咨询与建议

限定检索结果

文献类型

  • 356 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 465 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 80 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 16 篇 xi zhang
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 447 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
465 条 记 录,以下是281-290 订阅
排序:
Performance Analysis of Small Cell Networks Using Accurate Path Loss Model at 39 GHz  15
Performance Analysis of Small Cell Networks Using Accurate P...
收藏 引用
15th International Symposium on Wireless Communication Systems, ISWCS 2018
作者: Zhang, Yangying Jing, Xiaojun Gao, Hui Li, Bohan Xie, Jianxiao Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Ministry of Education Beijing China
In this paper, we apply an accurate millimeter wave (mmWave) path loss model, obtained from outdoor measurement operated at 39 GHz in Qingdao, China, into the stochastic geometry analysis to investigate the system per... 详细信息
来源: 评论
Emergency analysis based on affective computing in universities forum  5th
Emergency analysis based on affective computing in universit...
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Lu Wu, Xu Xie, Xiaqing Xu, Jin Zhang, Tianle Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China School of Cyberspace Security BUPT Beijing100876 China Beijing University of Posts and Telecommunications Library Beijing100876 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
Emergency analysis for social networking sites have gained increased attention. In order to detect emergencies in University Forums, we present an emergency analysis method based on affective computing. The method det... 详细信息
来源: 评论
Intelligent reflecting surface aided multi-user millimeter-wave communications for coverage enhancement
arXiv
收藏 引用
arXiv 2019年
作者: Cao, Yashuai Lv, Tiejun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Intelligent reflecting surface (IRS) is envisioned as a promising solution for controlling radio propagation environments in future wireless systems. In this paper, IRS is exploited to extend the millimeter wave (mmW)... 详细信息
来源: 评论
Deep Reinforcement Learning for Demand-Aware Joint VNF Placement-and-Routing
Deep Reinforcement Learning for Demand-Aware Joint VNF Place...
收藏 引用
IEEE Globecom Workshops
作者: Shaoyang Wang Tiejun Lv Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
One main challenge facing the deployment of the network function virtualization is the resource allocation on demand. As the primary stage of the resource allocation, the effective virtual network function (VNF) place... 详细信息
来源: 评论
Adversarial Residual Variational Graph Autoencoder with Batch Normalization
Adversarial Residual Variational Graph Autoencoder with Batc...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Qisheng Liao Xu Wu Xiaqing Xie Jingchen Wu Lirong Qiu Lijuan Sun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing University of Posts and Telecommunications Beijing China School of Economics and Management BUPT Beijing University of Posts and Telecommunications Beijing China
The variational graph autoencoder (VGAE), a framework for unsupervised learning on graph-structured data, has captured more attention recently in graph embedding area. However, it has been faced up with the challenge ... 详细信息
来源: 评论
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism
Insider Threat Detection Based on User Historical Behavior a...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Weiyu He Xu Wu Jingchen Wu Xiaqing Xie Lirong Qiu Lijuan Sun Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing University of Posts and Telecommunications Beijing China School of Economics and Management BUPT Beijing University of Posts and Telecommunications Beijing China
Insider threat makes enterprises or organizations suffer from the loss of property and the negative influence of reputation. User behavior analysis is the mainstream method of insider threat detection, but due to the ... 详细信息
来源: 评论
Sensitive Image Information Recognition Model of Network Community based on Content Text
Sensitive Image Information Recognition Model of Network Com...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Li Gao Xu Wu Jingchen Wu Xiaqing Xie Lirong Qiu Lijuan Sun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China School of Computer Science (National Pilot Software Engineering School) BUPT Beijing University of Posts and Telecommunications Beijing China School of Economics and Management BUPT Beijing University of Posts and Telecommunications Beijing China
With the advent of the multimedia era and the age of picture-reading, the recognition effect of sensitive content of image data has become the key to maintain the information security of network communities. At presen... 详细信息
来源: 评论
Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog Websites
Graph Neural Network Based User Group Comments Interaction B...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yisen Chen Xu Wu Xiaqing Xie Jingchen Wu Lirong Qiu Lijuan Sun Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China School of Computer Science(National Pilot Software Engineering School) BUPT Beijing University of Posts and Telecommunications Beijing China School of Economics and Management BUPT Beijing University of Posts and Telecommunications Beijing China
The interactive behavior of comments within the user group on microblog website is bidirectional and dynamic, reflecting the level of familiarity among users. Predicting the future comment interaction behavior within ... 详细信息
来源: 评论
Fixed-state Log-MAP detection for intensity-modulation and direct-detection optical systems over dispersion-uncompensated links
arXiv
收藏 引用
arXiv 2020年
作者: Shuangyue, L.I.U. Zhou, Ji Wang, Haide Mengqi, G.U.O. Xuekai, X.U. Yueming, L.U. Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Department of Electronic Engineering College of Information Science and Technology Jinan University Guangzhou510632 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School ofCyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
In this paper, an optimized detection using log-maximum a posteriori estimation with a fixed number of surviving states (fixed-state Log-MAP) is proposed for a C-band 64-Gbit/s intensity-modulation and direct-detectio... 详细信息
来源: 评论
An Intrusion Detection Model Based on SMOTE and Convolutional Neural Network Ensemble
收藏 引用
Journal of Physics: Conference Series 2021年 第1期1828卷
作者: Luyao Tian Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications (BUPT) Beijing 100876 China The School of Information and Communication Engineering Beijing University of Posts and Telecommunications (BUPT) Beijing 100876 China
Massive, multi-dimensional and imbalanced network traffic data has brought new challenges to traditional intrusion detection systems (IDSs). The detection performance of traditional algorithms is closely related to fe...
来源: 评论