咨询与建议

限定检索结果

文献类型

  • 353 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 462 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 234 篇 工学
    • 160 篇 计算机科学与技术...
    • 117 篇 软件工程
    • 75 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 22 篇 机械工程
    • 19 篇 交通运输工程
    • 17 篇 仪器科学与技术
    • 16 篇 网络空间安全
    • 14 篇 电气工程
    • 13 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
    • 4 篇 土木工程
  • 95 篇 理学
    • 60 篇 数学
    • 28 篇 生物学
    • 23 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 72 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 34 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 26 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 14 篇 security
  • 14 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 task analysis
  • 11 篇 antennas
  • 10 篇 conferences
  • 10 篇 real-time system...
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 predictive model...
  • 9 篇 cyberspace
  • 8 篇 internet of thin...
  • 8 篇 resource managem...
  • 8 篇 optical fiber co...

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 37 篇 school of inform...
  • 30 篇 key laboratory o...
  • 22 篇 school of comput...
  • 17 篇 beijing universi...
  • 17 篇 school of cybers...
  • 17 篇 school of softwa...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 41 篇 tiejun lv
  • 40 篇 yueming lu
  • 39 篇 xiaoyong li
  • 35 篇 hui gao
  • 28 篇 lu yueming
  • 27 篇 songlin sun
  • 23 篇 wu xu
  • 22 篇 xiaojun jing
  • 21 篇 xu wu
  • 18 篇 xiaqing xie
  • 15 篇 yali gao
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 wu jingchen
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 xie xiaqing
  • 12 篇 jie yuan
  • 12 篇 sun lijuan

语言

  • 443 篇 英文
  • 10 篇 其他
  • 9 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Servic"
462 条 记 录,以下是61-70 订阅
排序:
Adversarial Residual Variational Graph Autoencoder with Batch Normalization  6
Adversarial Residual Variational Graph Autoencoder with Batc...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Liao, Qisheng Wu, Xu Xie, Xiaqing Wu, Jingchen Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Key Laboratory Of Trustworthy Distributed Computing And Service Ministry Of Education Beijing China
The variational graph autoencoder (VGAE), a framework for unsupervised learning on graph-structured data, has captured more attention recently in graph embedding area. However, it has been faced up with the challenge ... 详细信息
来源: 评论
Sensitive Image Information Recognition Model of Network Community based on Content Text  6
Sensitive Image Information Recognition Model of Network Com...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Gao, Li Wu, Xu Wu, Jingchen Xie, Xiaqing Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Key Laboratory Of Trustworthy Distributed Computing And Service Ministry Of Education Beijing China
With the advent of the multimedia era and the age of picture-reading, the recognition effect of sensitive content of image data has become the key to maintain the information security of network communities. At presen... 详细信息
来源: 评论
Fast algorithms of public key cryptosystem based on Chebyshev polynomials over finite field
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2011年 第2期18卷 86-93页
作者: LI Zhi-hui CUI Yi-dong XU Hui-min Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beij ing 100876 China School of Information and Communication engineering Beijing University of Posts and Telecommunications Beijing 100876 China
The computation of Chebyshev polynomial over finite field is a dominating operation for a public key *** generic algorithms with running time of have been presented for this computation:the matrix algorithm and the c... 详细信息
来源: 评论
Machine-learning based ocean atmospheric duct forecasting:a hybrid model-data-driven approach
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2023年 第4期30卷 1-9页
作者: Feng Yuting Gong Haobing Hao Xiaojing Gao Hui Guo Xiangming Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Radio Wave Propagation Characteristics and Modeling Technology 22nd Research Institute of China Electronics Technology CorporationQingdao 266107China
The atmospheric duct is a vital radio wave *** methods of forecasting the atmospheric duct mainly include statistical analysis based on sounding observation data and mesoscale numerical model-based *** former can prov... 详细信息
来源: 评论
An efficient confidentiality protection solution for pub/sub system
收藏 引用
Cybersecurity 2023年 第4期6卷 14-25页
作者: Jinglei Pei Yuyang Shi Qingling Feng Ruisheng Shi Lina Lan Shui Yu Jinqiao Shi Zhaofeng Ma Beijing University of Posts and Telecommunications Beijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina School of Computer Science University of Technology SydneySydneyNSWAustralia
Publish/subscribe(pub/sub)systems are widely used in large-scale messaging systems due to their asynchronous and decoupled *** the population of pub/sub cloud services,the privacy protection problem of pub/sub systems... 详细信息
来源: 评论
Phishing detection method based on borderline-smote deep belief network  10th
Phishing detection method based on borderline-smote deep bel...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Zhang, Jiahua Li, Xiaoyong The Key Laboratory of Trustworthy Distributed Computing Service Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China
With the rapid development of Internet, phishing and other frauds are becoming more and more serious. Criminals posing as banks, electricity providers, social networking sites to send fraudulent information to induce ... 详细信息
来源: 评论
MTIV: A trustworthiness determination approach for threat intelligence  10th
MTIV: A trustworthiness determination approach for threat in...
收藏 引用
10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017
作者: Li, Lei Li, Xiaoyong Gao, Yali Key Laboratory of Trustworthy Distributed Computing Service of the Ministry of Education Beijing University of Posts and Telecommunications Beijing100876 China
With the gradually sharing of threat intelligences, users concern more about their trustworthiness, which is difficult to be judged. Some threat intelligence sharing platforms choose to show the risk or credibility, a... 详细信息
来源: 评论
Framework for understanding intention-unbreakable malware
收藏 引用
Science China(Information Sciences) 2023年 第4期66卷 174-192页
作者: Tiantian JI Binxing FANG Xiang CUI Zhongru WANG Peng LIAO Shouyou SONG Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education Beijing University of Posts and Telecommunications Cyberspace Institute of Advanced Technology Guangzhou University Chinese Academy of Cyberspace Studies Beijing Dig Apis Technology Co. Ltd.
The anti-analysis technology of malware has always been the focus in the cyberspace security field. As malware analysis techniques evolve, malware writers continually employ sophisticated anti-reverse engineering tech... 详细信息
来源: 评论
A Recommendation System Based on Multi-attribute  9
A Recommendation System Based on Multi-attribute
收藏 引用
9th International Conference on service Science, ICSS 2016
作者: Dong, Jiali Li, Xiaoyong Fang, Binxing Beijing University of Post and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
In recent years, more and more internet companies trend to fuse their products with personal recommendation functions. Although the idea of this business model satisfies characteristic of Internet industry felicitousl... 详细信息
来源: 评论
A Theoretical Framework for Value Co-creation Analysis of Ecological Interaction between 6G and Its Enabling Technologies  24
A Theoretical Framework for Value Co-creation Analysis of Ec...
收藏 引用
Proceedings of the 2024 10th International Conference on Communication and Information Processing
作者: Jiao Zhang Xuyu Zhao Fengshuai Du Xinyue Yan Tianjian Yang Haiyan Yan Jiayin Qi School of Economics and Management Beijing University of Posts and Telecommunications Beijing Beijing China China Mobile Research Institute Beijing Beijing China Scienze Politiche e delle relazioni internazionali University of Palermo Palermo Italy and Huangpu Research School of Guangzhou University Guangzhou University Guangzhou Guangdong China School of Management Fudan University Shanghai Shanghai China School of Management Shanghai University of International Business and Economics Shanghai Shanghai China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou Guangdong China and Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing Beijing China
As demand for communication increases in terms of rate, reliability and security, 6G networks will provide more extreme communication experiences and richer communication services. It is therefore crucial that 6G enab... 详细信息
来源: 评论