACP 2024 and International Conference on information Photonics and Optical communications, IPOC 2024
作者: Pan, Yan Li, Yang Wu, Mingze Zhang, Yichen Wang, Heng Huang, Wei Shao, Yun Xu, Bingjie Liu, Jinlu National Key Laboratory of Security Communication Institute of Southwestern Communication Chengdu610041 China State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China CAS Key Laboratory of Quantum Information University of Science and Technology of China Hefei230026 China
We first experimentally demonstrated discrete-modulated continuous-variable quantum key distribution over 100.93 km of standard single-mode fiber using probabilistic shaped 16QAM. The results show that a secret key ra... 详细信息
来源: 评论
Research on Covariance Matrix and Freedom Degree of GNSS Anti-jamming Array  6
Research on Covariance Matrix and Freedom Degree of GNSS Ant...
收藏 引用
6th International Conference on Signal and Image Processing, ICSIP 2021
作者: Nan, Pulong Wang, Lijun Pan, Gaofeng Science and Technology On Communication Information Security Control Laboratory Jiaxing China
The paper focuses on the covariance matrix and freedom degree widely involved in array anti-jamming processing. Based on the eigen decomposition of array covariance matrix of received signals, the correlation properti... 详细信息
来源: 评论
Phased Array Full-Duplex for Concurrent Multifunction: Architecture and Implementation  13
Phased Array Full-Duplex for Concurrent Multifunction: Archi...
收藏 引用
13th International Conference on Microwave and Millimeter Wave technology, ICMMT 2021
作者: Chen, Shunyang Chen, Jiarui Huang, Xiaoguo Chen, Linglu Zhang, Qi Chen, Binhui Zhu, Menglei Science And Technology On Communication Information Security Control Laboratory Jiaxing China
In this article, the realization of concurrent multifunction in phased array full-duplex platforms is discussed. For modern complex electromagnetic environment, an efficient architecture is needed to accomplish the co... 详细信息
来源: 评论
Signals of Opportunity Navigation Using LTE Downlink Signals  22
Signals of Opportunity Navigation Using LTE Downlink Signals
收藏 引用
22nd IEEE International Conference on communication technology, ICCT 2022
作者: Wang, Yiteng Zhu, Huijie Liang, Tianyi Qian, Jiachuan The 36th Research Institute of China Electronics Technology Group Corporation Science and Technology on Communication Information Security Control Laboratory Jiaxing China
For the global navigation satellite system (GNSS) cannot meet the positioning requirements under occlusion or malicious interference, this paper proposes a receiver self-localization method using long-term evolution (... 详细信息
来源: 评论
Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations
收藏 引用
Computers, Materials & Continua 2023年 第8期76卷 1947-1976页
作者: Asif Rahim Yanru Zhong Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi School of Computer and Information Security Guilin University of Electronic TechnologyGuilin541004China Guangxi Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of *** Neural Networks(CNNs)have shown promi... 详细信息
来源: 评论