咨询与建议

限定检索结果

文献类型

  • 507 篇 会议
  • 375 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 883 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 655 篇 工学
    • 474 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 182 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 74 篇 生物工程
    • 54 篇 电气工程
    • 53 篇 生物医学工程(可授...
    • 51 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
  • 314 篇 理学
    • 175 篇 数学
    • 84 篇 生物学
    • 67 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 34 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 training
  • 19 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 wang kezhi
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 827 篇 英文
  • 34 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory for Computer Information Processing Technology"
883 条 记 录,以下是71-80 订阅
排序:
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
Data-consistent Unsupervised Diffusion Model for Metal Artifact Reduction
Data-consistent Unsupervised Diffusion Model for Metal Artif...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Tong, Zhan Wu, Zhan Yang, Yang Mao, Weilong Wang, Shijie Li, Yinsheng Chen, Yang Southeast University Laboratory of Image Science and Technology Nanjing210096 China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing210096 China Chinese Academy of Sciences Research Center for Medical Artificial Intelligence Shenzhen Institutes of Advanced Technology Shenzhen518055 China School of Computer Science and Engineering Key Lab. of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Laboratory of Image Science and Technology Nanjing210096 China
Computed Tomography (CT) is an imaging technique widely used in clinical diagnosis. However, high-attenuation metallic implants result in the obstruction of low-energy Xrays and further lead to metal artifacts in the ... 详细信息
来源: 评论
Improved Power Conversion Efficiency and Stability of Perovskite Solar Cells Induced by Dual Interface Passivation
Improved Power Conversion Efficiency and Stability of Perovs...
收藏 引用
2023 International Conference on Optoelectronic Materials and Devices, ICOMD 2023
作者: Guan, Nianci Han, Qizhuo Institute of Biomedical Materials & Engineering Northwestern Polytechnical University Xi'an710072 China The School of Computer Science National Engineering Laboratory for Integrated Aero-Space-Ground- Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech and Image Information Processing Northwestern Polytechnical University Xi’an710072 China
Efficient and stable Perovskite solar cells (PSCs) have been successfully produced using a dual-layer modified (DLM) perovskite thin film. This method simultaneously modifies both the bottom (SnO2/perovskite) and top ... 详细信息
来源: 评论
EPI-Mamba: State Space Model for Semantic Segmentation from Light Fields
EPI-Mamba: State Space Model for Semantic Segmentation from ...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Yan Li Jianan Chen Qiong Wang Jinshan Xu College of Computer Science & Technology Zhejiang University of Technology Hangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing & Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Global contextual dependency is of significance for semantic segmentation from light fields. However, previous works mostly exploit attention mechanisms to model spatial context dependency and angular context dependen... 详细信息
来源: 评论
PCB Defect Detection Method Based on Improved RetinaNet  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Xu, Yusheng Cao, Xinrong Hu, Rong Keikhosrokiani, Pantea Li, Zuoyong College of Computer Science and Mathematics Fujian University of Technology Fuzhou350118 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China School of Computer Sciences Universiti Sains Malaysia Penang11800 Malaysia
In the electronic industry product quality control, PCB defect detection is a crucial part, which has the characteristics of small defect size and high similarity. The existing defect detection methods are still not g... 详细信息
来源: 评论
A Foreground Feature Embedding Network for Object Detection in Remote Sensing Images  18th
A Foreground Feature Embedding Network for Object Detection...
收藏 引用
18th CCF Conference on computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023
作者: Wu, Jiahui Cai, Yuanzheng Wang, Tao Luo, Zhiming Shan, Senhua Li, Zuoyong College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350108 China Department of Artificial Intelligence Xiamen University Xiamen361005 China Istrong Technology Limited Company Fuzhou350108 China
Compared with traditional natural images, remote sensing images (RSIs) typically have high resolution. The objects in the images are densely distributed, with heterogeneous orientation and large scale variation, even ... 详细信息
来源: 评论
MFGB: Molecular Properties Prediction leveraging Self-supervised Morgan Fingerprint Representation Learning
MFGB: Molecular Properties Prediction leveraging Self-superv...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Fang, Shuyan Liu, Yu Liu, Song Wuhan University of Science and Technology School of Computer Science and Technology Wuhan China Wuhan University of Science and Technology Hubei Prov. Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan China Wuhan University of Science and Technology Hubei Provincial Key Laboratory of Occupational Hazard Identification and Control Hubei Province Wuhan China
Simple molecular graphs or molecular line notations are insufficient for molecular representation learning models that automatically learn molecule representations to acquire deep semantic features about chemistry. Th... 详细信息
来源: 评论
Kernel-Guided Texture-Aware Blind Super-Resolution via Uncertainty Learning  13
Kernel-Guided Texture-Aware Blind Super-Resolution via Uncer...
收藏 引用
13th International Conference on information technology in Medicine and Education, ITME 2023
作者: Zhao, Tingting Li, Zuoyong Quan, Li Zeng, Kun Teng, Shenghua College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao266590 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou350121 China College of Computer Science and Big Data Fuzhou University Fuzhou350121 China
The accuracy of kernel estimation is critical to the performance of blind super-resolution (SR). Traditional kernel estimation methods usually use L1 or L2 loss function to minimize the difference between the estimate... 详细信息
来源: 评论