咨询与建议

限定检索结果

文献类型

  • 95 篇 会议
  • 42 篇 期刊文献

馆藏范围

  • 137 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 95 篇 工学
    • 78 篇 计算机科学与技术...
    • 69 篇 软件工程
    • 22 篇 信息与通信工程
    • 11 篇 生物工程
    • 9 篇 光学工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 5 篇 土木工程
    • 5 篇 化学工程与技术
    • 4 篇 机械工程
    • 4 篇 建筑学
    • 4 篇 交通运输工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 环境科学与工程(可...
    • 3 篇 安全科学与工程
  • 56 篇 理学
    • 36 篇 数学
    • 15 篇 统计学(可授理学、...
    • 12 篇 生物学
    • 9 篇 物理学
    • 5 篇 化学
    • 2 篇 系统科学
  • 31 篇 管理学
    • 17 篇 图书情报与档案管...
    • 16 篇 管理科学与工程(可...
    • 10 篇 工商管理
  • 13 篇 法学
    • 12 篇 社会学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 医学
    • 4 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学

主题

  • 7 篇 feature extracti...
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 reinforcement le...
  • 3 篇 complex networks
  • 3 篇 three-dimensiona...
  • 3 篇 image segmentati...
  • 3 篇 face recognition
  • 3 篇 learning algorit...
  • 3 篇 data mining
  • 3 篇 particle swarm o...
  • 3 篇 topology
  • 3 篇 population dynam...
  • 2 篇 next generation ...
  • 2 篇 semantic segment...
  • 2 篇 distillation
  • 2 篇 task analysis
  • 2 篇 indexes
  • 2 篇 computation offl...
  • 2 篇 big data

机构

  • 38 篇 fujian provincia...
  • 31 篇 college of compu...
  • 30 篇 college of mathe...
  • 18 篇 fujian provincia...
  • 16 篇 key laboratory o...
  • 10 篇 fujian provincia...
  • 8 篇 key laboratory o...
  • 6 篇 college of mathe...
  • 5 篇 fujian provincia...
  • 4 篇 information engi...
  • 4 篇 engineering rese...
  • 4 篇 intelligent info...
  • 4 篇 fujian key lab f...
  • 4 篇 fuzhou universit...
  • 4 篇 school of inform...
  • 3 篇 fujian key labor...
  • 3 篇 college of infor...
  • 3 篇 college of compu...
  • 3 篇 school of comput...
  • 3 篇 cognitive scienc...

作者

  • 22 篇 guo wenzhong
  • 13 篇 guo kun
  • 11 篇 wang shiping
  • 10 篇 yu zhiyong
  • 7 篇 huang fangwan
  • 6 篇 chen zhaoliang
  • 6 篇 guolong chen
  • 6 篇 chen yuzhong
  • 5 篇 xue xingsi
  • 5 篇 xiao ke
  • 5 篇 wu zhihao
  • 5 篇 zhang fuquan
  • 5 篇 ke xiao
  • 5 篇 yanhua liu
  • 4 篇 wenzhong guo
  • 4 篇 wang tao
  • 4 篇 yuzhen niu
  • 4 篇 liu zhanghui
  • 4 篇 zhong luying
  • 4 篇 xiaoling gao

语言

  • 133 篇 英文
  • 3 篇 中文
  • 1 篇 其他
检索条件"机构=Fujian Provincial Key Lab of the Network Computing and Intelligent Information Processing Fujian"
137 条 记 录,以下是71-80 订阅
排序:
Deep Learning-based Multi-task network for intelligent Management of Garbage Deposit Points
Deep Learning-based Multi-task Network for Intelligent Manag...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Yezhen Wang Haobin Zheng Changjiang Mao Jing Zhang Xiao Ke College of Computer and Data Science Fuzhou University Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou
With the economic and social development and the substantial improvement of material conditions, the generation of domestic waste has grown rapidly and has become a constraint factor for the development of new urbaniz... 详细信息
来源: 评论
Color Correction for Stereoscopic Images Based on Gradient Preservation
Color Correction for Stereoscopic Images Based on Gradient P...
收藏 引用
computing Conference, 2019
作者: Liu, Pengyu Niu, Yuzhen Chen, Junhao Shi, Yiqing College of Mathematics and Computer Science Fuzhou University Fuzhou China Fujian Provincial Key Lab of the Network Computing and Intelligent Information Processing Fujian China
Color correction can eliminate the color difference between similar images in image stitching and 3D video reconstruction. The result images generated by the local color correction algorithms usually show structure in... 详细信息
来源: 评论
HTtext: A TextCNN-based pre-silicon detection for hardware Trojans
HTtext: A TextCNN-based pre-silicon detection for hardware T...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Yi Xu Zhenyi Chen Binhong Huang Ximeng Liu Chen Dong College of Computer and Data Science Fuzhou University Fuzhou China University of South Floride Tampa USA Key Lab of Information Security of Network Systems (Fuzhou University) Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University)
With the advent of the intelligence era, the usage and investment for chips have risen year by year, causing the demand for chip security. Machine learning (ML) analysis has made progress as a pre-silicon hardware Tro... 详细信息
来源: 评论
A Comprehensive Assessment Method of Asset Importance for key Asset Protection  2019
A Comprehensive Assessment Method of Asset Importance for Ke...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Xiaoling Gao Yanhua Liu Yanbin Qiu Huajun Liu College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
A Dynamic Demand-driven Smart Manufacturing for Mass Individualization Production
A Dynamic Demand-driven Smart Manufacturing for Mass Individ...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Qiyu Hong Zhenyi Chen Chen Dong Qiancheng Xiong College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University University of South Florida Tampa United States
Industry 4.0 intends to realize mass individualization production driven by customers’ demands, thus generating several advanced manufacturing modes. However, the existing modes have disadvantages such as low custome... 详细信息
来源: 评论
Attack Intent Analysis Method Based on Attack Path Graph  2019
Attack Intent Analysis Method Based on Attack Path Graph
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and network Security
作者: Biqiong Chen Yanhua Liu Shijin Li Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
Review Spam Detection Based on Multi-dimensional Features  9th
Review Spam Detection Based on Multi-dimensional Features
收藏 引用
9th International Conference on Artificial Intelligence and Mobile Services, AIMS 2020, held as part of the Services Conference Federation, SCF 2020
作者: Deng, Liming Wei, Jingjing Liang, Shaobin Wen, Yuhan Liao, Xiangwen College of Mathematics and Computer Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Digital Fujian Institute of Financial Big Data Fuzhou350116 China College of Electronics and Information Science Fujian Jiangxia University Fuzhou350108 China
Review spam detection aims to detect the reviews with false information posted by the spammers on social media. The existing methods of review spam detection ignore the importance of the information hidden in the user... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
Abnormal network traffic detection based on leaf node density ratio  9
Abnormal network traffic detection based on leaf node densit...
收藏 引用
9th International Conference on Communication and network Security, ICCNS 2019
作者: Liu, Huajun Liu, Zhanghui Liu, Yanhua Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
As the network evolves, cyber-attacks become more and more diverse. In the process of detecting network traffic, the most complicated but also the most important task is to find unknown abnormal network traffic data i... 详细信息
来源: 评论