咨询与建议

限定检索结果

文献类型

  • 278 篇 期刊文献
  • 207 篇 会议

馆藏范围

  • 485 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 322 篇 工学
    • 201 篇 计算机科学与技术...
    • 155 篇 软件工程
    • 63 篇 信息与通信工程
    • 42 篇 电子科学与技术(可...
    • 38 篇 控制科学与工程
    • 38 篇 生物工程
    • 33 篇 电气工程
    • 24 篇 化学工程与技术
    • 21 篇 动力工程及工程热...
    • 20 篇 生物医学工程(可授...
    • 19 篇 材料科学与工程(可...
    • 18 篇 网络空间安全
    • 16 篇 机械工程
    • 15 篇 光学工程
    • 14 篇 土木工程
    • 11 篇 力学(可授工学、理...
    • 11 篇 建筑学
    • 11 篇 安全科学与工程
    • 8 篇 仪器科学与技术
  • 266 篇 理学
    • 183 篇 数学
    • 56 篇 物理学
    • 44 篇 生物学
    • 35 篇 系统科学
    • 32 篇 统计学(可授理学、...
    • 26 篇 化学
  • 69 篇 管理学
    • 44 篇 管理科学与工程(可...
    • 29 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 16 篇 医学
    • 15 篇 临床医学
    • 13 篇 基础医学(可授医学...
  • 10 篇 法学
  • 7 篇 教育学
  • 6 篇 农学
  • 5 篇 军事学
  • 4 篇 经济学
  • 3 篇 艺术学

主题

  • 17 篇 feature extracti...
  • 10 篇 deep learning
  • 10 篇 image segmentati...
  • 9 篇 semantics
  • 8 篇 internet of thin...
  • 6 篇 free energy
  • 6 篇 object detection
  • 6 篇 convolution
  • 6 篇 data mining
  • 6 篇 lightweight bloc...
  • 6 篇 training
  • 5 篇 deep neural netw...
  • 5 篇 generative adver...
  • 5 篇 machine learning
  • 5 篇 finite element m...
  • 5 篇 harmonic analysi...
  • 4 篇 distillation
  • 4 篇 side-channel ana...
  • 4 篇 optimization
  • 4 篇 fuses

机构

  • 57 篇 hunan provincial...
  • 50 篇 college of compu...
  • 46 篇 hunan provincial...
  • 44 篇 college of mathe...
  • 28 篇 hunan provincial...
  • 19 篇 fujian provincia...
  • 18 篇 college of compu...
  • 17 篇 hunan key labora...
  • 15 篇 fujian provincia...
  • 14 篇 fujian provincia...
  • 14 篇 college of infor...
  • 13 篇 fujian provincia...
  • 13 篇 school of mathem...
  • 12 篇 hunan provincial...
  • 10 篇 school of mathem...
  • 10 篇 hunan key labora...
  • 8 篇 college of mathe...
  • 8 篇 key laboratory o...
  • 7 篇 hengyang normal ...
  • 7 篇 hunan normal uni...

作者

  • 29 篇 jiang kai
  • 21 篇 li zuoyong
  • 18 篇 li lang
  • 18 篇 lang li
  • 18 篇 zhang juan
  • 13 篇 jiang feibo
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 11 篇 shu shi
  • 10 篇 zuoyong li
  • 10 篇 wang kezhi
  • 9 篇 hu rong
  • 9 篇 gao xieping
  • 9 篇 yang kun
  • 9 篇 pan cunhua
  • 8 篇 zhao huihuang
  • 8 篇 dai jianhua
  • 8 篇 yang yin
  • 8 篇 huang yunqing
  • 7 篇 yu zhiyong

语言

  • 455 篇 英文
  • 25 篇 其他
  • 5 篇 中文
检索条件"机构=Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics"
485 条 记 录,以下是81-90 订阅
排序:
Teaching Early Warning Approach for Teachers based on Cognitive Diagnosis and Long Short-term Memory
Teaching Early Warning Approach for Teachers based on Cognit...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hua Ma Peiji Huang Xi Luo Qiong Huang Xiangru Fu Wensheng Tang College of Information Science and Engineering Hunan Normal University Changsha China Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China
Teaching early warning is of great significance for avoiding teaching risks and continuously improving teaching quality. However, none of existing approaches assess the degree of course goals attainment and teacher... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on Computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and Applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on Computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on information Forensics and Security 2025年
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论
Learning to Learn Transferable Generative Attack for Person Re-Identification
收藏 引用
IEEE Transactions on Image processing 2025年 PP卷 PP页
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning-based person re-identification (reid) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely consider... 详细信息
来源: 评论
Congruences for modular forms and applications to crank functions
arXiv
收藏 引用
arXiv 2022年
作者: Zhang, Hao Zhang, Helen W.J. School of Mathematics Hunan University Changsha410082 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Applied Mathematics Changsha410082 China
In this paper, motivated by the work of Mahlburg, we find congruences for a large class of modular forms. Moreover, we generalize the generating function of the Andrews-Garvan-Dyson crank on partition and establish se...
来源: 评论
HIGHER ORDER ISOMETRIC SHIFT OPERATOR ON THE DE BRANGES-ROVNYAK SPACE
arXiv
收藏 引用
arXiv 2023年
作者: Gu, Caixing Luo, Shuaibing DEPARTMENT OF MATHEMATICS CALIFORNIA POLYTECHNIC STATE UNIVERSITY SAN LUIS OBISPO CA93407 United States SCHOOL OF MATHEMATICS AND HUNAN PROVINCIAL KEY LABORATORY OF INTELLIGENT INFORMATION PROCESSING AND APPLIED MATHEMATICS HUNAN UNIVERSITY Changsha410082 China
The de Branges-Rovnyak space H(b) is generated by a bounded analytic function b in the unit ball of H∞. When b is a nonextreme point, the space H(b) is invariant by the forward shift operator Mz. We show that the H(b...
来源: 评论