咨询与建议

限定检索结果

文献类型

  • 356 篇 期刊文献
  • 16 篇 会议

馆藏范围

  • 372 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 319 篇 工学
    • 117 篇 计算机科学与技术...
    • 97 篇 信息与通信工程
    • 93 篇 电子科学与技术(可...
    • 88 篇 仪器科学与技术
    • 58 篇 软件工程
    • 56 篇 网络空间安全
    • 47 篇 控制科学与工程
    • 41 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 电气工程
    • 9 篇 动力工程及工程热...
    • 6 篇 化学工程与技术
    • 5 篇 交通运输工程
    • 5 篇 航空宇航科学与技...
    • 4 篇 建筑学
    • 2 篇 材料科学与工程(可...
    • 2 篇 土木工程
  • 74 篇 理学
    • 28 篇 数学
    • 24 篇 物理学
    • 8 篇 系统科学
    • 5 篇 生物学
    • 3 篇 化学
    • 2 篇 地理学
    • 2 篇 地球物理学
  • 63 篇 管理学
    • 59 篇 管理科学与工程(可...
    • 4 篇 公共管理
  • 21 篇 军事学
    • 21 篇 军队指挥学
  • 8 篇 医学
    • 6 篇 临床医学
  • 3 篇 法学
  • 3 篇 农学
  • 3 篇 艺术学
    • 3 篇 设计学(可授艺术学...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 文学
  • 1 篇 历史学

主题

  • 15 篇 deep learning
  • 15 篇 security
  • 8 篇 network
  • 8 篇 wireless sensor ...
  • 8 篇 blockchain
  • 7 篇 networks
  • 6 篇 cognitive radio
  • 5 篇 intrusion detect...
  • 5 篇 wireless sensor ...
  • 5 篇 outage probabili...
  • 5 篇 cryptography
  • 5 篇 energy efficienc...
  • 4 篇 routing
  • 4 篇 quantum
  • 4 篇 machine learning
  • 4 篇 neural network
  • 4 篇 network security
  • 4 篇 artificial intel...
  • 4 篇 robustness
  • 3 篇 internet of thin...

机构

  • 11 篇 jiangsu high tec...
  • 10 篇 college of compu...
  • 7 篇 ministry of educ...
  • 6 篇 ministry of educ...
  • 5 篇 college of compu...
  • 4 篇 key lab of broad...
  • 4 篇 institute of qua...
  • 4 篇 state key labora...
  • 4 篇 guangxi key lab ...
  • 4 篇 heilongjiang key...
  • 4 篇 shandong provinc...
  • 4 篇 ministry of educ...
  • 3 篇 state key labora...
  • 3 篇 key laboratory o...
  • 3 篇 college of compu...
  • 3 篇 key lab of broad...
  • 3 篇 school of mathem...
  • 3 篇 school of commun...
  • 3 篇 key laboratory o...
  • 3 篇 state key labora...

作者

  • 7 篇 xiaohong guan
  • 6 篇 jiang wu
  • 6 篇 wang ruchuan
  • 5 篇 yin qinye
  • 4 篇 bin cao
  • 4 篇 deyu meng
  • 4 篇 yi ping
  • 4 篇 ruchuan wang
  • 4 篇 胡予濮
  • 4 篇 zheng yan
  • 3 篇 ma jianfeng
  • 3 篇 chao wang
  • 3 篇 baocang ding
  • 3 篇 wei li
  • 3 篇 qingyu yang
  • 3 篇 xu zongben
  • 3 篇 huifang ma
  • 3 篇 jie wu
  • 3 篇 qin wang
  • 3 篇 hong wang

语言

  • 350 篇 英文
  • 22 篇 中文
检索条件"机构=the Ministry of Education Key Lab for Intelligent Networks and Network Security"
372 条 记 录,以下是31-40 订阅
排序:
Optimal user scheduling and power control in multi-user cognitive broadcast systems
收藏 引用
Science China(Information Sciences) 2012年 第6期55卷 1402-1414页
作者: WANG QunHuan 1,2,3,WANG HuiMing 1,2,3 & YIN QinYe 1,3 1 School of Electronic and Information Engineering,Xi'an Jiaotong University,Xi'an 710049,China 2 State key lab for Integrated Services networks,Xidian University,Xi'an 710071,China 3 ministry of education key lab for intelligent networks and network security,Xi'an Jiaotong University,Xi'an 710071,China. School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China State key lab for Integrated Services networks Xidian University Xi’an China ministry of education key lab for intelligent networks and network security Xi’an Jiaotong University Xi’an China
Cognitive radio systems should not only have the ability to sense and exploit "frequency spectrum holes",but also the ability to sense and utilize "spatial spectrum holes".In this paper,we consider the issue of maximi... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Dynamic output feedback robust model predictive control based on ellipsoidal estimation error bound for quasi-LPV systems
Dynamic output feedback robust model predictive control base...
收藏 引用
第25届中国控制与决策会议
作者: Xubin Ping Baocang Ding ministry of education key lab For intelligent networks and network security (MOE KLINNS lab Department of Automation School of Electronic and Information Engineering Xi’an Jiaotong University
This paper presents a dynamic output feedback robust model predictive control (DOFRMPC) for the quasiLPV (quasi-linear parameter varying) systems with both polytopic uncertainty and bounded disturbance. Our previo... 详细信息
来源: cnki会议 评论
Efficient DPCA SAR imaging with fast iterative spectrum reconstruction method
收藏 引用
Science China(Information Sciences) 2012年 第8期55卷 1838-1851页
作者: FANG Jian1,ZENG JinShan1,XU ZongBen1&ZHAO Yao2 1M inistry of education key lab for intelligent networks and network security Xi'an Jiaotong University,Xi'an 710049,China 2N ational key laboratory of Science and Technology on Microwave Imaging&Institute of Electronics,Chinese Academy of Sciences,Beijing 100049,China ministry of education key lab for intelligent networks and network security Xi’an Jiaotong University Xi’an China National key laboratory of Science and Technology on Microwave Imaging & Institute of Electronics Chinese Academy of Sciences Beijing China
The displaced phase center antenna(DPCA)technique is an effective strategy to achieve wide-swath synthetic aperture radar(SAR)imaging with high azimuth ***,traditionally,it requires strict limitation of the pulse repe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of PRIMATEs
收藏 引用
Science China(Information Sciences) 2020年 第1期63卷 130-139页
作者: Yanbin LI Meiqin WANG Wenqing LIU Wei WANG key laboratory of Cryptologic Technology and Information security Ministry of EducationShandong University Shandong Provincial key laboratory of Computer networks
PRIMATEs is a family of authenticated encryption design submitted to competition for authenticated encryption: security, applicability, and robustness. The three modes of operation in PRIMATEs family are: APE, HANUMAN... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
On cross-correlation indicators of an S-box
收藏 引用
Frontiers of Computer Science 2011年 第4期5卷 448-453页
作者: Sheng GAO Wenping MA Zepeng ZHUO Fenghe WANG key laboratory of Computer network and Information security Ministry of Education Xidian University Xi'an 710071 China State key laboratory of Integrated Service networks Xidian University Xi'an 710071 China
Substitution boxes (S-boxes) are often used as the most important nonlinear components in many symmetric encryption algorithms. The cryptographic properties of an S-box directly affect the security of the whole ciph... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A wireless secret key generation method based on Chinese remainder theorem in FDD systems
收藏 引用
Science China(Information Sciences) 2012年 第7期55卷 1605-1616页
作者: WANG WenJie 1,JIANG HongYan 1 ,XIA XiangGen 2,3 ,MU PengCheng 1 & YIN QinYe 1 1 ministry of education key lab for intelligent networks and network security,Xi’an Jiaotong University,Xi’an 710049,China 2 Electrical and Computer Engineering,University of Delaware,Newark,DE 19716,USA 3 Chonbuk National University,Jeonju,South Korea ministry of education key lab for intelligent networks and network security Xi’an Jiaotong University Xi’an China Electrical and Computer Engineering University of Delaware Newark USA Chonbuk National University Jeonju South Korea
The wireless physical channel parameters are recently used to provide secret ***,the key generation usually suffers from the quantization errors due to the noise,which decreases the key agreement ratio (KAR) between a... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cyclic-delay time-reversal space-time block codes for single-carrier transmission with frequency-domain decision-feedback equalization
收藏 引用
Science China(Information Sciences) 2011年 第9期54卷 1905-1915页
作者: FENG Ang,YIN QinYe & WANG HuiMing MOE key laboratory for intelligent networks and network security,Xi’an Jiaotong University,Xi’an 710049,China MOE key laboratory for intelligent networks and network security Xi’an Jiaotong University Xi’an China
Transmit diversity is an important multiple-input multiple-output (MIMO) approach to improve the transmission reliability;however,it is usually designed with maximum-likelihood *** this paper,we investigate a simple t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations
收藏 引用
Chinese Physics Letters 2010年 第6期27卷 13-15页
作者: ZHU Zhen-Chao ZHANG Yu-Qing key lab of Computer networks and Information security of ministry of education Xidian University Xi'an 710071 National Computer network Intrusion Protection Center Graduate University Chinese Academy of Sciences Beijing 100049
In a recent paper [Chin. Phys. Lett 25(2008)1187], a quantum secret sharing scheme between multiparty and multiparty was presented. We show that the protocol is not secure because the last member in Alice's group c... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
AOD estimation in WSN localization system with synthetic aperture technique
收藏 引用
Science China(Information Sciences) 2012年 第10期55卷 2216-2225页
作者: WANG WenJie,YAO BoBin & YIN QinYe MOE key lab for intelligent networks and network security,School of Electronic and Information Engineering,Xi’an Jiaotong University,Xi’an 710049,China MOE key lab for intelligent networks and network security School of Electronic and Information Engineering Xi’an Jiaotong University Xi’an China
Angel of departure(AOD) based distributed localization scheme in wireless sensor networks allows the single antenna sensor node to estimate its own AOD information by an equivalent antenna array for further position *... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Weak generalized self-shrinking generators
收藏 引用
Journal of Systems Engineering and Electronics 2007年 第2期18卷 407-411页
作者: Dong Lihua Hu Yupu The key lab. of Computer networks and Information security the Ministry of Education Xidian Univ. Xi'an 710071 P. R. China
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论