咨询与建议

限定检索结果

文献类型

  • 377 篇 会议
  • 118 篇 期刊文献

馆藏范围

  • 495 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 252 篇 工学
    • 174 篇 计算机科学与技术...
    • 127 篇 软件工程
    • 84 篇 信息与通信工程
    • 48 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 机械工程
    • 21 篇 交通运输工程
    • 19 篇 网络空间安全
    • 18 篇 仪器科学与技术
    • 15 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
  • 101 篇 理学
    • 67 篇 数学
    • 27 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 18 篇 物理学
    • 8 篇 化学
    • 6 篇 系统科学
  • 79 篇 管理学
    • 46 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 5 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 17 篇 training
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 security
  • 14 篇 optimization
  • 13 篇 deep learning
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 complexity theor...

机构

  • 90 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 39 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of softwa...
  • 17 篇 school of cybers...
  • 16 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 11 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 46 篇 yueming lu
  • 42 篇 tiejun lv
  • 39 篇 hui gao
  • 38 篇 xiaoyong li
  • 32 篇 lu yueming
  • 28 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 wu jingchen
  • 14 篇 gao hui
  • 14 篇 hai huang
  • 14 篇 lv tiejun
  • 14 篇 li xiaoyong
  • 13 篇 zuo xingquan
  • 13 篇 binxing fang
  • 13 篇 wang quan

语言

  • 449 篇 英文
  • 35 篇 其他
  • 16 篇 中文
检索条件"机构=Key Lab of Trustworthy Distributed Computing and Service"
495 条 记 录,以下是61-70 订阅
排序:
RL-MSA: a Reinforcement Learning-based Multi-line bus Scheduling Approach
arXiv
收藏 引用
arXiv 2024年
作者: Liu, Yingzhuo Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China
Multiple Line Bus Scheduling Problem (MLBSP) is vital to save operational cost of bus company and guarantee service quality for passengers. Existing approaches typically generate a bus scheduling scheme in an offline ... 详细信息
来源: 评论
Multi-Agent Trust Evaluation Model based on Reinforcement Learning  8
Multi-Agent Trust Evaluation Model based on Reinforcement Le...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Haoran, Jia Yuyu, Yuan Qiang, Han Pengqian, Zhao Ting, Guo Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The establishment of trust between agents is an important part of Multi-agent Reinforcement Learning (MARL). Recent studies on multi-agents have paid more attention to the game relationship between agents, ignoring tr... 详细信息
来源: 评论
DACTI: a Generation-Based Data Augmentation Method for Cyber Threat Intelligence
DACTI: a Generation-Based Data Augmentation Method for Cyber...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Jingbing Chen Yali Gao Xiaoyong Li Key Lab of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Methods of data augmentation are extensively utilized to boost the efficacy of machine learning, given their superior capability in promoting generalization performance. In this paper, we address the issue of data sca...
来源: 评论
A Novel Evolutionary Neural Network-based Approach for Online Bus Scheduling
A Novel Evolutionary Neural Network-based Approach for Onlin...
收藏 引用
IEEE International Conference on Networking, Sensing and Control
作者: Wenyang Tian Feiyang Wang Xingquan Zuo School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Bus scheduling is vital to ensure service quality and save operational costs. Current studies typically consider the problem as an optimization problem and solve it using exact or heuristic approaches. In this paper, ... 详细信息
来源: 评论
Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog Websites  6
Graph Neural Network Based User Group Comments Interaction B...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Chen, Yisen Wu, Xu Xie, Xiaqing Wu, Jingchen Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trustworthy Distributed Computing And Service Beijing China
The interactive behavior of comments within the user group on microblog website is bidirectional and dynamic, reflecting the level of familiarity among users. Predicting the future comment interaction behavior within ... 详细信息
来源: 评论
Video Emotional Classification Based on Deep Reinforcement Learning
Video Emotional Classification Based on Deep Reinforcement L...
收藏 引用
Communications Technology and Computer Science (ACCTCS), Asia-Pacific Conference on
作者: Tingting Yuan Yuyu Yuan Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
We perform video emotion classification based on deep reinforcement learning, simulate the process of a human watching video and getting the emotional expression, and find a way to combine reinforcement learning algor...
来源: 评论
OptimizeLog: Log Anomaly Detection and Localization based on Optimized Log Parsing in distributed Systems
OptimizeLog: Log Anomaly Detection and Localization based on...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Yanjie Sun Yali Gao Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Modern distributed systems generate interleaved logs when performing parallel operations, and these logs become an important basis for anomaly detection and localization. To achieve more robust and accurate log anomal...
来源: 评论
Clean-label Poisoning Attack against Fake News Detection Models
Clean-label Poisoning Attack against Fake News Detection Mod...
收藏 引用
IEEE International Conference on Big Data
作者: Jiayi Liang Xi Zhang Yuming Shang Sanchuan Guo Chaozhuo Li Key Laboratory of Trustworthy Distributed Computing and Service (MOE) Beijing University of Posts and Telecommunications Beihang University Beijing China
Researching data poisoning attacks against fake news detection models is crucial for bolstering their robustness and curbing the dissemination of fake news. Existing textual data poisoning attacks necessitate control ...
来源: 评论
A Novel Low-Complexity Angle-Assisted Delay and Doppler Estimation for MIMO-OTFS
A Novel Low-Complexity Angle-Assisted Delay and Doppler Esti...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Weixin Deng Hui Gao Ruohan Cao Xinzhou Cheng Key Laboratory of Trustworthy Distributed Computing and Service MOE Beijing University of Posts and Telecommunications Beijing China China Unicom Research Institute Beijing China
Multiple-input multiple-output orthogonal time frequency space (MIMO-OTFS) is considered one of the potential technologies for high-speed mobile scenarios. However, in such systems, fractional delay and Doppler estima... 详细信息
来源: 评论
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism  6
Insider Threat Detection Based on User Historical Behavior a...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: He, Weiyu Wu, Xu Wu, Jingchen Xie, Xiaqing Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trustworthy Distributed Computing And Service Beijing China
Insider threat makes enterprises or organizations suffer from the loss of property and the negative influence of reputation. User behavior analysis is the mainstream method of insider threat detection, but due to the ... 详细信息
来源: 评论