咨询与建议

限定检索结果

文献类型

  • 3,876 篇 期刊文献
  • 2,860 篇 会议

馆藏范围

  • 6,736 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,037 篇 工学
    • 4,120 篇 计算机科学与技术...
    • 3,511 篇 电气工程
    • 3,258 篇 信息与通信工程
    • 639 篇 软件工程
    • 427 篇 电子科学与技术(可...
    • 291 篇 交通运输工程
    • 174 篇 控制科学与工程
    • 157 篇 仪器科学与技术
    • 71 篇 机械工程
    • 57 篇 光学工程
    • 38 篇 材料科学与工程(可...
    • 36 篇 动力工程及工程热...
    • 36 篇 土木工程
    • 34 篇 测绘科学与技术
    • 26 篇 力学(可授工学、理...
    • 26 篇 石油与天然气工程
    • 21 篇 生物工程
    • 21 篇 网络空间安全
  • 1,003 篇 理学
    • 588 篇 物理学
    • 284 篇 数学
    • 101 篇 生物学
    • 93 篇 化学
    • 39 篇 统计学(可授理学、...
    • 36 篇 系统科学
    • 21 篇 地球物理学
  • 360 篇 管理学
    • 313 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 148 篇 医学
    • 106 篇 临床医学
    • 50 篇 基础医学(可授医学...
  • 16 篇 教育学
  • 14 篇 经济学
  • 14 篇 文学
  • 13 篇 法学
  • 5 篇 农学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 223 篇 resource managem...
  • 207 篇 internet of thin...
  • 177 篇 optimization
  • 172 篇 servers
  • 165 篇 cloud computing
  • 163 篇 task analysis
  • 161 篇 resource allocat...
  • 153 篇 wireless communi...
  • 145 篇 delays
  • 142 篇 computational mo...
  • 131 篇 blockchain
  • 127 篇 wireless sensor ...
  • 124 篇 quality of servi...
  • 116 篇 security
  • 113 篇 mobile edge comp...
  • 111 篇 deep learning
  • 110 篇 reinforcement le...
  • 96 篇 edge computing
  • 90 篇 routing
  • 88 篇 energy consumpti...

机构

  • 4,919 篇 beijing univ pos...
  • 290 篇 beijing univ pos...
  • 136 篇 beijing univ pos...
  • 133 篇 bupt state key l...
  • 132 篇 state key lab of...
  • 120 篇 beijing univ pos...
  • 120 篇 beijing univ pos...
  • 115 篇 purple mt labs p...
  • 101 篇 beijing univ pos...
  • 85 篇 beijing univ pos...
  • 76 篇 state key lab ne...
  • 69 篇 beijing univ pos...
  • 65 篇 china acad telec...
  • 64 篇 state key labora...
  • 57 篇 tsinghua univ de...
  • 56 篇 capital normal u...
  • 53 篇 peng cheng lab d...
  • 51 篇 beijing univ pos...
  • 50 篇 beijing univ pos...
  • 48 篇 tsinghua univ de...

作者

  • 260 篇 chen junliang
  • 240 篇 qiu xuesong
  • 237 篇 tian hui
  • 232 篇 wang jingyu
  • 215 篇 yang yixian
  • 209 篇 cheng bo
  • 207 篇 wang ying
  • 203 篇 huang tao
  • 197 篇 zhang ping
  • 189 篇 yang fangchun
  • 179 篇 xu changqiao
  • 174 篇 wang shangguang
  • 170 篇 peng mugen
  • 166 篇 li wenjing
  • 164 篇 liao jianxin
  • 159 篇 yu peng
  • 151 篇 gao fei
  • 147 篇 wang wendong
  • 146 篇 qi qi
  • 139 篇 gao zhipeng

语言

  • 6,532 篇 英文
  • 153 篇 其他
  • 47 篇 中文
  • 5 篇 法文
  • 4 篇 德文
  • 1 篇 意大利文
  • 1 篇 俄文
检索条件"机构=State Key Lab of Networking and Switching Tech"
6736 条 记 录,以下是81-90 订阅
排序:
A Lightweight SAR Ship Detection Network Based on Deep Multiscale Grouped Convolution, Network Pruning, and Knowledge Distillation
收藏 引用
IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING 2025年 18卷 2190-2207页
作者: Hu, Boyi Miao, Hongxia Beijing Univ Posts & Telecommun Sch Informat & Commun Engn State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Deep learning has proven to be highly effective in synthetic aperture radar (SAR) image target detection. However, many latest deep learning models have predominantly focused on increasing depth and size to enhance de... 详细信息
来源: 评论
Near-Field High-Speed User Sensing in Wideband mmWave Communications: Algorithms and Bounds
收藏 引用
IEEE TRANSACTIONS ON SIGNAL PROCESSING 2025年 73卷 919-935页
作者: Miao, Hongxia Peng, Mugen Beijing Univ Posts & Telecommun Sch Informat & Commun Engn State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Integrated sensing and communications (ISAC) has been expected to be a key technique in the sixth-generation cellular networks. With the increase of carrier frequency (to millimeter-wave or Terahertz spectrum) and ant... 详细信息
来源: 评论
Differentially private generative decomposed adversarial network for vertically partitioned data sharing
收藏 引用
INFORMATION SCIENCES 2023年 619卷 722-744页
作者: Wang, Zhenya Cheng, Xiang Su, Sen Wang, Guangsheng Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing Peoples R China
This paper considers the problem of differentially private vertically partitioned data shar-ing. In particular, with the assistance of a semi-honest curator, the involved parties (i.e., data owners) each holds records... 详细信息
来源: 评论
Classification-labeled Continuousization and Multi-Domain Spatio-Temporal Fusion for Fine-Grained Urban Crime Prediction
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 2023年 第7期35卷 6725-6738页
作者: Zhao, Shuai Liu, Ruiqiang Cheng, Bo Zhao, Daxing Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Beijing 100876 Peoples R China
Fine-grained urban crime prediction is of great significance to urban management and public safety. Previous crime prediction work has been done at a relatively coarse time granularity, which may suffer from two issue... 详细信息
来源: 评论
A novel synchrosqueezing transform associated with linear canonical transform
收藏 引用
SIGNAL PROCESSING 2025年 227卷
作者: Miao, Hongxia Beijing Univ Posts & Telecommun Sch Informat & Commun Engn State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Synchrosqueezing transforms have aroused great attention for its ability in time-frequency energy rearranging and signal reconstruction, which are post-processing techniques of the time-frequency distribution. However... 详细信息
来源: 评论
FAT: Field-Aware Transformer for Point Cloud Segmentation With Adaptive Attention Fields
收藏 引用
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS 2024年 第9期20卷 10825-10835页
作者: Zhou, Junjie Liu, Baolin Xiong, Yongping Chiu, Chinwai Liu, Fangyu Gong, Xiangyang Beijing Univ Posts & Telecommun Sch Comp Sci State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Point cloud segmentation is crucial for various industrial applications, such as autonomous driving and robotics. Recent developments underscore the significant potential of transformer models in this field. However, ... 详细信息
来源: 评论
Quantum private query protocol based on counterfactual quantum key distribution with noiseless attack
收藏 引用
QUANTUM INFORMATION PROCESSING 2024年 第10期23卷 1-15页
作者: Liu, Dongmei Li, Jian Chen, Xiubo Ye, Chongqiang Wang, Zhuo Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
Most of the previous quantum private query protocols are based on the BB84 key distribution type and generally use a method that wastes most quantum resources to complete security detection. In order to save resources... 详细信息
来源: 评论
MVC-RSN: A Malware Classification Method With Variant Identification Ability
收藏 引用
IEEE INTERNET OF THINGS JOURNAL 2024年 第21期11卷 35654-35668页
作者: Wu, Wei Peng, Haipeng Zhu, Haotian Li, Lixiang Beijing Univ Posts & Telecommun Informat Secur Ctr State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China
With the rapid development of the Internet of Things (IoT), a substantial number of mobile devices may need to be connected to and communicate with the other devices. IoT smart nodes, which play a key role in these pr... 详细信息
来源: 评论
Flight Trajectory Control With Network-Oriented Hierarchical Reinforcement Learning for UAVs-Assisted Data Time-Sensitive IoT
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2025年 第5期26卷 6332-6345页
作者: Wang, Jingyu Li, Songyang Chen, Dezhi Fu, Qianlong Qi, Qi Sun, Haifeng He, Bo Liao, Jianxin Beijing Univ Posts & Telecommun State Key Lab Networking & Switching Technol Beijing 100876 Peoples R China Pengcheng Lab Shenzhen 518000 Peoples R China
Within the Internet of Things (IoT) for traffic monitoring, the employment of autonomous aerial vehicles (AAVs) as relays for collecting and transmitting real-time data from traffic sensors to base stations has proven... 详细信息
来源: 评论
FPCA: Parasitic Coding Authentication for UAVs by FM Signals
收藏 引用
IEEE-ACM TRANSACTIONS ON networking 2024年 第6期32卷 4570-4584页
作者: Zhu, Shaopeng Zheng, Xiaolong Liu, Liang Ma, Huadong Beijing Univ Posts & Telecommun Sch Comp Sci State Key Lab Networking & Switching Technol Beijing 100088 Peoples R China
De-authentication attack is one of the major threats to Unmanned Aerial Vehicle (UAV) communication, in which the attacker continuously sends de-authentication frames to disconnect the UAV communication link. Existing... 详细信息
来源: 评论