咨询与建议

限定检索结果

文献类型

  • 195 篇 期刊文献
  • 133 篇 会议

馆藏范围

  • 328 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 156 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 57 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 27 篇 控制科学与工程
    • 26 篇 生物工程
    • 19 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 6 篇 土木工程
  • 153 篇 理学
    • 86 篇 数学
    • 35 篇 生物学
    • 33 篇 物理学
    • 19 篇 化学
    • 18 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 61 篇 管理学
    • 33 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 农学
  • 5 篇 法学
  • 5 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 8 篇 deep learning
  • 6 篇 convolution
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 5 篇 deep neural netw...
  • 5 篇 lightweight bloc...
  • 4 篇 internet of thin...
  • 4 篇 object detection
  • 4 篇 support vector m...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 genetic algorith...
  • 4 篇 machine learning
  • 3 篇 compressed sensi...
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 iterative method...
  • 3 篇 contrastive lear...
  • 3 篇 visualization

机构

  • 50 篇 college of compu...
  • 43 篇 hunan provincial...
  • 21 篇 hunan provincial...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 9 篇 college of infor...
  • 8 篇 key laboratory o...
  • 7 篇 key laboratory o...
  • 6 篇 intelligent info...
  • 6 篇 hebei key labora...
  • 6 篇 college of liber...
  • 6 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 chongqing key la...
  • 6 篇 hunan key labora...
  • 5 篇 key laboratory o...
  • 5 篇 school of inform...
  • 5 篇 department of ma...

作者

  • 17 篇 zu-guo yu
  • 16 篇 li lang
  • 16 篇 lang li
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 10 篇 vo anh
  • 10 篇 wang kezhi
  • 10 篇 yu zu-guo
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 qiang baohua
  • 8 篇 wang yaonan
  • 7 篇 zou yi
  • 7 篇 liu fang
  • 7 篇 yang xianyi
  • 6 篇 huo danqun
  • 6 篇 ge jiao
  • 6 篇 hou changjun

语言

  • 312 篇 英文
  • 11 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Key Laboratory of Intelligent Information Perception and Processing Technology"
328 条 记 录,以下是111-120 订阅
排序:
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries  10th
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Tian, Xiaomei Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System  10th
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiang, Jie Tang, Sixin College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
Two Physics-Based Schwarz Preconditioners for Three-Temperature Radiation Diffusion Equations in High Dimensions
收藏 引用
Communications in Computational Physics 2022年 第8期32卷 829-849页
作者: Xiaoqiang Yue Jianmeng He Xiaowen Xu Shi Shu Libo Wang National Center for Applied Mathematics in Hunan Key Laboratory of Intelligent Computing&Information Processing of Ministry of EducationHunan Key Laboratory for Computation and Simulation in Science and EngineeringXiangtan UniversityXiangtan 411105P.R.China Laboratory of Computational Physics Institute of Applied Physics and ComputationalMathematicsBeijing 100094P.R.China College of Information Science and Technology JinanUniversityGuangzhou 510632P.R.China
We concentrate on the parallel,fully coupled and fully implicit solution of the sequence of 3-by-3 block-structured linear systems arising from the symmetrypreserving finite volume element discretization of the unstea... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function  10th
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiao, Ge Liu, Jiahao Zhou, Sheng Luo, Ning College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding application. Therefore, digital image steganography has become a hot research direct... 详细信息
来源: 评论
Design of preventing electricity-stolen intelligent video surveillance terminal based on 4G network
Design of preventing electricity-stolen intelligent video su...
收藏 引用
2017 IEEE Conference on Energy Internet and Energy System Integration, EI2 2017
作者: Xiong, Dezhi Chen, Yilei Yang, Jie Chen, Xiangqun Hunan Province Key Laboratory of Intelligent Electrical Measurement and Application Technology State Grid Hunan Electric Power Company Power Supply Service Center Changsha China Key Laboratory of Fiber Optic Sensing Technology and Information Processing Wuhan University of Technology Wuhan China
The current common preventing electricity-stolen technology and existing defects is analyzed, the key technologies such as 4G communication module, intelligent video forensics are proposed, a intelligent video monitor... 详细信息
来源: 评论
Federated Multitask Learning for HyperFace
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第5期3卷 788-797页
作者: Zhang, Chen Bai, Hang Zhang, Yonggang Niu, Xinyi Yu, Bin Gao, Yuan Xie, Yu Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Province Science and Technology Resources Coordination Center Xi'an710071 China Xidian University Key Laboratory of Intelligent Perception and Image Understanding Ministry of Education Xi'an710071 China Shanxi University Key Laboratory of Computational Intelligence and Chinese Information Processing Ministry of Education Taiyuan030006 China
Multitask learning (MTL) is a promising field in machine learning owing to its capability to improve the generalization performance of all tasks by sharing knowledge among the related tasks. MTL has attracted a large ... 详细信息
来源: 评论
Dynamic maintenance of decision rules for decision attribute values’ changing  25th
Dynamic maintenance of decision rules for decision attribute...
收藏 引用
25th International Conference on Neural information processing, ICONIP 2018
作者: Wang, Yingyao Dai, Jianhua Shi, Hong School of Computer Science and Technology Tianjin University Tianjin300350 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha410081 China
Rule induction method based on rough set theory (RST) which can generate a minimal set of decision rules by using attribute reduction and approximations has received much attention recently. In real-life, the variatio... 详细信息
来源: 评论
Label distribution learning based on ensemble neural networks  25th
Label distribution learning based on ensemble neural network...
收藏 引用
25th International Conference on Neural information processing, ICONIP 2018
作者: Zhai, Yansheng Dai, Jianhua Shi, Hong School of Computer Science and Technology Tianjin University Tianjin300350 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Normal University Changsha410081 China
Label distribution learning (LDL), as an extension of multi-label learning, is a new arising machine learning technique to deal with label ambiguity problems. The maximum entropy model is commonly used in label distri... 详细信息
来源: 评论
HSCS:a hybrid shared cache scheduling scheme for multiprogrammed workloads
收藏 引用
Frontiers of Computer Science 2018年 第6期12卷 1090-1104页
作者: Jingyu ZHANG Chentao WU Dingyu YANG Yuanyi CHEN Xiaodong MENG Liting XU Minyi GUO Department of Computer Science and Engineering Shanghai Jiao Tong UniversityShanghai 200240China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication EngineeringChangsha University of Science and TechnologyChangsha 410004China School of Electronics and Information Shanghai Dianji UniversityShanghai 200240China
The traditional dynamic random-access memory (DRAM) storage medium can be integrated on chips via modern emerging 3D-stacking technology to architect a DRAM shared cache in multicore systems. Compared with static rand... 详细信息
来源: 评论