咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是271-280 订阅
排序:
A Deep Multi-task Network for Activity Classification and Person Identification with Micro-Doppler Signatures
A Deep Multi-task Network for Activity Classification and Pe...
收藏 引用
IEEE International Conference on Radar
作者: Xinyu Li Yuan He Xiaojun Jing Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
In prior work, both person identification and activity classification in radar have been investigated. In this paper, we go one step beyond separate radar-based person identification and activity classification by pro... 详细信息
来源: 评论
Mobile Robot Object Recognition in The Internet of Things based on Fog computing
Mobile Robot Object Recognition in The Internet of Things ba...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Meixia Fu Songlin Sun Kaili Ni Xiaoying Hou National Engineering Laboratory for Mobile Network Security Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service (BUPT)
Mobile robot object recognition has attracted significant attention in the internet of things recently, in which there are many challenging tasks, such as the objects, the communication networks and the computer syste... 详细信息
来源: 评论
A Weakness Relevance Evaluation Method Based on PageRank
A Weakness Relevance Evaluation Method Based on PageRank
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yanan Du Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
In security incidents, vulnerability is always caused by several weaknesses. But in the vulnerability assessment, most of studies did not take weakness into account, resulting in inaccurate assessment of vulnerability... 详细信息
来源: 评论
Short Text Topic Recognition and Optimization Method for University Online Community  5th
Short Text Topic Recognition and Optimization Method for Uni...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Wu, Xu Wu, Haitao Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security BUPT Beijing China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The university online community mainly records what happens in target areas and groups of people. It has the characteristics of timeliness, regional strong and clear target groups. Compared with Weibo and post-bar, un... 详细信息
来源: 评论
Reinforcement Learning Based Antenna Selection in User-Centric Massive MIMO
Reinforcement Learning Based Antenna Selection in User-Centr...
收藏 引用
IEEE Conference on Vehicular Technology (VTC)
作者: Xinxin Chai Hui Gao Ji Sun Xin Su Tiejun Lv Jie Zeng Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Ministry of Industry and Information Technology Institute of Telecommunications Beijing China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China
In this paper, we consider a user-centric massive multiple-input multiple-output (UC-MMIMO) system, wherein the optimal antenna selection (AS) is very complicated, because of the huge number of deployed antennas. Trad... 详细信息
来源: 评论
Scalable Explanation of Inferences on Large Graphs
Scalable Explanation of Inferences on Large Graphs
收藏 引用
IEEE International Conference on Data Mining (ICDM)
作者: Chao Chen Yifei Liu Xi Zhang Sihong Xie Lehigh University Bethlehem PA USA Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education BUPT Beijing China
Probabilistic inferences distill knowledge from graphs to aid human make important decisions. Due to the inherent uncertainty in the model and the complexity of the knowledge, it is desirable to help the end-users und...
来源: 评论
Modulation Recognition based on Incremental Deep Learning
Modulation Recognition based on Incremental Deep Learning
收藏 引用
International Conference on Mechanical, Control and Computer Engineering (ICMCCE)
作者: Yong Yang Menghan Chen XiaoYa Wang Piming Ma The 54th Research Institute of CETC Shijiazhuang China School of Information Science and Engineering Shandong University Qingdao China School of Information and Communication Engineering National Engineering Laboratory for Mobile Network Security Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications line Beijing China
Incremental learning has emerged to solve the problem of incrementally updating the classification model as the number of data classes grows. There are many challenges in incremental learning such as catastrophic forg... 详细信息
来源: 评论
Performance Analysis of Small Cell Networks Using Accurate Path Loss Model at 39 GHz  15
Performance Analysis of Small Cell Networks Using Accurate P...
收藏 引用
15th International Symposium on Wireless Communication Systems, ISWCS 2018
作者: Zhang, Yangying Jing, Xiaojun Gao, Hui Li, Bohan Xie, Jianxiao Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China
In this paper, we apply an accurate millimeter wave (mmWave) path loss model, obtained from outdoor measurement operated at 39 GHz in Qingdao, China, into the stochastic geometry analysis to investigate the system per... 详细信息
来源: 评论
Emergency analysis based on affective computing in universities forum  5th
Emergency analysis based on affective computing in universit...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Lu Wu, Xu Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Cyberspace Security BUPT Beijing100876 China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The method det... 详细信息
来源: 评论
Intelligent reflecting surface aided multi-user millimeter-wave communications for coverage enhancement
arXiv
收藏 引用
arXiv 2019年
作者: Cao, Yashuai Lv, Tiejun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Intelligent reflecting surface (IRS) is envisioned as a promising solution for controlling radio propagation environments in future wireless systems. In this paper, IRS is exploited to extend the millimeter wave (mmW)... 详细信息
来源: 评论