咨询与建议

限定检索结果

文献类型

  • 504 篇 会议
  • 374 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 879 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 473 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 53 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 823 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
879 条 记 录,以下是61-70 订阅
排序:
Offline Reinforcement Learning with Policy Guidance and Uncertainty Estimation
Offline Reinforcement Learning with Policy Guidance and Unce...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Lan Wu Quan Liu Lihua Zhang Zhigang Huang School of Computer Science and Technology Soochow University Soochow China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Offline reinforcement learning is an approach for transforming static datasets into powerful decision engines. It cannot interact with the environment online, which leads to distribution shifts. Previous approaches ad...
来源: 评论
Offline Reinforcement Learning with Generative Adversarial Networks and Uncertainty Estimation
Offline Reinforcement Learning with Generative Adversarial N...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Lan Wu Quan Liu Lihua Zhang Zhigang Huang School of Computer Science and Technology Soochow University Soochow China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
In recent years, offline reinforcement learning has attracted considerable attention in artificial intelligence. By generating a static dataset through a behavior policy, it is unable to engage in online interactions ...
来源: 评论
A Policy-Controlled Signature Scheme for end-to-end Secure Communication  12
A Policy-Controlled Signature Scheme for end-to-end Secure C...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Yu, Feng Meng, Linghui Xi, Jing Li, Xianxian Lu, Qianhui Zhu, Weidong Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology GuiLin China University of SouthEast Jiangsu Provincial Key Laboratory of Netwrok and Information Security Nanjing China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security GuiLin China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University GuiLin China
In the digitalized society, end-to-end security communication is receiving increasing attention. Issues such as ma-licious sender impersonation and over-privilege communication continue to prevail in end-to-end commun... 详细信息
来源: 评论
A New Approach of Intrusion Detection with Command Sequence-To-Sequence Model  6th
A New Approach of Intrusion Detection with Command Sequence-...
收藏 引用
6th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2019
作者: Liu, Wei Mao, Yu Ci, Linlin Zhang, Fuquan School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350117 China
Traditionally, researchers have focused on network level intrusion detection and program level intrusion detection to improve computer security. However, neither approach is foolproof. We argue that the internal and e... 详细信息
来源: 评论
Efficient fully analytical polygon-based continuous shading rendering CGH algorithm with specular reflection  14
Efficient fully analytical polygon-based continuous shading ...
收藏 引用
Holography, Diffractive Optics, and Applications XIV 2024
作者: Wang, Pin Fu, Qingyang Zhang, Yaping Poon, Ting-Chung Yunnan Provincial Key Laboratory of Modern Information Optics Kunming University of Science and Technology Kunming Yunnan650500 China Nanjing University of Science and Technology Nanjing Jiangsu210094 China Bradley Department of Electrical and Computer Engineering Virginia Tech BlacksburgVA24061 United States
The fully analytical method has been widely studied for its higher accuracy and efficiency, and the addition of shading rendering can effectively improve the three-dimensional perception of reconstructed images. Howev... 详细信息
来源: 评论
Graph Contrastive Learning with Learnable Graph Augmentation  48
Graph Contrastive Learning with Learnable Graph Augmentation
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Pu, Xinyan Zhang, Ke Shu, Huazhong Coatrieux, Jean Louis Kong, Youyong Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Nanjing China Universit de Rennes 1 Ltsi Rennes France Centre de Recherche en Information BioMdicale Sino-Franais Rennes France
Graph contrastive learning has gained popularity due to its success in self-supervised graph representation learning. Augmented views in contrastive learning greatly determine the quality of the learned representation... 详细信息
来源: 评论
Dual-branch adjacent connection and channel mixing network for video crowd counting
收藏 引用
Pattern Recognition 2025年 167卷
作者: Ling, Miaogen Chen, Jixuan Liu, Yongwen Fang, Wei Geng, Xin School of Computer Science Nanjing University of Information Science and Technology Nanjing210044 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China School of Computer Science and Engineering Southeast University Nanjing210096 China
This paper focuses on the problem of video crowd counting, which usually uses the spatial and temporal correlations of the consecutive frames to achieve better performance than the single-image crowd counting methods.... 详细信息
来源: 评论
Spatio-Temporal Context Modeling for Road Obstacle Detection  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Wu, Xiuen Wang, Tao Liang, Lingyu Li, Zuoyong Ching, Fum Yew College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350108 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan354300 China School of Electronic and Information Engineering South China University of Technology Guangzhou510641 China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China Guangzhou510320 China Penang11800 Malaysia
Road obstacle detection is an important problem for vehicle driving safety. In this paper, we aim to obtain robust road obstacle detection based on spatio-temporal context modeling. Firstly, a data-driven spatial cont... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and Applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论