咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 188 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 40 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 14 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 zhang xi
  • 13 篇 wang quan

语言

  • 485 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
518 条 记 录,以下是151-160 订阅
排序:
Integrated Beamforming and Resource Allocation in RIS-Assisted mmWave Networks based on Deep Reinforcement Learning
Integrated Beamforming and Resource Allocation in RIS-Assist...
收藏 引用
Annual IEEE Northeast Workshop on Circuits and Systems (NEWCAS)
作者: Di Chen Hui Gao Na Chen Ruohan Cao Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Graduate School of Science and Technology Nara Institute of Science and Technology Ikoma Japan
Reconfigurable intelligent surface (RIS) has gained wide attention recently as a promising solution to address the blockage issue in millimeter wave (mmWave) communication networks. In this paper, we consider a RIS-as...
来源: 评论
Toward Wisdom-Evolutionary and Primitive-Concise 6G:A New Paradigm of Semantic Communication Networks
收藏 引用
Engineering 2022年 第1期8卷 60-73页
作者: Ping Zhang Wenjun Xu Hui Gao Kai Niu Xiaodong Xu Xiaoqi Qin Caixia Yuan Zhijin Qin Haitao Zhao Jibo Wei Fangwei Zhang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing 100876China Peng Cheng Laboratory Shenzhen 518066China Key Laboratory of Universal Wireless Communications Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China School of Artificial Intelligence Beijing University of Posts and TelecommunicationsBeijing 100876China The School of Electronic Engineering and Computer Science Queen Mary University of LondonLondon E14NSUK College of Electronic Science and Technology National University of Defense TechnologyChangsha 410073China School of Humanities Beijing University of Posts and TelecommunicationsBeijing 100876China
The sixth generation(6G)mobile networks will reshape the world by offering instant,efficient,and intelligent hyper-connectivity,as envisioned by the previously proposed Ubiquitous-X 6G *** hyper-massive and global con... 详细信息
来源: 评论
A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State Transitions
A Method for Generating Medical Text Data by Integrating Spa...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Xu Yang Lijuan Sun Yutong Gao Sanchuan Guo Xu Wu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China School of Cyberspace Security BUPT Beijing University of Posts and Telecommunications Beijing China Intellectual Property Information Service Center Beihang University Beijing China School of Information Engineering Minzu University of China
This study aims to generate medical text data that integrates spatiotemporal attributes to solve the problems of small size and low availability of open source text datasets due to the privacy of medical data. This pa... 详细信息
来源: 评论
Robust text clustering with graph and textual adversarial learning  5
Robust text clustering with graph and textual adversarial le...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Liang, Yongming Tian, Tian Jin, Kaifu Yang, Xiaoyu Lv, Yuefei Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ... 详细信息
来源: 评论
Mask Neural Network for Predicting Flight Ticket Price  6th
Mask Neural Network for Predicting Flight Ticket Price
收藏 引用
6th Conference on Signal and Information Processing, Networking and Computers, ICSINC 2019
作者: Zhang, Qianqian He, Yuan Jing, Xiaojun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Recently, the global air traffic has increased rapidly, most passengers choose to buy tickets in their own experiences. So accurately predicting flight ticket price is of great significance. Recently there exist some ... 详细信息
来源: 评论
Not All Image Regions Matter: Masked Vector Quantization for Autoregressive Image Generation
Not All Image Regions Matter: Masked Vector Quantization for...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Mengqi Huang Zhendong Mao Quan Wang Yongdong Zhang University of Science and Technology of China Hefei China Institute of Artificial intelligence Hefei Comprehensive National Science Center Hefei China MOE Key Laboratory of Trustworthy Beijing University of Posts and Telecommunications Distributed Computing and Service Beijing China
Existing autoregressive models follow the two-stage generation paradigm that first learns a codebook in the latent space for image reconstruction and then completes the image generation autoregressively based on the l...
来源: 评论
Not All Image Regions Matter: Masked Vector Quantization for Autoregressive Image Generation
arXiv
收藏 引用
arXiv 2023年
作者: Huang, Mengqi Mao, Zhendong Wang, Quan Zhang, Yongdong University of Science and Technology of China Hefei China MOE Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China Institute of Artificial intelligence Hefei Comprehensive National Science Center Hefei China
Existing autoregressive models follow the two-stage generation paradigm that first learns a codebook in the latent space for image reconstruction and then completes the image generation autoregressively based on the l... 详细信息
来源: 评论
An End-to-End Raw Bytes Based Malware Classifier via Self-Attention Residual Convolutional Network
An End-to-End Raw Bytes Based Malware Classifier via Self-At...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Zihan Hou Xiaoyong Li Linghui Li Jie Yuan Kaiyang Deng Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of Education College of Cyberspace Security Beijing University of Posts and Telecommunications Beijing P.R.China
Malware classification has always been a fundamental and cutting-edge problem in the field of cyber security. The rapidly evolution of malware variant makes the malware recognition challenging. Most of existing method... 详细信息
来源: 评论
PMU-Leaker: Performance Monitor Unit-based Realization of Cache Side-Channel Attacks
PMU-Leaker: Performance Monitor Unit-based Realization of Ca...
收藏 引用
Asia and South Pacific Design Automation Conference
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chunlu Wang Chang Liu Rihui Sun Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education & Tsinghua University Beijing China Tsinghua University Beijing China Harbin Institute of Technology Harbin Heilongjiang China University of Maryland College Park Maryland USA
Performance Monitor Unit (PMU) is a special hardware module in processors that contains a set of counters to record various architectural and micro-architectural events. In this paper, we propose PMU-Leaker, a novel r... 详细信息
来源: 评论
ADBA:Approximation Decision Boundary Approach for Black-Box Adversarial Attacks  39
ADBA:Approximation Decision Boundary Approach for Black-Box ...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Wang, Feiyang Zuo, Xingquan Huang, Hai Chen, Gang School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Services Ministry of Education Beijing China School of Engineering and Computer Science Victoria University of Wellington Wellington New Zealand
Many machine learning models are susceptible to adversarial attacks, with decision-based black-box attacks representing the most critical threat in real-world applications. These attacks are extremely stealthy, genera... 详细信息
来源: 评论