咨询与建议

限定检索结果

文献类型

  • 293 篇 会议
  • 92 篇 期刊文献

馆藏范围

  • 385 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 206 篇 工学
    • 132 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 61 篇 信息与通信工程
    • 44 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 21 篇 交通运输工程
    • 20 篇 生物工程
    • 19 篇 机械工程
    • 17 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 14 篇 电气工程
    • 10 篇 安全科学与工程
    • 8 篇 光学工程
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 3 篇 土木工程
    • 3 篇 航空宇航科学与技...
    • 3 篇 生物医学工程(可授...
  • 91 篇 理学
    • 64 篇 数学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 7 篇 化学
    • 5 篇 系统科学
  • 59 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 22 篇 feature extracti...
  • 18 篇 semantics
  • 13 篇 security
  • 12 篇 optimization
  • 10 篇 task analysis
  • 10 篇 neural networks
  • 10 篇 cyberspace
  • 9 篇 conferences
  • 9 篇 real-time system...
  • 9 篇 data science
  • 9 篇 training
  • 8 篇 signal to noise ...
  • 8 篇 resource managem...
  • 8 篇 antennas
  • 8 篇 mimo
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 deep learning
  • 7 篇 simulation
  • 7 篇 mimo communicati...

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 36 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 18 篇 school of cybers...
  • 17 篇 beijing universi...
  • 13 篇 beijing universi...
  • 13 篇 key laboratory o...
  • 12 篇 ministry of educ...
  • 12 篇 school of softwa...
  • 10 篇 beijing universi...
  • 10 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 chinese academy ...
  • 8 篇 beijing digapis ...
  • 8 篇 school of cybers...
  • 8 篇 beijing universi...
  • 7 篇 key laboratory o...

作者

  • 44 篇 yueming lu
  • 36 篇 lu yueming
  • 28 篇 tiejun lv
  • 27 篇 xiaoyong li
  • 25 篇 hui gao
  • 24 篇 songlin sun
  • 24 篇 wu xu
  • 22 篇 xu wu
  • 21 篇 xiaojun jing
  • 17 篇 xiaqing xie
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 13 篇 lv tiejun
  • 13 篇 jingchen wu
  • 12 篇 hai huang
  • 12 篇 sun lijuan
  • 12 篇 binxing fang
  • 12 篇 xie xiaqing
  • 9 篇 qiao yaojun
  • 9 篇 fang binxing

语言

  • 361 篇 英文
  • 15 篇 其他
  • 12 篇 中文
检索条件"机构=Key Laboratory of Ministry of Education and Trustworthy Distributed Computing and Service"
385 条 记 录,以下是1-10 订阅
排序:
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2625-2646页
作者: Mingliang Sun Jie Yuan Xiaoyong Li Dongxiao Liu Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... 详细信息
来源: 评论
Game-theoretic private blockchain design in edge computing networks
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1622-1634页
作者: Daoqi Han Yang Liu Fangwei Zhang Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications(BUPT)Beijing 100876China Beijing Institute of Astronautical Systems Engineering BeijingChina Beijing Institute of Technology BeijingChina
Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the partic... 详细信息
来源: 评论
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis  9
Modification Method for Internal Network Flow Anomaly Detect...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhang, Xinyu Ding, Junmei Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a... 详细信息
来源: 评论
An efficient confidentiality protection solution for pub/sub system
收藏 引用
Cybersecurity 2023年 第4期6卷 14-25页
作者: Jinglei Pei Yuyang Shi Qingling Feng Ruisheng Shi Lina Lan Shui Yu Jinqiao Shi Zhaofeng Ma Beijing University of Posts and Telecommunications Beijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina School of Computer Science University of Technology SydneySydneyNSWAustralia
Publish/subscribe(pub/sub)systems are widely used in large-scale messaging systems due to their asynchronous and decoupled *** the population of pub/sub cloud services,the privacy protection problem of pub/sub systems... 详细信息
来源: 评论
A Novel Evolutionary Neural Network-based Approach for Online Bus Scheduling  21
A Novel Evolutionary Neural Network-based Approach for Onlin...
收藏 引用
21st International Conference on Networking, Sensing and Control, ICNSC 2024
作者: Tian, Wenyang Wang, Feiyang Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Bus scheduling is vital to ensure service quality and save operational costs. Current studies typically consider the problem as an optimization problem and solve it using exact or heuristic approaches. In this paper, ... 详细信息
来源: 评论
Framework for understanding intention-unbreakable malware
收藏 引用
Science China(Information Sciences) 2023年 第4期66卷 174-192页
作者: Tiantian JI Binxing FANG Xiang CUI Zhongru WANG Peng LIAO Shouyou SONG Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education Beijing University of Posts and Telecommunications Cyberspace Institute of Advanced Technology Guangzhou University Chinese Academy of Cyberspace Studies Beijing Dig Apis Technology Co. Ltd.
The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware writers continually employ sophisticated anti-reverse engineering tech... 详细信息
来源: 评论
LRChain:data protection and sharing method of learning archives based on consortium blockchain
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第4期31卷 28-42页
作者: Lan Lina Gao Yuhan Shi Ruisheng Wu Fenfen School of Humanities Beijing University of Posts and TelecommunicationsBeijing 100876China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsMinistry of EducationBeijing 100876China
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing *** address these issues,this paper proposes LRChain,a method based on consor... 详细信息
来源: 评论
Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception  9
Reliability Measurement Of Vehicle Sensor Data Based On Hist...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Guo, Chenqing Zuo, Jinxin Lu, Yueming Xie, Weixuan Beijing University of Posts and Telecommunications School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
On-board sensors are utilized for monitoring and collecting a diverse range of data pertaining to the vehicle and its surroundings. However, in the field of Internet of Vehicles, security threats encountered by vehicl... 详细信息
来源: 评论
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for Transfer Learning  8
SSDAEE: Semi-Supervised Data-Augmented Event Extraction for ...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Shen, Yueyue Song, Feifan Wu, Jingchen Wu, Xu School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Economics and Finance Changchun Finance College Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Jilin China School of Computer Science Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Although the general event extraction model has achieved good results in the standard data sets, there is a gap in the extraction results in low-resource environments. The general event extraction model still has room... 详细信息
来源: 评论
An Unsupervised Graph Embedding Method Based on Dynamic Graph Attention Networks and Infomax for Link Prediction  8
An Unsupervised Graph Embedding Method Based on Dynamic Grap...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Lu, Jingzhu Song, Feifan Wu, Jingchen Wu, Xu School of Cyberspace Security Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Economics and Finance Changchun Finance College Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Jilin China School of Computer Science Beijing University of Posts and Telecommunications Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Due to the lack of labeled data in many real-world scenarios, Graph Neural Network models that require a large volume of labeled data are not effective, and research based on unsupervised learning frameworks has becom... 详细信息
来源: 评论