咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 125 篇 计算机科学与技术...
    • 88 篇 软件工程
    • 61 篇 信息与通信工程
    • 46 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 21 篇 交通运输工程
    • 20 篇 生物工程
    • 19 篇 机械工程
    • 17 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 12 篇 电气工程
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
  • 90 篇 理学
    • 63 篇 数学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 7 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 22 篇 feature extracti...
  • 18 篇 semantics
  • 13 篇 security
  • 12 篇 optimization
  • 10 篇 task analysis
  • 10 篇 neural networks
  • 10 篇 cyberspace
  • 9 篇 conferences
  • 9 篇 real-time system...
  • 9 篇 data science
  • 9 篇 training
  • 8 篇 signal to noise ...
  • 8 篇 resource managem...
  • 8 篇 antennas
  • 8 篇 mimo
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 deep learning
  • 7 篇 simulation
  • 7 篇 mimo communicati...

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 36 篇 school of inform...
  • 30 篇 key laboratory o...
  • 21 篇 school of comput...
  • 18 篇 school of cybers...
  • 15 篇 beijing universi...
  • 13 篇 beijing universi...
  • 13 篇 key laboratory o...
  • 12 篇 ministry of educ...
  • 12 篇 school of softwa...
  • 10 篇 beijing universi...
  • 10 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 chinese academy ...
  • 8 篇 beijing digapis ...
  • 8 篇 school of cybers...
  • 8 篇 beijing universi...
  • 6 篇 key laboratory o...

作者

  • 44 篇 yueming lu
  • 36 篇 lu yueming
  • 28 篇 tiejun lv
  • 27 篇 xiaoyong li
  • 25 篇 hui gao
  • 24 篇 songlin sun
  • 24 篇 wu xu
  • 22 篇 xu wu
  • 21 篇 xiaojun jing
  • 17 篇 xiaqing xie
  • 16 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 lv tiejun
  • 13 篇 jingchen wu
  • 12 篇 hai huang
  • 12 篇 sun lijuan
  • 12 篇 binxing fang
  • 12 篇 xie xiaqing
  • 9 篇 qiao yaojun
  • 9 篇 fang binxing

语言

  • 359 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education"
375 条 记 录,以下是31-40 订阅
排序:
Robust text clustering with graph and textual adversarial learning  5
Robust text clustering with graph and textual adversarial le...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Liang, Yongming Tian, Tian Jin, Kaifu Yang, Xiaoyu Lv, Yuefei Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ... 详细信息
来源: 评论
Cross-Lingual Propaganda Detection
Cross-Lingual Propaganda Detection
收藏 引用
2022 IEEE International Conference on Big Data, Big Data 2022
作者: Zhang, Wenshan Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Propaganda information that aims at influencing people's opinions is becoming more and more common around people, especially through social media. For the detection of propaganda content, researchers have conducte... 详细信息
来源: 评论
QoS-aware precautionary performance monitoring for PCE-based coherent optical OFDM networks
收藏 引用
Chinese Optics Letters 2012年 第4期10卷 8-10页
作者: 陆月明 侯连兴 Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications
A quality-of-service(QoS)aware scheme,called precautionary performance monitoring,is proposed to solve the optical impairments and congestion control in coherent optical orthogonal frequency division multiplexed(CO... 详细信息
来源: 评论
Leveraging Multi-aspect Semantics for Conversation Structure Modeling  7
Leveraging Multi-aspect Semantics for Conversation Structure...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Guo, Tuwen Zhang, Xi Qiu, Lirong Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
With the advent of online chatting systems, conversation structure modeling has attracted increasing attention and can be beneficial to many downstream tasks such as topic summarization and dialog generation. Existing... 详细信息
来源: 评论
Mask Neural Network for Predicting Flight Ticket Price  6th
Mask Neural Network for Predicting Flight Ticket Price
收藏 引用
6th Conference on Signal and Information Processing, Networking and Computers, ICSINC 2019
作者: Zhang, Qianqian He, Yuan Jing, Xiaojun Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Recently, the global air traffic has increased rapidly, most passengers choose to buy tickets in their own experiences. So accurately predicting flight ticket price is of great significance. Recently there exist some ... 详细信息
来源: 评论
Insider Threat Detection Based on User Historical Behavior and Attention Mechanism  6
Insider Threat Detection Based on User Historical Behavior a...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: He, Weiyu Wu, Xu Wu, Jingchen Xie, Xiaqing Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Ministry Of Education Key Laboratory Of Trustworthy Distributed Computing And Service Beijing China
Insider threat makes enterprises or organizations suffer from the loss of property and the negative influence of reputation. User behavior analysis is the mainstream method of insider threat detection, but due to the ... 详细信息
来源: 评论
Tree pruning for MIMO sphere detection based on MMSE detection
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2012年 第4期19卷 64-72页
作者: WANG Shi-liang SUN Song-lin J1NG Xiao-jun LU Yue-ming School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and TelecommunicationsBeijing 100876China
Tree pruning is an effective algorithm to reduce the complexity of sphere detection (SD) for multiple-input multiple-output (MIMO) communication systems. How to determine the tree pruning rule, as well as by what ... 详细信息
来源: 评论
Network Traffic Generation Based on Statistical Packet-Level Characteristics
收藏 引用
China Communications 2015年 第S2期12卷 144-148页
作者: WANG Dongbin ZHUO Weihan ZHANG Junhui WU Kexin OUYANG Wen School of Software Engineering Beijing University of Posts and Telecommunications National Engineering Laboratory for Mobile Network Security (BUPT) Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
Network traffic is very important for testing network equipment, network services, and security products. A new method of generating traffic based on statistical packet-level characteristics is proposed. In every time... 详细信息
来源: 评论
Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale Analysis  9
Modification Method for Internal Network Flow Anomaly Detect...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Zhang, Xinyu Ding, Junmei Lu, Yueming Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a... 详细信息
来源: 评论
Sensitive Image Information Recognition Model of Network Community based on Content Text  6
Sensitive Image Information Recognition Model of Network Com...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Gao, Li Wu, Xu Wu, Jingchen Xie, Xiaqing Qiu, Lirong Sun, Lijuan Beijing University Of Posts And Telecommunications Key Laboratory Of Trustworthy Distributed Computing And Service Ministry Of Education Beijing China
With the advent of the multimedia era and the age of picture-reading, the recognition effect of sensitive content of image data has become the key to maintain the information security of network communities. At presen... 详细信息
来源: 评论