咨询与建议

限定检索结果

文献类型

  • 503 篇 会议
  • 371 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 875 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 653 篇 工学
    • 476 篇 计算机科学与技术...
    • 399 篇 软件工程
    • 179 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 75 篇 生物工程
    • 54 篇 生物医学工程(可授...
    • 49 篇 电气工程
    • 49 篇 电子科学与技术(可...
    • 47 篇 光学工程
    • 35 篇 机械工程
    • 32 篇 网络空间安全
    • 29 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 22 篇 安全科学与工程
    • 20 篇 交通运输工程
    • 18 篇 仪器科学与技术
  • 310 篇 理学
    • 173 篇 数学
    • 84 篇 生物学
    • 66 篇 物理学
    • 38 篇 统计学(可授理学、...
    • 29 篇 系统科学
    • 27 篇 化学
  • 198 篇 管理学
    • 107 篇 管理科学与工程(可...
    • 94 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 47 篇 医学
    • 41 篇 临床医学
    • 36 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 22 篇 image segmentati...
  • 22 篇 convolution
  • 21 篇 training
  • 18 篇 deep learning
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 object detection
  • 15 篇 data mining
  • 13 篇 computer science
  • 13 篇 computational mo...
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 11 篇 optimization
  • 11 篇 convolutional ne...
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 genetic algorith...

机构

  • 104 篇 provincial key l...
  • 52 篇 fujian provincia...
  • 50 篇 college of compu...
  • 45 篇 school of comput...
  • 41 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 13 篇 school of electr...
  • 13 篇 jiangsu provinci...

作者

  • 49 篇 li zuoyong
  • 31 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 17 篇 yu fei
  • 17 篇 lang li
  • 16 篇 li lang
  • 16 篇 fan haoyi
  • 15 篇 gao guangwei
  • 15 篇 chen yang
  • 14 篇 teng shenghua
  • 14 篇 dong li
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 jiang feibo
  • 12 篇 jiao ge
  • 11 篇 wang kezhi
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 cao cungen
  • 10 篇 yang chen

语言

  • 824 篇 英文
  • 29 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
875 条 记 录,以下是31-40 订阅
排序:
LSU-NET: LIGHTWEIGHT AUTOMATIC ORGANS SEGMENTATION NETWORK FOR MEDICAL IMAGES
arXiv
收藏 引用
arXiv 2025年
作者: Ding, Yujie Teng, Shenghua Li, Zuoyong Chen, Xiao College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao266590 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control School of Computer and Big Data Minjiang University Fuzhou350121 China
UNet and its variants have widespread applications in medical image segmentation. However, the substantial number of parameters and computational complexity of these models make them less suitable for use in clinical ... 详细信息
来源: 评论
Transductive Few-shot Learning via Joint Message Passing and Prototype-based Soft-label Propagation
收藏 引用
ACM Transactions on Multimedia Computing, Communications and Applications 2025年 第4期21卷
作者: Wang, Jiahui Xu, Qin Jiang, Bo Luo, Bin The Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China The Information Materials and Intelligent Sensing Laboratory of Anhui Province School of Computer Science and Technology Anhui University The Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China
The transductive Few-shot Learning (FSL) mostly employs either prototype learning or label propagation methods to generalize to new classes by using the information of all query samples. However, existing methods have... 详细信息
来源: 评论
DBSSL: A Scheme to Detect Backdoor Attacks in Self-Supervised Learning Models
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Huang, Yuxian Yang, Geng Yuan, Dong Yu, Shui Nanjing University of Posts and Telecommunication College of Computer Science and Software China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing China University of Sydney School of Electrical and Information Engineering Australia University of Technology Sydney School of Computer Science Australia
Recently, self-supervised learning has garnered significant attention for its ability to extract high-quality features from unlabeled data. However, existing research indicates that backdoor attacks can pose significa... 详细信息
来源: 评论
Partially Hidden Policy Attribute-Based Multi-keyword Searchable Encryption with Verification and Revocation
收藏 引用
IEEE Transactions on Mobile Computing 2025年
作者: Chen, Liqing Xu, Shiguo Jin, Chunhua Zhang, Hao Weng, Jian Huaiyin Institute of Technology Faculty of Computer and Software Engineering Jiangsu Huai'an223003 China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Fuzhou350117 China Jinan University College of Information Science and Technology Guangdong Guangzhou510632 China
Data security is becoming increasingly critical as outsourced data services flourish. An effective solution for ensuring data confidentiality in the cloud is attribute-based searchable encryption (ABSE). However, most... 详细信息
来源: 评论
Dual Encoders for Diffusion-based Image Inpainting
Dual Encoders for Diffusion-based Image Inpainting
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Dezhi Zheng Kaijun Deng Jinbao Wang Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
Current diffusion-based inpainting models struggle to preserve unmasked regions or generate highly coherent content. Additionally, it is hard for them to generate meaningful content for 3D inpainting. To tackle these ... 详细信息
来源: 评论
A spectrum-enhanced attention model for semantic segmentation of remote sensing images
A spectrum-enhanced attention model for semantic segmentatio...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal processing, ICASSP 2025
作者: Li, Xin Xu, Feng Tao, Feifei Tong, Yao Lyu, Xin Zhong, Jianyi Kaup, André College of Computer Science and Software Engineering Hohai University Nanjing China Key Laboratory of Water Big Data Technology Ministry of Water Resources Hohai University Nanjing China School of Computer Engineering Jiangsu Ocean University Lianyungang China School of Artificial Intelligence and Information Technology Nanjing University of Chinese Medicine Nanjing China Multimedia Communications and Signal Processing Friedrich-Alexander University Erlangen-Nuremberg Erlangen Germany
Semantic segmentation of remote sensing images (RSIs) is essential for applications such as environmental monitoring, urban planning, and disaster management. Convolutional Neural Networks (CNNs) and their variants st... 详细信息
来源: 评论
High-Fidelity Editable Portrait Synthesis with 3D GAN Inversion
High-Fidelity Editable Portrait Synthesis with 3D GAN Invers...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Jindong Xie Jiachen Liu Yupei Lin Jinbao Wang Xianxu Hou Linlin Shen Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Information Engineering Guangdong University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Intelligent Information Processing School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University
The 3D generative adversarial network (GAN) inversion converts an image into 3D representation to attain high-fidelity reconstruction and facilitate realistic image manipulation within the 3D latent space. However, pr... 详细信息
来源: 评论
OCTAMamba: A State-Space Model Approach for Precision OCTA Vasculature Segmentation
OCTAMamba: A State-Space Model Approach for Precision OCTA V...
收藏 引用
International Conference on Acoustics, Speech, and Signal processing (ICASSP)
作者: Shun Zou Zhuo Zhang Guangwei Gao College of Artificial Intelligence Nanjing Agricultural University Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China College of Computer Science and Technology National University of Defense Technology Changsha China Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China
Optical Coherence Tomography Angiography (OCTA) is a crucial imaging technique for visualizing retinal vasculature and diagnosing eye diseases such as diabetic retinopathy and glaucoma. However, precise segmentation o... 详细信息
来源: 评论
Real-Time Student Behavior Analysis via YOLOv5 with Coordinate Attention  9th
Real-Time Student Behavior Analysis via YOLOv5 with Coordina...
收藏 引用
9th International Symposium on Artificial Intelligence and Robotics, ISAIR 2024
作者: Ma, Shuai Chang, Heyou Yang, Xinru Chen, Quan Han, Jian Key Laboratory of Intelligent Information Processing Nanjing XiaoZhuang University Nanjing China School of Information and Engineering Nanjing XiaoZhuang University Nanjing China School of Computer Science Nanjing University of Information Science and Technology Nanjing China Jiangsu Key Laboratory of Image and Video Understanding for Social Safety Nanjing University of Science and Technology Nanjing China Key Laboratory of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Nanjing University of Science and Technology Nanjing China
The detection and recognition of student behavior play a pivotal role in the context of smart classrooms. However, conventional methods often encounter performance degradation due to challenges such as occlusion, data... 详细信息
来源: 评论
FaceGCN: Structured Priors Inspired Graph Convolutional Networks for Blind Face Restoration
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Yan, Weidan Shao, Wenze Zhang, Dengyin Xiao, Liang Nanjing University of Posts and Telecommunications School of Internet of Things Nanjing210003 China Nanjing University of Posts and Telecommunications Jiangsu Key Laboratory of Intelligent Information Processing and Communication Technology Nanjing210003 China Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Facial image restoration has gained a tremendous progress since the increasing boom of the deep learning methods. Owing to its nature of strong ill-posedness, different categories of a-priori constraints have been har... 详细信息
来源: 评论