咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是111-120 订阅
排序:
Multi-features based classification for automatic summarization
Multi-features based classification for automatic summarizat...
收藏 引用
International Conference on Multimedia, Communication and computing Application, MCCA 2014
作者: Li, H.Y. Liu, R.F. Xu, W.R. Shi, R.S. School of Information and Communication Engineering Beijing University of Posts and Telecommunication Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service BUPT School of Humanities BUPT Beijing China
That the summary of an article can be automatically generated is an important text processing technique. The technique can automatically extract the most useful information of the text and present that information, wh... 详细信息
来源: 评论
AABN: Anonymity Assessment Model Based on Bayesian Network With Application to Blockchain
收藏 引用
China Communications 2019年 第6期16卷 55-68页
作者: Tianbo Lu Ru Yan Min Lei Zhimin Lin School of Software Engineering Beijing University of Posts and Telecommunications100876 BeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(Beijing University of Posts and Telecommunications) Ministry of Education100876 BeijingChina Information Security Center School of Cyberspace SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like *** anonymity of block... 详细信息
来源: 评论
Two-Stream Convolutional Neural Network for Action Recognition in Radar  6th
Two-Stream Convolutional Neural Network for Action Recogniti...
收藏 引用
6th Conference on Signal and Information Processing, Networking and Computers, ICSINC 2019
作者: Zhou, Hao He, Yuan Huang, Hai Jing, Xiaojun Laboratory of Biological Recognition and Information Application Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China
In the domain of human action classification, information obtained by optical equipment is used as the input source in most case. However, these optical devices are often affected by environmental factors, which bring... 详细信息
来源: 评论
Hot event detection for social media based on keyword semantic information  4
Hot event detection for social media based on keyword semant...
收藏 引用
4th IEEE International Conference on Data Science in Cyberspace, DSC 2019
作者: Yu, Zexuan Wu, Xu Xie, Xiaqing Xu, Jin Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Statistical features are commonly used to detect hot events in social media. However, these features cannot represent the semantic similarity of synonym expression. Aiming at this problem, a semantic keyword-based hot... 详细信息
来源: 评论
A Multi-Objective Emergency Resource Scheduling Method Based on MOEA/D  19
A Multi-Objective Emergency Resource Scheduling Method Based...
收藏 引用
Proceedings of the 2019 2nd International Conference on Algorithms, computing and Artificial Intelligence
作者: Yanrong Li Xiaoyong Li Liyang Hou Wenping Kong Wenxue Ma Key Laboratory of Trustworthy Distributed Computing and Servic Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory For Integrated Command And Dispatch Technology Beijing China
After unconventional events occur, rapid emergency response is often needed in order to reduce losses. When there are more than one disaster points and more than one supply points, how to coordinate the local dispatch... 详细信息
来源: 评论
A deepfake video detection method based on multi-modal deep learning method
A deepfake video detection method based on multi-modal deep ...
收藏 引用
作者: Yutong Zhang Xiaoyong Li Jie Yuan Yali Gao Linghui Li Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications
Recently,most deepfake video classification tasks depend on frame-level features and try to train deep neural networks to characterize fake *** this kind of methods can achieve good results,they also waste the audio i... 详细信息
来源: 评论
Multi-objective Explanations of GNN Predictions
Multi-objective Explanations of GNN Predictions
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Yifei Liu Chao Chen Yazheng Liu Xi Zhang Sihong Xie Key Laboratory of Trustworthy Distributed Computing and Service (MoE) BUPT Lehigh University
Graph Neural Network (GNN) has achieved state-of-the-art performance in various high-stake prediction tasks, but multiple layers of aggregations on graphs with irregular structures make GNN a less interpretable model.... 详细信息
来源: 评论
Deep learning based primary user classification in Cognitive Radios
Deep learning based primary user classification in Cognitive...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Yuanhao Cui Xiao jun Jing Songlin Sun Xiaohan Wang Dongmei Cheng Hai Huang Key Laboratory of Trustworthy Distributed Computing and service (BUPT) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and service (BUPT) Beijing University of Posts and Telecommunications Beijing Beijing CN Key Laboratory of Trustworthy Distributed Computing and service (BUPT) School of Software and Microelectronics Beijing China
Deep Belief Networks (DBN) is a very powerful algorithm in deep learning. The DBN has been effectively applied in many areas of machine learning, such as computer vision (CV) and natural language processing (NLP). Wit... 详细信息
来源: 评论
Research on improve topic representation over short text  3
Research on improve topic representation over short text
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Li, Lingyun Sun, Yawei Han, Xu Wang, Cong Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing100876 China School of Software Engineering Beijing University of Posts and Telecommunications Beijing100876 China
According to the characteristics of sparseness, poor focus and lack of semantic information in short text, the existing studies mainly improved the topic representation from two aspects: Adjusting the structure of the... 详细信息
来源: 评论
An AdamW-Based Deep Neural Network Using Feature Selection and Data Oversampling for Intrusion Detection
An AdamW-Based Deep Neural Network Using Feature Selection a...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Zhuoer Lu Xiaoyong Li Pengfei Qiu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China
With the development of the Internet and the increasing number of Internet users, cyber security has become a major concern for most netizens. In this paper, we propose an AdamW-based neural network using feature sele...
来源: 评论