咨询与建议

限定检索结果

文献类型

  • 383 篇 会议
  • 121 篇 期刊文献

馆藏范围

  • 504 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 259 篇 工学
    • 178 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 49 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 107 篇 理学
    • 72 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 zuo xingquan
  • 13 篇 gao hui
  • 13 篇 xi zhang
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 482 篇 英文
  • 12 篇 其他
  • 11 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
504 条 记 录,以下是1-10 订阅
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 2625-2646页
作者: Mingliang Sun Jie Yuan Xiaoyong Li Dongxiao Liu Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing100876China
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... 详细信息
来源: 评论
Zero-Shot Detection of LLM-Generated Text using Token Cohesiveness
Zero-Shot Detection of LLM-Generated Text using Token Cohesi...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Ma, Shixuan Wang, Quan MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The increasing capability and widespread usage of large language models (LLMs) highlight the desirability of automatic detection of LLM-generated text. Zero-shot detectors, due to their training-free nature, have rece... 详细信息
来源: 评论
DRLMS: a multipath scheduler based on deep reinforcement learning  3
DRLMS: a multipath scheduler based on deep reinforcement lea...
收藏 引用
3rd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2024
作者: Zhang, Mengyang Yuan, Kaiguo Li, Xiaoyong Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Most current network devices have multiple network interfaces, and multipath transport protocols can utilize multiple network paths (e.g., WiFi and cellular) to improve the performance and reliability of network trans... 详细信息
来源: 评论
A Neural Network and Bloom Filter-Based Name Search Method in Named Data Networking  4
A Neural Network and Bloom Filter-Based Name Search Method i...
收藏 引用
4th International Conference on Neural Networks, Information and Communication Engineering, NNICE 2024
作者: Liu, Yue Li, Xiaoyong Si, Xiaotian Zhang, Mengyang Yuan, Kaiguo Li, Pengcheng Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
In a new network architecture like NDN, designing an efficient name lookup method has always been a valuable challenge. The paper studies the name lookup technology based on the Bloom filter and BPNN neural network ma... 详细信息
来源: 评论
A recommendation algorithm based on adaptive privacy protection  9
A recommendation algorithm based on adaptive privacy protect...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, ISAEECE 2024
作者: Song, Yiyang Li, Xiaoyong Yuan, Kaiguo Kong, Weiyu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing100876 China
Differential privacy, as a provable privacy protection framework, has been widely applied in recommendation systems. However, the integration of existing collaborative filtering algorithms with differential privacy ty... 详细信息
来源: 评论
NFT Security Matrix:Towards Modeling NFT Ecosystem Threat
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3255-3285页
作者: Peng Liao Chaoge Liu Jie Yin Zhi Wang Xiang Cui Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing100876China Zhongguancun Laboratory Beijing100094China Institute of Information Engineering Chinese Academy of SciencesBeijing100085China
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in ***,numerous security ... 详细信息
来源: 评论
Game-theoretic private blockchain design in edge computing networks
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1622-1634页
作者: Daoqi Han Yang Liu Fangwei Zhang Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications(BUPT)Beijing 100876China Beijing Institute of Astronautical Systems Engineering BeijingChina Beijing Institute of Technology BeijingChina
Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the partic... 详细信息
来源: 评论
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis  9
Modification Method for Internal Network Flow Anomaly Detect...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhang, Xinyu Ding, Junmei Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a... 详细信息
来源: 评论
An IoT Device Recognition Method based on Convolutional Neural Network  3
An IoT Device Recognition Method based on Convolutional Neur...
收藏 引用
3rd International Conference on Neural Networks, Information and Communication Engineering, NNICE 2023
作者: Lu, Minghao Gao, Yali Li, Linghui Li, Xiaoyong Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Device recognition is the primary step toward a secure IoT system. However, the existing equipment recognition technology often faces the problems of unobvious data characteristics and insufficient training samples, r... 详细信息
来源: 评论
Encrypted Traffic Classification Model Based on SwinT-CNN  4
Encrypted Traffic Classification Model Based on SwinT-CNN
收藏 引用
4th International Conference on Computer Engineering and Application, ICCEA 2023
作者: Wang, Yueyang Gao, Yali Li, Xiaoyong Yuan, Jie Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the rapid development of the network, the proportion of encrypted traffic in the network is increasing, which brings great challenges to traffic classification. The traditional encrypted traffic classification al... 详细信息
来源: 评论