咨询与建议

限定检索结果

文献类型

  • 151 篇 期刊文献
  • 126 篇 会议

馆藏范围

  • 277 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 200 篇 工学
    • 137 篇 计算机科学与技术...
    • 110 篇 软件工程
    • 40 篇 信息与通信工程
    • 31 篇 控制科学与工程
    • 28 篇 电子科学与技术(可...
    • 25 篇 生物工程
    • 23 篇 电气工程
    • 18 篇 网络空间安全
    • 13 篇 光学工程
    • 12 篇 机械工程
    • 11 篇 化学工程与技术
    • 9 篇 安全科学与工程
    • 8 篇 仪器科学与技术
    • 8 篇 动力工程及工程热...
    • 8 篇 建筑学
    • 8 篇 生物医学工程(可授...
    • 7 篇 材料科学与工程(可...
    • 7 篇 土木工程
    • 6 篇 力学(可授工学、理...
  • 125 篇 理学
    • 69 篇 数学
    • 29 篇 物理学
    • 26 篇 生物学
    • 18 篇 系统科学
    • 12 篇 统计学(可授理学、...
    • 10 篇 化学
  • 40 篇 管理学
    • 27 篇 管理科学与工程(可...
    • 15 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 10 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 军事学
  • 5 篇 法学
  • 5 篇 农学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 1 篇 经济学

主题

  • 9 篇 deep learning
  • 7 篇 internet of thin...
  • 7 篇 lightweight bloc...
  • 6 篇 feature extracti...
  • 5 篇 image segmentati...
  • 5 篇 semantics
  • 5 篇 machine learning
  • 5 篇 accuracy
  • 5 篇 harmonic analysi...
  • 4 篇 deep neural netw...
  • 4 篇 generative adver...
  • 4 篇 side-channel ana...
  • 4 篇 harmonic functio...
  • 3 篇 distillation
  • 3 篇 latent semantic ...
  • 3 篇 side channel att...
  • 3 篇 education
  • 3 篇 information tech...
  • 3 篇 learning algorit...
  • 3 篇 stability analys...

机构

  • 57 篇 hunan provincial...
  • 51 篇 college of compu...
  • 46 篇 hunan provincial...
  • 28 篇 hunan provincial...
  • 19 篇 college of compu...
  • 14 篇 college of infor...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 8 篇 college of mathe...
  • 7 篇 hengyang normal ...
  • 7 篇 hunan normal uni...
  • 6 篇 college of liber...
  • 6 篇 school of mathem...
  • 6 篇 provincial key l...
  • 6 篇 hunan provincial...
  • 6 篇 college of compu...
  • 6 篇 faculty of scien...
  • 6 篇 the institute of...
  • 5 篇 school of inform...
  • 5 篇 hunan provincial...

作者

  • 19 篇 li lang
  • 19 篇 lang li
  • 13 篇 jiao ge
  • 12 篇 jiang feibo
  • 12 篇 dong li
  • 10 篇 wang kezhi
  • 9 篇 gao xieping
  • 8 篇 zhao huihuang
  • 8 篇 zou yi
  • 8 篇 dai jianhua
  • 8 篇 yang kun
  • 8 篇 pan cunhua
  • 7 篇 ge jiao
  • 7 篇 chen shaolin
  • 6 篇 ponnusamy samina...
  • 6 篇 qiuping li
  • 6 篇 liang xiaoman
  • 6 篇 xieping gao
  • 6 篇 hamada hidetaka
  • 6 篇 zhang helen w.j.

语言

  • 259 篇 英文
  • 13 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Application"
277 条 记 录,以下是41-50 订阅
排序:
Fuzzy information Quantity Measurement and Feature Selection by Macrogranular Entropy
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Zhu, Zhilin Zhang, Chucai Dai, Jianhua Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Changsha410081 China
Feature selection is an important data preprocessing process in artificial intelligence, which aims to eliminate redundant features while retaining essential features. Measuring feature significance and relevance betw... 详细信息
来源: 评论
Online Multi-label Streaming Feature Selection with Missing Features by Dual-Space Consistency information Measurement
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Dai, Jianhua Wang, Jie Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Changsha410081 China
Multi-label feature selection is critical to address the challenges of high dimensionality and computational complexity in multi-label learning. However, in some practical applications, a more complex challenge is the... 详细信息
来源: 评论
Online Multi-Label Streaming Feature Selection by Label Enhancement and Fuzzy Synergistic Discrimination information
收藏 引用
IEEE Transactions on Fuzzy Systems 2025年
作者: Zou, Ligeng Zhou, Tong Dai, Jianhua Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Changsha410081 China
Online streaming feature selection is an effective approach for handling large-scale streaming data in real-world applications. However, many existing online streaming feature selection studies do not effectively leve... 详细信息
来源: 评论
An Efficient WRF Framework for Discovering Risk Genes and Abnormal Brain Regions in Parkinson's Disease Based on Imaging Genetics Data
收藏 引用
Journal of Computer Science & Technology 2021年 第2期36卷 361-374页
作者: Xia-An Bi Zhao-Xu Xing Rui-Hui Xu Xi Hu College of Information Science and Engineering Hunan Normal UniversityChangsha 410006China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal UniversityChangsha 410006China
As an emerging research field of brain science,multimodal data fusion analysis has attracted broader attention in the study of complex brain diseases such as Parkinson's disease(PD).However,current studies primari... 详细信息
来源: 评论
Research on Security Trust Model of P2P Network Based on Improved Search Algorithm  11th
Research on Security Trust Model of P2P Network Based on Imp...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Zheng, Guangyong Xu, Yuming Hengyang Normal University HengyangHunan421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China Changsha Normal University ChangshaHunan410199 China
With the rapid development and popularization of the Internet, Peer-to-Peer (P2P) network technology has been developing rapidly, and the security trust mechanism of P2P network has become a prominent problem. This pa... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
Koebe Type Theorems and Pre-Schwarzian of Harmonic K-quasiconformal Mappings,and Their applications
收藏 引用
Acta Mathematica Sinica,English Series 2022年 第11期38卷 1965-1980页
作者: Shao Lin CHEN Saminathan PONNUSAMY College of Mathematics and Statistics Hengyang Normal UniversityHengyang 421002P.R.China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang 421002P.R.China Department of Mathematics Indian Institute of Technology MadrasChennai-600036India
In this article,we first establish an asymptotically sharp Koebe type covering theorem for harmonic K-quasiconformal *** we use it to obtain an asymptotically Koebe type distortion theorem,a coefficients estimate,a Li... 详细信息
来源: 评论