咨询与建议

限定检索结果

文献类型

  • 178 篇 期刊文献
  • 157 篇 会议
  • 1 册 图书

馆藏范围

  • 336 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 248 篇 工学
    • 158 篇 计算机科学与技术...
    • 132 篇 软件工程
    • 83 篇 信息与通信工程
    • 41 篇 电气工程
    • 38 篇 电子科学与技术(可...
    • 27 篇 生物工程
    • 24 篇 控制科学与工程
    • 19 篇 机械工程
    • 17 篇 光学工程
    • 15 篇 生物医学工程(可授...
    • 12 篇 化学工程与技术
    • 11 篇 仪器科学与技术
    • 8 篇 动力工程及工程热...
    • 7 篇 材料科学与工程(可...
    • 7 篇 建筑学
    • 7 篇 网络空间安全
    • 6 篇 冶金工程
    • 6 篇 交通运输工程
    • 6 篇 航空宇航科学与技...
  • 138 篇 理学
    • 85 篇 数学
    • 35 篇 生物学
    • 33 篇 物理学
    • 27 篇 统计学(可授理学、...
    • 18 篇 化学
    • 7 篇 系统科学
  • 66 篇 管理学
    • 37 篇 图书情报与档案管...
    • 31 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 14 篇 医学
    • 12 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 4 篇 法学
  • 3 篇 教育学
  • 2 篇 哲学
  • 2 篇 经济学
  • 2 篇 农学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 10 篇 semantics
  • 8 篇 data mining
  • 8 篇 feature extracti...
  • 8 篇 training
  • 7 篇 compressed sensi...
  • 7 篇 computer vision
  • 6 篇 clustering algor...
  • 6 篇 information proc...
  • 5 篇 deep learning
  • 5 篇 three-dimensiona...
  • 5 篇 image segmentati...
  • 5 篇 optimization
  • 5 篇 visualization
  • 5 篇 genetic algorith...
  • 5 篇 shape
  • 5 篇 ontology
  • 4 篇 transformers
  • 4 篇 recommender syst...
  • 4 篇 wireless communi...
  • 4 篇 ontologies

机构

  • 22 篇 key laboratory o...
  • 14 篇 college of infor...
  • 13 篇 school of electr...
  • 11 篇 key laboratory o...
  • 10 篇 aerospace inform...
  • 9 篇 school of comput...
  • 9 篇 suzhou aerospace...
  • 8 篇 key laboratory o...
  • 8 篇 college of compu...
  • 7 篇 nanjing universi...
  • 7 篇 peng cheng labor...
  • 6 篇 shanghai yanding...
  • 6 篇 chongqing key la...
  • 6 篇 zhejiang univers...
  • 6 篇 college of infor...
  • 6 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 5 篇 science computin...
  • 5 篇 department of co...
  • 5 篇 provincial key l...

作者

  • 15 篇 zhang zhe
  • 11 篇 cao cungen
  • 10 篇 yu fei
  • 10 篇 li yingsong
  • 9 篇 gao shang
  • 9 篇 yingsong li
  • 8 篇 qiu xiaolan
  • 8 篇 zhang zaiyue
  • 8 篇 gao silin
  • 7 篇 zhang bingchen
  • 6 篇 fei yu
  • 6 篇 huo danqun
  • 6 篇 yue guangxue
  • 6 篇 wang muhan
  • 6 篇 hou changjun
  • 6 篇 junwei qi
  • 6 篇 gao guangwei
  • 6 篇 li juncheng
  • 6 篇 yang jian
  • 6 篇 huang chongwen

语言

  • 320 篇 英文
  • 12 篇 其他
  • 5 篇 中文
检索条件"机构=Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology"
336 条 记 录,以下是31-40 订阅
排序:
Towards Accurate Unified Anomaly Segmentation
Towards Accurate Unified Anomaly Segmentation
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Wenxin Ma Qingsong Yao Xiang Zhang Zhelong Huang Zihang Jiang S. Kevin Zhou Division of Life Sciences and Medicine School of Biomedical Engineering University of Science and Technology of China (USTC) Hefei Anhui China Center for Medical Imaging Robotics Analytic Computing & Learning (MIRACLE) USTC Suzhou Institute for Advance Research Suzhou Jiangsu China Stanford University Palo Alto California United State School of Medicine Shanghai University Shanghai China Key Laboratory of Precision and Intelligent Chemistry USTC Hefei Anhui China Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS
Unsupervised anomaly detection (UAD) from images strives to model normal data distributions, creating discriminative representations to distinguish and precisely localize anomalies. Despite recent advancements in the ... 详细信息
来源: 评论
Modeling and Coverage Analysis of RIS-assisted Integrated Sensing and communication Networks
收藏 引用
IEEE Transactions on Wireless communications 2025年
作者: Gan, Xu Huang, Chongwen Yang, Zhaohui Chen, Xiaoming Bader, Faouzi Zhang, Zhaoyang Yuen, Chau Guan, Yong Liang Debbah, Merouane Zhejiang University College of Information Science and Electronic Engineering Hangzhou310027 China Xidian University State Key Laboratory of Integrated Service Networks Xian710071 China Zhejiang Provincial Key Laboratory of Multi-Modal Communication Networks and Intelligent Information Processing Hangzhou310027 China Nord Europe Lille France Nanyang Technological University School of Electrical and Electronics Engineering 639798 Singapore Khalifa University of Science and Technology KU6G Research Center PO Box 127788 Abu Dhabi United Arab Emirates University Paris-Saclay CentraleSupelec Gif-sur-Yvette91192 France
Integrated sensing and communication (ISAC) has emerged as a promising technology to facilitate high-rate communications and super-resolution sensing, particularly operating in the millimeter wave (mmWave) band. Howev... 详细信息
来源: 评论
Diffie-Hellman key exchange protocol based on ring-LWE
收藏 引用
Open Cybernetics and Systemics Journal 2015年 第1期9卷 1033-1037页
作者: Zhi-Min, Yu Zheng-Jun, Jing Shi-Cun, Li Key Laboratory of Cloud Computing and Intelligent Information Processing of Changzhou City Jiangsu University of Technology ChangzhouJiangsu213001 China
In this paper, we first construct a one-round Diffie-Hellman key exchange protocol based on Ring-LWE. The security of our construction is based on the hardness of the Ring-LWE problem. Second, we adaptively extend our... 详细信息
来源: 评论
Selective Visual Relationship Detection with Adaptive Context Learning  17
Selective Visual Relationship Detection with Adaptive Contex...
收藏 引用
17th International Congress on Image and Signal processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Tu, Jiangwei Liu, Feng Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology Nanjing China
Visual relation detection aims to describe the relationships between objects in a scene by using the form of a triplet . Existing methods not only suffer from the huge number of combinations of triples, but also make ... 详细信息
来源: 评论
Prominent Edge Characteristics for Open World Object Detection  17
Prominent Edge Characteristics for Open World Object Detecti...
收藏 引用
17th International Congress on Image and Signal processing, BioMedical Engineering and Informatics, CISP-BMEI 2024
作者: Li, Shihao Liu, Feng Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology Nanjing China
Open world object detection aims to simulate the human process of recognizing objects in real life scenarios. It can identify categories not introduced during the training phase as unknown during the testing phase and... 详细信息
来源: 评论
The M-computations induced by accessibility relations in nonstandard models M of Hoare logic
收藏 引用
Frontiers of Computer Science 2016年 第4期10卷 717-725页
作者: Cungen CAO Yuefei SUI Zaiyue ZHANG Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing 100190 China Department of Computer Science Jiangsu University of Sciences and Technology Zhenjiang 212003 China
Hoare logic is a logic used as a way of specifying semantics of programming languages, which has been extended to be a separation logic to reason about mutable heap structure. In a model M of Hoare logic, each program... 详细信息
来源: 评论
LMP-GAN: Out-Of-Distribution Detection For Non-Control Data Malware Attacks
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 PP卷 PP页
作者: Wood, David Kapp, David Kebede, Temesgen Hirakawa, Keigo Wuhan University School of Computer Science China Wuhan University National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering China Zhongguancun Academy China Wuhan University State Key Laboratory of Information Engineering in Surveying Mapping and Remote Sensing China Sun Yat-sen University School of Geography and Planning China Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates Chongqing University College of Computer Science China The University of Tokyo Japan RIKEN Center for Advanced Intelligence Project Japan Intelligent Science & Technology Academy Limited CASIC China iFlytek Company Ltd. National Engineering Research Center of Speech and Language Information Processing China Nanyang Technological University College of Computing & Data Science Singapore Henan Academy of Sciences Aerospace Information Research Institute China
Anomaly detection is a common application of machine learning. Out-of-distribution (OOD) detection in particular is a semi-supervised anomaly detection technique where the detection method is trained only on the inlie... 详细信息
来源: 评论
Weak value amplification via second-order correlated technique
收藏 引用
Chinese Physics B 2016年 第2期25卷 58-61页
作者: 崔挺 黄靖正 刘翔 曾贵华 State Key Laboratory of Advanced Optical Communication Systems and Networks Shanghai Key Laboratory on Navigation and Location-based Serviceand Center of Quantum Information Sensing and Processing Shanghai Jiao Tong University Shanghai Key Laboratory of Aerospace Intelligent Control Technology Shanghai Institute of Spaceflight Control Technology College of Information Science and Technology Northwest University
We propose a new framework combining weak measurement and second-order correlated technique. The theoretical analysis shows that weak value amplification (WVA) experiment can also be implemented by a second-order co... 详细信息
来源: 评论
Privacy preservation in role-based access control model
收藏 引用
Journal of Networks 2011年 第8期6卷 1106-1113页
作者: Chen, Zuo Yang, Qiuwei Wan, Xin Tu, Yuanyan Yu, Fei Xu, Chen School of Computer and Communication Hunan University Changsha China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Privacy preservation is a crucial problem in resource sharing and collaborating among multi-domains. Based on this problem, we propose a role-based access control model for privacy preservation. This scheme avoided th... 详细信息
来源: 评论
Automated trust negotiation with time behavior
收藏 引用
Journal of Networks 2011年 第8期6卷 1091-1098页
作者: Chen, Zuo Yang, Qiuwei Wan, Xin Tu, Yuanyan Yu, Fei Xu, Chen School of Computer and Communication Hunan University Chang sha China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
In automated trust negotiation(ATN), strangers build trust relationship by disclosing attributes credentials alternately. In the recent study of ATN, there was no rigorous formal definition of ATN abstract model, and ... 详细信息
来源: 评论