咨询与建议

限定检索结果

文献类型

  • 383 篇 会议
  • 122 篇 期刊文献

馆藏范围

  • 505 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 260 篇 工学
    • 179 篇 计算机科学与技术...
    • 133 篇 软件工程
    • 87 篇 信息与通信工程
    • 49 篇 电子科学与技术(可...
    • 31 篇 控制科学与工程
    • 27 篇 生物工程
    • 24 篇 机械工程
    • 22 篇 交通运输工程
    • 18 篇 仪器科学与技术
    • 18 篇 网络空间安全
    • 16 篇 电气工程
    • 15 篇 安全科学与工程
    • 10 篇 光学工程
    • 7 篇 化学工程与技术
    • 6 篇 动力工程及工程热...
    • 5 篇 材料科学与工程(可...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 建筑学
  • 108 篇 理学
    • 73 篇 数学
    • 28 篇 生物学
    • 24 篇 统计学(可授理学、...
    • 17 篇 物理学
    • 7 篇 化学
    • 6 篇 系统科学
  • 82 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 41 篇 图书情报与档案管...
    • 18 篇 工商管理
  • 9 篇 法学
    • 9 篇 社会学
  • 4 篇 医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 2 篇 艺术学
  • 1 篇 教育学
  • 1 篇 文学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 27 篇 feature extracti...
  • 21 篇 semantics
  • 16 篇 security
  • 16 篇 mimo
  • 15 篇 signal to noise ...
  • 15 篇 training
  • 13 篇 deep learning
  • 13 篇 optimization
  • 12 篇 neural networks
  • 11 篇 conferences
  • 11 篇 task analysis
  • 11 篇 real-time system...
  • 11 篇 antennas
  • 10 篇 array signal pro...
  • 10 篇 cyberspace
  • 9 篇 simulation
  • 9 篇 vectors
  • 9 篇 interference
  • 9 篇 predictive model...
  • 9 篇 data science

机构

  • 88 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 60 篇 key laboratory o...
  • 38 篇 school of inform...
  • 30 篇 key laboratory o...
  • 23 篇 school of comput...
  • 19 篇 school of cybers...
  • 18 篇 school of softwa...
  • 17 篇 beijing universi...
  • 15 篇 beijing universi...
  • 13 篇 moe key laborato...
  • 13 篇 key laboratory o...
  • 12 篇 university of sc...
  • 12 篇 ministry of educ...
  • 12 篇 school of cybers...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 10 篇 beijing universi...
  • 9 篇 state key labora...
  • 9 篇 key laboratory o...

作者

  • 48 篇 yueming lu
  • 42 篇 tiejun lv
  • 40 篇 xiaoyong li
  • 39 篇 hui gao
  • 38 篇 lu yueming
  • 27 篇 songlin sun
  • 25 篇 wu xu
  • 23 篇 xu wu
  • 22 篇 xiaojun jing
  • 18 篇 xiaqing xie
  • 16 篇 yali gao
  • 16 篇 lv tiejun
  • 16 篇 wu jingchen
  • 15 篇 li xiaoyong
  • 14 篇 hai huang
  • 14 篇 zuo xingquan
  • 13 篇 gao hui
  • 13 篇 xi zhang
  • 13 篇 wang quan
  • 13 篇 jingchen wu

语言

  • 482 篇 英文
  • 13 篇 其他
  • 10 篇 中文
检索条件"机构=The Key Laboratory of Trustworthy Distributed Computing and Service"
505 条 记 录,以下是41-50 订阅
排序:
RDI: An adversarial robustness evaluation metric for deep neural networks based on sample clustering features
arXiv
收藏 引用
arXiv 2025年
作者: Song, Jialei Zuo, Xingquan Wang, Feiyang Huang, Hai Zhang, Tianle Shool of Computer Science Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China Shool of Cyberspace Security Beijing University of Posts and Telecommunications Beijing China
Deep neural networks (DNNs) are highly susceptible to adversarial samples, raising concerns about their reliability in safety-critical tasks. Currently, methods of evaluating adversarial robustness are primarily categ... 详细信息
来源: 评论
XThe Application of Robot Localization and Navigation Based on WSN in the Disaster Relief
XThe Application of Robot Localization and Navigation Based ...
收藏 引用
作者: Cui, Xiaoyan Chen, Xiaoshuang Shi, Wei Zhang, Yi Key Laboratory of Trustworthy Distributed Computing and Service Automation School BUPT China
Disasters always disturb our normal life, and the loss is immeasurable. In this paper, we intend to find a new way to reduce the harm. We select the wireless sensor network to control the robot localization and naviga... 详细信息
来源: 评论
An Effective Cloud Workflow Scheduling Approach Combining PSO and Idle Time Slot-Aware Rules
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2021年 第5期8卷 1079-1094页
作者: Yun Wang Xingquan Zuo the School of Computing Science Beijing University of Posts and TelecommunicationsBeijing 100876China the School of Information Engineering Nanchang Institute of TechnologyNanchang 330099China the Key Laboratory of Trustworthy Distributed Computing and Service(BUPT) Ministry of EducationBeijing 100876China
Workflow scheduling is a key issue and remains a challenging problem in cloud *** with the large number of virtual machine(VM)types offered by cloud providers,cloud users need to choose the most appropriate VM type fo... 详细信息
来源: 评论
A recommendation algorithm based on adaptive privacy protection  9
A recommendation algorithm based on adaptive privacy protect...
收藏 引用
9th International Symposium on Advances in Electrical, Electronics, and Computer Engineering, ISAEECE 2024
作者: Song, Yiyang Li, Xiaoyong Yuan, Kaiguo Kong, Weiyu Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing100876 China
Differential privacy, as a provable privacy protection framework, has been widely applied in recommendation systems. However, the integration of existing collaborative filtering algorithms with differential privacy ty... 详细信息
来源: 评论
Multi-Agent Trust Evaluation Model based on Reinforcement Learning  8
Multi-Agent Trust Evaluation Model based on Reinforcement Le...
收藏 引用
8th International Conference on Dependable Systems and Their Applications, DSA 2021
作者: Haoran, Jia Yuyu, Yuan Qiang, Han Pengqian, Zhao Ting, Guo Ministry of Education Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications China
The establishment of trust between agents is an important part of Multi-agent Reinforcement Learning (MARL). Recent studies on multi-agents have paid more attention to the game relationship between agents, ignoring tr... 详细信息
来源: 评论
Browser Fingerprint Linking Based on Transformer-encoder Model
Browser Fingerprint Linking Based on Transformer-encoder Mod...
收藏 引用
2023 International Conference on Computer Network Security and Software Engineering, CNSSE 2023
作者: Tan, Yun Li, Xiaoyong Si, Xiaotian Li, Linghui Gao, Yali Yuan, Jie Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and Telecommunications Beijing100876 China
Browser fingerprinting has been used as a user-tracking technique in recent years. As a long-term tracking technique, it requires not only obtaining unique browser fingerprints but also linking fingerprints from the s... 详细信息
来源: 评论
NFT Security Matrix:Towards Modeling NFT Ecosystem Threat
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第6期139卷 3255-3285页
作者: Peng Liao Chaoge Liu Jie Yin Zhi Wang Xiang Cui Key Laboratory of Trustworthy Distributed Computing and Service Beijing University of Posts and TelecommunicationsBeijing100876China Zhongguancun Laboratory Beijing100094China Institute of Information Engineering Chinese Academy of SciencesBeijing100085China
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in ***,numerous security ... 详细信息
来源: 评论
A Secure Interaction and Control Method for InterClouds services
收藏 引用
China Communications 2015年 第S2期12卷 132-137页
作者: GAN Jiefu PENG Li LU Yueming China Information Security Certification Center School of Information and Communication Engineering Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service (BUPT) Ministry of Education
Inter-clouds services build information bridges over computing clouds so as to provide the convenience for electronic commerce and other information services. However, the interactions between clouds have challenges i... 详细信息
来源: 评论
Game-theoretic private blockchain design in edge computing networks
收藏 引用
Digital Communications and Networks 2024年 第6期10卷 1622-1634页
作者: Daoqi Han Yang Liu Fangwei Zhang Yueming Lu Key Laboratory of Trustworthy Distributed Computing and Service Ministry of EducationBeijing University of Posts and Telecommunications(BUPT)Beijing 100876China Beijing Institute of Astronautical Systems Engineering BeijingChina Beijing Institute of Technology BeijingChina
Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the partic... 详细信息
来源: 评论
Robust text clustering with graph and textual adversarial learning  5
Robust text clustering with graph and textual adversarial le...
收藏 引用
5th IEEE International Conference on Data Science in Cyberspace, DSC 2020
作者: Liang, Yongming Tian, Tian Jin, Kaifu Yang, Xiaoyu Lv, Yuefei Zhang, Xi Beijing University of Posts and Telecommunications Key Laboratory of Trustworthy Distributed Computing and Service Ministry of Education Beijing China
Text clustering is a fundamental task that finds groups of similar texts in the corpus. Deep learning based models can capture the semantic and syntactic information in local word sequences to represent the texts but ... 详细信息
来源: 评论