咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是131-140 订阅
排序:
Cooperative Spectrum Sensing Based on Centralized Double Threshold in MCN
收藏 引用
China Communications 2020年 第5期17卷 235-242页
作者: Hai Huang Junsheng Mu Xiaojun Jing School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing 100876China
Cooperative spectrum sensing appears popular currently due to its ability to solve the issue of hidden terminal and improve detection performance in Cognitive Radio Networks. Meanwhile, double threshold based energy d... 详细信息
来源: 评论
A Lightweight and Robust Cross-Domain Authentication Scheme Based on Master-Slave Blockchain
A Lightweight and Robust Cross-Domain Authentication Scheme ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Kaiyang Deng Yali Gao Jie Yuan Zihan Hou Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education College of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
In the era of network informatization, the Internet of Things has more and more complex requirements for information interaction across trust domains, and cross-domain identity authentication has become the focus of r... 详细信息
来源: 评论
A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples  7
A DNS-based Data Exfiltration Traffic Detection Method for U...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Ruiling, Gan Jiawen, Diao Xiang, Cui Shouyou, Song QI-ANXIN Technology Group Beijing China Beijing University of Posts and Telecommunications Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Guangzhou University Cyberspace Institute Advanced Technology Guangzhou China Beijing DigApis Technology Co. Ltd Beijing China
The advanced persistent threat (APT) is one of the most serious threats to cyberspace security. Posting back of exfiltrated data by way of DNS covert channels has become increasingly popular among APT attackers. Early... 详细信息
来源: 评论
A Practical YOLOV5 Face Detector with Decoupled Swin Head
A Practical YOLOV5 Face Detector with Decoupled Swin Head
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Shuozhi Yuan Wenming Guo Feng Yang Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Xinjiang Institute of Engineering Beijing China Xinjiang Institute of Engineering Urumqi China
Face detection is a fundamental and practical problem in computer vision, which aims to indicate the face positions in a wild environment precisely. However, different from the generic object detection tasks, there ar...
来源: 评论
SATMask: Spatial Attention Transform Mask for Dense Instance Segmentation  7
SATMask: Spatial Attention Transform Mask for Dense Instance...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Mao, Quanzhong Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Qiu, Lirong Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service China Bupt School of Cyberspace Security Bupt School of Computer Science National Pilot Software Engineering School Beijing Jiaotong University Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library China
There are often dense objects in the images processed by instance segmentation, but too dense objects will cause the problem that the objects are difficult to segment. Most of the current dense instance segmentation m... 详细信息
来源: 评论
Low-Complexity distributed Precoding in User-Centric Cell-Free mmWave MIMO Systems
arXiv
收藏 引用
arXiv 2022年
作者: Zhong, Yingrong Cao, Yashuai Lv, Tiejun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
User-centric (UC) based cell-free (CF) structures can provide the benefits of coverage enhancement for millimeter wave (mmWave) multiple input multiple output (MIMO) systems, which is regarded as the key technology of... 详细信息
来源: 评论
WBRP: Consensus Algorithm Based on Weak Proof of Work
WBRP: Consensus Algorithm Based on Weak Proof of Work
收藏 引用
IEEE International Conference on Blockchain (Blockchain)
作者: Jiarui Li Dongbin Wang Hui Zhi Wencheng Zhu Jianing Li Zedong Wang School of Cyberspace Engineering Beijing University of Post and Telecommunications Beijing China National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service Beijing China
Nakamoto Consensus (NC) is a classic Proof of Work (PoW) consensus algorithm where the probability of miners earning the right to a block is proportional to their computational power. To prevent blockchain forks, the ... 详细信息
来源: 评论
Intellicise Wireless Networks From Semantic Communications: A Survey, Research Issues, and Challenges
收藏 引用
IEEE Communications Surveys and Tutorials 2025年 第3期27卷 2051-2084页
作者: Zhang, Ping Xu, Wenjun Liu, Yiming Qin, Xiaoqi Niu, Kai Cui, Shuguang Shi, Guangming Qin, Zhijin Xu, Xiaodong Wang, Fengyu Meng, Yue Dong, Chen Dai, Jincheng Yang, Qianqian Sun, Yaping Gao, Dahua Gao, Hui Han, Shujun Song, Xiaodan Beijing University of Posts and Telecommunications State Key Laboratory of Network and Switching Technology Beijing100876 China Peng Cheng Laboratory Department of Broadband Communication Shenzhen518066 China Shenzhen518172 China Tsinghua University Department of Electronic Engineering Beijing National Research Center for Information Science and Technology Beijing100084 China State Key Laboratory of Space Network and Communications Beijing100876 China Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing100876 China Beijing University of Posts and Telecommunications Key Laboratory of Universal Wireless Communications Ministry of Education Beijing100876 China Zhejiang University College of Information Science and Electronic Engineering Hangzhou310007 China Xidian University School of Artificial Intelligence Xi’an710071 China Pazhou Lab Guangzhou510555 China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Guangzhou Institute of Technology Xidian University Guangzhou510555 China
Information and communication technology (ICT) has been an essential part of modern society. However, the current communication systems are not sufficient to meet the demands of emerging applications. Intellicise (int... 详细信息
来源: 评论
Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace
Enhancing IoT Flow Anomaly Detection with Differential Optim...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Weidong Shi Mingrui Fan Jiaqi Gao Jiahao Qi Daoqi Han Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education School of Cyberspace Security The State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
With the continuous expansion of network scale and increasing complexity, the application of the Internet of Things (IoT) is becoming more extensive. However, it is also vulnerable to various abnormal attacks, making ...
来源: 评论
Seeing the Attack Paths: Improved Flow Correlation Scheme in Stepping-Stone Intrusion
Seeing the Attack Paths: Improved Flow Correlation Scheme in...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Zixuan Chen Chao Zheng Zhao Li Jinqiao Shi Zeyu Li School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Geedge Networks Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Stepping-stones are widely used by attackers to conceal their identities and gain unauthorized access to restricted targets. Numerous strategies have been suggested to identify stepping-stones and counteract evasive b... 详细信息
来源: 评论