咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是191-200 订阅
排序:
Toward Wisdom-Evolutionary and Primitive-Concise 6G:A New Paradigm of Semantic Communication Networks
收藏 引用
Engineering 2022年 第1期8卷 60-73页
作者: Ping Zhang Wenjun Xu Hui Gao Kai Niu Xiaodong Xu Xiaoqi Qin Caixia Yuan Zhijin Qin Haitao Zhao Jibo Wei Fangwei Zhang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Peng Cheng Laboratory Shenzhen 518066China Key Laboratory of Universal Wireless Communications Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China School of Artificial Intelligence Beijing University of Posts and TelecommunicationsBeijing 100876China The School of Electronic Engineering and Computer Science Queen Mary University of LondonLondon E14NSUK College of Electronic Science and Technology National University of Defense TechnologyChangsha 410073China School of Humanities Beijing University of Posts and TelecommunicationsBeijing 100876China
The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G *** hyper-massive and global con... 详细信息
来源: 评论
CPCED: a container escape detection system based on CNI plugin
CPCED: a container escape detection system based on CNI plug...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yu Hao Xu Zhang Dongbin Wang School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications National Engineering Research Center for Mobile Internet Security Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service Beijing China
Container escape detection is a critical research topic in the field of cloud security. Among the challenges faced in modern cloud security, the issue of container escape poses a significant threat due to its direct i... 详细信息
来源: 评论
Identifying Data Breaches in Dark Web through Prompt Active Learning
Identifying Data Breaches in Dark Web through Prompt Active ...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hui Xiang Yifan Wu Xuebin Wang Jinqiao Shi Can Zhao Jiapeng Zhao School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Frequent data breaches have attracted people’s attention. The dark web forums have become the crucial platform for data breach transactions. While some forums are well-organized with distinct sections, such as a dedi... 详细信息
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Shouyou Song Pu Wang Yangchun Li Nanyang Wang Wei Jiang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China Chinese Academy of Cyberspace Studies Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ...
来源: 评论
An Adversarial Smart Contract Honeypot in Ethereum
收藏 引用
Computer Modeling in Engineering & Sciences 2021年 第7期128卷 247-267页
作者: Yu Han Tiantian Ji Zhongru Wang Hao Liu Hai Jiang Wendi Wang Xiang Cui Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China Chinese Academy of Cyberspace Studies Beijing100010China Qianxin Technology Group Co. Ltd.Beijing100088China Beijing DigApis Technology Co. Ltd.Beijing100081China Cyberspace Institute of Advanced Technology Guangzhou UniversityGuangzhou510006China
A smart contract honeypot is a special type of smart *** type of contract seems to have obvious vulnerabilities in contract *** a user transfers a certain amount of funds to the contract,then the user can withdraw the... 详细信息
来源: 评论
Enhancing Continuous service of Information Systems Based on Cyber Resilience
Enhancing Continuous Service of Information Systems Based on...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jinxin Zuo Ziyu Guo Jiefu Gan Yueming Lu Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China China Cyber security Review Technology and Certification Center Beijing China
Cyber resilience has become a strategic point of information security in recent years. In the face of complex attack means and severe internal and external threats, it is difficult to achieve 100% protection against i... 详细信息
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
Network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论
Self-learn to Explain Siamese Networks Robustly
Self-learn to Explain Siamese Networks Robustly
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Chao Chen Yifan Shen Guixiang Ma Xiangnan Kong Srinivas Rangarajan Xi Zhang Sihong Xie Lehigh University BUPT Key Laboratory of Trustworthy Distributed Computing and Service (MoE) University of Illinois at Chicago Worcester Polytechnic Institute
Learning to compare two objects are essential in applications, especially when labeled data are scarce and imbalanced. As these applications can involve humans and make high-stake decisions, it is critical to explain ... 详细信息
来源: 评论
Sensing-Centric Energy-Efficient Waveform Design for Integrated Sensing and Communications
Sensing-Centric Energy-Efficient Waveform Design for Integra...
收藏 引用
IEEE Conference on Global Communications (GLOBECOM)
作者: Jiaqi Zou Songlin Sun Christos Masouros Yuanhao Cui School of Information and Communication Engineering Beijing University of Posts and Telecommunications China Department of Electronics and Electrical Engineering University College London UK Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Department of Electronic and Electrical Engineering Southern University of Science and Technology China
In this paper, we consider the energy-efficient waveform design for integrated sensing and communications systems, simultaneously performing multi-user communications and point-like/extended target sensing. We propose...
来源: 评论
Sensing-Assisted Neighbor Discovery for Vehicular Ad Hoc Networks
Sensing-Assisted Neighbor Discovery for Vehicular Ad Hoc Net...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Yuyang Liu Songlin Sun Ronghui Zhang School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China
In this paper, we propose a sensing-assisted neighbor discovery algorithm that utilizes the sensing capability of radar to improve the efficiency of neighbor discovery for vehicular ad hoc networks (VANETs). To store ... 详细信息
来源: 评论