咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是41-50 订阅
排序:
A Practical YOLOV5 Face Detector with Decoupled Swin Head
A Practical YOLOV5 Face Detector with Decoupled Swin Head
收藏 引用
2023 IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023
作者: Yuan, Shuozhi Guo, Wenming Yang, Feng Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Beijing University of Posts and Telecommunications Xinjiang Institute of Engineering Beijing China Xinjiang Institute of Engineering Urumqi China
Face detection is a fundamental and practical problem in computer vision, which aims to indicate the face positions in a wild environment precisely. However, different from the generic object detection tasks, there ar... 详细信息
来源: 评论
An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link Prediction
An Unsupervised Graph Embedding Method Based on Dynamic Grap...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jingzhu Lu Feifan Song Jingchen Wu Xu Wu Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Economics and Finance Changchun Finance College Jilin China Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science Beijing University of Posts and Telecommunications Beijing China
Due to the lack of labeled data in many real-world scenarios, Graph Neural Network models that require a large volume of labeled data are not effective, and research based on unsupervised learning frameworks has becom...
来源: 评论
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer Learning
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for ...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yueyue Shen Feifan Song Jingchen Wu Xu Wu Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Economics and Finance Changchun Finance College Jilin China Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Computer Science Beijing University of Posts and Telecommunications Beijing China
Although the general event extraction model has achieved good results in the standard data sets, there is a gap in the extraction results in low-resource environments. The general event extraction model still has room...
来源: 评论
Blockchain Storage Method Based on Erasure Code  8
Blockchain Storage Method Based on Erasure Code
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Meng, Fanyao Li, Jin Gao, Jiaqi Liu, Junjie Ru, Junpeng Lu, Yueming School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Information and Communication Engineering Beijing University of Posts and Telecommunications The State Key Laboratory of Information Photonics and Optical Communications Beijing China
Blockchain, as an emerging distributed database, effectively addresses the issue of centralized storage in IoT data, where storage capacity cannot match the explosive growth in devices and data scale, as well as the c... 详细信息
来源: 评论
An Intrusion Detection Method Based on Transformer-LSTM Model
An Intrusion Detection Method Based on Transformer-LSTM Mode...
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Zhipeng Zhang Xiaotian Si Linghui Li Yali Gao Xiaoyong Li Jie Yuan Guoqiang Xing Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
With the development of network technologies, network intrusion has become increasing complex which makes the intrusion detection challenging. Traditional intrusion detection algorithms detect intrusion traffic throug... 详细信息
来源: 评论
LMR-CBT: learning modality-fused representations with CB-Transformer for multimodal emotion recognition from unaligned multimodal sequences
收藏 引用
Frontiers of Computer Science 2024年 第4期18卷 39-47页
作者: Ziwang FU Feng LIU Qing XU Xiangling FU Jiayin QI School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Beijing 100876China Shanghai International School of Chief Technology Officer East China Normal UniversityShanghai 200062China School of Computer Science and Technology East China Normal UniversityShanghai 200062China School of Cyberspace Security Guangzhou UniversityGuangdong 510006China
Learning modality-fused representations and processing unaligned multimodal sequences are meaningful and challenging in multimodal emotion *** approaches use directional pairwise attention or a message hub to fuse lan... 详细信息
来源: 评论
An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence Modeling  9
An Abnormal Behavior Detection Method Based on User Behavior...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhou, Yuting Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service China Beijing University of Posts and Telecommunications School of Cyberspace Security BUPT Beijing China Beihang University Intellectual Property Information Service Center BHU Beijing China Minzu University of China School of Information Engineering MUC Beijing China
The healthcare industry is one of the industries most affected by insider threats. At present, the mainstream abnormal behavior detection of internal threats has the problems of relatively single reference dimension o... 详细信息
来源: 评论
An IoT Device Recognition Method based on Convolutional Neural Network
An IoT Device Recognition Method based on Convolutional Neur...
收藏 引用
Neural Networks, Information and Communication Engineering (NNICE), International Conference on
作者: Minghao Lu Linghui Li Yali Gao Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Device recognition is the primary step toward a secure IoT system. However, the existing equipment recognition technology often faces the problems of unobvious data characteristics and insufficient training samples, r... 详细信息
来源: 评论
Encrypted Traffic Classification Model Based on SwinT-CNN
Encrypted Traffic Classification Model Based on SwinT-CNN
收藏 引用
International Conference on Computer Engineering and Applications (ICCEA)
作者: Yueyang Wang Yali Gao Xiaoyong Li Jie Yuan Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
With the rapid development of the network, the proportion of encrypted traffic in the network is increasing, which brings great challenges to traffic classification. The traditional encrypted traffic classification al...
来源: 评论
Improving Knowledge Distillation for Federated Learning on Non-IID Data
Improving Knowledge Distillation for Federated Learning on N...
收藏 引用
IEEE International Conference on Big Data
作者: Zongyi Chen Sanchuan Guo Liyan Shen Xi Zhang Zhuonan Chang Key Laboratory of Trustworthy Distributed Computing and Service (MOE) Beijing University of Posts and Telecommunications China
Federated learning (FL) leverages knowledge from decentralized clients to train a global model in a privacy-preserving manner. One of the critical challenges in FL is the heterogeneity of client local data (i.e. non-I...
来源: 评论