咨询与建议

限定检索结果

文献类型

  • 286 篇 会议
  • 89 篇 期刊文献

馆藏范围

  • 375 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 125 篇 计算机科学与技术...
    • 88 篇 软件工程
    • 61 篇 信息与通信工程
    • 46 篇 电子科学与技术(可...
    • 21 篇 控制科学与工程
    • 21 篇 交通运输工程
    • 20 篇 生物工程
    • 19 篇 机械工程
    • 17 篇 网络空间安全
    • 14 篇 仪器科学与技术
    • 12 篇 电气工程
    • 9 篇 安全科学与工程
    • 8 篇 光学工程
    • 7 篇 化学工程与技术
    • 4 篇 材料科学与工程(可...
    • 4 篇 动力工程及工程热...
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
  • 90 篇 理学
    • 63 篇 数学
    • 21 篇 生物学
    • 21 篇 统计学(可授理学、...
    • 14 篇 物理学
    • 7 篇 化学
    • 5 篇 系统科学
  • 58 篇 管理学
    • 37 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 3 篇 医学
    • 3 篇 公共卫生与预防医...
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学

主题

  • 22 篇 feature extracti...
  • 18 篇 semantics
  • 13 篇 security
  • 12 篇 optimization
  • 10 篇 task analysis
  • 10 篇 neural networks
  • 10 篇 cyberspace
  • 9 篇 conferences
  • 9 篇 real-time system...
  • 9 篇 data science
  • 9 篇 training
  • 8 篇 signal to noise ...
  • 8 篇 resource managem...
  • 8 篇 antennas
  • 8 篇 mimo
  • 7 篇 scalability
  • 7 篇 data privacy
  • 7 篇 deep learning
  • 7 篇 simulation
  • 7 篇 mimo communicati...

机构

  • 87 篇 key laboratory o...
  • 78 篇 key laboratory o...
  • 36 篇 school of inform...
  • 30 篇 key laboratory o...
  • 21 篇 school of comput...
  • 18 篇 school of cybers...
  • 15 篇 beijing universi...
  • 13 篇 beijing universi...
  • 13 篇 key laboratory o...
  • 12 篇 ministry of educ...
  • 12 篇 school of softwa...
  • 10 篇 beijing universi...
  • 10 篇 school of cybers...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...
  • 8 篇 chinese academy ...
  • 8 篇 beijing digapis ...
  • 8 篇 school of cybers...
  • 8 篇 beijing universi...
  • 6 篇 key laboratory o...

作者

  • 44 篇 yueming lu
  • 36 篇 lu yueming
  • 28 篇 tiejun lv
  • 27 篇 xiaoyong li
  • 25 篇 hui gao
  • 24 篇 songlin sun
  • 24 篇 wu xu
  • 22 篇 xu wu
  • 21 篇 xiaojun jing
  • 17 篇 xiaqing xie
  • 16 篇 wu jingchen
  • 13 篇 zuo xingquan
  • 13 篇 lv tiejun
  • 13 篇 jingchen wu
  • 12 篇 hai huang
  • 12 篇 sun lijuan
  • 12 篇 binxing fang
  • 12 篇 xie xiaqing
  • 9 篇 qiao yaojun
  • 9 篇 fang binxing

语言

  • 359 篇 英文
  • 9 篇 中文
  • 7 篇 其他
检索条件"机构=Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education"
375 条 记 录,以下是81-90 订阅
排序:
Employ Multimodal Machine Learning for Content Quality Analysis
Employ Multimodal Machine Learning for Content Quality Analy...
收藏 引用
IEEE Information Technology, Networking, Electronic and Automation Control Conference
作者: Pengfei Du Xiaoyong Li Yali Gao Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
User-generated content varies drastically, and todays mainstream media sites have a lot of information presented in graphic form. So the task of identifying high-quality content becomes increasingly important, and it ...
来源: 评论
Security-Critical Components Recognition Algorithm for Complex Heterogeneous Information Systems
收藏 引用
Computers, Materials & Continua 2021年 第8期68卷 2579-2595页
作者: Jinxin Zuo Yueming Lu Hui Gao Tong Peng Ziyv Guo Tong An Enjie Liu School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing100876China Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing100876China School of Information and Communication Engineering Beijing University of Posts and TelecommunicationsBeijing100876China University of Bedfordshire Institute for Research in Applicable Computing(IRAC)LutonUK
With the skyrocketing development of technologies,there are many issues in information security quantitative evaluation(ISQE)of complex heterogeneous information systems(CHISs).The development of CHIS calls for an ISQ... 详细信息
来源: 评论
Hybrid text topic discovery method for multi-source information  4
Hybrid text topic discovery method for multi-source informat...
收藏 引用
4th IEEE International Conference on Data Science in Cyberspace, DSC 2019
作者: Wang, Xinzhe Wu, Xu Xie, Xiaqing Xu, Jin Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security Beijing University of Posts and Telecommunications China Beijing University of Posts and Telecommunications Library China
With the wide application of information technology and the rapid development of cyberspace, cyberspace security has become a hot topic in society. Topic discovery technology plays a vital role to grasp the direction ... 详细信息
来源: 评论
The Construction and Application of Work and Production Resuming Behavior System Dynamics Evolutionary Game Regulation and Control Model
收藏 引用
Journal of Systems Science and Information 2023年 第2期11卷 160-178页
作者: Qiao HU Jiayin QI School of Business and Management Shanghai International Studies UniversityShanghai 201620China School of Cyberspace Security Guangzhou UniversityGuangzhou 510006ChinaKey Laboratory of Trustworthy Distributed Computing and Service(BUPT)Ministry of EducationBeijing 100084China
The resumption of production after the“suspension”caused by the COVID-19 has emerged as an urgent problem for many enterprises and the *** resumption of production is actually a dynamic evolution problem from 0 to 1... 详细信息
来源: 评论
A topic mining method for multi-source network public opinion based on improved hierarchical clustering  4
A topic mining method for multi-source network public opinio...
收藏 引用
4th IEEE International Conference on Data Science in Cyberspace, DSC 2019
作者: Cai, Yue Wu, Xu Xie, Xiaqing Xu, Jin Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security Beijing University of Posts and Telecommunications China Beijing University of Posts and Telecommunications Library China
Heterogeneous network information platform contains common topics and characteristic topics. However, there is no unified standard for dividing public opinion topics. And the existing technology cannot adapt to the ch... 详细信息
来源: 评论
Barebones particle swarm optimization with a neighborhood search strategy for feature selection  1
收藏 引用
13th International Conference on Bio-Inspired computing: Theories and Applications, BIC-TA 2018
作者: Qiu, Chenye Zuo, Xingquan School of Internet of Things Nanjing University of Posts and Telecommunications Nanjing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing University of Posts and Telecommunications Beijing China
Feature selection is a vital step in many machine learning and data mining tasks. Feature selection can reduce the dimensionality, speed up the learning process, and improve the performance of the learning models. Mos... 详细信息
来源: 评论
Enhancing Continuous service of Information Systems Based on Cyber Resilience  6
Enhancing Continuous Service of Information Systems Based on...
收藏 引用
6th IEEE International Conference on Data Science in Cyberspace, DSC 2021
作者: Zuo, Jinxin Guo, Ziyu Gan, Jiefu Lu, Yueming School Of Cyberspace Security Beijing University Of Posts And Telecommunications Key Lab Of Trustworthy Distributed Computing And Service Ministry Of Education Beijing China School Of Information And Communication Engineering Beijing University Of Posts And Telecommunications Key Lab Of Trustworthy Distributed Computing And Service Ministry Of Education Beijing China China Cyber Security Review Technology And Certification Center Beijing China
Cyber resilience has become a strategic point of information security in recent years. In the face of complex attack means and severe internal and external threats, it is difficult to achieve 100% protection against i... 详细信息
来源: 评论
AABN: Anonymity Assessment Model Based on Bayesian Network With Application to Blockchain
收藏 引用
China Communications 2019年 第6期16卷 55-68页
作者: Tianbo Lu Ru Yan Min Lei Zhimin Lin School of Software Engineering Beijing University of Posts and Telecommunications100876 BeijingChina Key Laboratory of Trustworthy Distributed Computing and Service(Beijing University of Posts and Telecommunications) Ministry of Education100876 BeijingChina Information Security Center School of Cyberspace SecurityBeijing University of Posts and TelecommunicationsBeijing 100876China
Blockchain is a technology that uses community validation to keep synchronized the content of ledgers replicated across multiple users,which is the underlying technology of digital currency like *** anonymity of block... 详细信息
来源: 评论
Multi-features based classification for automatic summarization
Multi-features based classification for automatic summarizat...
收藏 引用
International Conference on Multimedia, Communication and computing Application, MCCA 2014
作者: Li, H.Y. Liu, R.F. Xu, W.R. Shi, R.S. School of Information and Communication Engineering Beijing University of Posts and Telecommunication Beijing China Education Ministry Key Laboratory of Trustworthy Distributed Computing and Service BUPT School of Humanities BUPT Beijing China
That the summary of an article can be automatically generated is an important text processing technique. The technique can automatically extract the most useful information of the text and present that information, wh... 详细信息
来源: 评论
Hot event detection for social media based on keyword semantic information  4
Hot event detection for social media based on keyword semant...
收藏 引用
4th IEEE International Conference on Data Science in Cyberspace, DSC 2019
作者: Yu, Zexuan Wu, Xu Xie, Xiaqing Xu, Jin Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education China School of Cyberspace Security China Beijing University of Posts and Telecommunications Library Beijing University of Posts and Telecommunications Beijing China
Statistical features are commonly used to detect hot events in social media. However, these features cannot represent the semantic similarity of synonym expression. Aiming at this problem, a semantic keyword-based hot... 详细信息
来源: 评论