咨询与建议

限定检索结果

文献类型

  • 374 篇 会议
  • 119 篇 期刊文献

馆藏范围

  • 493 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 251 篇 工学
    • 173 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 82 篇 信息与通信工程
    • 47 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 100 篇 理学
    • 66 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 16 篇 training
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 89 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 33 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 gao hui
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 455 篇 英文
  • 27 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
493 条 记 录,以下是51-60 订阅
排序:
A Lightweight Bit-Operation Abnormal Traffic Detection Method Based On XNOR-CNN
A Lightweight Bit-Operation Abnormal Traffic Detection Metho...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Yueqin Ge Xiaoyong Li Binsi Cai Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
The rapid development of the Internet and the increasingly complex structure of network space make the network security situation more and more serious. Abnormal traffic detection is an important part of network intru... 详细信息
来源: 评论
AutoGuard: A Secure Implementation of the Conditional Branch Instruction
AutoGuard: A Secure Implementation of the Conditional Branch...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Zeru Lan Chunlu Wang Pengfei Qiu Yu Jin Yihao Yang Dongsheng Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Zhongguancun Laboratory Tsinghua University University of Maryland College Park
Side-channels are one of the major security threats to processors, which use the unintentional leakage of time, power consumption, and electromagnetic radiation from computers as a basis for obtaining important secret... 详细信息
来源: 评论
A deepfake video detection method based on multi-modal deep learning method  2
A deepfake video detection method based on multi-modal deep ...
收藏 引用
2nd International Conference on Electronics, Communications and Information Technology, CECIT 2021
作者: Zhang, Yutong Li, Xiaoyong Yuan, Jie Gao, Yali Li, Linghui Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Recently, most deepfake video classification tasks depend on frame-level features and try to train deep neural networks to characterize fake videos. Although this kind of methods can achieve good results, they also wa... 详细信息
来源: 评论
Violence Detection In Videos via Motion-Guided Global and Local Views  8
Violence Detection In Videos via Motion-Guided Global and Lo...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Su, Ning Sun, Lijuan Gao, Yutong Wu, Jingchen Wu, Xu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security Bupt China School of Economics and Management Beijing University of Posts and Telecommunications Beijing China Beijing Jiaotong University Beijing Key Lab of Traffic Data Analysis and Mining Beijing China Bupt China
Video violence detection aims to locate the time window in which violent behavior occurs. Most methods focus on utilizing RGB features directly or only fusing RGB and audio features, ignoring the effective exploitatio... 详细信息
来源: 评论
EFM: A Negative Network Public Opinion Early Warning Model Based on Evolutionary Feature Mining  8
EFM: A Negative Network Public Opinion Early Warning Model B...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Meng, Fanfeixue Wu, Jingchen Song, Feifan Wu, Xu Hu, Lan Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security Bupt China Beijing University of Posts and Telecommunications Beijing China Bupt China School of Economics and Finance Changchun Finance College China
With the popularity of the Internet and the increase in the number of netizens, it is of great significance to effectively monitor and predict the negative network public opinion on social media platforms. Most mainst... 详细信息
来源: 评论
A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State Transitions  9
A Method for Generating Medical Text Data by Integrating Spa...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Yang, Xu Sun, Lijuan Gao, Yutong Guo, Sanchuan Wu, Xu Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Beijing University of Posts and Telecommunications School of Cyberspace Security BUPT Beijing China Beihang University Intellectual Property Information Service Center Beijing China Minzu University of China School of Information Engineering China
This study aims to generate medical text data that integrates spatiotemporal attributes to solve the problems of small size and low availability of open source text datasets due to the privacy of medical data. This pa... 详细信息
来源: 评论
Characterizing Developers' Behaviors in LLM -Supported Software Development
Characterizing Developers' Behaviors in LLM -Supported Softw...
收藏 引用
IEEE Annual International Computer Software and Applications Conference (COMPSAC)
作者: Wei Wang Huilong Ning Shuo Qian Gaowei Zhang Yi Wang Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
The emergence of large language models (LLMs) represented by ChatGPT has profoundly influenced the conventional software development process. Nevertheless, there is little research on how developers interact with LLMs... 详细信息
来源: 评论
An Effective Cloud Workflow Scheduling Approach Combining PSO and Idle Time Slot-Aware Rules
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第5期8卷 1079-1094页
作者: Yun Wang Xingquan Zuo the School of Computing Science Beijing University of Posts and TelecommunicationsBeijing 100876China the School of Information Engineering Nanchang Institute of TechnologyNanchang 330099China the Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing 100876China
Workflow scheduling is a key issue and remains a challenging problem in cloud *** with the large number of virtual machine(VM)types offered by cloud providers,cloud users need to choose the most appropriate VM type fo... 详细信息
来源: 评论
Communication Encryption Scheme of 5G Power Trading Private Network Based on Dynamic key  2
Communication Encryption Scheme of 5G Power Trading Private ...
收藏 引用
2nd Asia Conference on Electrical, Power and Computer Engineering, EPCE 2023
作者: Zhou, Rui Song, Yiyang Xu, Ying Harbin Institute of Technology Electrical Engineering and Automation School Harbin China Guangdong Power Exchange Center Information Data Department Guangzhou China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Security has been the primary concern for the 5G power trading private network, which involves a large amount of power trading information. The communication must be encrypted to prevent the leakage of important infor... 详细信息
来源: 评论
RL-MSA: a Reinforcement Learning-based Multi-line bus Scheduling Approach
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yingzhuo Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China
Multiple Line Bus Scheduling Problem (MLBSP) is vital to save operational cost of bus company and guarantee service quality for passengers. Existing approaches typically generate a bus scheduling scheme in an offline ... 详细信息
来源: 评论