咨询与建议

限定检索结果

文献类型

  • 5,172 篇 期刊文献
  • 448 篇 会议

馆藏范围

  • 5,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,734 篇 工学
    • 1,708 篇 计算机科学与技术...
    • 1,441 篇 材料科学与工程(可...
    • 1,144 篇 电气工程
    • 1,125 篇 电子科学与技术(可...
    • 884 篇 控制科学与工程
    • 883 篇 信息与通信工程
    • 768 篇 机械工程
    • 663 篇 软件工程
    • 639 篇 化学工程与技术
    • 570 篇 仪器科学与技术
    • 320 篇 网络空间安全
    • 312 篇 环境科学与工程(可...
    • 309 篇 动力工程及工程热...
    • 305 篇 航空宇航科学与技...
    • 301 篇 力学(可授工学、理...
    • 214 篇 光学工程
    • 204 篇 生物医学工程(可授...
    • 199 篇 地质资源与地质工...
    • 189 篇 冶金工程
    • 176 篇 水利工程
  • 2,954 篇 理学
    • 983 篇 物理学
    • 791 篇 化学
    • 622 篇 数学
    • 495 篇 生物学
    • 288 篇 天文学
    • 281 篇 地球物理学
    • 213 篇 大气科学
  • 698 篇 管理学
    • 519 篇 管理科学与工程(可...
  • 455 篇 医学
    • 300 篇 临床医学
  • 384 篇 农学
    • 175 篇 作物学
  • 149 篇 经济学
  • 96 篇 法学
  • 85 篇 教育学
  • 75 篇 文学
  • 58 篇 艺术学
  • 53 篇 军事学
  • 6 篇 历史学
  • 5 篇 哲学

主题

  • 99 篇 deep learning
  • 44 篇 rare earths
  • 40 篇 model
  • 38 篇 system
  • 36 篇 network
  • 36 篇 blockchain
  • 36 篇 machine learning
  • 33 篇 artificial intel...
  • 31 篇 and
  • 30 篇 optimization
  • 28 篇 simulation
  • 27 篇 internet of thin...
  • 26 篇 convolutional ne...
  • 24 篇 analysis
  • 22 篇 gis
  • 22 篇 covid-19
  • 21 篇 feature extracti...
  • 20 篇 big data
  • 19 篇 remote sensing
  • 18 篇 power

机构

  • 83 篇 university of ch...
  • 29 篇 university of ch...
  • 19 篇 fujian science&t...
  • 18 篇 ieee
  • 18 篇 center of materi...
  • 17 篇 state key labora...
  • 14 篇 state key labora...
  • 12 篇 information secu...
  • 11 篇 school of optica...
  • 11 篇 department of el...
  • 10 篇 school of inform...
  • 10 篇 school of inform...
  • 10 篇 state key labora...
  • 9 篇 beijing national...
  • 9 篇 college of infor...
  • 9 篇 school of electr...
  • 9 篇 college of infor...
  • 9 篇 school of inform...
  • 9 篇 state key labora...
  • 8 篇 college of compu...

作者

  • 19 篇 wei wang
  • 18 篇 jing wang
  • 17 篇 jun wang
  • 16 篇 yu zhang
  • 16 篇 lei zhang
  • 15 篇 jian wang
  • 15 篇 yi zhang
  • 15 篇 fan yang
  • 14 篇 hao wang
  • 13 篇 wei liu
  • 13 篇 bo li
  • 13 篇 li li
  • 13 篇 hao zhang
  • 12 篇 xin liu
  • 12 篇 wei li
  • 12 篇 yang yang
  • 11 篇 fen xu
  • 11 篇 rui wang
  • 11 篇 jun zhang
  • 11 篇 chen chen

语言

  • 5,484 篇 英文
  • 135 篇 中文
  • 1 篇 法文
检索条件"机构=Petro-Cyber Works Information Technology Co."
5620 条 记 录,以下是1-10 订阅
排序:
Carbon efficiency modeling and optimization of solar-powered cellular networks
收藏 引用
Science China(information Sciences) 2024年 第5期67卷 228-243页
作者: Yuxi ZHAO Xiaohu GE Wen YAN Tao HAN Yi ZHONG School of Electronic information and co.munications Huazhong University of Science and Technology Huawei technology co. Ltd.
As wireless co.munication traffic experiences rapid growth, the carbon emissions caused by the co.munication industry are also on the rise. To achieve “carbon neutrality”, researchers are co.sidering the use of rene... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Blockchain-Based Proxy Re-Encryption Scheme with co.ditional Privacy Protection and Auditability
收藏 引用
China co.munications 2024年 第7期21卷 267-277页
作者: Chen Guo PengWeijun Wu Jing Fang Youxuan Ye Keke Xin Yanshuang China Mobile information technology co. LtdBeijing 100037China China Mobile information technology co. LtdShenzhen 518048China
With the development of Internet of Things technology,intelligent door lock devices are widely used in the field of house *** the traditional housing leasing scenario,problems of door lock information disclosure,tenan... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An optimization-oriented modeling approach using input co.vex neural networks and its application on optimal chiller loading
收藏 引用
Building Simulation 2024年 第4期17卷 639-655页
作者: Shanshuo Xing Jili Zhang Song Mu Dalian University of technology Dalian116024China Guangdong Airport Baiyun information technology co. Ltd.Guangzhou510000China
Optimization for the multi-chiller system is an indispensable approach for the operation of highly efficient chiller *** optima obtained by model-based optimization algorithms are dependent on precise and solvable obj... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Bus Planning Algorithm for FPC Design in co.plex Scenarios
收藏 引用
Chinese Journal of Electronics 2024年 第2期33卷 346-352页
作者: Haoying WU Sizhan ZOU Ning XU Shixu XIANG Mingyu LIU School of information Engineering Wuhan University of Technology Huawei Device co. Ltd.
Flexible printed circuit(FPC) design in co.plex scenarios has a list of pin co.centration areas, which lead to extremely co.gested intersection regions while co.necting the pins. Currently, it is challenging to explor... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data
收藏 引用
cybersecurity 2024年 第2期7卷 96-112页
作者: Fei Tang Shikai Liang Guowei Ling Jinyong Shan co.lege of co.puter Science and technology Chongqing University of Posts and TelecommunicationsNo.2Chongwen RoadNan'an DistrictChongqing 400065China School of cyber Security and information Law Chongqing University of Posts and TelecommunicationsChongqing 400065China sudo technology co. LTD.Beijing 100083China
Vertical Federated Learning(VFL)has many applications in the field of smart healthcare with excellent ***,current VFL systems usually primarily focus on the privacy protection during model training,while the preparati... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A new centrality measure based on neighbor loop structure for network dismantling
收藏 引用
Digital co.munications and Networks 2024年 第2期10卷 472-480页
作者: Qingxia Liu Bang Wang Jiming Qi Xianjun Deng School of Electronic information and co.munications Huazhong University of Science and TechnologyWuhan430074China School of cyber Science and Engineering Huazhong University of Science and TechnologyWuhan430074China
Nearly all real-world networks are co.plex networks and usually are in danger of ***,it is crucial to exploit and understand the mechanisms of network attacks and provide better protection for network *** dismantling ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A target parameter estimation method via atom-reco.struction in radar mainlobe jamming
收藏 引用
Journal of Systems Engineering and Electronics 2024年 第2期35卷 350-360页
作者: ZHOU Bilei LIU Weijian LI Rongfeng CHEN Hui ZHANG Liang DU Qinglei LI Binbin CHEN Hao Air Force Early Warning Academy Wuhan 430019China Aerospace Nanhu Electronic information technology co. Ltd.Jingzhou 434000China
Mainlobe jamming(MLJ)brings a big challenge for radar target detection,tracking,and *** suppression of MLJ is a hard task and an open problem in the electronic co.nter-co.nter measures(ECCM)*** parameters and target d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
co.ntermeasure against blinding attack for single-photon detectors in quantum key distribution
收藏 引用
Journal of Semico.ductors 2024年 第4期45卷 76-81页
作者: Lianjun Jiang Dongdong Li Yuqiang Fang Meisheng Zhao Ming Liu Zhilin Xie Yukang Zhao Yanlin Tang Wei Jiang Houlin Fang Rui Ma Lei Cheng Weifeng Yang Songtao Han Shibiao Tang QuantumCTek co. Ltd.Hefei 230088China Shandong Institute of Quantum Science and technology co. Ltd.Jinan 250101China QuantumCTek(Beijing)co. Ltd.Beijing 100193China School of cyber Science and technology University of Science and Technology of ChinaHefei 230027China Anhui Armed Police Force Hefei 230026China School of Electrical Engineering and Automation Anhui UniversityHefei 230601China
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic ***,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon **... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
NFHP-RN:AMethod of Few-Shot Network Attack Detection Based on the Network Flow Holographic Picture-ResNet
收藏 引用
co.puter Modeling in Engineering & Sciences 2024年 第7期140卷 929-955页
作者: Tao Yi Xingshu Chen Mingdong Yang Qindong Li Yi Zhu School of cyber Science and Engineering Sichuan UniversityChengdu610065China cyberScience Research Institute Sichuan UniversityChengdu610065China Chengdu Fengwei technology co. Ltd.Chengdu610041China
Due to the rapid evolution of Advanced Persistent Threats(APTs)attacks,the emergence of new and rare attack samples,and even those never seen before,make it challenging for traditional rule-based detection methods to ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Randomization Strategies in Image Steganography Techniques:A Review
收藏 引用
co.puters, Materials & co.tinua 2024年 第8期80卷 3139-3171页
作者: AFM Zainul Abadin Rossilawati Sulaiman Mohammad Kamrul Hasan Center for cyber Security Faculty of Information Science and TechnologyUniversiti Kebangsaan Malaysia(UKM)BangiSelangor43600Malaysia Department of information and co.munication Engineering Pabna University of Science and TechnologyPabna6600Bangladesh
Image steganography is one of the prominent technologies in data hiding *** system performance mostly depends on the embedding *** goal is to embed strictly co.fidential information into images without causing percept... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论