咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是151-160 订阅
排序:
Zero-Shot Detection of LLM-Generated Text using Token Cohesiveness
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Shixuan Wang, Quan MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The increasing capability and widespread usage of large language models (LLMs) highlight the desirability of automatic detection of LLM-generated text. Zero-shot detectors, due to their training-free nature, have rece... 详细信息
来源: 评论
Improving Knowledge Distillation for Federated Learning on Non-IID Data
Improving Knowledge Distillation for Federated Learning on N...
收藏 引用
IEEE International Conference on Big Data
作者: Zongyi Chen Sanchuan Guo Liyan Shen Xi Zhang Zhuonan Chang Key Laboratory of Trustworthy Distributed Computing and Service (MOE) Beijing University of Posts and Telecommunications China
Federated learning (FL) leverages knowledge from decentralized clients to train a global model in a privacy-preserving manner. One of the critical challenges in FL is the heterogeneity of client local data (i.e. non-I...
来源: 评论
Real Time Attrition Prediction Mechanism Based on Deep Learning
Real Time Attrition Prediction Mechanism Based on Deep Learn...
收藏 引用
Signal Processing, Communications and Engineering Management Conference (ISPCEM), International
作者: Chen Wu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Modern companies mostly have their own employee management systems, which retain a large amount of employee behavior data. These data can be used to mine valuable information, such as whether employees have attrition ... 详细信息
来源: 评论
A Lightweight Bit-Operation Abnormal Traffic Detection Method Based On XNOR-CNN
A Lightweight Bit-Operation Abnormal Traffic Detection Metho...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Yueqin Ge Xiaoyong Li Binsi Cai Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
The rapid development of the Internet and the increasingly complex structure of network space make the network security situation more and more serious. Abnormal traffic detection is an important part of network intru... 详细信息
来源: 评论
Towards Accurate and Efficient Super Spreader Detection with Sketching  8
Towards Accurate and Efficient Super Spreader Detection with...
收藏 引用
8th International Conference on Data Science in Cyberspace, DSC 2023
作者: Song, Shouyou Wang, Pu Li, Yangchun Wang, Nanyang Jiang, Wei Bupt Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Chinese Academy of Cyberspace Studies Beijing China Bupt Beijing China School of Computer and Information Engineering Chuzhou University Anhui China
Super spreaders are the flow that have a large number of distinct connections (also called spread), which related with many threats to networks. Estimating flow spread is the crucial step in super spreader detection. ... 详细信息
来源: 评论
QPSK pilot-aided carrier phase recovery algorithm for 800-Gb/s/? DP-256QAM transmission
QPSK pilot-aided carrier phase recovery algorithm for 800-Gb...
收藏 引用
2020 Asia Communications and Photonics Conference, ACPC 2020/International Conference on Information Photonics and Optical Communications, IPOC 2020
作者: Cui, Han Xu, Xuekai Liu, Shuangyue Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
A QPSK pilot-aided carrier phase recovery algorithm is investigated for 800-Gb/s/? DP-256QAM transmission systems. Simulation results show that, compared with BPS, this proposed algorithm reduces by 99% computational ... 详细信息
来源: 评论
APPLIED RESEARCH ON VISUAL MINING TECHNOLOGY IN MEDICAL DATA
APPLIED RESEARCH ON VISUAL MINING TECHNOLOGY IN MEDICAL DATA
收藏 引用
2016 4th IEEE International Conference on Cloud computing and Intelligence Systems(IEEE CCIS2016)
作者: Chunshan Wu Yongqiang Weng Qiaowei Jiang Wenming Guo Cong Wang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Software Engineering Beijing University of Post and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of AutomationBeijing University of Post and Telecommunications
Data mining is a process of discovering information from large datasets by using automated algorithms, which makes it difficult for users to intuitively understand, explore and optimize the datasets and algorithms pro... 详细信息
来源: 评论
Research on discrete emotion classification of Chinese online product reviews based on OCC model  3
Research on discrete emotion classification of Chinese onlin...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Liu, Lina Qi, Jiayin School of Economics and Management Key Laboratory of Trustworthy Distributed Computing and Service School of Ethnic Minority Education Beijing University of Posts and Telecommunication Beijing China School of Management Shanghai University of International Business and Economics Shanghai China
There are many rich and multi-dimensional discrete emotional information in online reviews. The research of discrete emotion analysis in English online reviews is relatively early and has made some achievements, but t... 详细信息
来源: 评论
Knowledge-based information security risk assessment method
收藏 引用
Journal of China Universities of Posts and Telecommunications 2013年 第SUPPL -2期20卷 60-63页
作者: Guan, Ji-Zheng Lei, Ming-Tao Zhu, Xiao-Lu Liu, Jian-Yi GDS Services Ltd. Beijing 100016 China Automation School Beijing University of Posts and Telecommunications Beijing 100876 China School of Computer Science Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing 100876 China
It is an important function for managers to keep away from information security risks. With the increasing complex and scale of information systems, information system security risks may be more difficult to assess an... 详细信息
来源: 评论
RBCP: A Reputation-based Blockchain Consensus Protocol for Internet of Things  24
RBCP: A Reputation-based Blockchain Consensus Protocol for I...
收藏 引用
24th IEEE International Conference on High Performance computing and Communications, 8th IEEE International Conference on Data Science and Systems, 20th IEEE International Conference on Smart City and 8th IEEE International Conference on Dependability in Sensor, Cloud and Big Data Systems and Application, HPCC/DSS/SmartCity/DependSys 2022
作者: Shang, Jiaze Lu, Tianbo Cai, Yingjie Luo, Shuang Jin, Zhaoxin School of Computer Science National Pilot Software Enginerring School Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
The application of blockchain in the Internet of Things (IoT) solves the problem of centralization, enables data interaction of IoT nodes in untrusted environments. However, most of the blockchain consensus protocols ... 详细信息
来源: 评论