咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是221-230 订阅
排序:
Mandari: Multi-Modal Temporal Knowledge Graph-aware Sub-graph Embedding for Next-POI Recommendation
Mandari: Multi-Modal Temporal Knowledge Graph-aware Sub-grap...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoqian Liu Xiuyun Li Yuan Cao Fan Zhang Xiongnan Jin Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The Technology Innovation Center of Cultural Tourism Big Data of Hebei Province Chengde China Hebei Normal University for Nationalities Chengde China Knowledge Discovery and Data Mining Research Center Zhejiang Lab Hangzhou China
Next-POI recommendation aims to explore from user check-in sequence to predict the next possible location to be visited. Existing methods are often difficult to model the implicit association of multi-modal data with ...
来源: 评论
Chinese open relation extraction with pointer-generator networks  5
Chinese open relation extraction with pointer-generator netw...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Cheng, Ziheng Wu, Xu Xie, Xiaqing Wu, Jingchen Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b... 详细信息
来源: 评论
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
arXiv
收藏 引用
arXiv 2025年
作者: Song, Jialei Zuo, Xingquan Wang, Feiyang Huang, Hai Zhang, Tianle Shool of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Shool of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Deep neural networks (DNNs) are highly susceptible to adversarial samples, raising concerns about their reliability in safety-critical tasks. Currently, methods of evaluating adversarial robustness are primarily categ... 详细信息
来源: 评论
Robust Text Clustering with Graph and Textual Adversarial Learning
Robust Text Clustering with Graph and Textual Adversarial Le...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yongming Liang Tian Tian Kaifu Jin Xiaoyu Yang Yuefei Lv Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ...
来源: 评论
Real-time event detection and tracking in microblog via text chain and sentiment time series  5
Real-time event detection and tracking in microblog via text...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Piao, Bingxu Wu, Xu Wu, Jingchen Xie, Xiaqing Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Microblog becomes one of the most popular media for sharing first-hand information. As more close to real event, detecting and tracking event in microblogs is a research hotspot. To alleviate feature sparsity problem,... 详细信息
来源: 评论
An efficient intrusion detection model based on deepFM
An efficient intrusion detection model based on deepFM
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Yuchen Ji Xiaoyong Li Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunication Beijing China
With the development of the Internet, more and more network attacks are also emerging. The traditional intrusion detection system has been challenged tremendously, and it is unable to detect the new types of attacks. ... 详细信息
来源: 评论
EML-Based IM/DD Transmission over Dispersion-Uncompensated Links Using Low-Complexity Optimized Detection
EML-Based IM/DD Transmission over Dispersion-Uncompensated L...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Shuangyue Liu Han Cui Xizi Tang Yueming Lu Yaojun Qiao State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
We experimentally demonstrate an EML-based 40-Gbit/s OOK IM/DD trans-mission over 120-km SSMF using a low-complexity optimized detection algorithm, which requires no multiplication during the update of survival path, ... 详细信息
来源: 评论
A High Accuracy DNS Tunnel Detection Method Without Feature Engineering
A High Accuracy DNS Tunnel Detection Method Without Feature ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Yang Chen XiaoYong Li Beijing Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Ministry of Education Beijing China
Domain Name System (DNS) is a key protocol and service used on the Internet. It is responsible for converting domain names into IP addresses. DNS tunnel is a method of encoding data of other programs or protocols in D... 详细信息
来源: 评论
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities
Multi-level Directed Fuzzing for Detecting Use-after-Free Vu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yuntao Zhang Zhongru Wang Weiqiang Yu Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Greybox fuzzing has been widely used in vulnerabilities detection. Most greybox fuzzing tools are coverage-based, which usually use basic block transition to gain code coverage and focus on improving it to trigger mor... 详细信息
来源: 评论
Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud services
Scalable Blind Matching: An Efficient Ciphertext Matching Sc...
收藏 引用
IEEE International Conference on Big Data
作者: Qingling Feng Ruisheng Shi Qifeng Luo Lina Lan Jinqiao Shi Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Content-based publish/subscribe cloud services are prevailing recently. Confidentiality in publish/subscribe cloud services has become a major concern, especially for applications with sensitive data. Many methods hav... 详细信息
来源: 评论