咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 108 篇 期刊文献

馆藏范围

  • 461 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 159 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
461 条 记 录,以下是111-120 订阅
排序:
Enhancing IoT Flow Anomaly Detection with Differential Optimal Feature Subspace
Enhancing IoT Flow Anomaly Detection with Differential Optim...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Weidong Shi Mingrui Fan Jiaqi Gao Jiahao Qi Daoqi Han Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education School of Cyberspace Security The State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
With the continuous expansion of network scale and increasing complexity, the application of the Internet of Things (IoT) is becoming more extensive. However, it is also vulnerable to various abnormal attacks, making ...
来源: 评论
Research on the Electric Energy Metering Data Sharing Method in Smart Grid Based on Blockchain
收藏 引用
Journal on Big Data 2023年 第1期5卷 57-67页
作者: Shaocheng Wu Honghao Liang Xiaowei Chen Tao Liu Junpeng Ru Qianhong Gong Jin Li Shenzhen Power Supply Co. Ltd.Shenzhen518001China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Beijing100876China
Enabling data sharing among smart grid power suppliers is a pressing challenge due to technical hurdles in verifying,storing,and synchronizing energy metering *** and sharing limitations are stringent for users,power ... 详细信息
来源: 评论
Knowledge-Enabled Intent-Driven Network Configuration Generation for 5G Core Networks
Knowledge-Enabled Intent-Driven Network Configuration Genera...
收藏 引用
International Conference on Communication Technology (ICCT)
作者: Qiuying Li Jiajun Cai Ji’ang Xu Ruosi Liu Caixia Yuan Hui Gao Key Laboratory of Trustworthy Distributed Computing and Service MOE Beijing University of Posts and Telecommunications Beijing China School of Artificial Intelligence Beijing University of Posts and Telecommunications Beijing China Huawei Technoligies Bantian Industrial Base Shenzhen China
Automating the configuration of 5G core networks (CNs) is crucial for meeting increasingly diverse and specialized application requirements. In this paper, we propose an intent-driven automation model for configuring ... 详细信息
来源: 评论
Improving Chinese Spelling Check by Character Pronunciation Prediction: The Effects of Adaptivity and Granularity
Improving Chinese Spelling Check by Character Pronunciation ...
收藏 引用
2022 Conference on Empirical Methods in Natural Language Processing, EMNLP 2022
作者: Li, Jiahao Wang, Quan Mao, Zhendong Guo, Junbo Yang, Yanyan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China People's Daily Online Co. Beijing China People's Public Security University of China Beijing China
Chinese spelling check (CSC) is a fundamental NLP task that detects and corrects spelling errors in Chinese texts. As most of these spelling errors are caused by phonetic similarity, effectively modeling the pronuncia... 详细信息
来源: 评论
Interpretable and Effective Reinforcement Learning for Attacking against Graph-based Rumor Detection
Interpretable and Effective Reinforcement Learning for Attac...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yuefei Lyu Xiaoyu Yang Jiaxin Liu Sihong Xie Philip Yu Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China Lehigh University Bethlehem USA University of Illinois at Chicago Chicago USA
Social networks are frequently polluted by rumors, which can be detected by advanced models such as graph neural networks. However, the models are vulnerable to attacks, and discovering and understanding the vulnerabi...
来源: 评论
Generalizing knowledge graph embedding with universal orthogonal parameterization  24
Generalizing knowledge graph embedding with universal orthog...
收藏 引用
Proceedings of the 41st International Conference on Machine Learning
作者: Rui Li Chaozhuo Li Yanming Shen Zeyu Zhang Xu Chen Gaoling School of Artificial Intelligence Renmin University of China Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (MOE) Beijing University of Posts and Telecommunications China School of Computer Science and Technology Dalian University of Technology China
Recent advances in knowledge graph embedding (KGE) rely on Euclidean/hyperbolic orthogonal relation transformations to model intrinsic logical patterns and topological structures. However, existing approaches are conf...
来源: 评论
Enhancement for Versatile Video Coding in Vehicular Ad Hoc Network Scenarios
Enhancement for Versatile Video Coding in Vehicular Ad Hoc N...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Jiacheng Wu Jiaqi Zou Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications (BUPT) Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Beijing China
Vehicular Ad hoc Network (VANET) allows infor-mation exchange between vehicles. In VANET, video is the most recommended medium for transmitting information. However, the characteristics of VANET and the requirements o... 详细信息
来源: 评论
Cooperative Spectrum Sensing Based on Centralized Double Threshold in MCN
收藏 引用
China Communications 2020年 第5期17卷 235-242页
作者: Hai Huang Junsheng Mu Xiaojun Jing School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing 100876China
Cooperative spectrum sensing appears popular currently due to its ability to solve the issue of hidden terminal and improve detection performance in Cognitive Radio Networks. Meanwhile, double threshold based energy d... 详细信息
来源: 评论
A Lightweight and Robust Cross-Domain Authentication Scheme Based on Master-Slave Blockchain
A Lightweight and Robust Cross-Domain Authentication Scheme ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Kaiyang Deng Yali Gao Jie Yuan Zihan Hou Xiaoyong Li Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education College of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
In the era of network informatization, the Internet of Things has more and more complex requirements for information interaction across trust domains, and cross-domain identity authentication has become the focus of r... 详细信息
来源: 评论
A DNS-based Data Exfiltration Traffic Detection Method for Unknown Samples  7
A DNS-based Data Exfiltration Traffic Detection Method for U...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Ruiling, Gan Jiawen, Diao Xiang, Cui Shouyou, Song QI-ANXIN Technology Group Beijing China Beijing University of Posts and Telecommunications Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Guangzhou University Cyberspace Institute Advanced Technology Guangzhou China Beijing DigApis Technology Co. Ltd Beijing China
The advanced persistent threat (APT) is one of the most serious threats to cyberspace security. Posting back of exfiltrated data by way of DNS covert channels has become increasingly popular among APT attackers. Early... 详细信息
来源: 评论