咨询与建议

限定检索结果

文献类型

  • 523 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 909 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 676 篇 工学
    • 495 篇 计算机科学与技术...
    • 404 篇 软件工程
    • 184 篇 信息与通信工程
    • 99 篇 控制科学与工程
    • 74 篇 生物工程
    • 55 篇 电气工程
    • 53 篇 电子科学与技术(可...
    • 53 篇 生物医学工程(可授...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 31 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 23 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 19 篇 仪器科学与技术
    • 17 篇 材料科学与工程(可...
  • 316 篇 理学
    • 176 篇 数学
    • 84 篇 生物学
    • 68 篇 物理学
    • 40 篇 统计学(可授理学、...
    • 29 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 109 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 48 篇 医学
    • 41 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 20 篇 农学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 20 篇 deep learning
  • 20 篇 training
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 12 篇 laboratories
  • 12 篇 computational mo...
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 accuracy
  • 9 篇 streaming media

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 51 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 24 篇 guangdong provin...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 16 篇 jiangsu provinci...
  • 15 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 13 篇 school of electr...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 chen yang
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 17 篇 lang li
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 wang jinbao
  • 12 篇 shen linlin
  • 12 篇 jiang feibo
  • 11 篇 kong youyong
  • 10 篇 gao shang
  • 10 篇 zhou guodong

语言

  • 827 篇 英文
  • 60 篇 其他
  • 24 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
909 条 记 录,以下是331-340 订阅
排序:
A new approach of user-level intrusion detection with command sequence-to-sequence model
A new approach of user-level intrusion detection with comman...
收藏 引用
作者: Liu, Wei Mao, Yu Ci, Linlin Zhang, Fuquan School of Computer Science and Technology Beijing Institute of Technology Beijing China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
It is not foolproof for intrusion detection to focus only on the network level and the program level. Internal security and external security of information systems should be given equal attention. User-level intrusio... 详细信息
来源: 评论
Adaptive multiple-view label propagation for semi-supervised classification  1
收藏 引用
1st International Conference on Neural Computing for Advanced Applications, NCAA 2020
作者: Jia, Lei Zhang, Huan Zhang, Zhao School of Computer Science and Technology Soochow University Suzhou215006 China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China School of Computer and Information Science Hefei University of Technology Hefei China
We propose a novel Adaptive Multiple-view Label Propagation (MLP) framework for semi-supervised classification. MLP performs classification on multiple views rather than on the single view, and can exploit the complem... 详细信息
来源: 评论
Ligand-rich oxygen evolution electrocatalysts reconstructed from metal-organic frameworks for anion-exchange membrane water electrolysis
收藏 引用
Science Bulletin 2025年 第12期70卷 1976-1985页
作者: Li, Shiqi Liu, Weiwei Shi, Yi Wang, Tang Liu, Tianyang Xue, Xiang Li, Rui Qiao, Man Wu, Zhen-Yu Zhang, Wang College of Materials Science and Engineering College of Environment Zhejiang University of Technology Hangzhou310014 China Department of Chemistry Institute of Innovative Material Guangdong Provincial Key Laboratory of Sustainable Biomimetic Materials and Green Energy Southern University of Science and Technology Shenzhen518055 China Jiangsu Co-Innovation Centre of Efficient Processing and Utilization of Forest Resources College of Chemical Engineering Nanjing Forestry University Nanjing210037 China Institute of Advanced Materials and Flexible Electronics School of Chemistry and Materials Science Nanjing University of Information Science & Technology Nanjing210044 China
Organic ligands in metal-organic frameworks (MOFs) play an indispensable role in the reconstruction and catalysis during the alkaline oxygen evolution reaction (OER). However, it is still a big challenge to maintain a... 详细信息
来源: 评论
Decomposed Neural Architecture Search for image denoising
收藏 引用
Applied Soft Computing 2022年 124卷
作者: Li, Di Bai, Yunpeng Bai, Zongwen Li, Ying Shang, Changjing Shen, Qiang School of Computer Science National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech & Image Information Processing Northwestern Polytechnical University Xi'an710129 China Department of Computer Science Faculty of Business and Physical Sciences Aberystwyth University AberystwythSY233DB United Kingdom Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data School of Physics and Electronic Information Yan'an University Yan'an716000 China
In practical applications of deep learning, as the demand for the modeling capability increases, the network size may need to be massively enlarged in response. This may form a significant challenge in practice, espec... 详细信息
来源: 评论
Pattern-Dependent Equalization for PAM-4 IM/DD System with Severe Bandwidth Limitation
Pattern-Dependent Equalization for PAM-4 IM/DD System with S...
收藏 引用
Asia Communications and Photonics Conference and Exhibition (ACP)
作者: Wei Wang Dongdong Zou Weihao Ni Zhaohui Li Fan Li Yi Cai Qi Sui School of Electronics and Information Technology Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Sun Yat-sen University Guangzhou China Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication Network Suzhou Key Laboratory of Advanced Optical Communication Network Technology Soochow University Suzhou China Southern Marine Science and Engineering Guangdong Laboratory (Zhuhai) Technology Zhuhai China
LUT enabled pattern-dependent equalization combined with MLSE is proposed for bandwidth-limited IM/DD system. The experimental results show that the proposed method can provide significant improvement compared to the ... 详细信息
来源: 评论
Discrimination-Aware Domain Adversarial Neural Network
收藏 引用
Journal of computer Science & technology 2020年 第2期35卷 259-267页
作者: Yun-Yun Wang Jian-Min Gu Chao Wang Song-Can Chen Hui Xue College of Computer Science and Engineering Nanjing University of Posts and Telecommunications Nanjing 210046China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210046China College of Computer Science and Technology/College of Artificial Intelligence Nanjing University of Aeronautics and AstronauticsNanjing 210023China Key Laboratory of Pattern Analysis and Machine Intelligence Ministry of Industry and Information Technology Nanjing 210023China School of Computer Science and Engineering Southeast UniversityNanjing 210096China
The domain adversarial neural network(DANN)methods have been successfully proposed and attracted much attention *** DANNs,a discriminator is trained to discriminate the domain labels of features generated by a generat... 详细信息
来源: 评论
An ontology-supported inquiry learning technique
Journal of Network Intelligence
收藏 引用
Journal of Network Intelligence 2021年 第1期6卷 16-28页
作者: Xue, Xingsi Zhang, Jie Yang, Chaofan Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology No.33 Xuefu South Road University Town Minhou Fuzhou Fujian350118 China School of Computer Science and Engineering Yulin Normal University No.299 Education Middle Road Yulin City Guanxi Province537000 China School of Computer Science and Mathematics Intelligent Information Processing Research Center Fujian University of Technology No.33 Xueyuan Road University Town Minhou Fuzhou Fujian350118 China Guangxi Key Laboratory of Automatic Detecting Technology and Instruments Guilin University of Electronic Technology No.1 Jinji Road Guilin Guangxi541004 China
Although Inquiry-based Learning (IBL) offers compelling opportunities for the engineering education, one of the challenges to the implementation of it is that the learner always lacks of the background knowledge. To p... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection  39
Look Inside for More: Internal Spatial Modality Perception f...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Survey on Research of RNN-Based Spatio-Temporal Sequence Prediction Algorithms
收藏 引用
Journal on Big Data 2021年 第3期3卷 97-110页
作者: Wei Fang Yupeng Chen Qiongying Xue School of Computer&Software Engineering Research Center of Digital ForensicsMinistry of EducationNanjing University of Information Science&TechnologyNanjing210044China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou215006China
In the past few years,deep learning has developed rapidly,and many researchers try to combine their subjects with deep *** algorithm based on Recurrent Neural Network(RNN)has been successfully applied in the fields of... 详细信息
来源: 评论
Decision-Based Iterative Fragile Watermarking for Model Integrity Verification
SSRN
收藏 引用
SSRN 2023年
作者: Yin, Zhaoxia Yin, Heng Su, Hang Zhang, Xinpeng Gao, Zhenzhe Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai Shanghai200241 China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Anhui Hefei230000 China Department of Computer Science and Technology Tsinghua University Beijing Beijing100000 China School of Computer Science and Technology Fudan University Shanghai Shanghai200241 China School of Communication and Electronic Engineering East China Normal University Shanghai Shanghai200241 China
Foundation models are commonly hosted on cloud servers to cater to the high demand for their services. However, this exposes them to security risks, as attackers can manipulate these models by introducing backdoor pat... 详细信息
来源: 评论