咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 118 篇 软件工程
    • 74 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 13 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 94 篇 理学
    • 59 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 444 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是51-60 订阅
排序:
Robust text clustering with graph and textual adversarial learning  5
Robust text clustering with graph and textual adversarial le...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Liang, Yongming Tian, Tian Jin, Kaifu Yang, Xiaoyu Lv, Yuefei Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ... 详细信息
来源: 评论
Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog Websites  6
Graph Neural Network Based User Group Comments Interaction B...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Chen, Yisen Wu, Xu Xie, Xiaqing Wu, Jingchen Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trustworthy Distributed Computing And Service Beijing China
The interactive behavior of comments within the user group on microblog website is bidirectional and dynamic, reflecting the level of familiarity among users. Predicting the future comment interaction behavior within ... 详细信息
来源: 评论
Cross-Lingual Propaganda Detection
Cross-Lingual Propaganda Detection
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Zhang, Wenshan Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Propaganda information that aims at influencing people's opinions is becoming more and more common around people, especially through social media. For the detection of propaganda content, researchers have conducte... 详细信息
来源: 评论
QoS-aware precautionary performance monitoring for PCE-based coherent optical OFDM networks
收藏 引用
Chinese Optics Letters 2012年 第4期10卷 8-10页
作者: 陆月明 侯连兴 Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications
A quality-of-service(QoS)aware scheme,called precautionary performance monitoring,is proposed to solve the optical impairments and congestion control in coherent optical orthogonal frequency division multiplexed(CO... 详细信息
来源: 评论
Leveraging Multi-aspect Semantics for Conversation Structure Modeling  7
Leveraging Multi-aspect Semantics for Conversation Structure...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Tuwen Zhang, Xi Qiu, Lirong Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
With the advent of online chatting systems, conversation structure modeling has attracted increasing attention and can be beneficial to many downstream tasks such as topic summarization and dialog generation. Existing... 详细信息
来源: 评论
Mask Neural Network for Predicting Flight Ticket Price  6th
Mask Neural Network for Predicting Flight Ticket Price
收藏 引用
6th Conference on Signal and Information Processing, Networking and Computers, ICSINC 2019
作者: Zhang, Qianqian He, Yuan Jing, Xiaojun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Recently, the global air traffic has increased rapidly, most passengers choose to buy tickets in their own experiences. So accurately predicting flight ticket price is of great significance. Recently there exist some ... 详细信息
来源: 评论
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism  6
Insider Threat Detection Based on User Historical Behavior a...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: He, Weiyu Wu, Xu Wu, Jingchen Xie, Xiaqing Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trustworthy Distributed Computing And Service Beijing China
Insider threat makes enterprises or organizations suffer from the loss of property and the negative influence of reputation. User behavior analysis is the mainstream method of insider threat detection, but due to the ... 详细信息
来源: 评论
Tree pruning for MIMO sphere detection based on MMSE detection
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2012年 第4期19卷 64-72页
作者: WANG Shi-liang SUN Song-lin J1NG Xiao-jun LU Yue-ming School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China
Tree pruning is an effective algorithm to reduce the complexity of sphere detection (SD) for multiple-input multiple-output (MIMO) communication systems. How to determine the tree pruning rule, as well as by what ... 详细信息
来源: 评论
PA-GAN: Graph Attention Network for Preference-Aware Social Recommendation  4
PA-GAN: Graph Attention Network for Preference-Aware Social ...
收藏 引用
2021 4th International Conference on Advanced Algorithms and Control Engineering, ICAACE 2021
作者: Hou, Liyang Kong, Wenping Gao, Yali Chen, Yang Li, Xiaoyong Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China
Social recommendation has been recently proposed by incorporating trust relationship to alleviate data-sparsity and cold-start problems. However, most of existing works only focus on friends different contribution to ...
来源: 评论
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis  9
Modification Method for Internal Network Flow Anomaly Detect...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhang, Xinyu Ding, Junmei Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a... 详细信息
来源: 评论