咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是211-220 订阅
排序:
A High-performance Web Attack Detection Method based on CNN-GRU Model
A High-performance Web Attack Detection Method based on CNN-...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Qiangqiang Niu Xiaoyong Li Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China
WEB attack detection is an important part of WEB security. This paper proposes a web attack detection method based on Convolutional Neural Network (CNN) combined with Gated Recurrent Unit (GRU). In order to improve th...
来源: 评论
Comprehensive Information Security Evaluation Model Based on Multi-Level Decomposition Feedback for IoT
收藏 引用
Computers, Materials & Continua 2020年 第10期65卷 683-704页
作者: Jinxin Zuo Yueming Lu Hui Gao Ruohan Cao Ziyv Guo Jim Feng School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China School of Information and Communication Engineering Beijing University of Posts and Telecommunica-tionsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing100876China Amphenol Global Interconnect Systems San JoseCA 95131USA
The development of the Internet of Things(IoT)calls for a comprehensive in-formation security evaluation framework to quantitatively measure the safety score and risk(S&R)value of the network *** this paper,we sum... 详细信息
来源: 评论
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI C...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Yihao Yang Xiaolei Dong Jiachen Shen Zhenfu Cao Yunbo Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Zongyang Hou Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan Print-Rite Technology Development Co. Ltd. Of Zhuhai China
Private Set Intersection (PSI) is one of the most important functions in secure multiparty computation (MPC). PSI protocols have been a practical cryptographic primitive and there are many privacy-preserving applicati...
来源: 评论
An Improved Multi-objective Evolutionary Algorithm Based on Gaussian Distribution Estimation
An Improved Multi-objective Evolutionary Algorithm Based on ...
收藏 引用
作者: Li-yang HOU Xiao-yong LI Yan-rong LI Wen-ping KONG Hai-feng CHANG Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications
When an emergency occurs, how to specify a reasonable resource scheduling scheme significantly affects disaster relief efficiency. However, most actual existing schemes lack considering satisfaction of potential disas... 详细信息
来源: 评论
PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph
PDG2Vec: Identify the Binary Function Similarity with Progra...
收藏 引用
IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Yuntao Zhang Yanhao Wang Yuwei Liu Zhengyuan Pang Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China QI-ANXIN Technology Group Inc. Beijing China Chinese Academy of Sciences Institute of Software Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Binary code similarity identification is an important technique applied to many security applications (e.g., plagiarism detection, bug search). The primary challenge of this research topic is how to extract sufficient... 详细信息
来源: 评论
QPSK pilot-aided carrier phase recovery algorithm for 800-Gb/s/? DP-256QAM transmission
QPSK pilot-aided carrier phase recovery algorithm for 800-Gb...
收藏 引用
2020 Asia Communications and Photonics Conference, ACPC 2020/International Conference on Information Photonics and Optical Communications, IPOC 2020
作者: Cui, Han Xu, Xuekai Liu, Shuangyue Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
A QPSK pilot-aided carrier phase recovery algorithm is investigated for 800-Gb/s/? DP-256QAM transmission systems. Simulation results show that, compared with BPS, this proposed algorithm reduces by 99% computational ... 详细信息
来源: 评论
QPSK-assisted MIMO equalization for 800-Gb/s/? DP-256QAM systems
QPSK-assisted MIMO equalization for 800-Gb/s/? DP-256QAM sys...
收藏 引用
2020 Asia Communications and Photonics Conference, ACPC 2020/International Conference on Information Photonics and Optical Communications, IPOC 2020
作者: Liu, Siqi Liu, Shuangyue Tang, Xizi Guo, Mengqi Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
A QPSK-assisted MIMO equalization is investigated to compensate bandwidth limitation for 800-Gb/s/? DP-256QAM systems with only 25G-class optics. Compared with conventional MIMO equalization, the proposed equalization... 详细信息
来源: 评论
Unsupervised Domain Adaptation for Human Activity Recognition in Radar
Unsupervised Domain Adaptation for Human Activity Recognitio...
收藏 引用
IEEE National Conference on Radar
作者: Xinyu Li Xiaojun Jing Yuan He Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing China
The difficulty of obtaining large-scale labeled radar data hinders the generalization of supervised deep learning algorithms, which makes the performance of these approaches drop when applied to a new domain. In this ... 详细信息
来源: 评论
An Effective Encrypted Traffic Classification Method Based on Pruning Convolutional Neural Networks for Cloud Platform
An Effective Encrypted Traffic Classification Method Based o...
收藏 引用
International Conference on Electronics, Communications and Information Technology (CECIT)
作者: Zilong Han Erxia Li Shichao Li Xiaoyong Li Chaoqun Kang Ruiwen Deng Yali Gao State Grid Shanghai Energy Interconnection Research Institute Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Beijing University of Posts and Telecommunications Beijing China
With the rapid development of cloud computing technology, the traffic of cloud platform also increases rapidly. Most of these traffic adopt encryption technology, the original traffic classification method is no longe... 详细信息
来源: 评论
A Multi-Objective Emergency Resource Scheduling Method Based on MOEA/D
A Multi-Objective Emergency Resource Scheduling Method Based...
收藏 引用
2019第二届算法、计算和人工智能国际会议
作者: Yanrong Li Xiaoyong Li Liyang Hou Wenping Kong Wenxue Ma Key Laboratory of Trustworthy Distributed Computing and Servic Beijing University of Posts and Telecommunications
After unconventional events occur, rapid emergency response is often needed in order to reduce losses. When there are more than one disaster points and more than one supply points, how to coordinate the local dispatch... 详细信息
来源: 评论