咨询与建议

限定检索结果

文献类型

  • 378 篇 会议
  • 120 篇 期刊文献

馆藏范围

  • 498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 258 篇 工学
    • 176 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 86 篇 信息与通信工程
    • 54 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 14 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 3 篇 建筑学
  • 107 篇 理学
    • 72 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 16 篇 training
  • 15 篇 signal to noise ...
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 59 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 15 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 9 篇 beijing universi...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 479 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
498 条 记 录,以下是91-100 订阅
排序:
Incorporate Personas and Emotions into Dialog Generation  5
Incorporate Personas and Emotions into Dialog Generation
收藏 引用
5th International Academic Exchange Conference on Science and Technology Innovation, IAECST 2023
作者: Wu, Yufeng Liu, Chengyu Guo, Wenjian Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Beijing University of Posts and Telecommunications State Key Laboratory of Networking and Switching Technology Beijing China
Since the Turing test, creating believable open-domain dialogues has been a basic problem in the study of artificial intelligence. Achieving success with dialogue models can greatly improve natural human-computer inte... 详细信息
来源: 评论
LRChain:data protection and sharing method of learning archives based on consortium blockchain
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2024年 第4期31卷 28-42页
作者: Lan Lina Gao Yuhan Shi Ruisheng Wu Fenfen School of Humanities Beijing University of Posts and TelecommunicationsBeijing 100876China School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsMinistry of EducationBeijing 100876China
Learning archives management in traditional systems faces challenges such as inadequate security,weak tamper resistance,and limited sharing *** address these issues,this paper proposes LRChain,a method based on consor... 详细信息
来源: 评论
Enhanced mutual authentication model of IoT
收藏 引用
Journal of China Universities of Posts and Telecommunications 2013年 第SUPPL -2期20卷 69-74页
作者: Yang, Jin-Cui Pang, Hao Zhang, Xin School of Software Engineering Beijing University of Posts and Telecommunications Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing 100876 China Bank of Communications Beijing Branch Beijing 100032 China
The authentication mechanism of the Internet of things (IoT) control system is an important research field. This paper aims to give an appropriate authentication mechanism of IoT control system. It analyzes the pros a... 详细信息
来源: 评论
Web Attack Detection through Network-Traffic-Based Feature Engineering and Machine Learning
Web Attack Detection through Network-Traffic-Based Feature E...
收藏 引用
2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020
作者: Yang, Jian Wang, Hao Lu, Yueming School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
The design of feature set is a basic research direction of anomaly detection technology. The characterization ability of feature set directly affects the accuracy and generalization ability of intrusion detection algo... 详细信息
来源: 评论
A recommend system for modelling large-scale advertising
A recommend system for modelling large-scale advertising
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Ma, Jing Lu, Yueming School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing China
In a large-scale network environment, the Internet has produced an amount of digital information such as social media, e-commercial comments, online shopping records and advertising click logs. So, recommend systems n... 详细信息
来源: 评论
Multi-source and multi-dimensional network security situational awareness model
Multi-source and multi-dimensional network security situatio...
收藏 引用
2020 International Conference on Cyberspace Innovation of Advanced Technologies, CIAT 2020
作者: Lv, Luqin Lu, Yueming School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Aiming at the problem that single protection technology is difficult to meet the needs of network security, the rationality and accuracy of situation assessment index are poor, the multi-source and multi-dimensional n... 详细信息
来源: 评论
Reliability Measurement Of Vehicle Sensor Data Based On Historical Perception  9
Reliability Measurement Of Vehicle Sensor Data Based On Hist...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Guo, Chenqing Zuo, Jinxin Lu, Yueming Xie, Weixuan Beijing University of Posts and Telecommunications School of Cyberspace Security Key Lab of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
On-board sensors are utilized for monitoring and collecting a diverse range of data pertaining to the vehicle and its surroundings. However, in the field of Internet of Vehicles, security threats encountered by vehicl... 详细信息
来源: 评论
Chinese Open Relation Extraction with Pointer-Generator Networks
Chinese Open Relation Extraction with Pointer-Generator Netw...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Ziheng Cheng Xu Wu Xiaqing Xie Jingchen Wu Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b...
来源: 评论
A method based on MD5 and time for preventing deception in electronic commerce
A method based on MD5 and time for preventing deception in e...
收藏 引用
International Conference on Cyberspace Technology, CCT 2014
作者: Hu, Zhenggang Lu, Yueming School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing China
Aiming at reducing the risk of data being intercepted and preventing deceptions in the electronic commerce, this paper proposes a method based on MD5 and time which can effectively prevent the deception in data transm... 详细信息
来源: 评论
A tensor-based sub-mode coordinate algorithm for stock prediction  3
A tensor-based sub-mode coordinate algorithm for stock predi...
收藏 引用
3rd IEEE International Conference on Data Science in Cyberspace, DSC 2018
作者: Huang, Jieyun Zhang, Yunjia Zhang, Jialai Zhang, Xi Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Electronic Information Sichuan University Chengdu China
The investment on the stock market is prone to be affected by the Internet. For the purpose of improving the prediction accuracy, we propose a multi-task stock prediction model that not only considers the stock correl... 详细信息
来源: 评论