咨询与建议

限定检索结果

文献类型

  • 504 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 479 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 183 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 75 篇 生物工程
    • 56 篇 电气工程
    • 54 篇 电子科学与技术(可...
    • 54 篇 生物医学工程(可授...
    • 48 篇 光学工程
    • 34 篇 机械工程
    • 32 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 21 篇 安全科学与工程
    • 20 篇 仪器科学与技术
    • 19 篇 交通运输工程
  • 317 篇 理学
    • 175 篇 数学
    • 85 篇 生物学
    • 68 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 31 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 23 篇 image segmentati...
  • 22 篇 convolution
  • 21 篇 training
  • 20 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 13 篇 computational mo...
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 12 篇 convolutional ne...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 genetic algorith...

机构

  • 104 篇 provincial key l...
  • 53 篇 college of compu...
  • 52 篇 fujian provincia...
  • 45 篇 school of comput...
  • 42 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 14 篇 hunan provincial...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 lang li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 15 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 zhao huihuang
  • 10 篇 wang kezhi
  • 10 篇 cao cungen

语言

  • 835 篇 英文
  • 33 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
890 条 记 录,以下是591-600 订阅
排序:
RH-BrainFS: regional heterogeneous multimodal brain networks fusion strategy  23
RH-BrainFS: regional heterogeneous multimodal brain networks...
收藏 引用
Proceedings of the 37th International Conference on Neural information processing Systems
作者: Hongting Ye Yalu Zheng Yueying Li Ke Zhang Youyong Kong Yonggui Yuan Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University and Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications (Southeast University) Ministry of Education China Department of Psychosomatics and Psychiatry Zhongda Hospital School of Medicine Southeast University
Multimodal fusion has become an important research technique in neuroscience that completes downstream tasks by extracting complementary information from multiple modalities. Existing multimodal research on brain netw...
来源: 评论
Research on User Authentication for Grid Computing Security
Research on User Authentication for Grid Computing Security
收藏 引用
International Conference on Semantics, Knowledge and Grid (SKG)
作者: Ronghui Wu Ronghui Wu Renfa Li Renfa Li Fei Yu Fei Yu Guangxue Yue Guangxue Yue Cheng Xu Cheng Xu State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing China School of Computer & Communication Hunan University Changsha China Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou Jiangsu Province China College of Informationg Engineering JiaXing University JiaXing China
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
来源: 评论
Code Generation Based on Quality-Aware Reordering
Code Generation Based on Quality-Aware Reordering
收藏 引用
6th International Conference on Intelligent Computing and Signal processing (ICSP)
作者: Yuan Song Luo Yu College of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Provincial Key Laboratory of Intelligent Information Processing and Real-time Industrial Systems Wuhan China
Translation efforts from natural language to code generation have achieved great success with large pre-trained language models. However, selecting the correct code output for the problem posed by the generated set of... 详细信息
来源: 评论
Sample efficient imitation learning via reward function trained in advance
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, LiHua Liu, Quan School of Computer Science and Technology Soochow University Soochow China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Soochow China Key Laboratory of Symbolic Computation Knowledge Engineering of Ministry of Education Jilin University Jilin China
Imitation learning (IL) is a framework that learns to imitate expert behavior from demonstrations. Recently, IL shows promising results on high dimensional and control tasks. However, IL typically suffers from sample ... 详细信息
来源: 评论
Leakage-resilient identity-based encryption scheme
Leakage-resilient identity-based encryption scheme
收藏 引用
International Conference on Networked Computing and Advanced information Management (NCM)
作者: Xizhao Luo Peide Qian Yanqin Zhu Shangping Wang School of Computer Science and Technology Soochow University Suzhou China Provincial Key Laboratory of Computer Information Processing Technology Soochow University Suzhou China School of Science Xi'an University of Technology Xi'an Shaanxi China
We present an identity-based encryption in the relative-leakage model. In our construction, we firstly make use of a notion of new cryptographic primitive, identity-based hash proof system(IB-HPS), to construct a leak... 详细信息
来源: 评论
Node-based sampling P2P bot detection
收藏 引用
Telkomnika 2012年 第5期10卷 1117-1122页
作者: Yin, Chunyong Sun, Ruxia Yang, Lei Dariuslko School of Computer and Software Nanjing University of Information Science and Technology Nanjing 210044 China Jiangsu Key Laboratory of Meteorological Observation Information Processing Nanjing University of Information Science and Technology Nanjing 210044 China
The concept of using node-based sampling for the treatment of packet capture mechanism based on Libpcap of network-based detecting Peer-to-Peer botnet process was tested, and its effect on the time window of feature e... 详细信息
来源: 评论
Large-Scale Target Detection and Classification Based on Improved Candidate Regions  11th
Large-Scale Target Detection and Classification Based on Imp...
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Xi, Runping Han, Qianqian Jia, Gaoyun Kou, Xuefeng School of Computer Science and Techology Northwest Polytechnical University Xi’an710072 China National Engineering Laboratory of Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi’an710129 China Shaanxi Provincial Key Laboratory of Speech and Image Information Processing Xi’an710129 China Shaanxi Baocheng Aviation instrument Co. Ltd. Baoji China
Target detection of aerial images has become a frontier subject of concern in the image processing field. Using existing method to detect and classify large-scale building objects in aerial images, the accuracy is sti... 详细信息
来源: 评论
Robust monocular visual odometry using optical flows for mobile robots
Robust monocular visual odometry using optical flows for mob...
收藏 引用
Chinese Control Conference (CCC)
作者: Haifeng Li Zunhe Hu Xinwei Chen College of Computer Science and Technology Civil Aviation University of China Tianjin Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou Department of Computer Science Minjiang University Fuzhou
A robust optical flow-based visual odometry method using a single onboard camera is proposed in this paper. To improve the quality of the noisy optical flows, a correction method across multiple frames is developed. F... 详细信息
来源: 评论
A Reliable Broadcasting Algorithm in Locally Twisted Cubes
A Reliable Broadcasting Algorithm in Locally Twisted Cubes
收藏 引用
IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)
作者: Baolei Cheng Jianxi Fan Dajin Wang Jiwen Yang Provincial Key Laboratory for Computer Information Processing Technology Soochow University China School of Computer Science and Technology Soochow University Suzhou China Department of Computer Science Montclair State University Upper Montclair NJ USA
Reliable broadcasting for a network can be obtained by using completely independent spanning trees(CISTs). Locally twisted cubes are popular networks which have been studied widely in the literature. In this paper, we... 详细信息
来源: 评论
Design and realization of evaluation environment in the performance analysis of intrusion detection system
Design and realization of evaluation environment in the perf...
收藏 引用
26th Chinese Control Conference, CCC 2007
作者: Liao, Guiping Yu, Fei Shen, Yue Zhang, Linfeng Xu, Cheng School of Computer and Information Engineering Hunan Agricultural University Changsha 410128 China Jiangsu Provincial Key Laboratory of Computer Information Processing Technology Suzhou University Suzhou 2150063 China Guangdong Province Key Lab of Electronic Commerce Market Application Technology Guangdong University of Business Studies Guangzhou510320 China
With the deeply research on intrusion detection techniques and the widely use of intrusion detection products, the study of evaluation techniques of intrusion detection systems became important. In the paper, relative... 详细信息
来源: 评论