咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 196 篇 工学
    • 124 篇 计算机科学与技术...
    • 88 篇 软件工程
    • 61 篇 信息与通信工程
    • 43 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 21 篇 交通运输工程
    • 20 篇 生物工程
    • 19 篇 机械工程
    • 17 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 12 篇 电气工程
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
  • 90 篇 理学
    • 63 篇 数学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 7 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 22 篇 feature extracti...
  • 18 篇 semantics
  • 13 篇 security
  • 12 篇 optimization
  • 10 篇 task analysis
  • 10 篇 neural networks
  • 10 篇 cyberspace
  • 9 篇 conferences
  • 9 篇 real-time system...
  • 9 篇 data science
  • 9 篇 training
  • 8 篇 signal to noise ...
  • 8 篇 resource managem...
  • 8 篇 antennas
  • 8 篇 mimo
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 deep learning
  • 7 篇 simulation
  • 7 篇 mimo communicati...

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 36 篇 school of inform...
  • 30 篇 key laboratory o...
  • 21 篇 school of comput...
  • 18 篇 school of cybers...
  • 15 篇 beijing universi...
  • 13 篇 beijing universi...
  • 13 篇 key laboratory o...
  • 12 篇 ministry of educ...
  • 12 篇 school of softwa...
  • 10 篇 beijing universi...
  • 10 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 chinese academy ...
  • 8 篇 beijing digapis ...
  • 8 篇 school of cybers...
  • 8 篇 beijing universi...
  • 6 篇 key laboratory o...

作者

  • 44 篇 yueming lu
  • 36 篇 lu yueming
  • 28 篇 tiejun lv
  • 27 篇 xiaoyong li
  • 25 篇 hui gao
  • 24 篇 songlin sun
  • 24 篇 wu xu
  • 22 篇 xu wu
  • 21 篇 xiaojun jing
  • 17 篇 xiaqing xie
  • 16 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 lv tiejun
  • 13 篇 jingchen wu
  • 12 篇 hai huang
  • 12 篇 sun lijuan
  • 12 篇 binxing fang
  • 12 篇 xie xiaqing
  • 9 篇 qiao yaojun
  • 9 篇 fang binxing

语言

  • 359 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"机构=Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service"
375 条 记 录,以下是1-10 订阅
排序:
LayerCFL:an efcient federated learning with layer-wised clustering
收藏 引用
Cybersecurity 2025年 第1期8卷 72-85页
作者: Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina Institute of Computer Science Faculty of Mathematics and Computer ScienceUniversity of GoettingenGöettingenGermany School of Information Technology Henan University of Chinese MedicineZhengzhouHenanChina
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste... 详细信息
来源: 评论
A Multi-holder Role and Strange Attractor-Based Data Possession Proof in Medical Clouds  24th
A Multi-holder Role and Strange Attractor-Based Data Possess...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Guo, Jinyuan Sun, Lijuan Wu, Jingchen Chu, Chiawei Gao, Yutong Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cybersecurity Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance Ministry of Education Minzu University Beijing China Intellectual Property Information Service Center BHU Beihang University Beijing China City University of Macau Taipa China Li’an International Education Innovation Pilot Zone Hainan International College of Minzu University of China Hainan Beijing China
Proof of Data Possession is a technique for ensuring the integrity of data stored in cloud storage. However, most audit schemes assume only one role for data owners, which is not suitable for complex Smart Healthcare ... 详细信息
来源: 评论
Novelty Calculation in Imbalanced Dynamic Interconnected Specialized IoT Network Traffic
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fan, Mingrui Zuo, Jinxin Gao, Jiaqi He, Yaru Shi, Weidong Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing100876 China
Quantifying the deviation of testing samples from known benign traffic in the form of novelty scores is essential for identifying new malicious traffic and detecting concept drifts of benign traffic. Most existing sol... 详细信息
来源: 评论
Compositional Concept-Based Neuron-Level Interpretability for Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Zeyu Huang, Hai Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Services Ministry of Education Beijing China
Deep reinforcement learning (DRL), through learning policies or values represented by neural networks, has successfully addressed many complex control problems. However, the neural networks introduced by DRL lack inte... 详细信息
来源: 评论
Unveiling the secrets without data: can graph neural networks be exploited through data-free model extraction attacks?  24
Unveiling the secrets without data: can graph neural network...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Yuanxin Zhuang Chuan Shi Mengmei Zhang Jinghui Chen Lingjuan Lyu Pan Zhou Lichao Sun Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education The Pennsylvania State University SONY AI Huazhong University of Science and Technology Lehigh University
Graph neural networks (GNNs) play a crucial role in various graph applications, such as social science, biology, and molecular chemistry. Despite their popularity, GNNs are still vulnerable to intellectual property th...
来源: 评论
Ranking Modules for Integrate Testing Based on PageRank Algorithm
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 993-998页
作者: SUN Qi Krishna Ricky MONIZ YUAN Yuyu Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing University of Posts and Telecommunications
The testing industry need to prioritize the limited resources and focus on testing modules whose failure is mostly likely to cause *** paper discusses a method that can rank modules in a software package for integrate... 详细信息
来源: 评论
An Alternative-service Recommending Algorithm Based on Semantic Similarity
收藏 引用
China Communications 2017年 第8期14卷 124-136页
作者: Kun Guo Yonghua Li Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijingChina
With the development of the Internet of Things(Io T), people's lives have become increasingly convenient. It is desirable for smart home(SH) systems to integrate and leverage the enormous information available fro... 详细信息
来源: 评论
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective
收藏 引用
Frontiers of Computer Science 2016年 第3期10卷 518-531页
作者: Yuan SU Xi ZHANG Lixin LIU Shouyou SONG Binxing FANG Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationSchool of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China
Social networks are fundamental media for dif- fusion of information and contagions appear at some node of the network and get propagated over the edges. Prior re- searches mainly focus on each contagion spreading ind... 详细信息
来源: 评论
DropConnect Regularization Method with Sparsity Constraint for Neural Networks
收藏 引用
Chinese Journal of Electronics 2016年 第1期25卷 152-158页
作者: LIAN Zifeng JING Xiaojun WANG Xiaohan HUANG Hai TAN Youheng CUI Yuanhao Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications School of Software and Microelectronics Peking University
Drop Connect is a recently introduced algorithm to prevent the co-adaptation of feature *** to Dropout, Drop Connect gains state-of-the-art results on several image recognition benchmarks. Motivated by the success of ... 详细信息
来源: 评论
Comparison of three data mining methods in predicting 5-year survival of colorectal cancer patients
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第6期25卷 65-73页
作者: Luo Yan Sun Yawei Fu Qunchao Xue Tengfei Zhou Ping School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education
The prediction of colorectal cancer(CRC) survivability has always been a challenging research issue. Considering the importance of predicting CRC patients’ survival rates, we compared the performance of three data mi... 详细信息
来源: 评论