咨询与建议

限定检索结果

文献类型

  • 195 篇 期刊文献
  • 133 篇 会议

馆藏范围

  • 328 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 245 篇 工学
    • 156 篇 计算机科学与技术...
    • 120 篇 软件工程
    • 57 篇 信息与通信工程
    • 30 篇 电子科学与技术(可...
    • 28 篇 电气工程
    • 27 篇 控制科学与工程
    • 26 篇 生物工程
    • 19 篇 机械工程
    • 18 篇 化学工程与技术
    • 17 篇 网络空间安全
    • 15 篇 光学工程
    • 14 篇 生物医学工程(可授...
    • 12 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 材料科学与工程(可...
    • 8 篇 交通运输工程
    • 7 篇 动力工程及工程热...
    • 7 篇 建筑学
    • 6 篇 土木工程
  • 153 篇 理学
    • 86 篇 数学
    • 35 篇 生物学
    • 33 篇 物理学
    • 19 篇 化学
    • 18 篇 统计学(可授理学、...
    • 15 篇 系统科学
  • 61 篇 管理学
    • 33 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 13 篇 工商管理
  • 12 篇 医学
    • 10 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 7 篇 农学
  • 5 篇 法学
  • 5 篇 军事学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 8 篇 deep learning
  • 6 篇 convolution
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 5 篇 deep neural netw...
  • 5 篇 lightweight bloc...
  • 4 篇 internet of thin...
  • 4 篇 object detection
  • 4 篇 support vector m...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 genetic algorith...
  • 4 篇 machine learning
  • 3 篇 compressed sensi...
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 iterative method...
  • 3 篇 contrastive lear...
  • 3 篇 visualization

机构

  • 50 篇 college of compu...
  • 43 篇 hunan provincial...
  • 21 篇 hunan provincial...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 9 篇 college of infor...
  • 8 篇 key laboratory o...
  • 7 篇 key laboratory o...
  • 6 篇 intelligent info...
  • 6 篇 hebei key labora...
  • 6 篇 college of liber...
  • 6 篇 college of compu...
  • 6 篇 school of comput...
  • 6 篇 chongqing key la...
  • 6 篇 hunan key labora...
  • 5 篇 key laboratory o...
  • 5 篇 school of inform...
  • 5 篇 department of ma...

作者

  • 17 篇 zu-guo yu
  • 16 篇 li lang
  • 16 篇 lang li
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 10 篇 vo anh
  • 10 篇 wang kezhi
  • 10 篇 yu zu-guo
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 qiang baohua
  • 8 篇 wang yaonan
  • 7 篇 zou yi
  • 7 篇 liu fang
  • 7 篇 yang xianyi
  • 6 篇 huo danqun
  • 6 篇 ge jiao
  • 6 篇 hou changjun

语言

  • 312 篇 英文
  • 11 篇 其他
  • 6 篇 中文
检索条件"机构=Hunan Key Laboratory of Intelligent Information Perception and Processing Technology"
328 条 记 录,以下是51-60 订阅
排序:
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and Applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
Koebe Type Theorems and Pre-Schwarzian of Harmonic K-quasiconformal Mappings,and Their Applications
收藏 引用
Acta Mathematica Sinica,English Series 2022年 第11期38卷 1965-1980页
作者: Shao Lin CHEN Saminathan PONNUSAMY College of Mathematics and Statistics Hengyang Normal UniversityHengyang 421002P.R.China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang 421002P.R.China Department of Mathematics Indian Institute of Technology MadrasChennai-600036India
In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal *** we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients estimate,a Li... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
Two Physics-Based Schwarz Preconditioners for Three-Temperature Radiation Diffusion Equations in High Dimensions
收藏 引用
Communications in Computational Physics 2022年 第8期32卷 829-849页
作者: Xiaoqiang Yue Jianmeng He Xiaowen Xu Shi Shu Libo Wang National Center for Applied Mathematics in Hunan Key Laboratory of Intelligent Computing&Information Processing of Ministry of EducationHunan Key Laboratory for Computation and Simulation in Science and EngineeringXiangtan UniversityXiangtan 411105P.R.China Laboratory of Computational Physics Institute of Applied Physics and ComputationalMathematicsBeijing 100094P.R.China College of Information Science and Technology JinanUniversityGuangzhou 510632P.R.China
We concentrate on the parallel,fully coupled and fully implicit solution of the sequence of 3-by-3 block-structured linear systems arising from the symmetrypreserving finite volume element discretization of the unstea... 详细信息
来源: 评论
Federated Multitask Learning for HyperFace
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2022年 第5期3卷 788-797页
作者: Zhang, Chen Bai, Hang Zhang, Yonggang Niu, Xinyi Yu, Bin Gao, Yuan Xie, Yu Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Province Science and Technology Resources Coordination Center Xi'an710071 China Xidian University Key Laboratory of Intelligent Perception and Image Understanding Ministry of Education Xi'an710071 China Shanxi University Key Laboratory of Computational Intelligence and Chinese Information Processing Ministry of Education Taiyuan030006 China
Multitask learning (MTL) is a promising field in machine learning owing to its capability to improve the generalization performance of all tasks by sharing knowledge among the related tasks. MTL has attracted a large ... 详细信息
来源: 评论
Cross-Modality Perturbation Synergy Attack for Person Re-identification  38
Cross-Modality Perturbation Synergy Attack for Person Re-ide...
收藏 引用
38th Conference on Neural information processing Systems, NeurIPS 2024
作者: Gong, Yunpeng Zhong, Zhun Qu, Yansong Luo, Zhiming Ji, Rongrong Jiang, Min School of Informatics Xiamen University China School of Computer Science and Information Engineering Hefei University of Technology China The Department of Artificial Intelligence Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Key Laboratory of Digital Protection and Intelligent Processing of Intangible CulturalHeritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University Fujian Xiamen361005 China
In recent years, there has been significant research focusing on addressing security concerns in single-modal person re-identification (ReID) systems that are based on RGB images. However, the safety of cross-modality...
来源: 评论
Object Detection Algorithm Based on Coordinate Attention and Context Feature Enhancement  22
Object Detection Algorithm Based on Coordinate Attention and...
收藏 引用
Proceedings of the 2022 11th International Conference on Computing and Pattern Recognition
作者: Lingzhi Liu Baohua Qiang Yuanchun Wang Xianyi Yang Jubo Tian Shihao Zhang Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology China Hebei Key Laboratory of Intelligent Information Perception and Processing The 54th Research Institute of CETC China
In recent years, object detection has been widely used in various fields such as face detection, remote sensing image detection and pedestrian detection. Due to the complex environment in the actual scene, we need to ... 详细信息
来源: 评论