咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是151-160 订阅
排序:
Integrated Beamforming and Resource Allocation in RIS-Assisted mmWave Networks based on Deep Reinforcement Learning
Integrated Beamforming and Resource Allocation in RIS-Assist...
收藏 引用
Annual IEEE Northeast Workshop on Circuits and Systems (NEWCAS)
作者: Di Chen Hui Gao Na Chen Ruohan Cao Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Graduate School of Science and Technology Nara Institute of Science and Technology Ikoma Japan
Reconfigurable intelligent surface (RIS) has gained wide attention recently as a promising solution to address the blockage issue in millimeter wave (mmWave) communication networks. In this paper, we consider a RIS-as...
来源: 评论
Named Entity Recognition of Chinese Diabetic Literature by Integrating General Domain Knowledge  4
Named Entity Recognition of Chinese Diabetic Literature by I...
收藏 引用
4th IEEE International Conference on Computer and Communication Engineering Technology, CCET 2021
作者: Zhang, Duochuan Beijing University of Posts and Telecommunications School of Computer National Demonstrative Software School Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China
In the field of named entity recognition of diabetes literature, due to the lack of large-scale and high-quality annotation data sets, the traditional named entity recognition technology has the drawback of insufficie... 详细信息
来源: 评论
Multi-source and multi-dimensional network security situational awareness model
Multi-source and multi-dimensional network security situatio...
收藏 引用
2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020
作者: Lv, Luqin Lu, Yueming School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Aiming at the problem that single protection technology is difficult to meet the needs of network security, the rationality and accuracy of situation assessment index are poor, the multi-source and multi-dimensional n... 详细信息
来源: 评论
Robust text clustering with graph and textual adversarial learning  5
Robust text clustering with graph and textual adversarial le...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Liang, Yongming Tian, Tian Jin, Kaifu Yang, Xiaoyu Lv, Yuefei Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ... 详细信息
来源: 评论
A Framework Design for Decentralized Digital Identity Across Borders
收藏 引用
Strategic Study of CAE 2025年 第1期27卷 88-97页
作者: Jian, Chen Zhiming, Cai Jiayin, Qi Binxing, Fang Faculty of Data Science City University of Macau Macao999078 China Faculty of Digital Science and Technology Macau Millennium College Macao999078 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China Huangpu Graduate School of Guangzhou University Guangzhou510006 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100084 China
In the digital era, the challenges of data sovereignty and the conflict between personal data privacy protection and efficient access are becoming more pronounced. As a critical foundational support for resolving this... 详细信息
来源: 评论
Incomplete Fingerprint Recognition Based on Inproved GA-PSO
收藏 引用
Chinese Journal of Electronics 2023年 第4期22卷 769-772页
作者: JING Xiaojun ZHANG Jie JIANG Haixia ZHONG Mingliang TAO Lei School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Labaratory of Trustworthy Distributed Computing and Service (BUPI) Ministry of Education Beijing University of Posts and Telecommunications Beijing China College of Information and Communication Engineering Harbin Engineering University Harbin China
Minutiae-based algorithm plays a more and more important role in fingerprint recognition. It is greatly limited by its demand for good image quality and dependence on fingerprint aligning, especially for incomplete fi... 详细信息
来源: 评论
A Logical Combination Based Application Layer Intrusion Detection Model
A Logical Combination Based Application Layer Intrusion Dete...
收藏 引用
2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020
作者: Wang, Hao Yang, Jian Lu, Yueming School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
In enterprise network attack intrusion detection system, false positives and false negatives are the opposite of each other, and it is difficult to achieve both, so reducing false positives rate and false negatives ra... 详细信息
来源: 评论
Mask Neural Network for Predicting Flight Ticket Price  6th
Mask Neural Network for Predicting Flight Ticket Price
收藏 引用
6th Conference on Signal and Information Processing, Networking and Computers, ICSINC 2019
作者: Zhang, Qianqian He, Yuan Jing, Xiaojun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Recently, the global air traffic has increased rapidly, most passengers choose to buy tickets in their own experiences. So accurately predicting flight ticket price is of great significance. Recently there exist some ... 详细信息
来源: 评论
Not All Image Regions Matter: Masked Vector Quantization for Autoregressive Image Generation
Not All Image Regions Matter: Masked Vector Quantization for...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Mengqi Huang Zhendong Mao Quan Wang Yongdong Zhang University of Science and Technology of China Hefei China Institute of Artificial intelligence Hefei Comprehensive National Science Center Hefei China MOE Key Laboratory of Trustworthy Beijing University of Posts and Telecommunications Distributed Computing and Service Beijing China
Existing autoregressive models follow the two-stage generation paradigm that first learns a codebook in the latent space for image reconstruction and then completes the image generation autoregressively based on the l...
来源: 评论
Not All Image Regions Matter: Masked Vector Quantization for Autoregressive Image Generation
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Mengqi Mao, Zhendong Wang, Quan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Institute of Artificial intelligence Hefei Comprehensive National Science Center Hefei China
Existing autoregressive models follow the two-stage generation paradigm that first learns a codebook in the latent space for image reconstruction and then completes the image generation autoregressively based on the l... 详细信息
来源: 评论