咨询与建议

限定检索结果

文献类型

  • 503 篇 会议
  • 373 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 877 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 654 篇 工学
    • 476 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 179 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 75 篇 生物工程
    • 54 篇 生物医学工程(可授...
    • 49 篇 电气工程
    • 47 篇 光学工程
    • 47 篇 电子科学与技术(可...
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 19 篇 交通运输工程
    • 18 篇 仪器科学与技术
  • 312 篇 理学
    • 174 篇 数学
    • 84 篇 生物学
    • 66 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 28 篇 化学
  • 199 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 21 篇 training
  • 19 篇 deep learning
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 object detection
  • 15 篇 data mining
  • 13 篇 computer science
  • 13 篇 computational mo...
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 11 篇 convolutional ne...
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 genetic algorith...

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 50 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...
  • 13 篇 jiangsu provinci...

作者

  • 49 篇 li zuoyong
  • 31 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 fan haoyi
  • 16 篇 lang li
  • 15 篇 gao guangwei
  • 15 篇 chen yang
  • 14 篇 teng shenghua
  • 14 篇 dong li
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiang feibo
  • 12 篇 jiao ge
  • 11 篇 wang kezhi
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 826 篇 英文
  • 29 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
877 条 记 录,以下是111-120 订阅
排序:
A Survey of Game Theory in Wireless Sensor Networks Security
收藏 引用
Journal of Networks 2011年 第3期6卷 521-532页
作者: Shen, Shigen Yue, Guangxue Cao, Qiying Yu, Fei College of Information Science and Technology Donghua University Shanghai China College of Mathematics and Information Engineering Jiaxing University Jiaxing China College of Computer and Communication Hunan University Changsha China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
Wireless Sensor Networks (WSNs) are becoming an integral part of our lives. There are not widespread applications of WSNs without ensuring WSNs security. Due to the limited capabilities of sensor nodes in terms of com... 详细信息
来源: 评论
Hierarchical Structures on Multigranulation Spaces
收藏 引用
Journal of computer Science & technology 2012年 第6期27卷 1169-1183页
作者: 杨习贝 钱宇华 杨静宇 School of Computer Science and Engineering Jiangsu University of Science and Technology School of Computer Science and Technology Nanjing University of Science and Technology Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University
Though many hierarchical structures have been proposed to analyze the finer or coarser relationships between two granulation spaces, these structures can only be used to compare the single granulation spaces. However,... 详细信息
来源: 评论
Pyramid: Building incentive architecture for unstructured peer-to-peer network
Pyramid: Building incentive architecture for unstructured pe...
收藏 引用
Advanced International Conference on Telecommunications andInternational Conference on Internet and Web Applications and Services, AICT/ICIW'06
作者: Zhao, Jia Lu, Jian-De Jiangsu Key Laboratory of Computer Information Processing Technology Soochow University Jiangsu Suzhou 215006 China
As non-cooperation behaviors such as free-riding do not seems to have been checked according to a recent survey of Gnutella network [3], it hereby calls for more attention to this issue and more efforts in our future ... 详细信息
来源: 评论
IMEWAS - A integrated multi-platform EAPoW-based WLAN AAA solution
IMEWAS - A integrated multi-platform EAPoW-based WLAN AAA so...
收藏 引用
Third International Conference on Wireless and Mobile Communications 2007, ICWMC '07
作者: Chen, Ling Lu, Jian-De Jiangsu Key Laboratory Computer Information Processing Technology Soochow University Jiangsu Suzhou 215006 China
As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsup... 详细信息
来源: 评论
A content-based classified hierarchical vector quantization algorithm for volume compression
Journal of Software
收藏 引用
Journal of Software 2011年 第2期6卷 322-330页
作者: Zhao, Li-Ping Yue, Guang-Xue Xiao, De-Gui Zhou, Xu Yu, Xiang Yu, Fei School of Mathematics and Information Engineering Jiaxing University Jiaxing Zhejiang China School of Computer and Communication Engineering Hunan University Changsha Hunan China Department of Computer Science and Technology Huaihua University Huaihua China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China
An improved volumetric compression algorithm is presented in this paper. Histogram technique is used for analyzing the trait of volume data. The volume data is then partitioned into volume bricks which will be classif... 详细信息
来源: 评论
A Review on the Application of Deep Learning Methods in Detection and Identification of Rice Diseases and Pests
收藏 引用
computers, Materials & Continua 2024年 第1期78卷 197-225页
作者: Xiaozhong Yu Jinhua Zheng College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang421002China
In rice production,the prevention and management of pests and diseases have always received special *** methods require human experts,which is costly and *** to the complexity of the structure of rice diseases and pes... 详细信息
来源: 评论
Side-Channel Leakage Analysis of Inner Product Masking
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1245-1262页
作者: Yuyuan Li Lang Li Yu Ou College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang421002China
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher... 详细信息
来源: 评论
FSA-Net:A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization
收藏 引用
Intelligent Automation & Soft Computing 2023年 第7期37卷 971-983页
作者: Zhipeng Bin Huihuang Zhao Xiaoman Liang Wenli Chen College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two *** this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face *** e... 详细信息
来源: 评论
SFGA-CPA: A Novel Screening Correlation Power Analysis Framework Based on Genetic Algorithm
收藏 引用
computers, Materials & Continua 2024年 第6期79卷 4641-4657页
作者: Jiahui Liu Lang Li Di Li Yu Ou College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang421002China
Correlation power analysis(CPA)combined with genetic algorithms(GA)now achieves greater attack efficiency and can recover all subkeys ***,two issues in GA-based CPA still need to be addressed:key degeneration and slow... 详细信息
来源: 评论
Rational semantics for prioritized logic programs
Rational semantics for prioritized logic programs
收藏 引用
International Conference on computer Science and Service System
作者: Zhang, Zhizheng School of Computer Science and Engineering Southeast University Nanjing 210096 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University China
Both preference logics and preference representation in logic programming are concerned with reasoning about preferences on combinatorial domains, yet little research has been published using preference axioms in logi... 详细信息
来源: 评论