咨询与建议

限定检索结果

文献类型

  • 504 篇 会议
  • 385 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 890 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 663 篇 工学
    • 479 篇 计算机科学与技术...
    • 401 篇 软件工程
    • 183 篇 信息与通信工程
    • 85 篇 控制科学与工程
    • 75 篇 生物工程
    • 56 篇 电气工程
    • 54 篇 电子科学与技术(可...
    • 54 篇 生物医学工程(可授...
    • 48 篇 光学工程
    • 34 篇 机械工程
    • 32 篇 网络空间安全
    • 30 篇 化学工程与技术
    • 23 篇 动力工程及工程热...
    • 21 篇 安全科学与工程
    • 20 篇 仪器科学与技术
    • 19 篇 交通运输工程
  • 317 篇 理学
    • 175 篇 数学
    • 85 篇 生物学
    • 68 篇 物理学
    • 39 篇 统计学(可授理学、...
    • 31 篇 化学
    • 28 篇 系统科学
  • 201 篇 管理学
    • 108 篇 管理科学与工程(可...
    • 95 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 50 篇 医学
    • 42 篇 临床医学
    • 38 篇 基础医学(可授医学...
    • 23 篇 药学(可授医学、理...
  • 22 篇 法学
    • 18 篇 社会学
  • 21 篇 农学
    • 18 篇 作物学
  • 10 篇 教育学
  • 6 篇 军事学
  • 5 篇 经济学
  • 5 篇 文学
  • 4 篇 艺术学
  • 2 篇 哲学

主题

  • 35 篇 feature extracti...
  • 27 篇 semantics
  • 23 篇 image segmentati...
  • 22 篇 convolution
  • 21 篇 training
  • 20 篇 deep learning
  • 16 篇 object detection
  • 16 篇 signal processin...
  • 16 篇 information proc...
  • 15 篇 data mining
  • 13 篇 computer science
  • 13 篇 computational mo...
  • 12 篇 laboratories
  • 12 篇 clustering algor...
  • 12 篇 convolutional ne...
  • 11 篇 optimization
  • 10 篇 support vector m...
  • 10 篇 cryptography
  • 9 篇 speech processin...
  • 9 篇 genetic algorith...

机构

  • 104 篇 provincial key l...
  • 53 篇 college of compu...
  • 52 篇 fujian provincia...
  • 45 篇 school of comput...
  • 42 篇 hunan provincial...
  • 38 篇 fujian provincia...
  • 22 篇 provincial key l...
  • 20 篇 school of comput...
  • 19 篇 school of comput...
  • 18 篇 college of compu...
  • 17 篇 college of elect...
  • 17 篇 guangdong provin...
  • 16 篇 key laboratory o...
  • 16 篇 school of comput...
  • 16 篇 hunan provincial...
  • 15 篇 jiangsu provinci...
  • 15 篇 national enginee...
  • 14 篇 hunan provincial...
  • 14 篇 jiangsu provinci...
  • 14 篇 hunan provincial...

作者

  • 49 篇 li zuoyong
  • 32 篇 zhang fuquan
  • 20 篇 zuoyong li
  • 18 篇 lang li
  • 17 篇 yu fei
  • 17 篇 chen yang
  • 17 篇 li lang
  • 17 篇 fan haoyi
  • 15 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 kong fang
  • 13 篇 zhu qiaoming
  • 13 篇 dong li
  • 12 篇 jiao ge
  • 12 篇 jiang feibo
  • 10 篇 gao shang
  • 10 篇 zhou guodong
  • 10 篇 zhao huihuang
  • 10 篇 wang kezhi
  • 10 篇 cao cungen

语言

  • 835 篇 英文
  • 33 篇 其他
  • 23 篇 中文
检索条件"机构=Jiangsu Provincial Key Laboratory of Computer Information Processing Technology"
890 条 记 录,以下是611-620 订阅
排序:
Building an efficient intrusion detection system based on feature selection and ensemble classifier
arXiv
收藏 引用
arXiv 2019年
作者: Zhou, Yuyang Cheng, Guang Jiang, Shanqing Dai, Mian School of Cyber Science and Engineering Southeast University Nanjing China Key Laboratory of Computer Network and Information Integration Ministry of Education Nanjing China Jiangsu Provincial Key Laboratory of Computer Network Technology Southeast University Nanjing China National Key Laboratory of Science and Technology on Information System Security Beijing China
Intrusion detection system (IDS) is one of extensively used techniques in a network topology to safeguard the integrity and availability of sensitive assets in the protected systems. Although many supervised and unsup... 详细信息
来源: 评论
Research on intrusion detection model of heterogeneous attributes clustering
Journal of Software
收藏 引用
Journal of Software 2012年 第12期7卷 2823-2831页
作者: Xie, Linquan Wang, Ying Yu, Fei Xu, Chen Yue, Guangxue School of Science Jiangxi University of Science and Technology 341000 Ganzhou China School of Science Jiangxi University of Science and Technology 341000 Ganzhou China Jiangsu Provincial Key Laboratory for Computer Information Processing Technology Soochow University 215000 Soochow China School of Information Science and Engineering Hunan University 416000 Changsha China Department of Computer Science and Technology Huaihua University Huaihua China
A fuzzy clustering algorithm for intrusion detection based on heterogeneous attributes is proposed in this paper. Firstly, the algorithm modifies the comparability measurement for the categorical attributes according ... 详细信息
来源: 评论
A Low-Area Overhead Secure Scan Architecture Resisting Scan-Based Attacks for Crypto Chips
A Low-Area Overhead Secure Scan Architecture Resisting Scan-...
收藏 引用
2017 International MultiConference of Engineers and computer Scientists, IMECS 2017
作者: Weizheng, Wang Jincheng, Wang Shuo, Cai Peng, Liu Tieqiao, Liu College of Computer and Communication Engineering Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha University of Science and Technology Changsha Hunan410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China College of Computer and Communication Engineering Changsha University of Science and Technology Changsha410114 China Information Science and Engineering Department Hunan University Changsha410082 China Management School Hangzhou Dianzi University Hangzhou310018 China
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b... 详细信息
来源: 评论
Retinal Vessel Segmentation Based on UNet and Edge Detection
Retinal Vessel Segmentation Based on UNet and Edge Detection
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Peixin Yan Zuoyong Li Rong Hu Xinrong Cao College of Computer Science and Mathematics Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Colloge of Computer and Control Engineering Minjiang University Fuzhou China
Retinal vessel segmentation is important for the diagnosis of many diseases. The segmentation of microscopic vessels is one of the challenges because of the complex structure of retinal vessels, which makes it challen... 详细信息
来源: 评论
Insulator Defect Detection Based on YOLOv4-tiny with Improved Feature Fusion
Insulator Defect Detection Based on YOLOv4-tiny with Improve...
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Yuning Zhong Rong Hu Zuoyong Li Yuanzheng Cai College of Computer Science and Mathematics Fujian University of Technology Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou China
Insulator exposed to a wild environment for long-term running usually suffers from the damage of natural calamities that makes them become one of the most fragile components in the whole power system. In this case, ev... 详细信息
来源: 评论
Cross-domain attribute representation based on convolutional neural network*
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Guohui Liang, Gaoyuan Su, Fang Qu, Fanxin Wang, Jing-Yan Huawei Technologies Co. Ltd. Shanghai China Jiangsu University of Technology Jiangsu213001 China Shaanxi University of Science & Technology Xi’an China Northwestern Polytechnical University Xi’an China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China
In the problem of domain transfer learning, we learn a model for the prediction in a target domain from the data of both some source domains and the target domain, where the target domain is in lack of labels while th... 详细信息
来源: 评论
Application and Study on Sentiment-oriented Analysis on Social Semantic Network
Application and Study on Sentiment-oriented Analysis on Soci...
收藏 引用
2013 International Conference on Advanced computer Science and Electronics information(ICACSEI 2013)
作者: Dan Zhang Dongsheng Wang Haiping Huang College of Telecommunications & Information Engineering Nanjing University of Posts and Telecommunications Department of Computer and Information Science Korea University Seoul College of Computer & Information Science Nanjing University of Posts and Telecommunications Jiangsu Computer Information Processing Technology Key Laboratory Suzhou University
With the increasing growth of users and exponential propagation of messages, Social Network Services such as Twitter, Facebook can be used to analyze social trend, people's interests and personal-favor. Recently, ... 详细信息
来源: 评论
Invulnerability Optimization of Communication Network Based on Analog Attack Strategy
Invulnerability Optimization of Communication Network Based ...
收藏 引用
作者: Lingling Xia Xueli Ni Zhengjun Jing Jiayin Liu Yan Zhang Department of Computer Information and Cyber Security Jiangsu Police Institute Jiangsu Province Electronic Data Forensics and Analysis Engineering Research Center Key Laboratory of Digital Forensics of Jiangsu Provincial Public Security Department College of Computer Engineering Jiangsu University of Technology
Invulnerability of communication networks directly related to security and reliability of networks has received increasing attention in recent years. In order to enhance the destruction resisting capacity of communica... 详细信息
来源: 评论
Leveraging Tumor Heterogeneity: Heterogeneous Graph Representation Learning for Cancer Survival Prediction in Whole Slide Images  38
Leveraging Tumor Heterogeneity: Heterogeneous Graph Represen...
收藏 引用
38th Conference on Neural information processing Systems, NeurIPS 2024
作者: Wu, Junxian Ke, Xinyi Jiang, Xiaoming Wu, Huanwen Kong, Youyong Shao, Lizhi School of Internet Anhui University China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Southeast University China Department of Pathology State Key Laboratory of Complex Severe and Rare Disease Molecular Pathology Research Center Peking Union Medical College Hospital Chinese Academy of Medical Sciences Peking Union Medical College Beijing China School of Bioinformatics Chongqing University of Post and Telecommunications China Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Ministry of Education China
Survival prediction is a significant challenge in cancer management. Tumor microenvironment is a highly sophisticated ecosystem consisting of cancer cells, immune cells, endothelial cells, fibroblasts, nerves and extr...
来源: 评论
Survey of key technologies on millimeter-wave CMOS integrated circuits
Survey of key technologies on millimeter-wave CMOS integrate...
收藏 引用
2017年第二届可靠性工程国际会议
作者: Fei Yu Lei Gao Lixiang Li Shuo Cai Wei Wang Chunhua Wang Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation & School of Computer and Communication Engineering Changsha University of Science and Technology College of Information Science and Engineering Hunan University
In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor(MMW-CMOS) integrated circuits(IC), this paper provides a survey of key technologies on MMW-C... 详细信息
来源: 评论