咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
909 条 记 录,以下是351-360 订阅
排序:
Machine Learning Based Tongue Image Recognition for Diabetes Diagnosis  3rd
Machine Learning Based Tongue Image Recognition for Diabetes...
收藏 引用
3rd International Conference on Machine Learning for Cyber Security, ML4CS 2020
作者: Lin, Xiaohui Yu, Zhaochai Li, Zuoyong Liu, Weina Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China Department of Computer Engineering Fujian Polytechnic of Information Technology Fuzhou350003 China
Tongue diagnosis of Traditional Chinese Medicine (TCM) is of great significance in the diagnosis of diabetes. To reduce the subjectivity of doctors in clinical diagnosis, this paper proposes a method for diabetic tong... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2024年
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Student Behavior Recognition in Remote Video Classrooms  16th
Student Behavior Recognition in Remote Video Classrooms
收藏 引用
16th International Conference on Intelligent information Hiding and Multimedia Signal processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of information technology, Applications and Tools, FITAT 2020
作者: Wang, Rongrong Zhang, Guanglong Zhang, Fuquan Dong, Zhiwei Qi, Mingzhu Computer School Beijing Institute of Technology Beijing100081 China Computer School Jilin University Changchun130012 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China Botou Vocational College Botou062150 China Shandong Dezhou Experimental Middle School Dezhou253000 China
With the development of high-definition camera equipment and Internet communication technology, remote video teaching methods have emerged. This new type of teaching method has led to changes in traditional classrooms... 详细信息
来源: 评论
Learning to Reduce information Bottleneck for Object Detection in Aerial Images
arXiv
收藏 引用
arXiv 2022年
作者: Shen, Yuchen Zhang, Dong Song, Zhihao Jiang, Xuesong Ye, Qiaolin The College of Information Science and Technology Nanjing Forestry University Jiangsu Nanjing210037 China Key Laboratory Intelligent Information Processing Nanjing Xiaozhuang University Jiangsu Nanjing211171 China The Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong The College of Mechanical and Electronic Engineering Nanjing Forestry University Jiangsu Nanjing210037 China
Object detection in aerial images is a fundamental research topic in the geoscience and remote sensing domain. However, the advanced approaches on this topic mainly focus on designing the elaborate backbones or head n... 详细信息
来源: 评论
Blockchain-aided Mobile Edge Intelligence With Sparse Rewarded Computing Resource Allocation
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Niu, Wei Shi, Long Wang, Zhe Yang, Weiwei Guo, Yongan Nanjing University of Science and Technology School of Electronic and Optical Engineering Nanjing210094 China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China Dongguan University of Technology School of Electrical Engineering and Intelligentization Dongguan523000 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology Nanjing210003 China Nanjing University of Posts and Telecommunications School of Communications and Information Engineering Nanjing210003 China
In the blockchain-aided mobile edge intelligence (B-MEI) network, base stations (BSs) each with an edge server not only execute tasks offloaded from users but also serve as blockchain nodes to ensure trustworthy data ... 详细信息
来源: 评论
Transformer-Based Hierarchical Dynamic Decoders for Salient Object Detection
SSRN
收藏 引用
SSRN 2023年
作者: Zheng, Qingping Zheng, Ling Deng, Jiankang Li, Ying Shang, Changjing Shen, Qiang School of Computer Science National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech & Image Information Processing Northewestern Polytechnical University Shaanxi Xi’an710129 China Fuzhou Institute of Data Technology Fujian350200 China Department of Computing Imperial College London LondonSW7 2AZ United Kingdom
HighlightsTransformer-Based Hierarchical Dynamic Decoders for Salient Object DetectionQingping Zheng, Ling Zheng, Jiankang Deng, Ying Li, Changjing Shang, Qiang Shen• T-HDDNet employs dynamic upsampling and fusion for... 详细信息
来源: 评论
An optimized aes masking method for resisting side channel analysis  8th
An optimized aes masking method for resisting side channel a...
收藏 引用
8th International Conference on computer Engineering and Networks, CENet 2018
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal University HengyangHunan421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application HengyangHunan421002 China
In order to against the side channel analysis attack such as power, electromagnetic waves, and time attack, an optimized masking method is proposed for Advanced Encryption Standard (AES) algorithm in this paper. This ... 详细信息
来源: 评论
DBSCAN Is Semi-Spectral Clustering*
DBSCAN Is Semi-Spectral Clustering*
收藏 引用
International Conference on Big Data and information Analytics (BigDIA)
作者: Yewang Chen The Provincial Key Laboratory for Computer Information Processing Technology Soochow University
Spectral clustering and DBSCAN are two famous clustering methods, the former reduces data dimensionality by spectrum of similarity matrix, and then utilizes kmeans to cluster data in low dimensional space. While DBSCA... 详细信息
来源: 评论
Disentangled Generation Network for Enlarged License Plate Recognition and A Unified Dataset
arXiv
收藏 引用
arXiv 2022年
作者: Li, Chenglong Yang, Xiaobin Wang, Guohao Zheng, Aihua Tan, Chang Jia, Ruoran Tang, Jin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Artificial Intelligence Anhui University Hefei230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Lab of Intelligent Computing and Signal Processing Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China iFLYTEK Co. Ltd. Hefei230088 China
License plate recognition plays a critical role in many practical applications, but license plates of large vehicles are difficult to be recognized due to the factors of low resolution, contamination, low illumination... 详细信息
来源: 评论
Large Generative Model Assisted 3D Semantic Communication
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Feibo Peng, Yubo Dong, Li Wang, Kezhi Yang, Kun Pan, Cunhua You, Xiaohu Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China School of Information Science and Engineering Hunan Normal University Changsha China Changsha Social Laboratory of Artificial Intelligence Hunan University of Technology and Business Changsha China The Department of Computer Science Brunel University London United Kingdom The School of Computer Science and Electronic Engineering University of Essex ColchesterCO4 3SQ United Kingdom Changchun Institute of Technology China The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The Frontiers Science Center for Mobile Information Communication and Security National Mobile Communications Research Laboratory Southeast University Nanjing China The Purple Mountain Laboratories Nanjing China
Semantic Communication (SC) is a novel paradigm for data transmission in 6G. However, there are several challenges posed when performing SC in 3D scenarios: 1) 3D semantic extraction;2) Latent semantic redundancy;and ... 详细信息
来源: 评论