咨询与建议

限定检索结果

文献类型

  • 785 篇 会议
  • 532 篇 期刊文献

馆藏范围

  • 1,317 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 833 篇 工学
    • 595 篇 计算机科学与技术...
    • 510 篇 软件工程
    • 233 篇 信息与通信工程
    • 140 篇 生物工程
    • 96 篇 控制科学与工程
    • 83 篇 电气工程
    • 63 篇 机械工程
    • 63 篇 光学工程
    • 61 篇 生物医学工程(可授...
    • 55 篇 电子科学与技术(可...
    • 47 篇 化学工程与技术
    • 33 篇 网络空间安全
    • 32 篇 交通运输工程
    • 31 篇 土木工程
    • 28 篇 动力工程及工程热...
    • 28 篇 安全科学与工程
    • 26 篇 仪器科学与技术
  • 487 篇 理学
    • 268 篇 数学
    • 147 篇 生物学
    • 86 篇 物理学
    • 85 篇 统计学(可授理学、...
    • 50 篇 化学
    • 38 篇 系统科学
  • 236 篇 管理学
    • 129 篇 管理科学与工程(可...
    • 118 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 58 篇 医学
    • 47 篇 临床医学
    • 41 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 41 篇 法学
    • 31 篇 社会学
  • 19 篇 教育学
  • 14 篇 农学
  • 13 篇 经济学
  • 6 篇 文学
  • 2 篇 艺术学
  • 1 篇 军事学

主题

  • 66 篇 feature extracti...
  • 51 篇 training
  • 43 篇 semantics
  • 37 篇 deep learning
  • 27 篇 object detection
  • 25 篇 predictive model...
  • 25 篇 accuracy
  • 24 篇 convolution
  • 22 篇 data models
  • 21 篇 computational mo...
  • 20 篇 data mining
  • 19 篇 task analysis
  • 19 篇 neural networks
  • 16 篇 machine learning
  • 16 篇 forecasting
  • 15 篇 reinforcement le...
  • 15 篇 big data
  • 15 篇 optimization
  • 14 篇 three-dimensiona...
  • 14 篇 anomaly detectio...

机构

  • 74 篇 college of compu...
  • 54 篇 school of comput...
  • 53 篇 school of comput...
  • 40 篇 school of electr...
  • 39 篇 jiangsu key labo...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 35 篇 shaanxi key labo...
  • 32 篇 fujian provincia...
  • 31 篇 key laboratory o...
  • 31 篇 key laboratory o...
  • 30 篇 school of comput...
  • 30 篇 jiangsu key labo...
  • 29 篇 fujian key labor...
  • 28 篇 shaanxi key labo...
  • 26 篇 beijing key labo...
  • 26 篇 national enginee...
  • 24 篇 school of mathem...
  • 23 篇 school of comput...
  • 22 篇 henan key labora...

作者

  • 36 篇 xu xiaolong
  • 26 篇 wang zhongmin
  • 24 篇 huang qingming
  • 24 篇 xiaolong xu
  • 22 篇 xu qianqian
  • 21 篇 li zuoyong
  • 21 篇 guo wenzhong
  • 21 篇 hongyan ma
  • 20 篇 chen yanping
  • 20 篇 shen linlin
  • 18 篇 guo kun
  • 16 篇 liu yiwen
  • 15 篇 yang zhiyong
  • 13 篇 xia hong
  • 13 篇 xue xingsi
  • 13 篇 gao cong
  • 13 篇 zhongmin wang
  • 12 篇 wang shiping
  • 12 篇 wang tao
  • 11 篇 ma sugang

语言

  • 1,256 篇 英文
  • 47 篇 其他
  • 21 篇 中文
检索条件"机构=Intelligent Data Processing Laboratory"
1317 条 记 录,以下是1-10 订阅
排序:
Personalized Privacy-Preserving Routing Mechanism Design in Payment Channel Network
收藏 引用
Journal of Computer Science & Technology 2024年 第6期39卷 1380-1400页
作者: Peng-Cheng Zhao Li-Jie Xu Jia Xu Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and TelecommunicationsNanjing 210023China
Payment Channel Network(PCN)provides the off-chain settlement of *** is one of the most promising solutions to solve the scalability issue of the *** routing techniques in PCN have been ***,both incentive attack and p... 详细信息
来源: 评论
Underwater target recognition based on adaptive multi-feature fusion network
收藏 引用
Multimedia Tools and Applications 2025年 第10期84卷 7297-7317页
作者: Pan, Xiaoying Sun, Jia Feng, TianHao Lei, MingZhu Wang, Hao Zhang, WuXia Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121 China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’an710121 China School of Computer Science and Technology Xi’an University of Post & Telecommunications Xi’an710121 China
Due to the complexity of the underwater environment, underwater acoustic target recognition is more challenging than ordinary target recognition, and has become a hot topic in the field of underwater acoustics researc... 详细信息
来源: 评论
L_(1)-Smooth SVM with Distributed Adaptive Proximal Stochastic Gradient Descent with Momentum for Fast Brain Tumor Detection
收藏 引用
Computers, Materials & Continua 2024年 第5期79卷 1975-1994页
作者: Chuandong Qin Yu Cao Liqun Meng School of Mathematics and Information Science North Minzu UniversityYinchuan750021China Ningxia Key Laboratory of Intelligent Information and Big Data Processing Yinchuan750021China
Brain tumors come in various types,each with distinct characteristics and treatment approaches,making manual detection a time-consuming and potentially ambiguous *** tumor detection is a valuable tool for gaining a de... 详细信息
来源: 评论
Wireless Charging Scheduling for Long-term Utility Optimization
收藏 引用
ACM Transactions on Sensor Networks 2025年 第1期21卷 1-31页
作者: Xu, Jia Chen, Wenbin Dai, Haipeng Xu, Lijie Xiao, Fu Liu, Linfeng Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing China The State Key Laboratory for Novel Software Technology Nanjing University Nanjing China
Wireless power transmission has been widely used to replenish energy for wireless sensor networks, where the energy consumption rate of sensor nodes is usually time varying and indefinite. However, few works have inve... 详细信息
来源: 评论
JDC-GCN: joint diversity and consistency graph convolutional network
收藏 引用
Neural Computing and Applications 2025年 1-17页
作者: Lin, Renjie Yao, Jie Wang, Shiping Guo, Wenzhong College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China
In real-world scenarios, multi-view data comprises heterogeneous features, with each feature corresponding to a specific view. The objective of multi-view semi-supervised classification is to enhance classification pe... 详细信息
来源: 评论
Research on Improved MobileViT Image Tamper Localization Model
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3173-3192页
作者: Jingtao Sun Fengling Zhang Huanqi Liu Wenyan Hou School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an University of Posts and TelecommunicationsXi’an710121China
As image manipulation technology advances rapidly,the malicious use of image tampering has alarmingly escalated,posing a significant threat to social *** the realm of image tampering localization,accurately localizing... 详细信息
来源: 评论
Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet
收藏 引用
Computers, Materials & Continua 2023年 第4期75卷 2101-2117页
作者: Yanping Chen Xuyang Bai Xiaomin Jin Zhongmin Wang Fengwei Wang Li Ling School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’an710121China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’an710121China Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anShaanxi710121China ZTE Corporation Shenzhen51805China
Deploying task caching at edge servers has become an effectiveway to handle compute-intensive and latency-sensitive tasks on the industrialinternet. However, how to select the task scheduling location to reduce taskde... 详细信息
来源: 评论
AMHF-TP:Multifunctional therapeutic peptides prediction based on multi-granularity hierarchical features
收藏 引用
Quantitative Biology 2025年 第1期13卷 127-141页
作者: Shouheng Tuo YanLing Zhu Jiangkun Lin Jiewei Jiang School of Computer Science and Technology Xi’an University of Posts and TelecommunicationsXi’anChina Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi’anChina Xi’an Key Laboratory of Big Data and Intelligent Computing Xi’anChina School of Electronic Engineering Xi’an University of Posts and TelecommunicationsXi’anChina
Multifunctional therapeutic peptides(MFTP)hold immense potential in diverse therapeutic contexts,yet their prediction and identification remain challenging due to the limitations of traditional methodologies,such as e... 详细信息
来源: 评论
Face Forgery Detection Based on Fine-Grained Clues and Noise Inconsistency
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第1期6卷 144-158页
作者: Zhang, Dengyong He, Ruiyi Liao, Xin Li, Feng Chen, Jiaxin Yang, Gaobo Changsha University of Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation the School of Computer and Communication Engineering Changsha410114 China Hunan University Changsha410082 China
Deepfake detection has gained increasing research attention in media forensics, and a variety of works have been produced. However, subtle artifacts might be eliminated by compression, and the convolutional neural net... 详细信息
来源: 评论
Joint Estimation of SOH and RUL for Lithium-Ion Batteries Based on Improved Twin Support Vector Machineh
收藏 引用
Energy Engineering 2025年 第1期122卷 243-264页
作者: Liyao Yang Hongyan Ma Yingda Zhang Wei He School of Electrical and Information Engineering Beijing University of Civil Engineering and ArchitectureBeijing100044China Institute of Distributed Energy Storage Safety Big Data Beijing100044China Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing100044China
Accurately estimating the State of Health(SOH)and Remaining Useful Life(RUL)of lithium-ion batteries(LIBs)is crucial for the continuous and stable operation of battery management ***,due to the complex internal chemic... 详细信息
来源: 评论