咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 162 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 105 篇 工学
    • 87 篇 计算机科学与技术...
    • 73 篇 软件工程
    • 27 篇 信息与通信工程
    • 13 篇 光学工程
    • 10 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 生物工程
    • 7 篇 控制科学与工程
    • 5 篇 机械工程
    • 5 篇 交通运输工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 土木工程
    • 4 篇 化学工程与技术
    • 4 篇 安全科学与工程
    • 3 篇 建筑学
    • 3 篇 环境科学与工程(可...
    • 2 篇 仪器科学与技术
  • 62 篇 理学
    • 39 篇 数学
    • 19 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 10 篇 生物学
    • 5 篇 化学
    • 3 篇 系统科学
  • 36 篇 管理学
    • 21 篇 图书情报与档案管...
    • 17 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 11 篇 法学
    • 10 篇 社会学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 3 篇 教育学
    • 3 篇 教育学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 农学

主题

  • 10 篇 feature extracti...
  • 6 篇 image segmentati...
  • 6 篇 semantics
  • 6 篇 training
  • 5 篇 reinforcement le...
  • 5 篇 data mining
  • 5 篇 computational mo...
  • 4 篇 big data
  • 4 篇 optimization
  • 4 篇 security
  • 4 篇 clustering algor...
  • 4 篇 software
  • 4 篇 data models
  • 3 篇 complex networks
  • 3 篇 conferences
  • 3 篇 long short-term ...
  • 3 篇 vocabulary
  • 3 篇 face recognition
  • 3 篇 learning algorit...
  • 3 篇 servers

机构

  • 37 篇 fujian provincia...
  • 29 篇 college of mathe...
  • 26 篇 college of compu...
  • 18 篇 fujian provincia...
  • 15 篇 key laboratory o...
  • 11 篇 fujian provincia...
  • 10 篇 key laboratory o...
  • 7 篇 fujian provincia...
  • 7 篇 fujian provincia...
  • 6 篇 fujian provincia...
  • 6 篇 key laboratory o...
  • 6 篇 college of mathe...
  • 5 篇 engineering rese...
  • 5 篇 fujian provincia...
  • 4 篇 information engi...
  • 4 篇 fujian key labor...
  • 4 篇 fuzhou universit...
  • 4 篇 school of inform...
  • 4 篇 the key laborato...
  • 3 篇 faculty of mathe...

作者

  • 22 篇 guo wenzhong
  • 11 篇 wang shiping
  • 11 篇 guo kun
  • 9 篇 ke xiao
  • 8 篇 yu zhiyong
  • 7 篇 xiaodong wu
  • 7 篇 guolong chen
  • 6 篇 xing chen
  • 6 篇 chen zhaoliang
  • 6 篇 xiao ke
  • 6 篇 chen yuzhong
  • 5 篇 wenzhong guo
  • 5 篇 huang fangwan
  • 5 篇 wang tao
  • 5 篇 wu zhihao
  • 5 篇 li zuoyong
  • 5 篇 yanhua liu
  • 5 篇 chen xing
  • 4 篇 lin dazhen
  • 4 篇 chen guolong

语言

  • 157 篇 英文
  • 3 篇 其他
  • 2 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information"
162 条 记 录,以下是91-100 订阅
排序:
A forensics method of web browsing behavior based on association rule mining
A forensics method of web browsing behavior based on associa...
收藏 引用
International Conference on Systems and Informatics (ICSAI)
作者: Yiyun Zhang Guolong Chen College of Mathematics and Computer Science Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente... 详细信息
来源: 评论
An Energy-Efficient Virtual Machine Placement Algorithm Based on Improved Grouping GA
An Energy-Efficient Virtual Machine Placement Algorithm Base...
收藏 引用
IEEE International Conference on Automation, Electronics and Electrical Engineering (AUTEEE)
作者: Taisheng Zeng Xiaodong Wu School of Mathematics and Computer Science Quanzhou Normal University Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian Province University Quanzhou China
Virtual machine placement (VMP) plays a crucial role in optimizing the efficiency and sustainability of data centers. By consolidating virtual machines (VMs) onto fewer physical machines (PMs), VMP can significantly r... 详细信息
来源: 评论
A Multi-scale Framework for Out-of-Distribution Detection in Dermoscopic Images  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Huang, Zhongzheng Wang, Tao Cai, Yuanzheng Liang, Lingyu College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering and International Digital Economy College Minjiang University Fuzhou350108 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan354300 China Fujian Yilian-Health Nursing Information Technology Co. Ltd. Fuzhou350003 China School of Electronic and Information Engineering South China University of Technology Guangzhou510641 China
The automatic detection of skin diseases via dermoscopic images can improve the efficiency in diagnosis and help doctors make more accurate judgments. However, conventional skin disease recognition systems may produce... 详细信息
来源: 评论
Web server security evaluation method based on multi-source data
Web server security evaluation method based on multi-source ...
收藏 引用
International Conference on Cloud computing, Big Data and Blockchain (ICCBB)
作者: Kedong Wu Xiaoling Gao Yanhua Liu Provincial Key Laboratory of Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian Fujian Fuzhou Fujian China
Traditional web security assessments are evaluated using a single data source, and the results of the calculations from different data sources are different. Based on multi-source data, this paper uses Analytic Hierar... 详细信息
来源: 评论
Few-Shot Object Detection Based on Generalized Features
Few-Shot Object Detection Based on Generalized Features
收藏 引用
Artificial Intelligence and intelligent information Processing (AIIIP), International Conference on
作者: Qiuqin Chen Xiao Ke Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fuzhou China Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou Fuzhou China
Few-shot object detection aims to rapidly detect novel classes of objects using a minimal number of annotated instances. Compared to methods such as meta-learning, few-shot object detection based on transfer learning ...
来源: 评论
Sparse Representation Optimization of Gaussian Mixed Feature of Image Based on Convolution Neural Network
Research Square
收藏 引用
Research Square 2021年
作者: Ye, Yuguang Quanzhou Normal University Fujian Quanzhou362000 China Fujian Provincial Key Laboratory of Data Intensive Computing Fujian Quanzhou362000 China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University Fujian Quanzhou362000 China
With the rapid development of intelligent algorithm and image processing technology, the limitations of traditional image processing methods are more and more obvious. Based on this, this paper studies a new pattern o... 详细信息
来源: 评论
A Comprehensive Assessment Method of Asset Importance for key Asset Protection  2019
A Comprehensive Assessment Method of Asset Importance for Ke...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Xiaoling Gao Yanhua Liu Yanbin Qiu Huajun Liu College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
Attack Intent Analysis Method Based on Attack Path Graph  2019
Attack Intent Analysis Method Based on Attack Path Graph
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Biqiong Chen Yanhua Liu Shijin Li Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
A method of off-line signature verification for digital forensics
A method of off-line signature verification for digital fore...
收藏 引用
International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)
作者: Weiwei Pan Guolong Chen College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
Signature verification is an important part of digital forensics. In order to solve the shortcomings of manual identification in technical accuracy and subjectivity, this paper proposed an off-line signature identific... 详细信息
来源: 评论
Model-Driven Approach to Hadoop Deployment in Cloud
Model-Driven Approach to Hadoop Deployment in Cloud
收藏 引用
IEEE International Conference on Mobile Cloud computing, Services, and Engineering (MobileCloud)
作者: Zheyi Chen Tao Xiang Xing Chen Department of Computer Science and Technology Tsinghua National Laboratory for Information Science and Technology (TNLIST) Beijing China College of Mathematics and Computer Science Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing Fuzhou China
Due to the diversification of software and hardware resources in cloud and ever-changing demand for deployment, Hadoop deployment is faced with great challenges in difficulty and complexity. Most of present researches... 详细信息
来源: 评论