咨询与建议

限定检索结果

文献类型

  • 391 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 183 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
  • 109 篇 理学
    • 74 篇 数学
    • 28 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 488 篇 英文
  • 15 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
513 条 记 录,以下是241-250 订阅
排序:
The Controlled Sharing Mechanism for Private Data Based on Blockchain  6
The Controlled Sharing Mechanism for Private Data Based on B...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Wenqing, Li Wenjie, Dong Xu, Zhang Yueming, Lu School Of Cyberspace Security Beijing University Of Posts And Telecommunications Beijing China Beijing Aerospace Automatic Control Institute Beijing China Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trusted Distributed Computing And Service Beijing China
In order to solve the problems that private information is easy to be leaked and privacy violations are difficult to be traced in the process of data cross-domain transferring, we propose a blockchain-based controlled... 详细信息
来源: 评论
QPSK pilot-aided carrier phase recovery algorithm for 800-Gb/s/? DP-256QAM transmission
QPSK pilot-aided carrier phase recovery algorithm for 800-Gb...
收藏 引用
2020 Asia Communications and Photonics Conference, ACPC 2020/International Conference on Information Photonics and Optical Communications, IPOC 2020
作者: Cui, Han Xu, Xuekai Liu, Shuangyue Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
A QPSK pilot-aided carrier phase recovery algorithm is investigated for 800-Gb/s/? DP-256QAM transmission systems. Simulation results show that, compared with BPS, this proposed algorithm reduces by 99% computational ... 详细信息
来源: 评论
Unsupervised Domain Adaptation for Human Activity Recognition in Radar
Unsupervised Domain Adaptation for Human Activity Recognitio...
收藏 引用
IEEE National Conference on Radar
作者: Xinyu Li Xiaojun Jing Yuan He Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunications Beijing China
The difficulty of obtaining large-scale labeled radar data hinders the generalization of supervised deep learning algorithms, which makes the performance of these approaches drop when applied to a new domain. In this ... 详细信息
来源: 评论
An Effective Encrypted Traffic Classification Method Based on Pruning Convolutional Neural Networks for Cloud Platform
An Effective Encrypted Traffic Classification Method Based o...
收藏 引用
International Conference on Electronics, Communications and Information Technology (CECIT)
作者: Zilong Han Erxia Li Shichao Li Xiaoyong Li Chaoqun Kang Ruiwen Deng Yali Gao State Grid Shanghai Energy Interconnection Research Institute Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China Beijing University of Posts and Telecommunications Beijing China
With the rapid development of cloud computing technology, the traffic of cloud platform also increases rapidly. Most of these traffic adopt encryption technology, the original traffic classification method is no longe... 详细信息
来源: 评论
QPSK-assisted MIMO equalization for 800-Gb/s/? DP-256QAM systems
QPSK-assisted MIMO equalization for 800-Gb/s/? DP-256QAM sys...
收藏 引用
2020 Asia Communications and Photonics Conference, ACPC 2020/International Conference on Information Photonics and Optical Communications, IPOC 2020
作者: Liu, Siqi Liu, Shuangyue Tang, Xizi Guo, Mengqi Lu, Yueming Qiao, Yaojun State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing100876 China
A QPSK-assisted MIMO equalization is investigated to compensate bandwidth limitation for 800-Gb/s/? DP-256QAM systems with only 25G-class optics. Compared with conventional MIMO equalization, the proposed equalization... 详细信息
来源: 评论
Towards Energy-Efficiency: Integrating MATD3 Reinforcement Learning Method for Computational Offloading in RIS-Aided UAV-MEC Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wu, Liangshun Zhang, Cong Zhang, Bin Du, Jianbo Qu, Junsuo Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education Shanghai201804 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai201210 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Xi'an Key Laboratory of Advanced Control and Intelligent Process School of Automation Xi'an University of Posts & Telecommunications Xi'an710061 China Xinjiang University of Political Science and Law Tumushuke832003 China School of Remote Sensing and Information Engineering Wuhan University Wuhan430079 China Department of Computer City University of Hong Kong 999077 Hong Kong School of Communications and Information Engineering Xi'an University of Posts & Telecommunications Xi'an710061 China
With the proliferation of IoT devices, there is an escalating demand for enhanced computing and communication capabilities. Mobile Edge computing (MEC) addresses this need by relocating computing resources to the netw... 详细信息
来源: 评论
Mandari: Multi-Modal Temporal Knowledge Graph-aware Sub-graph Embedding for Next-POI Recommendation
Mandari: Multi-Modal Temporal Knowledge Graph-aware Sub-grap...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiaoqian Liu Xiuyun Li Yuan Cao Fan Zhang Xiongnan Jin Jinpeng Chen School of Computer Science (National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The Technology Innovation Center of Cultural Tourism Big Data of Hebei Province Chengde China Hebei Normal University for Nationalities Chengde China Knowledge Discovery and Data Mining Research Center Zhejiang Lab Hangzhou China
Next-POI recommendation aims to explore from user check-in sequence to predict the next possible location to be visited. Existing methods are often difficult to model the implicit association of multi-modal data with ...
来源: 评论
Chinese open relation extraction with pointer-generator networks  5
Chinese open relation extraction with pointer-generator netw...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Cheng, Ziheng Wu, Xu Xie, Xiaqing Wu, Jingchen Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Most of the traditional Chinese open relation extraction (Open RE) system exploit the syntactic, lexical and other language structure information obtained by natural language processing (NLP) tools from sentences to b... 详细信息
来源: 评论
Robust Text Clustering with Graph and Textual Adversarial Learning
Robust Text Clustering with Graph and Textual Adversarial Le...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Yongming Liang Tian Tian Kaifu Jin Xiaoyu Yang Yuefei Lv Xi Zhang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ...
来源: 评论
Real-time event detection and tracking in microblog via text chain and sentiment time series  5
Real-time event detection and tracking in microblog via text...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Piao, Bingxu Wu, Xu Wu, Jingchen Xie, Xiaqing Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Microblog becomes one of the most popular media for sharing first-hand information. As more close to real event, detecting and tracking event in microblogs is a research hotspot. To alleviate feature sparsity problem,... 详细信息
来源: 评论