咨询与建议

限定检索结果

文献类型

  • 78 篇 会议
  • 69 篇 期刊文献

馆藏范围

  • 147 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 113 篇 工学
    • 69 篇 计算机科学与技术...
    • 51 篇 软件工程
    • 19 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 15 篇 电子科学与技术(可...
    • 15 篇 网络空间安全
    • 11 篇 生物工程
    • 8 篇 机械工程
    • 8 篇 光学工程
    • 8 篇 电气工程
    • 6 篇 建筑学
    • 6 篇 土木工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 5 篇 安全科学与工程
    • 4 篇 力学(可授工学、理...
    • 4 篇 化学工程与技术
    • 4 篇 交通运输工程
    • 3 篇 动力工程及工程热...
  • 63 篇 理学
    • 36 篇 数学
    • 12 篇 系统科学
    • 11 篇 物理学
    • 11 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 4 篇 化学
  • 16 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 5 篇 图书情报与档案管...
  • 6 篇 医学
    • 4 篇 基础医学(可授医学...
    • 4 篇 临床医学
  • 5 篇 军事学
    • 5 篇 军队指挥学
  • 3 篇 农学
  • 3 篇 艺术学
  • 2 篇 法学
  • 1 篇 经济学

主题

  • 7 篇 lightweight bloc...
  • 6 篇 internet of thin...
  • 5 篇 deep learning
  • 5 篇 harmonic analysi...
  • 4 篇 side-channel ana...
  • 4 篇 feature extracti...
  • 4 篇 harmonic functio...
  • 3 篇 side channel att...
  • 3 篇 convolutional ne...
  • 2 篇 image enhancemen...
  • 2 篇 object detection
  • 2 篇 image matching
  • 2 篇 information tech...
  • 2 篇 learning algorit...
  • 2 篇 convolution
  • 2 篇 correlation powe...
  • 2 篇 contrastive lear...
  • 2 篇 location awarene...
  • 2 篇 radio frequency ...
  • 2 篇 evolutionary alg...

机构

  • 57 篇 hunan provincial...
  • 50 篇 college of compu...
  • 28 篇 hunan provincial...
  • 19 篇 college of compu...
  • 11 篇 hunan provincial...
  • 8 篇 college of mathe...
  • 7 篇 hengyang normal ...
  • 6 篇 provincial key l...
  • 6 篇 faculty of scien...
  • 6 篇 the institute of...
  • 5 篇 department of ma...
  • 5 篇 college of mathe...
  • 4 篇 school of comput...
  • 4 篇 hengyang normal ...
  • 3 篇 the state key la...
  • 3 篇 college of infor...
  • 3 篇 hunan provincial...
  • 3 篇 school of inform...
  • 2 篇 key laboratory o...
  • 2 篇 fujian provincia...

作者

  • 19 篇 li lang
  • 18 篇 lang li
  • 13 篇 jiao ge
  • 8 篇 zhao huihuang
  • 8 篇 zou yi
  • 7 篇 ge jiao
  • 7 篇 chen shaolin
  • 6 篇 ponnusamy samina...
  • 6 篇 qiuping li
  • 6 篇 liang xiaoman
  • 6 篇 hamada hidetaka
  • 5 篇 chen zhong
  • 5 篇 deng hongwei
  • 5 篇 cui zhi-ming
  • 5 篇 huihuang zhao
  • 5 篇 yi zou
  • 5 篇 li qiuping
  • 5 篇 xiaoman liang
  • 5 篇 wu jian
  • 5 篇 zheng jinhua

语言

  • 139 篇 英文
  • 7 篇 其他
  • 2 篇 中文
检索条件"机构=Human Provincial Key Laboratory of Intelligent Information Processing and Application"
147 条 记 录,以下是71-80 订阅
排序:
Research on Security Trust Model of P2P Network Based on Improved Search Algorithm
Research on Security Trust Model of P2P Network Based on Imp...
收藏 引用
作者: Guangyong Zheng Yuming Xu Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Changsha Normal University
With the rapid development and popularization of the Internet, Peerto-Peer(P2 P) network technology has been developing rapidly, and the security trust mechanism of P2 P network has become a prominent problem. This pa... 详细信息
来源: 评论
A Novel Binary Firefly Algorithm for the Minimum Labeling Spanning Tree Problem
收藏 引用
Computer Modeling in Engineering & Sciences 2020年 第10期125卷 197-214页
作者: Mugang Lin Fangju Liu Huihuang Zhao Jianzhen Chen College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China School of Computer Science University of South ChinaHengyang421001China
Given a connected undirected graph G whose edges are labeled,the minimumlabeling spanning tree(MLST)problemis to find a spanning tree of G with the smallest number of different *** is anNP-hard combinatorial optimizat... 详细信息
来源: 评论
Radiation Pattern Decoupled Dipole Antennas with Shorted Stubs for Millimeter-Wave applications
Radiation Pattern Decoupled Dipole Antennas with Shorted Stu...
收藏 引用
IEEE Conference on Antenna Measurements & applications (CAMA)
作者: Jingchang Nan Kai Lu Jingtao Cao Pengfei Hu Nan Yang Mingming Gao School of electronic and Information Engineering and Liaoning Provincial Key Laboratory of Radio Frequency Big Data Intelligent Application Liaoning Technical University(LNTU) Huludao China School of Electronics and Information technology and Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Sun Yat-sen University (SYSU) Guangzhou China
A pair of shorted stubs are presented in this paper to decouple $1 \times 2$ millimeter-wave printed dipole antennas and to obtain restored radiation patterns. The $1 \times 2$ printed dipole antennas are placed side ... 详细信息
来源: 评论
Adaptive Image Steganographic Analysis System Based on Deep Convolutional Neural Network
Adaptive Image Steganographic Analysis System Based on Deep ...
收藏 引用
作者: Ge Jiao College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Adaptive steganography emplaces the message into the hard-to-detect noise area or the complex texture area of the image, so the steganography analysis method based on artificial design features needs to design a very ... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
作者: Xiyu Sun Zhong Chen College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
Implementation of PRINCE with resource-efficient structures based on FPGAs
收藏 引用
Frontiers of information Technology & Electronic Engineering 2021年 第11期22卷 1505-1516页
作者: Lang LI Jingya FENG Botao LIU Ying GUO Qiuping LI Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang421002China College of Information Science and Engineering Hunan Normal UniversityChangsha410081China College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China
In this era of pervasive computing, low-resource devices have been deployed in various fields. PRINCE is a lightweight block cipher designed for low latency, and is suitable for pervasive computing applications. In th... 详细信息
来源: 评论
EQUIVALENT NORMS AND HARDY-LITTLEWOOD TYPE THEOREMS, AND THEIR applicationS
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Shaolin Hamada, Hidetaka College of Mathematics and Statistics Hengyang Normal University Hunan Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application 421002 China Faculty of Science and Engineering Kyushu Sangyo University 3-1 Matsukadai 2-Chome Higashi-ku Fukuoka813-8503 Japan
The main purpose of this paper is to develop some methods to investigate equivalent norms and Hardy-Littlewood type Theorems on Lipschitz type spaces of analytic functions and complex-valued harmonic functions. Initia... 详细信息
来源: 评论
CA-MLIF: Cross-Attention and Multimodal Low-Rank Interaction Fusion Framework for Tumor Prognostic Prediction  39
CA-MLIF: Cross-Attention and Multimodal Low-Rank Interaction...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: An, Yajun Chen, Jiale Lin, Huan Liu, Zhenbing Feng, Siyang Zhang, Hualong Lan, Rushi Liu, Zaiyi Pan, Xipeng School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China School of Artificial Intelligence and Big Data Chongqing College of Finance and Economics Chongqing402160 China Southern Medical University Guangzhou510080 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin541004 China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangzhou510080 China
Cancer is a leading cause of death worldwide due to its aggressive nature and complex variability. Accurate prognosis is therefore challenging but essential for guiding personalized treatment and follow-up. Previous r... 详细信息
来源: 评论
A Flexible Two-Stage Constrained Multi-Objective Evolutionary Algorithm Based on Autonomic Regulation
SSRN
收藏 引用
SSRN 2022年
作者: Zou, Juan Luo, Jian Liu, Yuan Yang, Shengxiang Zheng, Jinhua Key Laboratory of Intelligent Computing and Information Processing Ministry of Education Computer science College of Xiangtan University Hunan Province Xiangtan China Faculty of Informational Engineering University of Xiangtan Xiangtan411105 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China School of Computer Science and Informatics De Montfort University LeicesterLE1 9BH United Kingdom
The core element in solving constrained multi-objective problems (CMOPs) with evolutionary algorithms is simultaneously balancing objective optimization and constraint satisfaction. The di ffi culty of maintaining thi... 详细信息
来源: 评论
An optimized aes masking method for resisting side channel analysis  8th
An optimized aes masking method for resisting side channel a...
收藏 引用
8th International Conference on Computer Engineering and Networks, CENet 2018
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University HengyangHunan421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application HengyangHunan421002 China
In order to against the side channel analysis attack such as power, electromagnetic waves, and time attack, an optimized masking method is proposed for Advanced Encryption Standard (AES) algorithm in this paper. This ... 详细信息
来源: 评论