咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 119 篇 期刊文献

馆藏范围

  • 493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 251 篇 工学
    • 173 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 82 篇 信息与通信工程
    • 47 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 100 篇 理学
    • 66 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 16 篇 training
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 89 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 33 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 gao hui
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 455 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
493 条 记 录,以下是31-40 订阅
排序:
A Neural Network and Bloom Filter-Based Name Search Method in Named Data Networking
A Neural Network and Bloom Filter-Based Name Search Method i...
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Yue Liu Xiaoyong Li Xiaotian Si Mengyang Zhang Kaiguo Yuan Pengcheng Li Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
In a new network architecture like NDN, designing an efficient name lookup method has always been a valuable challenge. The paper studies the name lookup technology based on the Bloom filter and BPNN neural network ma...
来源: 评论
Zero-Shot Detection of LLM-Generated Text using Token Cohesiveness
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Shixuan Wang, Quan MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The increasing capability and widespread usage of large language models (LLMs) highlight the desirability of automatic detection of LLM-generated text. Zero-shot detectors, due to their training-free nature, have rece... 详细信息
来源: 评论
The Construction and Application of Work and Production Resuming Behavior System Dynamics Evolutionary Game Regulation and Control Model
收藏 引用
Journal of Systems Science and Information 2023年 第2期11卷 160-178页
作者: Qiao HU Jiayin QI School of Business and Management Shanghai International Studies UniversityShanghai 201620China School of Cyberspace Security Guangzhou UniversityGuangzhou 510006ChinaKey Laboratory of Trustworthy Distributed Computing and Service(BUPT)Ministry of EducationBeijing 100084China
The resumption of production after the“suspension”caused by the COVID-19 has emerged as an urgent problem for many enterprises and the *** resumption of production is actually a dynamic evolution problem from 0 to 1... 详细信息
来源: 评论
A Novel Color Image Encryption based on Chaos and DNA Mutation
A Novel Color Image Encryption based on Chaos and DNA Mutati...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Mingliang Sun Jie Yuan Xiaoyong Li Dongxiao Liu Xinghai Wei Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing China
The security of the color images is challenged by the illegal copying and distribution over various communication networks. This work proposed a novel color image encryption scheme based on the chaos and Deoxyribonucl... 详细信息
来源: 评论
Knowledge-Enabled Intent-Driven Network Configuration Generation for 5G Core Networks  24
Knowledge-Enabled Intent-Driven Network Configuration Genera...
收藏 引用
24th IEEE International Conference on Communication Technology, ICCT 2024
作者: Li, Qiuying Cai, Jiajun Xu, Ji'ang Liu, Ruosi Yuan, Caixia Gao, Hui Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Moe Beijing China Beijing University of Posts and Telecommunications School of Artificial Intelligence Beijing China Bantian Industrial Base Huawei Technoligies Shenzhen China
Automating the configuration of 5G core networks (CNs) is crucial for meeting increasingly diverse and specialized application requirements. In this paper, we propose an intent-driven automation model for configuring ... 详细信息
来源: 评论
Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception
Reliability Measurement Of Vehicle Sensor Data Based On Hist...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Chenqing Guo Jinxin Zuo Yueming Lu Weixuan Xie School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
On-board sensors are utilized for monitoring and collecting a diverse range of data pertaining to the vehicle and its surroundings. However, in the field of Internet of Vehicles, security threats encountered by vehicl... 详细信息
来源: 评论
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis
Modification Method for Internal Network Flow Anomaly Detect...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xinyu Zhang Junmei Ding Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a... 详细信息
来源: 评论
Generating a Personalised Sensor Data Generation System for the Fusion of Adversarial Networks and Behavioural Matter-of-Fact Mapping  8th
Generating a Personalised Sensor Data Generation System for ...
收藏 引用
8th EAI International Conference on Machine Learning and Intelligent Communications, MLICOM 2023
作者: Cao, Jingge Sun, Lijuan Wu, Jingchen Zhang, Xiujian Wu, Xu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security BUPT Beijing China Key Laboratory of Artificial Intelligence Measurement and Standards for State Market Regulation Beijing Aerospace Institute for Metrology and Measurement Technology Beijing100076 China
Generative models such as Generative Adversarial Networks and Variational Self-Encoders have been shown to generate highly simulated synthetic data with incredible results in areas such as text, images, and audio. How... 详细信息
来源: 评论
An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection
An AdamW-Based Deep Neural Network Using Feature Selection a...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Zhuoer Lu Xiaoyong Li Pengfei Qiu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
With the development of the Internet and the increasing number of Internet users, cyber security has become a major concern for most netizens. In this paper, we propose an AdamW-based neural network using feature sele...
来源: 评论
A Practical YOLOV5 Face Detector with Decoupled Swin Head
A Practical YOLOV5 Face Detector with Decoupled Swin Head
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Yuan, Shuozhi Guo, Wenming Yang, Feng Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Beijing University of Posts and Telecommunications Xinjiang Institute of Engineering Beijing China Xinjiang Institute of Engineering Urumqi China
Face detection is a fundamental and practical problem in computer vision, which aims to indicate the face positions in a wild environment precisely. However, different from the generic object detection tasks, there ar... 详细信息
来源: 评论