咨询与建议

限定检索结果

文献类型

  • 378 篇 会议
  • 120 篇 期刊文献

馆藏范围

  • 498 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 258 篇 工学
    • 176 篇 计算机科学与技术...
    • 131 篇 软件工程
    • 86 篇 信息与通信工程
    • 54 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 14 篇 安全科学与工程
    • 13 篇 电气工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 3 篇 建筑学
  • 107 篇 理学
    • 72 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 16 篇 training
  • 15 篇 signal to noise ...
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 59 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 15 篇 beijing universi...
  • 15 篇 beijing universi...
  • 14 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 9 篇 beijing universi...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 13 篇 gao hui
  • 13 篇 xi zhang
  • 13 篇 zuo xingquan
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 479 篇 英文
  • 10 篇 中文
  • 9 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service"
498 条 记 录,以下是81-90 订阅
排序:
Exact analysis of transmit/receive zero-forcing based Mimo AF two-way relaying when relay has two antennas
Exact analysis of transmit/receive zero-forcing based Mimo A...
收藏 引用
International Conference on Cyberspace Technology, CCT 2013
作者: Li, Rongsheng Lv, Tiejun Lu, Yueming Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing 100876 China
In this paper, the performance of joint transmit/receive zero-forcing (ZF) is analyzed for multiple-input multiple-out (IV11MO) amplify-and-forward (AT) two-way relay network when the relay has two antennas. The perfo... 详细信息
来源: 评论
Research and Implementation of Trusted Data Collection Technology in Network Community  6
Research and Implementation of Trusted Data Collection Techn...
收藏 引用
6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2018
作者: Wu, Xu Duan, Sishu Xie, Xiaqing Key Laboratory of Trustworthy Distributed Computing and Service BUPT China School of Cyberspace Security BUPT China Beijing University of Posts and Telecommunications Library China
This paper attempts to research and implement the data collection technology and trusted mechanism in network communities, and explore how to improve the reliability and credibility of the data collection process from... 详细信息
来源: 评论
A decomposition based multiobjective evolutionary algorithm for dynamic overlapping community detection  13th
A decomposition based multiobjective evolutionary algorithm ...
收藏 引用
13th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2018
作者: Wan, Xing Zuo, Xingquan Song, Feng School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Dynamic and overlapping are common features of community structures of many real world complex networks. There are few studies on detecting dynamic overlapping communities, but those studies consider only single optim... 详细信息
来源: 评论
A Novel Evolutionary Neural Network-based Approach for Online Bus Scheduling  21
A Novel Evolutionary Neural Network-based Approach for Onlin...
收藏 引用
21st International Conference on Networking, Sensing and Control, ICNSC 2024
作者: Tian, Wenyang Wang, Feiyang Zuo, Xingquan School of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Bus scheduling is vital to ensure service quality and save operational costs. Current studies typically consider the problem as an optimization problem and solve it using exact or heuristic approaches. In this paper, ... 详细信息
来源: 评论
An Efficient Batch Verification Scheme for SM2 Signatures  8
An Efficient Batch Verification Scheme for SM2 Signatures
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Liu, Dingning Yuan, Yuyu Xue, Tengfei Chen, Lei Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China Huawei Technologies Co. Ltd China
SM2 cryptographic algorithm is an elliptic curve public key algorithm released by China's State Cryptography Administration, which includes digital signature algorithms, key exchange protocols, public key encrypti... 详细信息
来源: 评论
Short-term traffic flow prediction based on echo state networks
收藏 引用
Advances in Information Sciences and service Sciences 2012年 第9期4卷 269-277页
作者: Yang, Fei Wang, Chunlu Zuo, Xingquan Zhong, Ruiming Xiang, Fei School of Computer Science Beijing University of Post and Telecommunications Key Lab of Trustworthy Distributed Computing and Service of the Ministry of Education of China Services Sciences and Intelligent Transportation Research Center 10086 China
The traffic flow is critical for the traffic control and traffic guidance. As the short-term traffic flow has the characteristics of highly nonlinear, complexity and chaos, the traditional neural networks can not tota... 详细信息
来源: 评论
Joint cache placement and beamforming design for scalable videos in C-RAN  15
Joint cache placement and beamforming design for scalable vi...
收藏 引用
15th International Symposium on Wireless Communication Systems, ISWCS 2018
作者: Ma, Mingfeng Lv, Tiejun Zhang, Xuewei Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing University of Posts and Telecommunications Beijing100876 China
This paper investigates the joint optimization of layered caching and beamforming design for scalable videos delivered by Dynamic Adaptive Streaming over HTTP in the multicell cloud radio access network. To transmit d... 详细信息
来源: 评论
SWIPT-Aided Secure Beamforming Design for Downlink Cooperative NOMA Systems  6
SWIPT-Aided Secure Beamforming Design for Downlink Cooperati...
收藏 引用
6th Global Wireless Summit, GWS 2018
作者: Hao, Yunqin Lv, Tiejun Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education School of Information and Communication Engineering Beijing100876 China
In this paper, we consider a downlink non-orthogonal multiple access system, in which base station emits secret messages to two legitimate users in the presence of multiple eavesdroppers, and all the eavesdroppers col... 详细信息
来源: 评论
TKCA:a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
收藏 引用
Cybersecurity 2021年 第1期4卷 177-192页
作者: Lulu Yang Chen Li Ruibang You Bibo Tu Linghui Li Institute of Information Engineering Chinese Academy of Sciences100093 BeijingChina School of Cyber Security University of Chinese Academy of Sciences100049 BeijingChina Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications100876 BeijingChina
keystroke-based behavioral biometrics have been proven effective for continuous user *** state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some *** remains a c... 详细信息
来源: 评论
VMScan: an out-of-VM malware scanner
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2020年 第4期27卷 59-68页
作者: Lin Jie Liu Chuanyi Fang Binxing School of Computer Science and Technology Harbin Institute of TechnologyShenzhenShenzhen 518055China Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing 100876China Department of Information and Electronic Engineering Chinese Academy of EngineeringBeijing 100088China
The harm caused by malware in cloud computing environment is more and more serious. Traditional anti-virus software is in danger of being attacked when it is deployed in virtual machine on a large scale, and it tends ... 详细信息
来源: 评论