咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是101-110 订阅
排序:
Cross-Lingual Propaganda Detection
Cross-Lingual Propaganda Detection
收藏 引用
IEEE International Conference on Big Data
作者: Wenshan Zhang Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Propaganda information that aims at influencing people’s opinions is becoming more and more common around people, especially through social media. For the detection of propaganda content, researchers have conducted s... 详细信息
来源: 评论
An Efficient Active Learning based Method for Deepfake Vidoes Model Attribution
An Efficient Active Learning based Method for Deepfake Vidoe...
收藏 引用
Digital Society and Intelligent Systems (DSInS), International Conference on
作者: Xiaotian Si Weiqiang Jiang Linghui Li Xiaoyong Li Kaiguo Yuan Zhongyuan Guo Key Laboratory of Trustworthy Distributed Computing and Service (MoE) Beijing University of Posts and Telecommunications Beijing China Chine Mobile Group Co. Ltd Beijing China
To enhance the forensic investigation of deepfake face-swap videos, it is essential to attribute the specific generation model used to create these videos. Despite the remarkable progress made in data-driven approache...
来源: 评论
Introducing Natural Language-based Instruction Protocol for Intelligent Machine Collaborations
Introducing Natural Language-based Instruction Protocol for ...
收藏 引用
International Wireless Communications and Mobile computing Conference, IWCMC
作者: Haobing Gong Hui Gao Yuting Feng Caixia Yuany Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China
The rapid development of various autonomous unmanned systems has increased the endogenous intelligence of machines, which empowers functional collaborations among intelligent machines. However, traditional protocols f...
来源: 评论
Trade less Accuracy for Fairness and Trade-off Explanation for GNN
Trade less Accuracy for Fairness and Trade-off Explanation f...
收藏 引用
IEEE International Conference on Big Data
作者: Yazheng Liu Xi Zhang Sihong Xie Key Laboratory of Trustworthy Distributed Computing and Service (MoE) BUPT Computer Science and Engineering Dept Lehigh University
Graphs are widely found in social network analysis and e-commerce, where Graph Neural Networks (GNNs) are the state-of the-art model. GNNs can be biased due to sensitive attributes and network topology. With existing ... 详细信息
来源: 评论
A Fusion Scheme of Region of Interest Extraction in Incomplete Fingerprint
收藏 引用
Chinese Journal of Electronics 2023年 第4期21卷 663-666页
作者: Xiaojun JING Bo ZHANG Jie ZHANG Mingliang ZHONG School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
A fusion scheme is proposed for incomplete fingerprint to extract the Region of interest (ROI) centered at the reference point. Firstly, the orientation entropy is computed. Secondly, it is necessary for ROI extractio... 详细信息
来源: 评论
BiTrust: Hybrid Trust Management for Secure Data Transmission in LEO Satellite Networks
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wei, Xinghai Yuan, Jie Hu, Runshan Wang, Haiguang Liu, Xiang Liu, Dongxiao Wang, Xingwu Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Huawei Technologies Co. Ltd Beijing100095 China Huawei International Shield Lab Changi Business Park 486035 Singapore Pengcheng Laboratory Shenzhen518083 China
Due to characteristics such as the openness and exposure of inter-satellite links, Low-Earth Orbit (LEO) satellite networks are subject to heightened vulnerability to malicious attacks compared to ground-based network... 详细信息
来源: 评论
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
arXiv
收藏 引用
arXiv 2025年
作者: Song, Jialei Zuo, Xingquan Wang, Feiyang Huang, Hai Zhang, Tianle Shool of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Shool of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Deep neural networks (DNNs) are highly susceptible to adversarial samples, raising concerns about their reliability in safety-critical tasks. Currently, methods of evaluating adversarial robustness are primarily categ... 详细信息
来源: 评论
TKCA:a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
收藏 引用
Cybersecurity 2021年 第1期4卷 177-192页
作者: Lulu Yang Chen Li Ruibang You Bibo Tu Linghui Li Institute of Information Engineering Chinese Academy of Sciences100093 BeijingChina School of Cyber Security University of Chinese Academy of Sciences100049 BeijingChina Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications100876 BeijingChina
keystroke-based behavioral biometrics have been proven effective for continuous user *** state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some *** remains a c... 详细信息
来源: 评论
A Non-Statistical Reinstatement Algorithm for Orientation Field of Incomplete Fingerprint
收藏 引用
Chinese Journal of Electronics 2023年 第3期21卷 177-180页
作者: Xiaojun JING Bo ZHANG Xinjing LIU Dong WANG School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Fingerprint orientation is the key information in fingerprint enhancement and matching. According to the problem of incomplete fingerprint orientation, a novel algorithm of fingerprint orientation reinstatement is pro... 详细信息
来源: 评论
Incorporate Personas and Emotions into Dialog Generation
Incorporate Personas and Emotions into Dialog Generation
收藏 引用
Science and Technology Innovation (IAECST), International Academic Exchange Conference on
作者: Yufeng Wu Chengyu Liu Wenjian Guo Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
Since the Turing test, creating believable open-domain dialogues has been a basic problem in the study of artificial intelligence. Achieving success with dialogue models can greatly improve natural human-computer inte...
来源: 评论