咨询与建议

限定检索结果

文献类型

  • 195 篇 期刊文献
  • 133 篇 会议

馆藏范围

  • 328 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 156 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 57 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 27 篇 控制科学与工程
    • 26 篇 生物工程
    • 19 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 6 篇 土木工程
  • 153 篇 理学
    • 86 篇 数学
    • 35 篇 生物学
    • 33 篇 物理学
    • 19 篇 化学
    • 18 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 61 篇 管理学
    • 33 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 农学
  • 5 篇 法学
  • 5 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 8 篇 deep learning
  • 6 篇 convolution
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 5 篇 deep neural netw...
  • 5 篇 lightweight bloc...
  • 4 篇 internet of thin...
  • 4 篇 object detection
  • 4 篇 support vector m...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 genetic algorith...
  • 4 篇 machine learning
  • 3 篇 compressed sensi...
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 iterative method...
  • 3 篇 contrastive lear...
  • 3 篇 visualization

机构

  • 50 篇 college of compu...
  • 43 篇 hunan provincial...
  • 21 篇 hunan provincial...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 9 篇 college of infor...
  • 8 篇 key laboratory o...
  • 7 篇 key laboratory o...
  • 6 篇 intelligent info...
  • 6 篇 hebei key labora...
  • 6 篇 college of liber...
  • 6 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 chongqing key la...
  • 6 篇 hunan key labora...
  • 5 篇 key laboratory o...
  • 5 篇 school of inform...
  • 5 篇 department of ma...

作者

  • 17 篇 zu-guo yu
  • 16 篇 li lang
  • 16 篇 lang li
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 10 篇 vo anh
  • 10 篇 wang kezhi
  • 10 篇 yu zu-guo
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 qiang baohua
  • 8 篇 wang yaonan
  • 7 篇 zou yi
  • 7 篇 liu fang
  • 7 篇 yang xianyi
  • 6 篇 huo danqun
  • 6 篇 ge jiao
  • 6 篇 hou changjun

语言

  • 312 篇 英文
  • 11 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Key Laboratory of Intelligent Information Perception and Processing Technology"
328 条 记 录,以下是31-40 订阅
排序:
Structure-constrain Source Free Domain Adaptation with Regularized Knowledge Distillation of Source Model  13
Structure-constrain Source Free Domain Adaptation with Regul...
收藏 引用
13th IEEE Data Driven Control and Learning Systems Conference, DDCLS 2024
作者: Yang, Dan Peng, Xin Su, Cheng Tan, Dayu Chen, Chaoyang Zhong, Weimin Ministry of Education East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Shanghai200237 China Ministry of Education Anhui University Key Laboratory of Intelligent Computing and Signal Processing Anhui Hefei230601 China School of Information and Electrical Engineering Hunan University of Science and Technology Xiangtan China
Transfer learning aims to leverage the knowledge of the source domain to help the learning of unlabeled target domain models. However, all conventional transfer learning methods assume that samples from source and tar... 详细信息
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on information Forensics and Security 2025年
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论
Traffic Signal Light Recognition Based on Transformer  12th
Traffic Signal Light Recognition Based on Transformer
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Ou, Yangze Sun, Yaqi Yu, Xiaozhong Yun, Liuqing College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
With more and more developed technology, unmanned driving technology has gradually entered people’s vision. Many cars are now equipped with self-parking technology, which allows the vehicle to enter the garage throug... 详细信息
来源: 评论
Deep Learning Image Steganalysis Method Fused with CBAM  12th
Deep Learning Image Steganalysis Method Fused with CBAM
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Chen, Huasuo Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421002 China
Steganography is a critical technical tool for preventing the disclosure of sensitive information. The detection performance of picture steganography algorithms based on deep learning has to be enhanced in tandem with... 详细信息
来源: 评论
Traffic Sign Recognition System Based on YOLOv5  12th
Traffic Sign Recognition System Based on YOLOv5
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Zhang, Lin Sun, Yaqi Chen, Wenli Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
Traffic sign recognition is an important part of intelligent driving and an important content of intelligent transportation system. However, the current traffic sign detection algorithm has some problems, such as high... 详细信息
来源: 评论
Adaptive Image Steganographic Analysis System Based on Deep Convolutional Neural Network  11th
Adaptive Image Steganographic Analysis System Based on Deep ...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Jiao, Ge College of Computer Science and Technology Hengyang Normal University HengyangHunan421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application HengyangHunan421002 China
Adaptive steganography emplaces the message into the hard-to-detect noise area or the complex texture area of the image, so the steganography analysis method based on artificial design features needs to design a very ... 详细信息
来源: 评论
Variational Graph Autoencoders Method Based on Attentional Mechanisms for Overlapping Community Detection  12th
Variational Graph Autoencoders Method Based on Attentional M...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Wen, Kunhui Lin, Mugang Zhu, Xuanying Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421008 China
Detecting overlapping communities of an attribute network is an important and difficult issue in network science. Traditional methods for overlapping community detection generally considered only its topological struc... 详细信息
来源: 评论
Attribute Selection Method Based on Artificial Bee Colony Algorithm and Neighborhood Discrimination Matrix Optimization  16th
Attribute Selection Method Based on Artificial Bee Colony Al...
收藏 引用
16th International Conference on Bio-Inspired Computing: Theories and Applications, BIC-TA 2021
作者: Ji, Yuxuan Ye, Jun Yang, Zhenyu Ao, Jiaxin Wang, Lei Nanchang Institute of Technology Jiangxi Nanchang330000 China Key Laboratory of Water Information Cooperative Perception and Intelligent Processing of Jiangxi Province Jiangxi Nanchang330000 China
At present, the existing attribute reduction algorithm combining artificial bee colony and neighborhood rough set basically uses the attribute dependence and the number of attribute subsets as parameters to construct ... 详细信息
来源: 评论
Positive-Guided Knowledge Distillation for Document-Level Relation Extraction with Noisy Labeled Data  12th
Positive-Guided Knowledge Distillation for Document-Level R...
收藏 引用
12th National CCF Conference on Natural Language processing and Chinese Computing, NLPCC 2023
作者: Zeng, Daojian Zhu, Jianling Jiang, Lincheng Dai, Jianhua Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China Institute of AI and Targeted International Communication Hunan Normal University Changsha China College of Advanced Interdisciplinary Studies National University of Defense Technology Changsha China
Since one entity may have multiple mentions and relations between entities may stretch across multiple sentences in a document, the annotation of document-level relation extraction datasets becomes a challenging task.... 详细信息
来源: 评论
Learning to Learn Transferable Generative Attack for Person Re-Identification
arXiv
收藏 引用
arXiv 2024年
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan The College of Electrical and Information Engineering Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology Hunan Changsha China The College of Information Science and Engineering Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Changsha China
Deep learning-based person re-identification (re-id) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely conside... 详细信息
来源: 评论