咨询与建议

限定检索结果

文献类型

  • 89 篇 期刊文献
  • 76 篇 会议

馆藏范围

  • 165 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 122 篇 工学
    • 93 篇 计算机科学与技术...
    • 81 篇 软件工程
    • 29 篇 信息与通信工程
    • 19 篇 控制科学与工程
    • 18 篇 电气工程
    • 15 篇 电子科学与技术(可...
    • 13 篇 生物工程
    • 7 篇 机械工程
    • 7 篇 仪器科学与技术
    • 7 篇 动力工程及工程热...
    • 7 篇 化学工程与技术
    • 6 篇 力学(可授工学、理...
    • 6 篇 光学工程
    • 5 篇 生物医学工程(可授...
    • 4 篇 安全科学与工程
    • 4 篇 网络空间安全
    • 3 篇 建筑学
  • 78 篇 理学
    • 52 篇 数学
    • 13 篇 物理学
    • 13 篇 生物学
    • 12 篇 系统科学
    • 7 篇 化学
    • 4 篇 统计学(可授理学、...
  • 33 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 16 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 7 篇 医学
    • 6 篇 临床医学
    • 4 篇 基础医学(可授医学...
  • 4 篇 法学
    • 3 篇 社会学
  • 4 篇 农学
    • 3 篇 作物学
  • 2 篇 军事学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 7 篇 semantics
  • 6 篇 image segmentati...
  • 5 篇 deep learning
  • 4 篇 internet of thin...
  • 4 篇 deep neural netw...
  • 3 篇 reinforcement le...
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 3 篇 neural networks
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 feature selectio...
  • 3 篇 cryptography
  • 2 篇 ultrasonic imagi...
  • 2 篇 semantic segment...
  • 2 篇 generative adver...
  • 2 篇 acoustics
  • 2 篇 data mining
  • 2 篇 local and parall...
  • 2 篇 contrastive lear...

机构

  • 45 篇 hunan provincial...
  • 30 篇 hunan provincial...
  • 22 篇 college of compu...
  • 9 篇 college of infor...
  • 6 篇 hunan normal uni...
  • 6 篇 college of liber...
  • 5 篇 xiangjiang labor...
  • 5 篇 school of inform...
  • 5 篇 hunan normal uni...
  • 5 篇 hunan key labora...
  • 4 篇 changsha social ...
  • 4 篇 hengyang normal ...
  • 4 篇 school of comput...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 hunan provincial...
  • 4 篇 key laboratory o...
  • 4 篇 department of co...
  • 4 篇 school of comput...
  • 4 篇 changchun instit...

作者

  • 14 篇 jiang feibo
  • 14 篇 dong li
  • 12 篇 li lang
  • 11 篇 wang kezhi
  • 11 篇 dai jianhua
  • 10 篇 yang kun
  • 10 篇 pan cunhua
  • 8 篇 gao xieping
  • 5 篇 zou yi
  • 5 篇 peng yubo
  • 5 篇 xieping gao
  • 5 篇 li qiuping
  • 5 篇 jiao ge
  • 5 篇 yunqing huang
  • 4 篇 zou juan
  • 4 篇 yang shengxiang
  • 4 篇 liu yunlong
  • 4 篇 zhao huihuang
  • 4 篇 zhao junxia
  • 4 篇 huang jingui

语言

  • 152 篇 英文
  • 10 篇 其他
  • 3 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing"
165 条 记 录,以下是81-90 订阅
排序:
Design of a Real-Time and Reliable Multi-machine System  10th
Design of a Real-Time and Reliable Multi-machine System
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
An IoT (Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control use... 详细信息
来源: 评论
An Optimized Scheme of information Hiding-Based Visual Secret Sharing  9th
An Optimized Scheme of Information Hiding-Based Visual Secre...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zou, Yi Li, Lang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
information hiding-based visual secret sharing (IH-VSS) uses the information hiding techniques to embed secret data into images. In the IH-VSS scheme, hidden images are divided into n shadows under the guidance and co... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT  9th
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient met... 详细信息
来源: 评论
WeChat Public Platform for Customers Reserving Bank Branches Based IoT  9th
WeChat Public Platform for Customers Reserving Bank Branches...
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Chen, Jie Liang, Xiaoman Zhang, Jian College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
With the development of the social economy, the amount of currency circulation has increased and become more frequent, but the customer gathering often occurs in many bank’s business. In this paper, with some framewo... 详细信息
来源: 评论
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries  10th
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Tian, Xiaomei Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System  10th
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiang, Jie Tang, Sixin College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function  10th
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiao, Ge Liu, Jiahao Zhou, Sheng Luo, Ning College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding application. Therefore, digital image steganography has become a hot research direct... 详细信息
来源: 评论
Variational neural discourse relation recognizer
Variational neural discourse relation recognizer
收藏 引用
2016 Conference on Empirical Methods in Natural language processing, EMNLP 2016
作者: Zhang, Biao Xiong, Deyi Su, Jinsong Liu, Qun Ji, Rongrong Duan, Hong Zhang, Min Xiamen University Xiamen361005 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China ADAPT Centre School of Computing Dublin City University Ireland Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China
Implicit discourse relation recognition is a crucial component for automatic discourse-level analysis and nature language understanding. Previous studies exploit discriminative models that are built on either powerful... 详细信息
来源: 评论
Hierarchical Policies of Subgoals for Safe Deep Reinforcement Learning  2nd
Hierarchical Policies of Subgoals for Safe Deep Reinforcem...
收藏 引用
2nd International Conference on Ubiquitous Security, UbiSec 2022
作者: Yu, Fumin Gao, Feng Yuan, Yao Xing, Xiaofei Dai, Yinglong College of Information Science and Engineering Hunan Normal University Changsha410081 China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou510006 China College of Liberal Arts and Sciences National University of Defense Technology Changsha410073 China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha410081 China
Reinforcement learning is a machine learning method that relies on the agent to learn by trial and error to solve decision optimization problems. It is well known that an agent based on deep reinforcement learning in ... 详细信息
来源: 评论
DSAFF-Net:A Backbone Network Based on Mask R-CNN for Small Object Detection
收藏 引用
Computers, Materials & Continua 2023年 第2期74卷 3405-3419页
作者: Jian Peng Yifang Zhao Dengyong Zhang Feng Li Arun Kumar Sangaiah Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and TechnologyChangsha410114China School of Computer and Communication Engineering Changsha University of Science and TechnologyChangsha410114China School of Computing Science and Engineering Vellore Institute of Technology(VIT)Vellore632014India
Recently,object detection based on convolutional neural networks(CNNs)has developed *** backbone networks for basic feature extraction are an important component of the whole detection ***,we present a new feature ext... 详细信息
来源: 评论