咨询与建议

限定检索结果

文献类型

  • 378 篇 会议
  • 120 篇 期刊文献

馆藏范围

  • 498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 258 篇 工学
    • 176 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 86 篇 信息与通信工程
    • 54 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 14 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 3 篇 建筑学
  • 107 篇 理学
    • 72 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 16 篇 training
  • 15 篇 signal to noise ...
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 59 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 15 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 9 篇 beijing universi...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 479 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
498 条 记 录,以下是1-10 订阅
排序:
CMI-AIGCX at GenAI Detection Task 2: Leveraging Multilingual Proxy LLMs for Machine-Generated Text Detection in Academic Essays  1
CMI-AIGCX at GenAI Detection Task 2: Leveraging Multilingual...
收藏 引用
1st Workshop on GenAI Content Detection, GenAIDetect 2025
作者: Jiao, Kaijie Yao, Xingyu Ma, Shixuan Fang, Sifan Guo, Zikang Xu, Benfeng Zhang, Licheng Wang, Quan Zhang, Yongdong Mao, Zhendong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
This paper presents the approach we proposed for GenAI Detection Task 2, which aims to classify a given text as either machine-generated or human-written, with a particular emphasis on academic essays. We participated... 详细信息
来源: 评论
LayerCFL:an efcient federated learning with layer-wised clustering
收藏 引用
Cybersecurity 2025年 第1期8卷 72-85页
作者: Jie Yuan Rui Qian Tingting Yuan Mingliang Sun Jirui Li Xiaoyong Li School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijingChina Institute of Computer Science Faculty of Mathematics and Computer ScienceUniversity of GoettingenGöettingenGermany School of Information Technology Henan University of Chinese MedicineZhengzhouHenanChina
Federated Learning(FL)sufers from the Non-IID problem in practice,which poses a challenge for efcient and accurate model *** address this challenge,prior research has introduced clustered FL(CFL),which involves cluste... 详细信息
来源: 评论
EHealth: A Chinese Biomedical Language Model Built via Multi-Level Text Discrimination
IEEE Transactions on Audio, Speech and Language Processing
收藏 引用
IEEE Transactions on Audio, Speech and Language Processing 2025年 33卷 908-921页
作者: Quan Wang Songtai Dai Benfeng Xu Yajuan Lyu Hua Wu Haifeng Wang MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Baidu Inc. Beijing China School of Information Science and Technology University of Science and Technology of China Hefei China
Pre-trained language models (PLMs) have recently revolutionized the field of natural language processing, impacting not only the general domain but also the biomedical domain. Most previous studies on constructing bio... 详细信息
来源: 评论
Novelty Calculation in Imbalanced Dynamic Interconnected Specialized IoT Network Traffic
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fan, Mingrui Zuo, Jinxin Gao, Jiaqi He, Yaru Shi, Weidong Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing100876 China Beijing University of Posts and Telecommunications School of Information and Communication Engineering Beijing100876 China
Quantifying the deviation of testing samples from known benign traffic in the form of novelty scores is essential for identifying new malicious traffic and detecting concept drifts of benign traffic. Most existing sol... 详细信息
来源: 评论
A Multi-holder Role and Strange Attractor-Based Data Possession Proof in Medical Clouds  24th
A Multi-holder Role and Strange Attractor-Based Data Possess...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Guo, Jinyuan Sun, Lijuan Wu, Jingchen Chu, Chiawei Gao, Yutong Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cybersecurity Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Ethnic Language Intelligent Analysis and Security Governance Ministry of Education Minzu University Beijing China Intellectual Property Information Service Center BHU Beihang University Beijing China City University of Macau Taipa China Li’an International Education Innovation Pilot Zone Hainan International College of Minzu University of China Hainan Beijing China
Proof of Data Possession is a technique for ensuring the integrity of data stored in cloud storage. However, most audit schemes assume only one role for data owners, which is not suitable for complex Smart Healthcare ... 详细信息
来源: 评论
Unveiling the secrets without data: can graph neural networks be exploited through data-free model extraction attacks?  24
Unveiling the secrets without data: can graph neural network...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Yuanxin Zhuang Chuan Shi Mengmei Zhang Jinghui Chen Lingjuan Lyu Pan Zhou Lichao Sun Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education The Pennsylvania State University SONY AI Huazhong University of Science and Technology Lehigh University
Graph neural networks (GNNs) play a crucial role in various graph applications, such as social science, biology, and molecular chemistry. Despite their popularity, GNNs are still vulnerable to intellectual property th...
来源: 评论
Compositional Concept-Based Neuron-Level Interpretability for Deep Reinforcement Learning
arXiv
收藏 引用
arXiv 2025年
作者: Jiang, Zeyu Huang, Hai Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Services Ministry of Education Beijing China
Deep reinforcement learning (DRL), through learning policies or values represented by neural networks, has successfully addressed many complex control problems. However, the neural networks introduced by DRL lack inte... 详细信息
来源: 评论
Ranking Modules for Integrate Testing Based on PageRank Algorithm
收藏 引用
Chinese Journal of Electronics 2017年 第5期26卷 993-998页
作者: SUN Qi Krishna Ricky MONIZ YUAN Yuyu Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing University of Posts and Telecommunications
The testing industry need to prioritize the limited resources and focus on testing modules whose failure is mostly likely to cause *** paper discusses a method that can rank modules in a software package for integrate... 详细信息
来源: 评论
An Alternative-service Recommending Algorithm Based on Semantic Similarity
收藏 引用
China Communications 2017年 第8期14卷 124-136页
作者: Kun Guo Yonghua Li Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijingChina
With the development of the Internet of Things(Io T), people's lives have become increasingly convenient. It is desirable for smart home(SH) systems to integrate and leverage the enormous information available fro... 详细信息
来源: 评论
DropConnect Regularization Method with Sparsity Constraint for Neural Networks
收藏 引用
Chinese Journal of Electronics 2016年 第1期25卷 152-158页
作者: LIAN Zifeng JING Xiaojun WANG Xiaohan HUANG Hai TAN Youheng CUI Yuanhao Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications School of Software and Microelectronics Peking University
Drop Connect is a recently introduced algorithm to prevent the co-adaptation of feature *** to Dropout, Drop Connect gains state-of-the-art results on several image recognition benchmarks. Motivated by the success of ... 详细信息
来源: 评论