咨询与建议

限定检索结果

文献类型

  • 5,164 篇 期刊文献
  • 165 篇 会议

馆藏范围

  • 5,329 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,003 篇 工学
    • 1,266 篇 计算机科学与技术...
    • 830 篇 网络空间安全
    • 767 篇 电子科学与技术(可...
    • 493 篇 仪器科学与技术
    • 455 篇 软件工程
    • 404 篇 控制科学与工程
    • 397 篇 信息与通信工程
    • 387 篇 材料科学与工程(可...
    • 381 篇 机械工程
    • 330 篇 光学工程
    • 223 篇 化学工程与技术
    • 140 篇 电气工程
    • 67 篇 生物医学工程(可授...
    • 66 篇 航空宇航科学与技...
    • 60 篇 生物工程
    • 52 篇 环境科学与工程(可...
  • 1,597 篇 理学
    • 704 篇 物理学
    • 315 篇 数学
    • 159 篇 大气科学
    • 121 篇 化学
    • 93 篇 生物学
    • 76 篇 系统科学
    • 62 篇 海洋科学
  • 538 篇 管理学
    • 490 篇 管理科学与工程(可...
  • 314 篇 军事学
    • 312 篇 军队指挥学
  • 295 篇 医学
    • 217 篇 临床医学
  • 218 篇 农学
    • 82 篇 作物学
    • 64 篇 农业资源与环境
  • 81 篇 艺术学
    • 76 篇 设计学(可授艺术学...
  • 71 篇 经济学
    • 68 篇 应用经济学
  • 32 篇 文学
  • 26 篇 法学
  • 21 篇 教育学
  • 4 篇 历史学

主题

  • 138 篇 blockchain
  • 110 篇 security
  • 91 篇 deep learning
  • 68 篇 cryptography
  • 57 篇 authentication
  • 57 篇 quantum
  • 53 篇 internet of thin...
  • 41 篇 machine learning
  • 39 篇 information secu...
  • 36 篇 network
  • 33 篇 privacy
  • 32 篇 image encryption
  • 32 篇 artificial intel...
  • 31 篇 optical
  • 30 篇 physical layer s...
  • 30 篇 privacy protecti...
  • 29 篇 quantum cryptogr...
  • 28 篇 key
  • 28 篇 distribution
  • 28 篇 communication

机构

  • 90 篇 university of ch...
  • 41 篇 information secu...
  • 37 篇 state key labora...
  • 28 篇 department of co...
  • 27 篇 information secu...
  • 25 篇 beijing academy ...
  • 24 篇 southern marine ...
  • 23 篇 state key labora...
  • 23 篇 ieee
  • 22 篇 key laboratory o...
  • 21 篇 state key labora...
  • 21 篇 state key labora...
  • 21 篇 southern marine ...
  • 19 篇 state key labora...
  • 19 篇 college of under...
  • 19 篇 school of inform...
  • 18 篇 school of electr...
  • 18 篇 school of automa...
  • 17 篇 beijing national...
  • 17 篇 key laboratory o...

作者

  • 37 篇 xiaocong yuan
  • 29 篇 wei wang
  • 26 篇 yu zhang
  • 24 篇 xiu-bo chen
  • 20 篇 hao wang
  • 19 篇 jian wang
  • 19 篇 lei zhang
  • 17 篇 温巧燕
  • 16 篇 rui zhang
  • 16 篇 dianyuan fan
  • 15 篇 jun zhang
  • 15 篇 wei li
  • 14 篇 wei liu
  • 14 篇 xiubo chen
  • 14 篇 kai wang
  • 14 篇 wei huang
  • 14 篇 zhenwei xie
  • 14 篇 huijun wang
  • 13 篇 bo li
  • 12 篇 xin liu

语言

  • 4,695 篇 英文
  • 634 篇 中文
检索条件"机构=1. Guangdong Key Laboratory of Information Security Technology"
5329 条 记 录,以下是1-10 订阅
排序:
Mode-dependent dynamic gain of all-fiber FM-EDFA under various pump manipulation
收藏 引用
Chinese Optics Letters 2024年 第2期22卷 128-134页
作者: 方翼鸿 张心怡 黄锡恒 曾研 许鸥 李建平 付松年 秦玉文 Institute of Advanced Photonics technology School of Information EngineeringGuangdong University of TechnologyGuangzhou 510006China guangdong Provincial {1. laboratory of information Photonics technology Guangdong University of TechnologyGuangzhou 510006China key {1. of Photonic technology for Integrated Sensing and Communication Ministry of EducationGuangdong University of TechnologyGuangzhou 510006China
The dynamic gain of a few-mode erbium-doped fiber amplifier(FM-EDFA)is vital for the long-haul mode division multiplexing(MDM)***,we investigate the mode-dependent dynamic gain of an FM-EDFA under various manipulation... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Linear shallow neural network to accelerate transmitter dispersion eye closure quaternary(TDECQ) assessment
收藏 引用
Science China(information Sciences) 2024年 第4期67卷 337-338页
作者: Junjiang XIANG Zejun CHEN Yijun CHENG Hailin YANG Xuancheng HUO Meng XIANG Gai ZHOU Yuwen QIN Songnian FU Institute of Advanced Photonics technology School of Information EngineeringGuangdong University of Technology School of Optical and Electronic information Huazhong University of Science and Technology key {1. of Photonic technology for Integrated Sensing and Communication Ministry of Education of ChinaGuangdong University of Technology guangdong Provincial {1. laboratory of information Photonics technology Guangdong University of Technology
To support the ever-emerging capacity requirement of datacenter interconnection(DCI) applications, transmitter dispersion eye closure quaternary(TDECQ) has been proposed by IEEE802.3 standard [1., which is specificall... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Lightweight Object Detection Networks for UAV Aerial Images Based on YOLO
收藏 引用
Chinese Journal of Electronics 2024年 第4期33卷 997-1009页
作者: Yanshan LI Jiarong WANG Kunhua ZHANG Jiawei YI Miaomiao WEI Lirong ZHENG Weixin XIE ATR National key {1. of Defense technology Shenzhen University guangdong {1. laboratory of Intelligent information Processing Shenzhen University
Existing high-precision object detection algorithms for UAV(unmanned aerial vehicle) aerial images often have a large number of parameters and heavy weight, which makes it difficult to be applied to mobile *** propose... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
收藏 引用
Computers, Materials & Continua 2024年 第4期79卷 1705-1726页
作者: Aodi Liu Na Wang Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang He’nan Province key {1. of information security Information Engineering UniversityZhengzhou450000China
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Robust adaptive radar beamforming based on iterative training sample selection using kurtosis of generalized inner product statistics
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第1期35卷 24-30页
作者: TIAN Jing ZHANG Wei School of information and Electronics Beijing Institute of TechnologyBeijing 100081China National key {1. of Electromagnetic Space security Chengdu 610036China
In engineering application,there is only one adaptive weights estimated by most of traditional early warning radars for adaptive interference suppression in a pulse reputation interval(PRI).Therefore,if the training s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Spatial Distribution Feature Extraction Network for Open Set Recognition of Electromagnetic Signal
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 279-296页
作者: Hui Zhang Huaji Zhou Li Wang Feng Zhou The Ministry key {1. of Electronic information Countermeasure and Simulation Xidian UniversityXi’an710071China Science and technology on Communication {1. security Control laboratory Jiaxing314033China
This paper proposes a novel open set recognition method,the Spatial Distribution Feature Extraction Network(SDFEN),to address the problem of electromagnetic signal recognition in an open *** spatial distribution featu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
FL-EASGD:Federated Learning Privacy security Method Based on Homomorphic Encryption
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2361-2373页
作者: Hao Sun Xiubo Chen Kaiguo Yuan information {1. Center State Key Laboratory ofNetworking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China
Federated learning ensures data privacy and security by sharing models among multiple computing nodes instead of plaintext ***,there is still a potential risk of privacy leakage,for example,attackers can obtain the or... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Constructing the Impossible Differential of Type-II GFN with Boolean Function and Its Application to WARP
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 80-89页
作者: Jiali SHI Guoqiang LIU Chao LI College of Liberal Arts and Sciences National University of Defense Technology Hunan Engineering Research Center of Commercial Cryptography Theory and technology Innovation State key {1. of information security Institute of Information Engineering
Type-Ⅱ generalized Feist el network(GFN) has attracted a lot of attention for its simplicity and high *** differential attack is one of the powerful cryptanalytic approaches for word-oriented block ciphers such as Fe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A new quantum key distribution resource allocation and routing optimization scheme
收藏 引用
Chinese Physics B 2024年 第3期33卷 244-259页
作者: 毕琳 袁晓同 吴炜杰 林升熙 School of Computer Science and technology Changchun University of Science and TechnologyChangchun 130012China key {1. of Network and information security in Jilin Province Changchun 130012China
Quantum key distribution(QKD)is a {1. that can resist the threat of quantum computers to existing conventional cryptographic ***,due to the stringent requirements of the quantum key generation environment,the g... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Vision-Based Adaptive Prescribed-Time Control of UAV for Uncooperative Target Tracking with Performance Constraint
收藏 引用
Journal of Systems Science & Complexity 2024年 第5期37卷 1956-1977页
作者: SHE Xuehua MA Hui REN Hongru LI Hongyi School of Automation and the guangdong Provincial {1. laboratory of Intelligent Decision and Cooperative Control Guangdong University of TechnologyGuangzhou 510006China School of Mathematics and Statistics Guangdong University of TechnologyGuangzhou 510006China College of Electronic and information Engineering and Chongqing {1. laboratory of Generic technology and System of Service Robots Southwest UniversityChongqing 400715China
This paper discusses the uncooperative target tracking control problem for the unmanned aerial vehicle(UAV)under the performance constraint and scaled relative velocity constraint,in which the states of the uncooperat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论