咨询与建议

限定检索结果

文献类型

  • 391 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 513 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 266 篇 工学
    • 183 篇 计算机科学与技术...
    • 137 篇 软件工程
    • 86 篇 信息与通信工程
    • 52 篇 电子科学与技术(可...
    • 32 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 15 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 6 篇 土木工程
    • 5 篇 材料科学与工程(可...
    • 5 篇 建筑学
    • 5 篇 生物医学工程(可授...
  • 109 篇 理学
    • 74 篇 数学
    • 28 篇 生物学
    • 25 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 83 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 42 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 81 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 24 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 xi zhang
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 zuo xingquan
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 488 篇 英文
  • 15 篇 其他
  • 13 篇 中文
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
513 条 记 录,以下是251-260 订阅
排序:
An efficient intrusion detection model based on deepFM
An efficient intrusion detection model based on deepFM
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Yuchen Ji Xiaoyong Li Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Beijing University of Posts and Telecommunication Beijing China
With the development of the Internet, more and more network attacks are also emerging. The traditional intrusion detection system has been challenged tremendously, and it is unable to detect the new types of attacks. ... 详细信息
来源: 评论
A High Accuracy DNS Tunnel Detection Method Without Feature Engineering
A High Accuracy DNS Tunnel Detection Method Without Feature ...
收藏 引用
International Conference on Computational Intelligence and Security
作者: Yang Chen XiaoYong Li Beijing Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications) Ministry of Education Beijing China
Domain Name System (DNS) is a key protocol and service used on the Internet. It is responsible for converting domain names into IP addresses. DNS tunnel is a method of encoding data of other programs or protocols in D... 详细信息
来源: 评论
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities
Multi-level Directed Fuzzing for Detecting Use-after-Free Vu...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yuntao Zhang Zhongru Wang Weiqiang Yu Binxing Fang Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China Chinese Academy of Cyberspace Studies Beijing China Beijing DigApis Technology Co. Ltd Beijing China
Greybox fuzzing has been widely used in vulnerabilities detection. Most greybox fuzzing tools are coverage-based, which usually use basic block transition to gain code coverage and focus on improving it to trigger mor... 详细信息
来源: 评论
Scalable Blind Matching: An Efficient Ciphertext Matching Scheme for Content-Based Pub/Sub Cloud services
Scalable Blind Matching: An Efficient Ciphertext Matching Sc...
收藏 引用
IEEE International Conference on Big Data
作者: Qingling Feng Ruisheng Shi Qifeng Luo Lina Lan Jinqiao Shi Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Content-based publish/subscribe cloud services are prevailing recently. Confidentiality in publish/subscribe cloud services has become a major concern, especially for applications with sensitive data. Many methods hav... 详细信息
来源: 评论
EML-Based IM/DD Transmission over Dispersion-Uncompensated Links Using Low-Complexity Optimized Detection
EML-Based IM/DD Transmission over Dispersion-Uncompensated L...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Shuangyue Liu Han Cui Xizi Tang Yueming Lu Yaojun Qiao State Key Laboratory of Information Photonics and Optical Communications School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
We experimentally demonstrate an EML-based 40-Gbit/s OOK IM/DD trans-mission over 120-km SSMF using a low-complexity optimized detection algorithm, which requires no multiplication during the update of survival path, ... 详细信息
来源: 评论
Fast and Efficient Layer-Aware Container Vulnerability Patching in Edge computing  4th
Fast and Efficient Layer-Aware Container Vulnerability Patc...
收藏 引用
4th International Conference on Ubiquitous Security, UbiSec 2024
作者: Xie, Xuan Hu, Yuting Chen, Xinpu Lin, Yumin Tang, Zhiqing Guo, Jianxiong Zhang, Tianle Wang, Tian Faculty of Arts and Sciences Beijing Normal University Zhuhai China Institute of AI and Future Networks Beijing Normal University Zhuhai China BNU-HKBU United International College Zhuhai China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
With the rise of Edge computing (EC), more applications are being deployed on edge servers using containers to serve users. These containers rely on image files composed of multiple layers, which often harbor vulnerab... 详细信息
来源: 评论
An iterative sinogram metal artifact reducdion based on UNet
An iterative sinogram metal artifact reducdion based on UNet
收藏 引用
IEEE International Conference on Big Data
作者: Zichong An Xuemei Zhu Xiangling Fu Junqi Ma Chenyi Guo Zheng Zhang School of Computer Science(National Pilot Software Engineering School) Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education Beijing China The University Hospital of Beijing University of Posts and Telecommunications Beijing China Yofo Medical Technology Co. Ltd Beijing China Department of Electronic Enginerring Tsinghua University Beijing China School of Modern Post(School of Automation) Beijing University of Posts and Telecommunications Beijing China
In the practice of dentistry, oral dental CT images are frequently used to assist doctors in diagnosis. Filtered back projection (FBP) technique is widely employed in practice for the reconstruction of CT images obtai...
来源: 评论
An Efficient Trust Inference Algorithm with Local Weighted Centrality for Social Recommendation
An Efficient Trust Inference Algorithm with Local Weighted C...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Binsi Cai Xiaoyong Li Yali Gao Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing P.R.China
The integration of trust system and recommendation system is a new hot spot in current research. Trust relationship has be exploited in social recommendation, which can effectively solve the problems of low recommenda... 详细信息
来源: 评论
distributed File System Multilevel Fault-Tolerant High Availability Mechanism  2020
Distributed File System Multilevel Fault-Tolerant High Avail...
收藏 引用
Proceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies
作者: Yufeng Shi Jinxin Zuo Yihong Guo Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Servi-ce(BUPT) Ministry of Education Beijing University of Posts and Telecommunications Beijing China Nanjing University of Science & Technology Nanjing Jiangsu China
To solve the single point of failure (SPoF), we designed a distributed file system multilevel fault-tolerant high availability mechanism and implemented the multilevel fault-tolerant file system (MFTFS). At the same t... 详细信息
来源: 评论
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI C...
收藏 引用
Annual Conference on Privacy, Security and Trust, PST
作者: Yihao Yang Xiaolei Dong Jiachen Shen Zhenfu Cao Yunbo Yang Jun Zhou Liming Fang Zhe Liu Chunpeng Ge Chunhua Su Zongyang Hou Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai China Research Center for Basic Theories of Intelligent Computing Research Institute of Basic Theories Zhejiang Lab Hangzhou China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China Science and Technology on Parallel and Distributed Processing Laboratory (PDL) Changsha China Shandong University Jinan China University of Aizu Fukushima Japan Print-Rite Technology Development Co. Ltd. Of Zhuhai China
Private Set Intersection (PSI) is one of the most important functions in secure multiparty computation (MPC). PSI protocols have been a practical cryptographic primitive and there are many privacy-preserving applicati...
来源: 评论