咨询与建议

限定检索结果

文献类型

  • 378 篇 会议
  • 120 篇 期刊文献

馆藏范围

  • 498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 258 篇 工学
    • 176 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 86 篇 信息与通信工程
    • 54 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 14 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 3 篇 建筑学
  • 107 篇 理学
    • 72 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 16 篇 training
  • 15 篇 signal to noise ...
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 59 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 15 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 9 篇 beijing universi...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 479 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
498 条 记 录,以下是31-40 订阅
排序:
DRLMS: a multipath scheduler based on deep reinforcement learning  3
DRLMS: a multipath scheduler based on deep reinforcement lea...
收藏 引用
3rd International Conference on Algorithms, Microchips, and Network Applications, AMNA 2024
作者: Zhang, Mengyang Yuan, Kaiguo Li, Xiaoyong Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing China
Most current network devices have multiple network interfaces, and multipath transport protocols can utilize multiple network paths (e.g., WiFi and cellular) to improve the performance and reliability of network trans... 详细信息
来源: 评论
Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gated Recurrent Unit  19
Robust Spatio-Temporal Trajectory Modeling Based on Auto-Gat...
收藏 引用
2022 IEEE SmartWorld, 19th IEEE International Conference on Ubiquitous Intelligence and computing, 2022 IEEE International Conference on Autonomous and Trusted Vehicles Conference, 22nd IEEE International Conference on Scalable computing and Communications, 2022 IEEE International Conference on Digital Twin, 8th IEEE International Conference on Privacy computing and 2022 IEEE International Conference on Metaverse, SmartWorld/UIC/ATC/ScalCom/DigitalTwin/PriComp/Metaverse 2022
作者: Jia, Jia Li, Xiaoyong Li, Ximing Li, Linghui Yuan, Jie Wang, Hongmiao Gao, Yali Qiu, Pengfei Tang, Jialu Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the huge amount of crowd mobility data generated by the explosion of mobile devices, deep neural networks (DNNs) are applied to trajectory data mining and modeling, which make great progresses in those scenarios.... 详细信息
来源: 评论
Towards Energy-Efficiency: Integrating MATD3 Reinforcement Learning Method for Computational Offloading in RIS-Aided UAV-MEC Environments
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Wu, Liangshun Zhang, Cong Zhang, Bin Du, Jianbo Qu, Junsuo Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education Shanghai201804 China Shanghai Key Laboratory of Trustworthy Computing East China Normal University Shanghai201210 China School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Xi'an Key Laboratory of Advanced Control and Intelligent Process School of Automation Xi'an University of Posts & Telecommunications Xi'an710061 China Xinjiang University of Political Science and Law Tumushuke832003 China School of Remote Sensing and Information Engineering Wuhan University Wuhan430079 China Department of Computer City University of Hong Kong 999077 Hong Kong School of Communications and Information Engineering Xi'an University of Posts & Telecommunications Xi'an710061 China
With the proliferation of IoT devices, there is an escalating demand for enhanced computing and communication capabilities. Mobile Edge computing (MEC) addresses this need by relocating computing resources to the netw... 详细信息
来源: 评论
A Neural Network and Bloom Filter-Based Name Search Method in Named Data Networking  4
A Neural Network and Bloom Filter-Based Name Search Method i...
收藏 引用
4th International Conference on Neural Networks, Information and Communication Engineering, NNICE 2024
作者: Liu, Yue Li, Xiaoyong Si, Xiaotian Zhang, Mengyang Yuan, Kaiguo Li, Pengcheng Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
In a new network architecture like NDN, designing an efficient name lookup method has always been a valuable challenge. The paper studies the name lookup technology based on the Bloom filter and BPNN neural network ma... 详细信息
来源: 评论
Encrypted Traffic Classification Model Based on SwinT-CNN  4
Encrypted Traffic Classification Model Based on SwinT-CNN
收藏 引用
4th International Conference on Computer Engineering and Application, ICCEA 2023
作者: Wang, Yueyang Gao, Yali Li, Xiaoyong Yuan, Jie Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the rapid development of the network, the proportion of encrypted traffic in the network is increasing, which brings great challenges to traffic classification. The traditional encrypted traffic classification al... 详细信息
来源: 评论
An Intrusion Detection Method Based on Transformer-LSTM Model  3
An Intrusion Detection Method Based on Transformer-LSTM Mode...
收藏 引用
3rd International Conference on Neural Networks, Information and Communication Engineering, NNICE 2023
作者: Zhang, Zhipeng Si, Xiaotian Li, Linghui Gao, Yali Li, Xiaoyong Yuan, Jie Xing, Guoqiang Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
With the development of network technologies, network intrusion has become increasing complex which makes the intrusion detection challenging. Traditional intrusion detection algorithms detect intrusion traffic throug... 详细信息
来源: 评论
Real Time Attrition Prediction Mechanism Based on Deep Learning  2
Real Time Attrition Prediction Mechanism Based on Deep Learn...
收藏 引用
2nd International Signal Processing, Communications and Engineering Management Conference, ISPCEM 2022
作者: Wu, Chen Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Beijing China
Modern companies mostly have their own employee management systems, which retain a large amount of employee behavior data. These data can be used to mine valuable information, such as whether employees have attrition ... 详细信息
来源: 评论
XThe Application of Robot Localization and Navigation Based on WSN in the Disaster Relief
XThe Application of Robot Localization and Navigation Based ...
收藏 引用
作者: Cui, Xiaoyan Chen, Xiaoshuang Shi, Wei Zhang, Yi Key Laboratory of Trustworthy Distributed Computing and Service Automation School BUPT China
Disasters always disturb our normal life, and the loss is immeasurable. In this paper, we intend to find a new way to reduce the harm. We select the wireless sensor network to control the robot localization and naviga... 详细信息
来源: 评论
An Effective Cloud Workflow Scheduling Approach Combining PSO and Idle Time Slot-Aware Rules
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第5期8卷 1079-1094页
作者: Yun Wang Xingquan Zuo the School of Computing Science Beijing University of Posts and TelecommunicationsBeijing 100876China the School of Information Engineering Nanchang Institute of TechnologyNanchang 330099China the Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing 100876China
Workflow scheduling is a key issue and remains a challenging problem in cloud *** with the large number of virtual machine(VM)types offered by cloud providers,cloud users need to choose the most appropriate VM type fo... 详细信息
来源: 评论
A recommendation algorithm based on adaptive privacy protection  9
A recommendation algorithm based on adaptive privacy protect...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, ISAEECE 2024
作者: Song, Yiyang Li, Xiaoyong Yuan, Kaiguo Kong, Weiyu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing100876 China
Differential privacy, as a provable privacy protection framework, has been widely applied in recommendation systems. However, the integration of existing collaborative filtering algorithms with differential privacy ty... 详细信息
来源: 评论