咨询与建议

限定检索结果

文献类型

  • 356 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 80 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 16 篇 xi zhang
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 447 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
465 条 记 录,以下是231-240 订阅
排序:
A High Accuracy DNS Tunnel Detection Method Without Feature Engineering
A High Accuracy DNS Tunnel Detection Method Without Feature ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Yang Chen XiaoYong Li Beijing Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Ministry of Education Beijing China
Domain Name System (DNS) is a key protocol and service used on the Internet. It is responsible for converting domain names into IP addresses. DNS tunnel is a method of encoding data of other programs or protocols in D... 详细信息
来源: 评论
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities
Multi-level Directed Fuzzing for Detecting Use-after-Free Vu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yuntao Zhang Zhongru Wang Weiqiang Yu Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Greybox fuzzing has been widely used in vulnerabilities detection. Most greybox fuzzing tools are coverage-based, which usually use basic block transition to gain code coverage and focus on improving it to trigger mor... 详细信息
来源: 评论
Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud services
Scalable Blind Matching: An Efficient Ciphertext Matching Sc...
收藏 引用
IEEE International Conference on Big Data
作者: Qingling Feng Ruisheng Shi Qifeng Luo Lina Lan Jinqiao Shi Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Content-based publish/subscribe cloud services are prevailing recently. Confidentiality in publish/subscribe cloud services has become a major concern, especially for applications with sensitive data. Many methods hav... 详细信息
来源: 评论
An iterative sinogram metal artifact reducdion based on UNet
An iterative sinogram metal artifact reducdion based on UNet
收藏 引用
IEEE International Conference on Big Data
作者: Zichong An Xuemei Zhu Xiangling Fu Junqi Ma Chenyi Guo Zheng Zhang School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The University Hospital of Beijing University of Posts and Telecommunications Beijing China Yofo Medical Technology Co. Ltd Beijing China Department of Electronic Enginerring Tsinghua University Beijing China School of Modern Post(School of Automation) Beijing University of Posts and Telecommunications Beijing China
In the practice of dentistry, oral dental CT images are frequently used to assist doctors in diagnosis. Filtered back projection (FBP) technique is widely employed in practice for the reconstruction of CT images obtai...
来源: 评论
An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation
An Efficient Trust Inference Algorithm with Local Weighted C...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Binsi Cai Xiaoyong Li Yali Gao Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing P.R.China
The integration of trust system and recommendation system is a new hot spot in current research. Trust relationship has be exploited in social recommendation, which can effectively solve the problems of low recommenda... 详细信息
来源: 评论
Rigorous explanation of inference on probabilistic graphical models
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Yifei Chen, Chao Zhang, Xi Xie, Sihong Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Bupt Beijing China Lehigh University BethlehemPA United States
Probabilistic graphical models, such as Markov random fields (MRF), exploit dependencies among random variables to model a rich family of joint probability distributions. Sophisticated infer-ence algorithms, such as b... 详细信息
来源: 评论
Base station network traffic prediction approach based on LMA-DeepAR
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Jiachen Zuo, Xingquan Xu, Mingying Han, Jing Zhang, Baisheng Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing Uinversity of Posts and Telecommunications Beijing China Key Laboratory of Intelligent Telecommunication Software and Multimedia Beijing Uinversity of Posts and Telecommunications Beijing China Network Interface Virtualization Shanghai System Design Deptment Zhongxing Telecommunication Equipment Corporation Shanghai China
Accurate network traffic prediction of base station cell is very vital for the expansion and reduction of wireless devices in base station cell. The burst and uncertainty of base station cell network traffic makes the... 详细信息
来源: 评论
Deep reinforcement learning based dynamic optimization of bus timetable
arXiv
收藏 引用
arXiv 2021年
作者: Ai, Guanqun Zuo, Xingquan Chen, Gang Wu, Binglin School of Computer Science Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Engineering and Computer Science Victoria University of Wellington Wellington6140 New Zealand
Bus timetable optimization is a key issue to reduce operational cost of bus companies and improve the service quality. Existing methods use exact or heuristic algorithms to optimize the timetable in an offline manner.... 详细信息
来源: 评论
Reinforcement Learning Based Antenna Selection in User-Centric Massive MIMO  91
Reinforcement Learning Based Antenna Selection in User-Centr...
收藏 引用
91st IEEE Vehicular Technology Conference, VTC Spring 2020
作者: Chai, Xinxin Gao, Hui Sun, Ji Su, Xin Lv, Tiejun Zeng, Jie Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Institute of Telecommunications Ministry of Industry and Information Technology Beijing100804 China Tsinghua University Beijing National Research Center for Information Science and Technology Beijing100091 China
In this paper, we consider a user-centric massive multiple-input multiple-output (UC-MMIMO) system, wherein the optimal antenna selection (AS) is very complicated, because of the huge number of deployed antennas. Trad... 详细信息
来源: 评论
Dynamic Multichannel Access for 5G and Beyond with Fast Time-Varying Channel
Dynamic Multichannel Access for 5G and Beyond with Fast Time...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Shaoyang Wang Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
In 5G and beyond wireless communication systems, providing satisfactory service to users in high-mobility scenarios becomes very essential. Unstable service supply caused by frequent handover under high-mobility compr... 详细信息
来源: 评论