咨询与建议

限定检索结果

文献类型

  • 396 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 518 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 271 篇 工学
    • 188 篇 计算机科学与技术...
    • 134 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 40 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 14 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 67 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 zhang xi
  • 13 篇 wang quan

语言

  • 485 篇 英文
  • 23 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
518 条 记 录,以下是211-220 订阅
排序:
Human motion recognition by three-view kinect sensors in virtual basketball training
Human motion recognition by three-view kinect sensors in vir...
收藏 引用
2020 IEEE Region 10 Conference, TENCON 2020
作者: Yao, Baoqi Gao, Hui Su, Xin Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service China Tsinghua University Beijing National Research Center for Information Science and Technology Beijing China
In recent years, human action recognition has received a considerable amount of research attention because of it's potential in a variety of applications, such as video surveillance, human-computer interaction, an... 详细信息
来源: 评论
A microservice based generic consensus engine for BaaS
A microservice based generic consensus engine for BaaS
收藏 引用
IEEE International Conference on Industrial Technology (ICIT)
作者: Huiyang Li Xu Zhang Jing Li Dongbin Wang Beijing University of Posts and Telecommunications Beijing China School of Cyber Security National Engineering Laboratory for Mobile Network Security Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing Tongbang Zhuoyi Technology Co. Ltd
Blockchain-as-a-service (BaaS) has gradually serve as an infrastructure, providing underlying blockchain services for the rapid deployment and transaction on-chain of large-scale enterprise application scenarios. By h... 详细信息
来源: 评论
Leveraging the Dual Capabilities of LLM: LLM-Enhanced Text Mapping Model for Personality Detection  39
Leveraging the Dual Capabilities of LLM: LLM-Enhanced Text M...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Bi, Weihong Kou, Feifei Shi, Lei Li, Yawen Li, Haisheng Chen, Jinpeng Xu, Mingying School of Computer Science National Pilot School of Software Engineering BUPT Beijing 100876 China Key Laboratory of Trustworthy Distributed Computing and Service BUPT Ministry of Education Beijing 100876 China State Key Laboratory of Media Convergence and Communication CUC Beijing 100024 China State Key Laboratory of Intelligent Game Yangtze River Delta Research Institute of NPU Taicang 215400 China School of Economics and Management BUPT Beijing 100876 China Beijing Technology and Business University Beijing 100048 China Xiangjiang Laboratory Changsha 410205 China North China University of Technology Beijing 100144 China
Personality detection aims to deduce a user’s personality from their published posts. The goal of this task is to map posts to specific personality types. Existing methods encode post information to obtain user vecto... 详细信息
来源: 评论
TAFM: Topic-Attention FM-encoder for Text Generation  7
TAFM: Topic-Attention FM-encoder for Text Generation
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: He, Dongye Sun, Lijuan Wu, Jingchen Gao, Yutong Wu, Xu Qiu, Lirong Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Beijing University of Posts and Telecommunications School of Cyberspace Security Bupt Beijing China Beijing University of Posts and Telecommunications School of Economics and Management Bupt Beijing China Bupt Beijing China Beijing Jiaotong University Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
With the development and application of deep learning, the research of text generation has made great progress, especially in the fields of machine translation, dialogue generation, etc. However, with the application ... 详细信息
来源: 评论
Dynamic Music emotion recognition based on CNN-BiLSTM
Dynamic Music emotion recognition based on CNN-BiLSTM
收藏 引用
IEEE Information Technology and Mechatronics Engineering Conference (ITOEC)
作者: Pengfei Du Xiaoyong Li Yali Gao Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
Most of the music information will express the emotional signal, the emotional classification of music can be more convenient for the organization and retrieval of music, is the use of music for psychological interven... 详细信息
来源: 评论
Research on Staged Practice Teaching System Based on Systems Engineering
收藏 引用
计算机教育 2021年 第12期 51-55页
作者: Wanjiang Han Jincui Yang Tao Qi Pengfei Sun Xin Jin Jinpeng Chen Yongping Zhang School of Computer Science(National Pilot Software Engineering School)Beijing University of Posts and Telecommunication Key Laboratory of Trustworthy Distributed Computing and Service(BUPT)Ministry of EducationBeijing100876China
The practical teaching management system is an important factor to ensure the quality of *** training of systematic thinking needs a systematic teaching system,and a systematic process is a gradual process and a stand... 详细信息
来源: 评论
Employ Multimodal Machine Learning for Content Quality Analysis
Employ Multimodal Machine Learning for Content Quality Analy...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Pengfei Du Xiaoyong Li Yali Gao Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
User-generated content varies drastically, and todays mainstream media sites have a lot of information presented in graphic form. So the task of identifying high-quality content becomes increasingly important, and it ...
来源: 评论
Review of Semi-Structured Document Information Extraction Techniques Based on Deep Learning
Review of Semi-Structured Document Information Extraction Te...
收藏 引用
Machine Learning, Cloud computing and Intelligent Mining (MLCCIM), International Conference on
作者: Yangchun Li Wei Jiang Shouyou Song Chinese Academy of Cybersapce Studies School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cybersapce Studies Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Chinese Academy of Cybersapce Studies Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the advent of global digital transformation, using an intelligent method based on deep learning to extract crucial information from semi-structured documents, as represented by various types of receipts and invoi...
来源: 评论
An Effective Encrypted Traffic Classification Method Based on Pruning Convolutional Neural Networks for Cloud Platform
An Effective Encrypted Traffic Classification Method Based o...
收藏 引用
作者: Zilong Han Erxia Li Shichao Li Xiaoyong Li Chaoqun Kang Ruiwen Deng Yali Gao State Grid Shanghai Energy Interconnection Research Institute Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications
With the rapid development of cloud computing technology,the traffic of cloud platform also increases *** of these traffic adopt encryption technology,the original traffic classification method is no longer *** this p... 详细信息
来源: 评论
DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM
DCC-Find: DNS Covert Channel Detection by Features Concatena...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Dongxu Han Pu Dong Ning Li Xiang Cui Jiawen Diao Qing Wang Dan Du Yuling Liu Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Beijing China
DNS (Domain Name System) plays an important role in network communication and it is rarely blocked by firewalls and intrusion detection systems (IDS). It is a suitable way for attackers to build DCC (DNS Covert Channe... 详细信息
来源: 评论