咨询与建议

限定检索结果

文献类型

  • 356 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 80 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 16 篇 xi zhang
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 447 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
465 条 记 录,以下是181-190 订阅
排序:
Enabling Media-Based Modulation for Reconfigurable Intelligent Surface Communications
Enabling Media-Based Modulation for Reconfigurable Intellige...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Yang Yan Yashuai Cao Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Reconfigurable intelligent surface (RIS) is highly promising to be applied to enable media-based modulation (MBM) transmissions, which is expected to greatly reduce the hardware cost at the transmitter. In this paper,... 详细信息
来源: 评论
Coordinate Attention-Based Convolution Neural Network for In-loop Filter of AVS3
Coordinate Attention-Based Convolution Neural Network for In...
收藏 引用
International Symposium on Communications and Information Technologies (ISCIT)
作者: Ruotong Wu Songlin Sun Jiaqi Zou Shaokang Wang Zhilei Ling School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK
Employing deep learning is a promising solution for reducing encoding bit rate in future video encoding systems. This paper proposes a neural network-based in-loop filter for the third generation of Audio Video Coding...
来源: 评论
A Double-Shell Structured Ransomware Defense Method Tailored for the RaaS Model  3rd
A Double-Shell Structured Ransomware Defense Method Tailored...
收藏 引用
3rd International Conference on Cyberspace Simulation and Evaluation, CSE 2024
作者: Chen, Monan Ji, Tiantian Li, Shudong Zhang, Yuntao Wang, Tian Mao, Kai Sun, Yanwei Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China Peng Cheng Laboratory Shenzhen China Zhongguancun Laboratory Beijing China
Ransomware attacks have become a significant cybersecurity threat, with the Ransomware as a service (RaaS) paradigm enabling attackers with limited technical expertise to launch sophisticated campaigns. There is curre... 详细信息
来源: 评论
A New Semantic Segmentation Diagram for Intelligent Transportation Based on Heterogeneous Knowledge Base
A New Semantic Segmentation Diagram for Intelligent Transpor...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Jingyuan Tang Jiaqi Zou Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education China Engineering Research Center of Blockchain and Network Convergence Technology Ministry of Education China Department of Electronics and Electrical Engineering University College London London UK
Semantic segmentation is regarded as an important technology for future communication and sensing networks due to its promising ability to extract features of transmit data. It integrates the functionality of computer... 详细信息
来源: 评论
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism
From Passive to Active: Near-optimal DNS-based Data Exfiltra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Jiawen Diao Binxing Fang Xiang Cui Zhongru Wang Tian Wang Shouyou Song Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Ministry of Education Beijing China Zhongguancun Laboratory Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
DNS-based data exfiltration has become increasingly popular among advanced persistent threat (APT) attackers owing to the ubiquity and penetrability of the DNS protocol. AI-powered methods solve the defect that attack... 详细信息
来源: 评论
Chinese Open Relation Extraction with Pointer-Generator Networks
Chinese Open Relation Extraction with Pointer-Generator Netw...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Ziheng Cheng Xu Wu Xiaqing Xie Jingchen Wu Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b...
来源: 评论
Real-time Event Detection and Tracking in Microblog via Text Chain and Sentiment time series
Real-time Event Detection and Tracking in Microblog via Text...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Bingxu Piao Xu Wu Jingchen Wu Xiaqing Xie Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education
Microblog becomes one of the most popular media for sharing first-hand information. As more close to real event, detecting and tracking event in microblogs is a research hotspot. To alleviate feature sparsity problem,...
来源: 评论
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Sy...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Panyu Wu Zhenfu Cao Jiachen Shen Xiaolei Dong Yihao Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan
Since data outsourcing poses privacy concerns with data leakage, searchable symmetric encryption (SSE) has emerged as a powerful solution that enables clients to perform query operations on encrypted data while preser...
来源: 评论
A microservice based generic consensus engine for BaaS
A microservice based generic consensus engine for BaaS
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Huiyang Li Xu Zhang Jing Li Dongbin Wang Beijing University of Posts and Telecommunications Beijing China School of Cyber Security National Engineering Laboratory for Mobile Network Security Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing Tongbang Zhuoyi Technology Co. Ltd
Blockchain-as-a-service (BaaS) has gradually serve as an infrastructure, providing underlying blockchain services for the rapid deployment and transaction on-chain of large-scale enterprise application scenarios. By h... 详细信息
来源: 评论
Linear uncertainty quantification of graphical model inference  24
Linear uncertainty quantification of graphical model inferen...
收藏 引用
Proceedings of the 38th International Conference on Neural Information Processing Systems
作者: Chenghua Guo Han Yu Jiaxin Liu Chao Chen Qi Li Sihong Xie Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service (MoE) Beijing University of Posts and Telecommunications China College of Artificial Intelligence Beijing University of Posts and Telecommunications China Department of Computer Science and Engineering Lehigh University School of Computer Science and Technology Harbin Institute of Technology (Shenzhen) China Department of Computer Science Iowa State University AI Thrust The Hong Kong University of Science and Technology (Guangzhou) China
Uncertainty Quantification (UQ) is vital for decision makers as it offers insights into the potential reliability of data and model, enabling more informed and risk-aware decision-making. Graphical models, capable of ...
来源: 评论