咨询与建议

限定检索结果

文献类型

  • 151 篇 期刊文献
  • 126 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 137 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 40 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 28 篇 电子科学与技术(可...
    • 25 篇 生物工程
    • 23 篇 电气工程
    • 18 篇 网络空间安全
    • 13 篇 光学工程
    • 12 篇 机械工程
    • 11 篇 化学工程与技术
    • 9 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 7 篇 土木工程
    • 6 篇 力学(可授工学、理...
  • 125 篇 理学
    • 69 篇 数学
    • 29 篇 物理学
    • 26 篇 生物学
    • 18 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
  • 40 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 军事学
  • 5 篇 法学
  • 5 篇 农学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 9 篇 deep learning
  • 7 篇 internet of thin...
  • 7 篇 lightweight bloc...
  • 6 篇 feature extracti...
  • 5 篇 image segmentati...
  • 5 篇 semantics
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 deep neural netw...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 harmonic functio...
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 education
  • 3 篇 information tech...
  • 3 篇 learning algorit...
  • 3 篇 stability analys...

机构

  • 57 篇 hunan provincial...
  • 51 篇 college of compu...
  • 46 篇 hunan provincial...
  • 28 篇 hunan provincial...
  • 19 篇 college of compu...
  • 14 篇 college of infor...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 8 篇 college of mathe...
  • 7 篇 hengyang normal ...
  • 7 篇 hunan normal uni...
  • 6 篇 college of liber...
  • 6 篇 school of mathem...
  • 6 篇 provincial key l...
  • 6 篇 hunan provincial...
  • 6 篇 college of compu...
  • 6 篇 faculty of scien...
  • 6 篇 the institute of...
  • 5 篇 school of inform...
  • 5 篇 hunan provincial...

作者

  • 19 篇 li lang
  • 19 篇 lang li
  • 13 篇 jiao ge
  • 12 篇 jiang feibo
  • 12 篇 dong li
  • 10 篇 wang kezhi
  • 9 篇 gao xieping
  • 8 篇 zhao huihuang
  • 8 篇 zou yi
  • 8 篇 dai jianhua
  • 8 篇 yang kun
  • 8 篇 pan cunhua
  • 7 篇 ge jiao
  • 7 篇 chen shaolin
  • 6 篇 ponnusamy samina...
  • 6 篇 qiuping li
  • 6 篇 liang xiaoman
  • 6 篇 xieping gao
  • 6 篇 hamada hidetaka
  • 6 篇 zhang helen w.j.

语言

  • 259 篇 英文
  • 13 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Application"
277 条 记 录,以下是91-100 订阅
排序:
Gender Identification for Coloring Black and White Portrait with cGan  10th
Gender Identification for Coloring Black and White Portrait ...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Liu, Qingyun Lin, Mugang Sun, Yaqi Zhang, Feng College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network (cGan). As a cGan model essentially, a method named pix2pix interprets image style... 详细信息
来源: 评论
Constant-Weight Group Coded Bloom Filter for Multiple-Set Membership Queries  10th
Constant-Weight Group Coded Bloom Filter for Multiple-Set Me...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Tian, Xiaomei Zhao, Huihuang College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s... 详细信息
来源: 评论
Research on Crop Disease and Pest Surveillance based on Big Data and Image processing Technologies
Research on Crop Disease and Pest Surveillance based on Big ...
收藏 引用
information Technology, Communication Ecosystem and Management (ITCEM), International Conference on
作者: Yimei Yang Yujun Yang Huixia Shu Changhua Zhao Shaowei Deng College of Computer and Artificial Intelligence(Software College) Huaihua University Huaihua China Hunan Provincial Key Laboratory of Ecological Agriculture Intelligent Control Technology Huaihua China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua Hunan China
Recently, with the increasing complexity of agricultural systems and climate change, agricultural pest and disease surveillance and early detection have become critical tasks for guaranteeing food stability and promot... 详细信息
来源: 评论
Power Analysis Attack on a Lightweight Block Cipher GIFT  9th
Power Analysis Attack on a Lightweight Block Cipher GIFT
收藏 引用
9th International Conference on Computer Engineering and Networks, CENet2019
作者: Zhang, Jian Li, Lang Li, Qiuping Zhao, Junxia Liang, Xiaoman College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
GIFT is a new lightweight block cipher with smaller area and higher efficiency, which is very suitable for the Internet of Things (IoT) devices with constrained resources. The power analysis attack is an efficient met... 详细信息
来源: 评论
A Image Adaptive Steganography Algorithm Combining Chaotic Encryption and Minimum Distortion Function  10th
A Image Adaptive Steganography Algorithm Combining Chaotic E...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiao, Ge Liu, Jiahao Zhou, Sheng Luo, Ning College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding application. Therefore, digital image steganography has become a hot research direct... 详细信息
来源: 评论
Research on Task Scheduling in Distributed Vulnerability Scanning System  10th
Research on Task Scheduling in Distributed Vulnerability Sca...
收藏 引用
10th International Conference on Computer Engineering and Networks, CENet 2020
作者: Jiang, Jie Tang, Sixin College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli... 详细信息
来源: 评论
Inequalities for the k-Regular Overpartitions
arXiv
收藏 引用
arXiv 2023年
作者: Peng, Yi Zhang, Helen W.J. Zhong, Ying School of Mathematics Hunan University Changsha410082 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics Changsha410082 China
Bessenrodt and Ono, Chen, Wang and Jia, DeSalvo and Pak were the first to discover the log-subadditivity, log-concavity, and the third-order Turán inequality of partition function, respectively. Many other import...
来源: 评论
Asymptotics for k-crank of k-colored partitions
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Helen W.J. Zhong, Ying School of Mathematics Hunan University Changsha410082 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics Changsha410082 China
In this paper, we obtain asymptotic formulas for k-crank of k-colored partitions. Let Mk(a, c;n) denote the number of k-colored partitions of n with a k-crank congruent to a mod c. For the cases k = 2, 3, 4, Fu and Ta...
来源: 评论
Pseudo Multi-Source Domain Extension and Selective Pseudo-Labeling for Unsupervised Domain Adaptive Medical Image Segmentation
Pseudo Multi-Source Domain Extension and Selective Pseudo-La...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Xiaokang Liu Zhiqiang Wang Kai Hu Xieping Gao Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education Xiangtan University Xiangtan China College of Medical Imaging Laboratory and Rehabilitation Xiangnan University Chenzhou China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
Unsupervised domain adaptation (UDA) attracts extra attention in medical image processing because no additional labels are required when adapting to different distributions. In this work, we propose a novel unsupervis... 详细信息
来源: 评论
ALCencryption:A Secure and Efficient Algorithm for Medical Image Encryption
收藏 引用
Computer Modeling in Engineering & Sciences 2020年 第12期125卷 1083-1100页
作者: Jiao Ge College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an... 详细信息
来源: 评论