咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是171-180 订阅
排序:
Multi-source and multi-dimensional network security situational awareness model  2020
Multi-source and multi-dimensional network security situatio...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Luqin Lv Yueming Lu School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Aiming at the problem that single protection technology is difficult to meet the needs of network security, the rationality and accuracy of situation assessment index are poor, the multi-source and multi-dimensional n... 详细信息
来源: 评论
Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning  2020
Web Attack Detection through Network-Traffic-Based Feature E...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Jian Yang Hao Wang Yueming Lu School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
The design of feature set is a basic research direction of anomaly detection technology. The characterization ability of feature set directly affects the accuracy and generalization ability of intrusion detection algo... 详细信息
来源: 评论
TNRAS: Tor Nodes Reliability Analysis Scheme  2021
TNRAS: Tor Nodes Reliability Analysis Scheme
收藏 引用
2021 the 11th International Conference on Communication and Network Security
作者: Wenzhen Zhang Tianbo Lu Zeyu Du School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China School of Computer Science (National Pilot Software Engineering School) School of Cyberspace Security Beijing University of Posts and Telecommunications China and Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications China
With the rapid Internet development, the security attacks become more and more noteworthy that people have paid more concentration on personal privacy. The Onion Router (Tor), a distributed anonymous communication net... 详细信息
来源: 评论
Auto-GAN: GAN-Based Self-Supervised Collaborative Learning for Robust Spatio-Temporal Trajectory Classification in IoT
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Jia, Jia Li, Linghui Li, Ximing Wang, Ning Cai, Binsi Zhang, Xu Qiu, Pengfei Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Research Institute of China Mobile Communications Corporation Beijing100032 China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing100876 China China Academy of Information and Communications Technology Beijing China Nanjing University School of Electronic Science and Engineering Nanjing210023 China
With the rapid proliferation of crowd mobility data produced by ubiquitous mobile devices equipped with spatial positioning modules, deep neural networks (DNNs) have become widely applied in spatio-temporal trajectory... 详细信息
来源: 评论
MASCA: A Multimodal Abstractive Summarization Model Based on Core Words Fusion Attention  7
MASCA: A Multimodal Abstractive Summarization Model Based on...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Yin, Xiaohan Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Qiu, Lirong Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Beijing University of Posts and Telecommunications School of Cyberspace Security Bupt Beijing China Bupt Beijing China Beijing Jiaotong University Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
With the rapid development of information technology, automatic summarization research has gradually developed into abstractive summarization. The number of data in various modalities(such as pictures) in practical ap... 详细信息
来源: 评论
Meta Balanced Network for Fair Face Recognition
arXiv
收藏 引用
arXiv 2022年
作者: Wang, Mei Zhang, Yaobin Deng, Weihong The Pattern Recognition and Intelligent System Lab. School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Key Lab. of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Although deep face recognition has achieved impressive progress in recent years, controversy has arisen regarding discrimination based on skin tone, questioning their deployment into real-world scenarios. In this pape... 详细信息
来源: 评论
Vehicle Destination Prediction Based on Trajectory Data
Vehicle Destination Prediction Based on Trajectory Data
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Wenming Guo Ruiqi Jia Che Zong Ruichao Li Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China School of Information Engineering Xinjiang Institute of Engineering Urumqi China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China
With the increasing requirements of real-time traffic management in urban transportation, vehicle destination prediction data, as an important part of smart city brain data, is becoming more and more important in urba...
来源: 评论
The Mechanism of Mobile Communication Technology Prompting Digital Transformation of Manufacturing Industry: From the Perspective of Data Factor Empowerment  24
The Mechanism of Mobile Communication Technology Prompting D...
收藏 引用
Proceedings of the 2024 10th International Conference on Communication and Information Processing
作者: Ran Li Muhua Wei Huili Liu Jiayin Qi Lina Liu Department of User and Market Research China Mobile Research Institute Beijing Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou Guangzhou China and Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing Beijing China School of Economics and Management Beijing University of Posts and Telecommunications Beijing Beijing China
Abstract: The digital transformation of manufacturing industry is a crucial measure for achieving high-quality development, and mobile communication technology plays a significant role in this process. This paper focu... 详细信息
来源: 评论
Audio Public opinion Analysis Model based on heterogeneous Neural Network
Audio Public opinion Analysis Model based on heterogeneous N...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International Conference on
作者: Haikun Jiang Xu Wu Xiaqing Xie Jingchen Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Library Beijing China
With the rapid development of the information age, the main body of public opinion information is no longer just structured data such as text and numbers, but the proportion of unstructured data such as audio and vide... 详细信息
来源: 评论
Violence Detection In Videos via Motion-Guided Global and Local Views
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Ning Su Lijuan Sun Yutong Gao Jingchen Wu Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio...
来源: 评论