咨询与建议

限定检索结果

文献类型

  • 2,424 篇 会议
  • 2,090 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,515 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,086 篇 工学
    • 2,157 篇 计算机科学与技术...
    • 1,806 篇 软件工程
    • 785 篇 信息与通信工程
    • 373 篇 生物工程
    • 353 篇 控制科学与工程
    • 328 篇 电气工程
    • 295 篇 电子科学与技术(可...
    • 265 篇 光学工程
    • 222 篇 机械工程
    • 211 篇 生物医学工程(可授...
    • 192 篇 化学工程与技术
    • 137 篇 仪器科学与技术
    • 111 篇 动力工程及工程热...
    • 95 篇 材料科学与工程(可...
    • 83 篇 网络空间安全
    • 80 篇 交通运输工程
    • 78 篇 安全科学与工程
  • 1,769 篇 理学
    • 932 篇 数学
    • 526 篇 物理学
    • 417 篇 生物学
    • 281 篇 统计学(可授理学、...
    • 194 篇 化学
    • 126 篇 系统科学
  • 885 篇 管理学
    • 479 篇 图书情报与档案管...
    • 437 篇 管理科学与工程(可...
    • 156 篇 工商管理
  • 177 篇 医学
    • 151 篇 临床医学
    • 134 篇 基础医学(可授医学...
    • 86 篇 药学(可授医学、理...
  • 106 篇 法学
    • 92 篇 社会学
  • 61 篇 农学
  • 46 篇 教育学
  • 44 篇 经济学
  • 19 篇 文学
  • 12 篇 军事学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 178 篇 semantics
  • 160 篇 feature extracti...
  • 117 篇 training
  • 81 篇 deep learning
  • 79 篇 convolution
  • 73 篇 computational mo...
  • 65 篇 object detection
  • 62 篇 accuracy
  • 59 篇 image segmentati...
  • 51 篇 data mining
  • 50 篇 visualization
  • 47 篇 computer science
  • 47 篇 optimization
  • 45 篇 support vector m...
  • 45 篇 clustering algor...
  • 45 篇 convolutional ne...
  • 43 篇 robustness
  • 42 篇 computer vision
  • 41 篇 contrastive lear...
  • 41 篇 machine learning

机构

  • 157 篇 hubei province k...
  • 141 篇 key laboratory o...
  • 108 篇 school of comput...
  • 94 篇 college of compu...
  • 90 篇 provincial key l...
  • 89 篇 faculty of scien...
  • 89 篇 departamento de ...
  • 89 篇 department for p...
  • 88 篇 department of ph...
  • 88 篇 department of ph...
  • 88 篇 dipartimento di ...
  • 88 篇 yerevan physics ...
  • 88 篇 institute of phy...
  • 87 篇 kirchhoff-instit...
  • 86 篇 graduate school ...
  • 85 篇 fakultät für phy...
  • 85 篇 institute of phy...
  • 85 篇 physikalisches i...
  • 84 篇 department of ph...
  • 84 篇 institut für ast...

作者

  • 81 篇 f. buehrer
  • 81 篇 a. t. law
  • 81 篇 c. alexa
  • 81 篇 j. m. izen
  • 81 篇 s. veneziano
  • 81 篇 d. di valentino
  • 81 篇 g. bella
  • 81 篇 j. strandberg
  • 81 篇 d. calvet
  • 81 篇 c. amelung
  • 81 篇 n. orlando
  • 81 篇 c. gumpert
  • 81 篇 h. a. gordon
  • 81 篇 y. tayalati
  • 81 篇 g. spigo
  • 81 篇 v. chiarella
  • 81 篇 f. siegert
  • 81 篇 a. c. könig
  • 81 篇 a. dimitrievska
  • 81 篇 f. deliot

语言

  • 4,246 篇 英文
  • 173 篇 其他
  • 102 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Computer Information Processing Technology"
4515 条 记 录,以下是61-70 订阅
MSF-Net: A Multilevel Spatiotemporal Feature Fusion Network Combines Attention for Action Recognition
收藏 引用
computer Systems Science & Engineering 2023年 第11期47卷 1433-1449页
作者: Mengmeng Yan Chuang Zhang Jinqi Chu Haichao Zhang Tao Ge Suting Chen School of Electronic and Information Engineering Nanjing University of Information Science and TechnologyNanjing210044China Jiangsu Key Laboratory of Meteorological Observation and Information Processing Nanjing210044China
An action recognition network that combines multi-level spatiotemporal feature fusion with an attention mechanism is proposed as a solution to the issues of single spatiotemporal feature scale extraction,information r... 详细信息
来源: 评论
Privacy-Preserving Fingerprint Recognition via Federated Adaptive Domain Generalization
收藏 引用
computers, Materials & Continua 2025年 第3期82卷 5035-5055页
作者: Yonghang Yan Xin Xie Hengyi Ren Ying Cao Hongwei Chang Henan Key Laboratory of Big Data Analysis and Processing Computer and Information EngineeringHenan UniversityKaifeng475004China College of Information Science and Technology Nanjing Forestry UniversityNanjing210037China Henan Branch China Life Insurance Co.Ltd.Zhengzhou450000China
Fingerprint features,as unique and stable biometric identifiers,are crucial for identity ***,traditional centralized methods of processing these sensitive data linked to personal identity pose significant privacy risk... 详细信息
来源: 评论
Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations
收藏 引用
computers, Materials & Continua 2023年 第8期76卷 1947-1976页
作者: Asif Rahim Yanru Zhong Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi School of Computer and Information Security Guilin University of Electronic TechnologyGuilin541004China Guangxi Key Laboratory of Intelligent Processing of Computer Images and Graphics Guilin University of Electronic TechnologyGuilin541004China School of Information and Communication Guilin University of Electronic TechnologyGuilin541004China EIAS:Data Science and Blockchain Laboratory College of Computer and Information SciencesPrince Sultan UniversityRiyadh11586Saudi Arabia
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of *** Neural Networks(CNNs)have shown promi... 详细信息
来源: 评论
Consistency Guided Diffusion Model with Neural Syntax for Perceptual Image Compression  24
Consistency Guided Diffusion Model with Neural Syntax for Pe...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Kuang, Haowei Ma, Yiyang Yang, Wenhan Guo, Zongming Liu, Jiaying Wangxuan Institute of Computer Technology State Key Laboratory of Multimedia Information Processing Peking University Beijing China Wangxuan Institute of Computer Technology Peking University Beijing China Pengcheng Laboratory Shenzhen China
Diffusion models show impressive performances in image generation with excellent perceptual quality. However, its tendency to introduce additional distortion prevents its direct application in image compression. To ad... 详细信息
来源: 评论
Learning Unknowns from Unknowns: Diversified Negative Prototypes Generator for Few-shot Open-Set Recognition  24
Learning Unknowns from Unknowns: Diversified Negative Protot...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhang, Zhenyu Chen, Guangyao Zou, Yixiong Li, Yuhua Li, Ruixuan School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China National Key Laboratory for Multimedia Information Processing School of Computer Science Peking University Beijing China
Few-shot open-set recognition (FSOR) is a challenging task that requires a model to recognize known classes and identify unknown classes with limited labeled data. Existing approaches, particularly Negative-Prototype-... 详细信息
来源: 评论
Sentence Similarity Model based on Semantics and Syntax  5
Sentence Similarity Model based on Semantics and Syntax
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2024
作者: Zhou, Ya Chen, Chen Huang, Guimin Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
In the research methods of sentence similarity, sentence similarity is often calculated from the semantic aspect, while the influence of syntactic structure is ignored. We propose an enhanced knowledge language repres... 详细信息
来源: 评论
Dynamic Student Classification with Forgetting Mechanisms on Memory Networks for Knowledge Tracing  5
Dynamic Student Classification with Forgetting Mechanisms on...
收藏 引用
5th International Conference on Intelligent Computing and Human-computer Interaction, ICHCI 2024
作者: Huang, Guimin Qin, Xiangqian School of Computer Science and Information Security Guilin University of Electronic Technology Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
Knowledge Tracing (KT), a technique for modeling students' knowledge levels and predicting their future question-answering performance based on their historical answer data, is one of the key research areas to str... 详细信息
来源: 评论
Context-Aware Grammatical Error Correction Model  5
Context-Aware Grammatical Error Correction Model
收藏 引用
5th International Conference on Big Data and Artificial Intelligence and Software Engineering, ICBASE 2024
作者: Lin, Jianxing Huang, Guimin Wang, JiaHao Guilin University of Electronic Technology School of Computer Science and Information Security Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin China
The pursuit of accurate and fluent English communication is the cornerstone of global academic exchange and expression. The accuracy of written English is crucial for effective discourse;however, despite advancements ... 详细信息
来源: 评论
Dynamic defenses in cyber security:Techniques,methods and challenges Author links open overlay panel
收藏 引用
Digital Communications and Networks 2022年 第4期8卷 422-435页
作者: Yu Zheng Zheng Li Xiaolong Xu Qingzhan Zhao School of Computer and Software Nanjing University of Information Science and TechnologyNanjing210044JiangsuChina Key Laboratory for Novel Software Technology Nanjing UniversityNanjing210023JiangsuChina College of Information Science and Technology Shihezi University Geospatial Information Engineering Research CenterChina
Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human ***,security pr... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论