咨询与建议

限定检索结果

文献类型

  • 195 篇 期刊文献
  • 133 篇 会议

馆藏范围

  • 328 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 156 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 57 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 27 篇 控制科学与工程
    • 26 篇 生物工程
    • 19 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 6 篇 土木工程
  • 153 篇 理学
    • 86 篇 数学
    • 35 篇 生物学
    • 33 篇 物理学
    • 19 篇 化学
    • 18 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 61 篇 管理学
    • 33 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 农学
  • 5 篇 法学
  • 5 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 8 篇 deep learning
  • 6 篇 convolution
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 5 篇 deep neural netw...
  • 5 篇 lightweight bloc...
  • 4 篇 internet of thin...
  • 4 篇 object detection
  • 4 篇 support vector m...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 genetic algorith...
  • 4 篇 machine learning
  • 3 篇 compressed sensi...
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 iterative method...
  • 3 篇 contrastive lear...
  • 3 篇 visualization

机构

  • 50 篇 college of compu...
  • 43 篇 hunan provincial...
  • 21 篇 hunan provincial...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 9 篇 college of infor...
  • 8 篇 key laboratory o...
  • 7 篇 key laboratory o...
  • 6 篇 intelligent info...
  • 6 篇 hebei key labora...
  • 6 篇 college of liber...
  • 6 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 chongqing key la...
  • 6 篇 hunan key labora...
  • 5 篇 key laboratory o...
  • 5 篇 school of inform...
  • 5 篇 department of ma...

作者

  • 17 篇 zu-guo yu
  • 16 篇 li lang
  • 16 篇 lang li
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 10 篇 vo anh
  • 10 篇 wang kezhi
  • 10 篇 yu zu-guo
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 qiang baohua
  • 8 篇 wang yaonan
  • 7 篇 zou yi
  • 7 篇 liu fang
  • 7 篇 yang xianyi
  • 6 篇 huo danqun
  • 6 篇 ge jiao
  • 6 篇 hou changjun

语言

  • 312 篇 英文
  • 11 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Key Laboratory of Intelligent Information Perception and Processing Technology"
328 条 记 录,以下是101-110 订阅
排序:
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos  10th
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Li, Kangman Li, Qiuping College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
Gender Identification for Coloring Black and White Portrait with cGan  10th
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Liu, Qingyun Lin, Mugang Sun, Yaqi Zhang, Feng College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style... 详细信息
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm  10th
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Wang, Ying Liu, Qingyun Sun, Yaqi Zhang, Feng Zhu, Yining College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine lear... 详细信息
来源: 评论
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal and Collision Reduction
ALOHA Anti-collision Algorithm for Frame Idle Slot Removal a...
收藏 引用
作者: Deng, Hong-wei Zeng, Wei Yao, Ming Kong, Jia-li College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this study, we propose an ALOHA anti-collision algorithm for frame idle slot removal and collision reduction—called the Cancel Idle and Reduce Collision Framed Slotted Aloha (CIRC-FSA) algorithm—to address the co... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
Design of a Real-Time and Reliable Multi-machine System  10th
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control use... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT  9th
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient met... 详细信息
来源: 评论
An Optimized Scheme of information Hiding-Based Visual Secret Sharing  9th
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zou, Yi Li, Lang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and co... 详细信息
来源: 评论
WeChat Public Platform for Customers Reserving Bank Branches Based IoT  9th
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Chen, Jie Liang, Xiaoman Zhang, Jian College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the development of the social economy, the amount of currency circulation has increased and become more frequent, but the customer gathering often occurs in many bank’s business. In this paper, with some framewo... 详细信息
来源: 评论