咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是181-190 订阅
排序:
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model  7
Automated Crash Analysis and Exploit Generation with Extenda...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Zhehui Wang, Zhongru Zhang, Yuntao Liu, Tong Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
Recently, more and more software vulnerabilities are disclosed and researchers tend to study on automatically discover and exploit the vulnerabilities. However, the main challenges of automated exploit generation are:... 详细信息
来源: 评论
A deepfake video detection method based on multi-modal deep learning method
A deepfake video detection method based on multi-modal deep ...
收藏 引用
International Conference on Electronics, Communications and Information Technology (CECIT)
作者: Yutong Zhang Xiaoyong Li Jie Yuan Yali Gao Linghui Li Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing P.R. China
Recently, most deepfake video classification tasks depend on frame-level features and try to train deep neural networks to characterize fake videos. Although this kind of methods can achieve good results, they also wa... 详细信息
来源: 评论
CWAI-CNER: Chinese entity recognition based on adaptive incorporation of characters and words
CWAI-CNER: Chinese entity recognition based on adaptive inco...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International Conference on
作者: Pai Peng Xu Wu Xiaqing Xie Jingchen Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Library BUPT Beijing China
Chinese Named Entity Recognition (CNER) is an important sub topic in the field of Chinese Natural Language Processing, which plays an important role in multi tasks. However, it's difficult to determine the boundar... 详细信息
来源: 评论
Training for stable explanation for free  24
Training for stable explanation for free
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Chao Chen Chenghua Guo Rufeng Chen Guixiang Ma Ming Zeng Xiangwen Liao Xi Zhang Sihong Xie School of Computer Science and Technology Harbin Institute of Technology (Shenzhen) China Key Laboratory of Trustworthy Distributed Computing and Service (MoE) Beijing University of Posts and Telecommunications China Artificial Intelligence Thrust The Hong Kong University of Science and Technology (Guangzhou) China Intel Carnegie Mellon University College of Computer and Data Science Fuzhou University China
To foster trust in machine learning models, explanations must be faithful and stable for consistent insights. Existing relevant works rely on the ℓp distance for stability assessment, which diverges from human percept...
来源: 评论
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining
EFM: A Negative Network Public Opinion Early Warning Model B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Fanfeixue Meng Jingchen Wu Feifan Song Xu Wu Lan Hu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT School of Economics and Finance Changchun Finance College
With the popularity of the Internet and the increase in the number of netizens, it is of great significance to effectively monitor and predict the negative network public opinion on social media platforms. Most mainst...
来源: 评论
A hierarchical sharing mechanism based privacy data protection
A hierarchical sharing mechanism based privacy data protecti...
收藏 引用
Science and Technology Innovation (IAECST), International Academic Exchange Conference on
作者: Zhaxi Namjie Tianbo Lu Yanjiao Gong Jiaze Shang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
The frequent occurrence of privacy data breaches and the subsequent issuance of data security laws and regulations have led to increased attention paid to the security of personal data. Ensuring the safety of personal... 详细信息
来源: 评论
EML-Based IM/DD Transmission over Dispersion-Uncompensated Links Using Low-Complexity Optimized Detection
EML-Based IM/DD Transmission over Dispersion-Uncompensated L...
收藏 引用
2021 Asia Communications and Photonics Conference, ACP 2021
作者: Liu, Shuangyue Cui, Han Tang, Xizi Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
We experimentally demonstrate an EML-based 40-Gbit/s OOK IM/DD transmission over 120-km SSMF using a low-complexity optimized detection algorithm, which requires no multiplication during the update of survival path, s... 详细信息
来源: 评论
A survey of automated International Classification of Diseases coding:development,challenges,and applications
收藏 引用
Intelligent Medicine 2022年 第3期2卷 161-173页
作者: Chenwei Yan Xiangling Fu Xien Liu Yuanqiu Zhang Yue Gao Ji Wu Qiang Li School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing 100876China Department of Electronic Engineering Tsinghua UniversityBeijing 100084China Beijing Tsinghua Changgung Hospital Beijing 102218China
The International Classification of Diseases(ICD)is an international standard and tool for epidemiological in-vestigation,health management,and clinical diagnosis with a fundamental role in intelligent medical *** ass... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hongfan Chen Yigang Diao Hui Xiang Yixuan Huo Xiaqing Xie Jiapeng Zhao Xuebin Wang Yanwei Sun Jinqiao Shi School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Cyberspace Administration of China Data and Technology Support Center Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论
DSE-GAN: Dynamic Semantic Evolution Generative Adversarial Network for Text-to-Image Generation
arXiv
收藏 引用
arXiv 2022年
作者: Huang, Mengqi Mao, Zhendong Wang, Penghui Wang, Quan Zhang, Yongdong University of Science and Technology of China China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China Institute of Artificial Intelligence Hefei Comprehensive National Science Center China
Text-to-image generation aims at generating realistic images which are semantically consistent with the given text. Previous works mainly adopt the multi-stage architecture by stacking generator-discriminator pairs to... 详细信息
来源: 评论