咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是221-230 订阅
排序:
Rate Control for VVC Intra Coding with Simplified Cubic Rate-Distortion Model
Rate Control for VVC Intra Coding with Simplified Cubic Rate...
收藏 引用
IEEE Workshop on Multimedia Signal Processing
作者: Yizhao Wang Jiaqi Zhang Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China National Engineering Research Center of Visual Technology School of Computer Science Peking University Beijing China
In this paper, we propose a simplified cubic polynomial R-D model with corresponding rate control methods for Versatile Video Coding (VVC) intra frame coding. First, we explore the rate-distortion (R-D) characteristic...
来源: 评论
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded Logits for Few-Shot Text Classification
UCL-AST: Active Self-Training with Uncertainty-Aware Clouded...
收藏 引用
International Conference on Tools for Artificial Intelligence (ICTAI)
作者: Yi Xu Jie Hu Zhiqiao Gao Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China China Telecom Corporation Limited Research Institute Beijing China
Although the recent advances in pre-training language models have achieved great success and migrated annotation bottleneck for many tasks, the task-specific fine-tuning for text classification still requires thousand... 详细信息
来源: 评论
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism
From Passive to Active: Near-optimal DNS-based Data Exfiltra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jiawen Diao Binxing Fang Xiang Cui Zhongru Wang Tian Wang Shouyou Song Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Ministry of Education Beijing China Zhongguancun Laboratory Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
DNS-based data exfiltration has become increasingly popular among advanced persistent threat (APT) attackers owing to the ubiquity and penetrability of the DNS protocol. AI-powered methods solve the defect that attack... 详细信息
来源: 评论
Transformer-F: A Transformer network with effective methods for learning universal sentence representation
arXiv
收藏 引用
arXiv 2021年
作者: Shi, Yu School of Software Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
The Transformer model is widely used in natural language processing for sentence representation. However, the previous Transformer-based models focus on function words that have limited meaning in most cases and could... 详细信息
来源: 评论
A microservice based generic consensus engine for BaaS
A microservice based generic consensus engine for BaaS
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Huiyang Li Xu Zhang Jing Li Dongbin Wang Beijing University of Posts and Telecommunications Beijing China School of Cyber Security National Engineering Laboratory for Mobile Network Security Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing Tongbang Zhuoyi Technology Co. Ltd
Blockchain-as-a-service (BaaS) has gradually serve as an infrastructure, providing underlying blockchain services for the rapid deployment and transaction on-chain of large-scale enterprise application scenarios. By h... 详细信息
来源: 评论
Uplink channel estimation and signal extraction under malicious attack in massive MIMO system
arXiv
收藏 引用
arXiv 2020年
作者: Zheng, Xiaofeng Cao, Ruohan Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China
This paper investigates correlative attack for the massive MIMO uplink. Malicious users (MUs) send jamming data sequences that are correlative to the data sequences of legitimate users (LUs) to a base station (BS). We... 详细信息
来源: 评论
Mandari: Multi-Modal Temporal Knowledge Graph-aware Sub-graph Embedding for Next-POI Recommendation
Mandari: Multi-Modal Temporal Knowledge Graph-aware Sub-grap...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoqian Liu Xiuyun Li Yuan Cao Fan Zhang Xiongnan Jin Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The Technology Innovation Center of Cultural Tourism Big Data of Hebei Province Chengde China Hebei Normal University for Nationalities Chengde China Knowledge Discovery and Data Mining Research Center Zhejiang Lab Hangzhou China
Next-POI recommendation aims to explore from user check-in sequence to predict the next possible location to be visited. Existing methods are often difficult to model the implicit association of multi-modal data with ...
来源: 评论
An Improved CTU-level Rate Control Algorithm Based on Temporal Domain Motion Intensity
An Improved CTU-level Rate Control Algorithm Based on Tempor...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Shaokang Wang Songlin Sun Jiaqi Zou Ruotong Wu Zhilei Ling Xingtong Liu School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK Business School Beijing Normal University Beijing China
Rate control (RC) plays a vital role in Versatile Video Coding (VVC) and video transmission. However, the RC algorithm in VVC remains the problem that the process of updating model parameters only considers the impact...
来源: 评论
Improving Chinese Spelling Check by Character Pronunciation Prediction: The Effects of Adaptivity and Granularity
arXiv
收藏 引用
arXiv 2022年
作者: Li, Jiahao Wang, Quan Mao, Zhendong Guo, Junbo Yang, Yanyan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China People's Daily Online Co. Beijing China People's Public Security University of China Beijing China
Chinese spelling check (CSC) is a fundamental NLP task that detects and corrects spelling errors in Chinese texts. As most of these spelling errors are caused by phonetic similarity, effectively modeling the pronuncia...
来源: 评论
A High-performance Web Attack Detection Method based on CNN-GRU Model
A High-performance Web Attack Detection Method based on CNN-...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Qiangqiang Niu Xiaoyong Li Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China
WEB attack detection is an important part of WEB security. This paper proposes a web attack detection method based on Convolutional Neural Network (CNN) combined with Gated Recurrent Unit (GRU). In order to improve th...
来源: 评论