咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 188 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 40 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 14 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 zhang xi
  • 13 篇 wang quan

语言

  • 485 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
518 条 记 录,以下是161-170 订阅
排序:
Joint Optimization Algorithm for Adaptive Bit Allocation Based on Temporal-Spatial Information
Joint Optimization Algorithm for Adaptive Bit Allocation Bas...
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Shaokang Wang Songlin Sun School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) China Ministry of Education Engineering Research Center of Blockchain and Network Convergence Technology China
Versatile Video Coding (VVC) standard further improves the video compression ratio. Despite inter prediction and intra prediction effectively eliminating temporal and spatial residual information, there is still room ...
来源: 评论
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense  7
A Hybrid Routing Mutation Mechanism based on Mutation Cost a...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Kun Gao, Yibo Wang, Dongbin Zhi, Hui Zhang, Tao Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Cyberspace Security Research Center Peng Cheng Laboratory Beijing China Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Beijing China TravelSky Technology Limited Beijing China China Academy of Launch Vehicle Technology Beijing China
Network moving target defense technology can effectively defend against attacker monitoring of the service. The technology makes it more difficult for attackers to attack and can ensure secure communication for servic... 详细信息
来源: 评论
Progressive Evolution Scheme with Socialization Swarm for Privacy Blockchain
Progressive Evolution Scheme with Socialization Swarm for Pr...
收藏 引用
Pacific Rim International Symposium on Dependable computing
作者: Daoqi Han Tao Yu Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Institute of Network Science and Cyberspace Tsinghua University Beijing China
To enhance the dependability of lightweight blockchain, this paper presents a privacy protection mechanism in open networks with a secure ledger for each cell of society. We propose a swarm intelligence scheme called ... 详细信息
来源: 评论
Communication Encryption Scheme of 5G Power Trading Private Network Based on Dynamic key
Communication Encryption Scheme of 5G Power Trading Private ...
收藏 引用
Electrical, Power and Computer Engineering (EPCE), Asia Conference on
作者: Rui Zhou Yiyang Song Ying Xu Electrical Engineering and Automation School Harbin Institute of Technology Harbin China Information Data Department Guangdong Power Exchange Center Guangzhou China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Security has been the primary concern for the 5G power trading private network, which involves a large amount of power trading information. The communication must be encrypted to prevent the leakage of important infor...
来源: 评论
Blockchain Storage Method Based on Erasure Code
Blockchain Storage Method Based on Erasure Code
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Fanyao Meng Jin Li Jiaqi Gao Junjie Liu Junpeng Ru Yueming Lu Key Lab of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China
Blockchain, as an emerging distributed database, effectively addresses the issue of centralized storage in IoT data, where storage capacity cannot match the explosive growth in devices and data scale, as well as the c...
来源: 评论
IWRN:A Robust Blind Watermarking Method for Artwork Image Copyright Protection Against Noise Attack  39
IWRN:A Robust Blind Watermarking Method for Artwork Image Co...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Kou, Feifei Yao, Yuhan Yao, Siyuan Wang, Jiahao Shi, Lei Li, Yawen Kang, Xuejing School of Computer Science National Pilot School of Software Engineering BUPT Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing 100876 China School of Economics and Management BUPT Beijing 100876 China State Key Laboratory of Media Convergence and Communication CUC Beijing 100024 China State Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang 215400 China
Adding imperceptible watermarks to artwork images, such as paintings and photographs, can effectively safeguard the copyright of these images without compromising their usability. However, existing blind watermarking ... 详细信息
来源: 评论
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in Transient Executions
PMU-Spill: Performance Monitor Unit Counters Leak Secrets in...
收藏 引用
IEEE Asian Hardware-Oriented Security and Trust (AsianHOST)
作者: Pengfei Qiu Qiang Gao Dongsheng Wang Yongqiang Lyu Chang Liu Xiaoyong Li Chunlu Wang Gang Qu Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Tsinghua University Beijing China Department of Computer Science and Technology Beijing National Research Center for Information Science and Technology Tsinghua University Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing China Department of Electrical and Computer Engineering Institute for Systems Research University of Maryland Maryland USA
The processor's Performance Monitor Unit (PMU) allows the recording of architectural and microarchitectural events for profiling purposes. In this study, we reveal a security issue caused by the fact that current ... 详细信息
来源: 评论
EML-Based IM/DD Transmission over Dispersion-Uncompensated Links Using Low-Complexity Optimized Detection
EML-Based IM/DD Transmission over Dispersion-Uncompensated L...
收藏 引用
2021 Asia Communications and Photonics Conference, ACP 2021
作者: Liu, Shuangyue Cui, Han Tang, Xizi Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
We experimentally demonstrate an EML-based 40-Gbit/s OOK IM/DD transmission over 120-km SSMF using a low-complexity optimized detection algorithm, which requires no multiplication during the update of survival path, s... 详细信息
来源: 评论
Automated Vulnerability Discovery System Based on Hybrid Execution  7
Automated Vulnerability Discovery System Based on Hybrid Exe...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Liu, Tong Wang, Zhongru Zhang, Yuntao Liu, Zhehui Fang, Binxing Pang, Zhengyuan Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing China Chinese Academy of Cyberspace Studies Beijing China North China University of Technology School of Information Science and Technology Beijing100144 China Beijing DigApis Technology Co. Ltd Beijing100871 China JiangSu DigApis Technology Co. Ltd Jiangsu Nantong226000 China
At present, program vulnerabilities occur frequently, which seriously threatens the security of cyberspace. Automated vulnerability discovery technology has attracted more and more attention because of its efficiency ... 详细信息
来源: 评论
Decode the Dark Side of the Language: Applications of LLMs in the Dark Web
Decode the Dark Side of the Language: Applications of LLMs i...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Hongfan Chen Yigang Diao Hui Xiang Yixuan Huo Xiaqing Xie Jiapeng Zhao Xuebin Wang Yanwei Sun Jinqiao Shi School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Cyberspace Administration of China Data and Technology Support Center Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Previous studies have discovered that Transformers pre-trained on large scale datasets have a great advantage over traditional methods and can achieve human-level performance in many NLP tasks. Various encoder-only mo... 详细信息
来源: 评论