咨询与建议

限定检索结果

文献类型

  • 197 篇 期刊文献
  • 133 篇 会议

馆藏范围

  • 330 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 247 篇 工学
    • 158 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 57 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 27 篇 控制科学与工程
    • 26 篇 生物工程
    • 19 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 6 篇 土木工程
  • 153 篇 理学
    • 86 篇 数学
    • 35 篇 生物学
    • 33 篇 物理学
    • 19 篇 化学
    • 18 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 61 篇 管理学
    • 33 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 农学
  • 5 篇 法学
  • 5 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 8 篇 deep learning
  • 6 篇 convolution
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 5 篇 object detection
  • 5 篇 deep neural netw...
  • 5 篇 lightweight bloc...
  • 4 篇 internet of thin...
  • 4 篇 support vector m...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 genetic algorith...
  • 4 篇 machine learning
  • 3 篇 compressed sensi...
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 iterative method...
  • 3 篇 contrastive lear...
  • 3 篇 visualization

机构

  • 50 篇 college of compu...
  • 43 篇 hunan provincial...
  • 21 篇 hunan provincial...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 9 篇 college of infor...
  • 8 篇 key laboratory o...
  • 7 篇 key laboratory o...
  • 6 篇 intelligent info...
  • 6 篇 hebei key labora...
  • 6 篇 college of liber...
  • 6 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 chongqing key la...
  • 6 篇 hunan key labora...
  • 5 篇 key laboratory o...
  • 5 篇 school of inform...
  • 5 篇 hunan provincial...

作者

  • 17 篇 zu-guo yu
  • 16 篇 li lang
  • 16 篇 lang li
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 10 篇 vo anh
  • 10 篇 wang kezhi
  • 10 篇 yu zu-guo
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 qiang baohua
  • 8 篇 wang yaonan
  • 7 篇 zou yi
  • 7 篇 liu fang
  • 7 篇 yang xianyi
  • 6 篇 huo danqun
  • 6 篇 ge jiao
  • 6 篇 hou changjun

语言

  • 314 篇 英文
  • 11 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Key Laboratory of Intelligent Information Perception and Processing Technology"
330 条 记 录,以下是11-20 订阅
排序:
Controlled-source electromagnetic noise attenuation via a deep convolutional neural network and high-quality sounding curve screening mechanism
收藏 引用
Geophysics 2025年 第3期90卷 WA125-WA140页
作者: Liu, Yecheng Li, Diquan Li, Jin Zhang, Xian Central South University Monitoring Ministry of Education Key Laboratory of Metallogenic Prediction of Nonferrous Metals and Geological Environment Changsha China Hunan Provincial Key Laboratory of Non-ferrous Resources and Geological Hazard Detection Changsha China Central South University School of Geoscience and Info-physics Changsha China Hunan Normal University College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha China Hunan University of Finance and Economics School of Information Technology and Management Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology Changsha China
Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation... 详细信息
来源: 评论
FSA-Net:A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization
收藏 引用
intelligent Automation & Soft Computing 2023年 第7期37卷 971-983页
作者: Zhipeng Bin Huihuang Zhao Xiaoman Liang Wenli Chen College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two *** this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face *** e... 详细信息
来源: 评论
Design and Implementation of Warning Signs for Vehicles Based on Automatic Navigation Algorithms  1
收藏 引用
13th International Conference on Computer Engineering and Networks, CENet 2023
作者: Wang, Fangyan Jiao, Ge Lu, Jinjia Yuan, Yiping College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421002 China
Traditional warning signs use human retrograde placement;there are problems such as short warning distances, imprecise placement positions, and difficult positioning of accident points. According to statistics, the us... 详细信息
来源: 评论
Abstractive Text Summarization Model Based on BERT Vectorization and Bidirectional Decoding
Abstractive Text Summarization Model Based on BERT Vectoriza...
收藏 引用
2023 International Conference on Cyber Security, Artificial Intelligence, and Digital Economy, CSAIDE 2023
作者: Teng, Keliang Qiang, Baohua Wang, Yufeng Yang, Xianyi Wang, Yuemeng Wang, Chen Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin541004 China Hebei Key Laboratory of Intelligent Information Perception and Processing The 54th Research Institute of CETC Shijiazhuang050081 China
Facing the pressure of the extremely inflated network information and data overload surplus, it is extremely important to locate "valuable information" efficiently and accurately. Text summarization technolo... 详细信息
来源: 评论
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs
收藏 引用
Frontiers of Computer Science 2023年 第4期17卷 97-107页
作者: Jia LI Wenjun LI Yongjie YANG Xueying YANG School of Information Engineering Hunan Industry PolytechnicChangsha 410036China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication EngineeringChangsha University of Science and TechnologyChangsha 410015China Chair of Economic Theory Saarland UniversitySaarbrücken 66123Germany
In the minimum degree vertex deletion problem,we are given a graph,a distinguished vertex in the graph,and an integer κ,and the question is whether we can delete at most κ vertices from the graph so that the disting... 详细信息
来源: 评论
SCENERY:a lightweight block cipher based on Feistel structure
收藏 引用
Frontiers of Computer Science 2022年 第3期16卷 193-202页
作者: Jingya FENG Lang LI Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang 421002China College of Information Science and Engineering Hunan Normal UniversityChangsha 410081China College of Computer Science and Technology Hengyang Normal UniversityHengyang 421002China
In this paper,we propose a new lightweight block cipher called *** main purpose of SCENERY design applies to hardware and software *** is a 64-bit block cipher supporting 80-bit keys,and its data processing consists o... 详细信息
来源: 评论
Side-channel analysis attacks based on deep learning network
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 35-45页
作者: Yu OU Lang LI Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang 421002China College of Information Science and Engineering Hunan Normal UniversityChangsha 410081China College of Computer Science and Technology Hengyang Normal UniversityHengyang 421002China
There has been a growing interest in the sidechannel analysis(SCA)field based on deep learning(DL)*** DL network or model has been developed to improve the efficiency of ***,few studies have investigated the impact of... 详细信息
来源: 评论
Unified convergence analysis of a second-order method of multipliers for nonlinear conic programming
收藏 引用
Science China Mathematics 2022年 第11期65卷 2397-2422页
作者: Liang Chen Junyuan Zhu Xinyuan Zhao School of Mathematics Hunan UniversityChangsha 410082China Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics Changsha 410082China School of Mathematics Beijing University of TechnologyBeijing 100124China
In this paper,we accomplish the unified convergence analysis of a second-order method of multipliers(i.e.,a second-order augmented Lagrangian method)for solving the conventional nonlinear conic optimization ***,the al... 详细信息
来源: 评论
Chinese Event Extraction Algorithm of Multi-information Semantic Enhancements  12
Chinese Event Extraction Algorithm of Multi-Information Sema...
收藏 引用
12th International Conference on Computing and Pattern Recognition, ICCPR 2023
作者: Qiang, Baohua Tang, Feng Zhou, Xiangyu Wang, Yuanchun Yang, Xianyi Li, Kai Guilin University of Electronic Technology Guilin China The 54th Research Institute of Cetc Shijiazhuang China Hebei Key Laboratory of Intelligent Information Perception and Processing Shijiazhuang China
To address the problems of inaccurate event element extraction, inability to directly handle long texts and errors in the fine-tuning stage of the task due to insufficient semantic information and incomplete semantic ... 详细信息
来源: 评论
Semantic Matching Algorithm for Legal Issues Based on BERT and Graph Convolution with Multi-granularity Features  12
Semantic Matching Algorithm for Legal Issues Based on BERT a...
收藏 引用
12th International Conference on Computing and Pattern Recognition, ICCPR 2023
作者: Qiang, Baohua Pang, Shijie Teng, Keliang Liu, Zhiguang Liu, Weigang Guilin University of Electronic Technology Guilin China The 54th Research Institute of Cetc Shijiazhuang China Hebei Key Laboratory of Intelligent Information Perception and Processing Shijiazhuang China
In recent years, pre-training models represented by BERT have shown amazing text semantic representation capabilities supported by large-scale corpus, and now have become one of the mainstream solutions for semantic m... 详细信息
来源: 评论