咨询与建议

限定检索结果

文献类型

  • 503 篇 会议
  • 378 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 882 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 656 篇 工学
    • 475 篇 计算机科学与技术...
    • 398 篇 软件工程
    • 181 篇 信息与通信工程
    • 84 篇 控制科学与工程
    • 75 篇 生物工程
    • 54 篇 生物医学工程(可授...
    • 52 篇 电气工程
    • 52 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 34 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 21 篇 安全科学与工程
    • 19 篇 仪器科学与技术
    • 19 篇 交通运输工程
  • 314 篇 理学
    • 174 篇 数学
    • 85 篇 生物学
    • 66 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 200 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 40 篇 临床医学
    • 37 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 21 篇 training
  • 19 篇 deep learning
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 object detection
  • 15 篇 data mining
  • 13 篇 computer science
  • 13 篇 computational mo...
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 12 篇 convolutional ne...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 genetic algorith...

机构

  • 106 篇 provincial key l...
  • 52 篇 college of compu...
  • 52 篇 fujian provincia...
  • 45 篇 school of comput...
  • 42 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 16 篇 chen yang
  • 15 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 12 篇 jiao ge
  • 12 篇 jiang feibo
  • 12 篇 dong li
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 zhao huihuang
  • 10 篇 wang kezhi
  • 10 篇 cao cungen

语言

  • 828 篇 英文
  • 32 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
882 条 记 录,以下是181-190 订阅
排序:
Transformer-Based Deep Hashing Method for Multi-Scale Feature Fusion  48
Transformer-Based Deep Hashing Method for Multi-Scale Featur...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: He, Chao Wei, Hongxi Inner Mongolia University School of Computer Science Hohhot China Provincial Key Laboratory of Mongolian Information Processing Technology Hohhot China National and Local Joint Engineering Research Center of Mongolian Information Processing Technology Hohhot China
The deep image hashing aims to map the input image into simply binary hash codes via deep neural networks. Motivated by the recent advancements of Vision Transformers (ViT), many deep hashing methods based on ViT have... 详细信息
来源: 评论
Efficient vulnerability detection based on an optimized rule-checking static analysis technique
收藏 引用
Frontiers of information technology & Electronic Engineering 2017年 第3期18卷 332-345页
作者: Deng CHEN Yan-duo ZHANG Wei WEI Shi-xun WANG Ru-bing HUANG Xiao-lin LI Bin-bin QU Sheng JIANG Hubei Provincial Key Laboratory of Intelligent Robot Wuhan Institute of TechnologyWuhan 430205China Industrial Robot Engineering Center Wuhan Institute of TechnologyWuhan 430205China School of Computer and Information Engineering Henan Normal UniversityXinxiang 453007China School of Computer Science and Telecommunication Engineering Jiangsu UniversityZhenjiang 212013China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China
Static analysis is an efficient approach for software assurance. It is indicated that its most effective usage is to perform analysis in an interactive way through the software development process, which has a high pe... 详细信息
来源: 评论
Rough knowledge mining algorithm based on extension decision rule lattice for electronic patient record
Rough knowledge mining algorithm based on extension decision...
收藏 引用
International Conference on Artificial Intelligence and Computational Intelligence
作者: Ding, Weiping Wang, Jiandong Guan, Zhijing Zhu, Hao Shi, Quan College of Information Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing China School of Computer Science and Technology Nantong University Nantong China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
Electronic patient record mining deals with the implicit and useful medical information stored in the electronic patient record *** this technology the useful knowledge is extracted and the scientific and auxiliary de... 详细信息
来源: 评论
A New Approach of Intrusion Detection with Command Sequence-To-Sequence Model  6th
A New Approach of Intrusion Detection with Command Sequence-...
收藏 引用
6th Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2019
作者: Liu, Wei Mao, Yu Ci, Linlin Zhang, Fuquan School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350117 China
Traditionally, researchers have focused on network level intrusion detection and program level intrusion detection to improve computer security. However, neither approach is foolproof. We argue that the internal and e... 详细信息
来源: 评论
An Improved Q-RRT^(*) Algorithm Based on Virtual Light
收藏 引用
computer Systems Science & Engineering 2021年 第10期39卷 107-119页
作者: Chengchen Zhuge Qun Wang Jiayin Liu Lingxiang Yao Department of Computer Information and Cyber Security Jiangsu Police InsituteNanjing210031China Jiangsu Electronic Data Forensics and Analysis Engineering Research Center Jiangsu Police InsituteNanjing210031China Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics Jiangsu Police InsituteNanjing210031China University of Technology Sydney Sydney2007Australia
The Rapidly-exploring Random Tree(RRT)algorithm is an efficient path-planning algorithm based on random *** RRT^(*)algorithm is a variant of the RRT algorithm that can achieve convergence to the optimal ***,it has bee... 详细信息
来源: 评论
A decoupled hybrid structure for active noise control with uncorrelatednarrowband disturbances  43
A decoupled hybrid structure for active noise control with u...
收藏 引用
43rd International Congress on Noise Control Engineering: Improving the World Through Noise Control, INTERNOISE 2014
作者: Wu, Lifu Qiu, Xiaojun Burnett, Ian S. Cheng, Eva Guo, Yecai Royal Melbourne Institute of Technology School of Electrical and Computer Engineering Australia Jiangsu Key Laboratory of Meteorological Observation and Information Processing Nanjing University of Information Science and Technology 210044 China
In real active noise control (ANC)applications,the following situations frequently occur, one isthat disturbances only present at the error sensor and havelowcorrelation with reference signal, the other is thatthere i... 详细信息
来源: 评论
Reliable Multi-Modal Object Re-Identification via Modality-Aware Graph Reasoning
arXiv
收藏 引用
arXiv 2025年
作者: Wan, Xixi Zheng, Aihua Wang, Zi Jiang, Bo Tang, Jin Ma, Jixin Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Security Artificial Intelligence School of Artificial Intelligence Anhui University Hefei230601 China School of Biomedical Engineering Anhui Medical University Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China School of Computing and Mathematical Sciences University of Greenwich LondonSE10 9LS United Kingdom
Multi-modal data provides abundant and diverse object information, crucial for effective modal interactions in Re-Identification (ReID) tasks. However, existing approaches often overlook the quality variations in loca... 详细信息
来源: 评论
Rotation-DPeak: Improving Density Peaks Selection for Imbalanced Data  1
收藏 引用
8th China computer Federation International Conference on Big Data, CCF BIGDATA 2020
作者: Hu, Xiaoliang Yan, Ming Chen, Yewang Yang, Lijie Du, Jixiang The College of Computer Science and Technology Huaqiao University Xiamen China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China Fujian Key Laboratory of Big Data Intelligence and Security Huaqiao University Xiamen China
Density Peak (DPeak) is an effective clustering algorithm. It maps arbitrary dimensional data onto a 2-dimensional space, which yields cluster centers and outliers automatically distribute on upper right and upper lef... 详细信息
来源: 评论
A unified semi-supervised framework for author disambiguation in academic social network
A unified semi-supervised framework for author disambiguatio...
收藏 引用
25th International Conference on Database and Expert Systems Applications, DEXA 2014
作者: Wang, Peng Zhao, Jianyu Huang, Kai Xu, Baowen School of Computer Science and Engineering Southeast University China State Key Laboratory for Novel Software Technology Nanjing University China State Key Laboratory of Software Engineering Wuhan University China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
This paper addresses the author disambiguation problem in academic social network, namely, resolves the phenomenon of synonym problem "multiple names refer to one person" and polysemy problem "one name ... 详细信息
来源: 评论
On the parameterized complexity of minimum/maximum degree vertex deletion on several special graphs
收藏 引用
Frontiers of computer Science 2023年 第4期17卷 97-107页
作者: Jia LI Wenjun LI Yongjie YANG Xueying YANG School of Information Engineering Hunan Industry PolytechnicChangsha 410036China Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation School of Computer and Communication EngineeringChangsha University of Science and TechnologyChangsha 410015China Chair of Economic Theory Saarland UniversitySaarbrücken 66123Germany
In the minimum degree vertex deletion problem,we are given a graph,a distinguished vertex in the graph,and an integer κ,and the question is whether we can delete at most κ vertices from the graph so that the disting... 详细信息
来源: 评论