咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 373 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 881 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 84 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 825 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
881 条 记 录,以下是231-240 订阅
排序:
A Policy-Controlled Signature Scheme for end-to-end Secure Communication
A Policy-Controlled Signature Scheme for end-to-end Secure C...
收藏 引用
International Conference on Advanced Cloud and Big Data (CBD)
作者: Feng Yu Linghui Meng Jing Xi Xianxian Li Qianhui Lu Weidong Zhu Key Lab of Education Blockchain and Intelligent Technology Guangxi Normal University GuiLin China Jiangsu Provincial Key Laboratory of Netwrok and Information Security University of SouthEast Nanjing China Guangxi Key Lab of Multi-Source Information Mining and Security Guangxi Normal University GuiLin China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University GuiLin China
In the digitalized society, end-to-end security communication is receiving increasing attention. Issues such as ma-licious sender impersonation and over-privilege communication continue to prevail in end-to-end commun... 详细信息
来源: 评论
A Multi-Stage Goal-Driven Network for Pedestrian Trajectory Prediction
arXiv
收藏 引用
arXiv 2024年
作者: Wu, Xiuen Wang, Tao Cai, Yuanzheng Liang, Lingyu Papageorgiou, George Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China College of Computer and Data Science Fuzhou University Fuzhou China School of Electronic and Information Engineering South China University of Technology Guangzhou China SYSTEMA Research Center European University Cyprus Nicosia Cyprus
Pedestrian trajectory prediction plays a pivotal role in ensuring the safety and efficiency of various applications, including autonomous vehicles and traffic management systems. This paper proposes a novel method for... 详细信息
来源: 评论
AdaSemiCD: An Adaptive Semi-supervised Change Detection Method Based on Pseudo Label Evaluation
arXiv
收藏 引用
arXiv 2024年
作者: Ran, Lingyan Wen, Dongcheng Zhuo, Tao Zhang, Shizhou Zhang, Xiuwei Zhang, Yanning School of Computer Science Shaanxi Provincial Key Laboratory of Speech and Image Information Processing The National Engineering Laboratory for Integrated Aerospace-GroundOcean Big Data Application Technology The Ningbo Institute of Northwestern Polytechnical University Northwestern Polytechnical University Xi’an710072 China College of Information Engineering Northwest A&F University Yangling712100 China
Change detection(CD) is an essential field in remote sensing, with a primary focus on identifying areas of change in bitemporal image pairs captured at varying intervals of the same region. The data annotation process... 详细信息
来源: 评论
Recognizing Human-object Interactions for a Home Assistive Robot
Recognizing Human-object Interactions for a Home Assistive R...
收藏 引用
Automation, Control and Robotics Engineering (CACRE), International Conference on
作者: Liangliang Wang Guanglei Huo Xinwei Chen Chengxi Huang School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan China Fujian(Quanzhou)-HIT Research Institute of Engineering and Technology Quanzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
To enable robots to understand a specific assistive task during human-robot interactions under complex home scenes, at the center is the problem of human-object interaction (HOI) recognition. In particular, aiming at ...
来源: 评论
A Fraud Detection Approach Based on Combined Feature Weighting  10th
A Fraud Detection Approach Based on Combined Feature Weighti...
收藏 引用
10th EAI International Conference on Cloud Computing, CloudComp 2020
作者: Liu, Xiaoqian Yu, Chenfei Xia, Bin Gu, Haiyan Wang, Zhenli Department of Computer Information and Cyber Security Jiangsu Police Institute Nanjing210031 China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing University of Posts and Telecommunications Nanjing210023 China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Nanjing China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Nanjing China
Data mining technology has yielded fruitful results in the area of crime discovery and intelligent decision making. Credit card is one of the most popular payment methods, providing great convenience and efficiency. H... 详细信息
来源: 评论
Heterogeneous Graph Convolutional Network for Visual Reinforcement Learning of Action Detection
Heterogeneous Graph Convolutional Network for Visual Reinfor...
收藏 引用
Automation, Control and Robotics Engineering (CACRE), International Conference on
作者: Liangliang Wang Chengxi Huang Xinwei Chen School of Computer Science and Artificial Intelligence Wuhan University of Technology Wuhan China Fujian(Quanzhou)-HIT Research Institute of Engineering and Technology Quanzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
Existing action detection approaches do not take spatio-temporal structural relationships of action clips into account, which leads to a low applicability in real-world scenarios and can benefit detecting if exploited...
来源: 评论
Outer Synchronization Between Complex Delayed Networks with Both Uncertain Parameters and Unknown Topological Structure  9th
Outer Synchronization Between Complex Delayed Networks with ...
收藏 引用
9th International Conference on computer Engineering and Networks, CENet2019
作者: Chen, Zhong Tian, Xiaomei Lei, Tianqi Chen, Junyao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China Department of Computer Engineering Ajou University Suwon16499 Korea Republic of
In this paper, synchronization of both non-identical unknown network and identical known network can be considered. Based on Lyapunov stability theory, for the case of non-identical or identical network, synchronizati... 详细信息
来源: 评论
Automatic Identification for Projector Brand and Model Number  1
收藏 引用
6th International Conference on Data Mining and Big Data, DMBD 2021
作者: Li, Zuoyong Wang, Weice Zhang, Fuquan Fan, Haoyi Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China College of Computer and Information Sciences Fujian Agriculture and Forestry University Fuzhou350002 China School of Computer Science and Technology Harbin University of Science and Technology Harbin150080 China
The projector production process needs to pack manufactured projectors. The key step of projector packing is to check whether the brand and model number of the projector is correct or not, for avoiding the projector’... 详细信息
来源: 评论
Unsupervised Time Series Anomaly Detection under Data Contamination  12
Unsupervised Time Series Anomaly Detection under Data Contam...
收藏 引用
12th International Conference on information technology in Medicine and Education, ITME 2022
作者: Lin, Xiaohui Li, Zuoyong Huang, Xunhua Chen, Xinwei Fan, Haoyi Fuzhou University College of Computer and Data Science Fuzhou350108 China Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Fuzhou350121 China Harbin University of Science and Technology School of Computer Science and Technology Harbin150080 China Minjiang University Fujian Engineering and Research Center of New Chinese Lacquer Materials Fuzhou350121 China Zhengzhou University School of Computer and Artificial Intelligence Zhengzhou450001 China
Unsupervised learning utilizes unlabeled data to alleviate the reliance on large amounts of labeled data, and it has made great progress in time series anomaly detection. However, there are still some thorny issues un... 详细信息
来源: 评论
Graph Contrastive Learning with Learnable Graph Augmentation
Graph Contrastive Learning with Learnable Graph Augmentation
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Xinyan Pu Ke Zhang Huazhong Shu Jean Louis Coatrieux Youyong Kong Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China LTSI Universit de Rennes 1 Rennes France Centre de Recherche en Information BioMdicale Sino-Franais Rennes France
Graph contrastive learning has gained popularity due to its success in self-supervised graph representation learning. Augmented views in contrastive learning greatly determine the quality of the learned representation... 详细信息
来源: 评论