咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是31-40 订阅
排序:
DRLMS: a multipath scheduler based on deep reinforcement learning  3
DRLMS: a multipath scheduler based on deep reinforcement lea...
收藏 引用
3rd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2024
作者: Zhang, Mengyang Yuan, Kaiguo Li, Xiaoyong Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Most current network devices have multiple network interfaces, and multipath transport protocols can utilize multiple network paths (e.g., WiFi and cellular) to improve the performance and reliability of network trans... 详细信息
来源: 评论
Zero-Shot Detection of LLM-Generated Text using Token Cohesiveness
Zero-Shot Detection of LLM-Generated Text using Token Cohesi...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Ma, Shixuan Wang, Quan MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The increasing capability and widespread usage of large language models (LLMs) highlight the desirability of automatic detection of LLM-generated text. Zero-shot detectors, due to their training-free nature, have rece... 详细信息
来源: 评论
Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit  19
Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gat...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Jia, Jia Li, Xiaoyong Li, Ximing Li, Linghui Yuan, Jie Wang, Hongmiao Gao, Yali Qiu, Pengfei Tang, Jialu Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the huge amount of crowd mobility data generated by the explosion of mobile devices, deep neural networks (DNNs) are applied to trajectory data mining and modeling, which make great progresses in those scenarios.... 详细信息
来源: 评论
A Neural Network and Bloom Filter-Based Name Search Method in Named Data Networking  4
A Neural Network and Bloom Filter-Based Name Search Method i...
收藏 引用
4th International Conference on Neural Networks, Information and Communication Engineering, NNICE 2024
作者: Liu, Yue Li, Xiaoyong Si, Xiaotian Zhang, Mengyang Yuan, Kaiguo Li, Pengcheng Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
In a new network architecture like NDN, designing an efficient name lookup method has always been a valuable challenge. The paper studies the name lookup technology based on the Bloom filter and BPNN neural network ma... 详细信息
来源: 评论
Encrypted Traffic Classification Model Based on SwinT-CNN  4
Encrypted Traffic Classification Model Based on SwinT-CNN
收藏 引用
4th International Conference on Computer Engineering and Application, ICCEA 2023
作者: Wang, Yueyang Gao, Yali Li, Xiaoyong Yuan, Jie Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the rapid development of the network, the proportion of encrypted traffic in the network is increasing, which brings great challenges to traffic classification. The traditional encrypted traffic classification al... 详细信息
来源: 评论
An Intrusion Detection Method Based on Transformer-LSTM Model  3
An Intrusion Detection Method Based on Transformer-LSTM Mode...
收藏 引用
3rd International Conference on Neural Networks, Information and Communication Engineering, NNICE 2023
作者: Zhang, Zhipeng Si, Xiaotian Li, Linghui Gao, Yali Li, Xiaoyong Yuan, Jie Xing, Guoqiang Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the development of network technologies, network intrusion has become increasing complex which makes the intrusion detection challenging. Traditional intrusion detection algorithms detect intrusion traffic throug... 详细信息
来源: 评论
Real Time Attrition Prediction Mechanism Based on Deep Learning  2
Real Time Attrition Prediction Mechanism Based on Deep Learn...
收藏 引用
2nd International Signal Processing, Communications and Engineering Management Conference, ISPCEM 2022
作者: Wu, Chen Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Modern companies mostly have their own employee management systems, which retain a large amount of employee behavior data. These data can be used to mine valuable information, such as whether employees have attrition ... 详细信息
来源: 评论
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
arXiv
收藏 引用
arXiv 2025年
作者: Song, Jialei Zuo, Xingquan Wang, Feiyang Huang, Hai Zhang, Tianle Shool of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Shool of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Deep neural networks (DNNs) are highly susceptible to adversarial samples, raising concerns about their reliability in safety-critical tasks. Currently, methods of evaluating adversarial robustness are primarily categ... 详细信息
来源: 评论
An Effective Cloud Workflow Scheduling Approach Combining PSO and Idle Time Slot-Aware Rules
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第5期8卷 1079-1094页
作者: Yun Wang Xingquan Zuo the School of Computing Science Beijing University of Posts and TelecommunicationsBeijing 100876China the School of Information Engineering Nanchang Institute of TechnologyNanchang 330099China the Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing 100876China
Workflow scheduling is a key issue and remains a challenging problem in cloud *** with the large number of virtual machine(VM)types offered by cloud providers,cloud users need to choose the most appropriate VM type fo... 详细信息
来源: 评论
Pulmonary tuberculosis detection model of chest X-ray images using convolutional neural network
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2018年 第6期25卷 1-6页
作者: He Jin Wang Cong Chen Zhao School of Software Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education China Electronic Data Service CO. LTD
The primary screening for pulmonary tuberculosis mainly relies on X-ray imaging all over the world. In recent years, the incidence of pulmonary tuberculosis has rebounded. This paper proposes a convolutional neural ne... 详细信息
来源: 评论