咨询与建议

限定检索结果

文献类型

  • 86 篇 会议
  • 67 篇 期刊文献

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 110 篇 工学
    • 75 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 18 篇 信息与通信工程
    • 17 篇 电子科学与技术(可...
    • 11 篇 电气工程
    • 10 篇 机械工程
    • 10 篇 控制科学与工程
    • 10 篇 网络空间安全
    • 8 篇 生物工程
    • 6 篇 动力工程及工程热...
    • 6 篇 交通运输工程
    • 5 篇 仪器科学与技术
    • 5 篇 材料科学与工程(可...
    • 4 篇 力学(可授工学、理...
    • 4 篇 光学工程
    • 4 篇 化学工程与技术
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 3 篇 公安技术
  • 48 篇 理学
    • 28 篇 数学
    • 14 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 11 篇 生物学
    • 6 篇 系统科学
    • 3 篇 化学
  • 22 篇 管理学
    • 18 篇 管理科学与工程(可...
    • 7 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 4 篇 法学
    • 3 篇 社会学
  • 2 篇 文学
    • 2 篇 外国语言文学
  • 2 篇 艺术学
  • 1 篇 经济学
  • 1 篇 医学
  • 1 篇 军事学

主题

  • 6 篇 algorithm design...
  • 5 篇 hardware
  • 5 篇 training
  • 4 篇 energy consumpti...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 field programmab...
  • 4 篇 scheduling
  • 3 篇 prediction model...
  • 3 篇 computer archite...
  • 3 篇 logic gates
  • 3 篇 optimization
  • 3 篇 particle swarm o...
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 scheduling algor...
  • 3 篇 encryption
  • 3 篇 heuristic algori...
  • 2 篇 internet of thin...
  • 2 篇 object detection

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 15 篇 college of compu...
  • 11 篇 key laboratory f...
  • 6 篇 college of infor...
  • 6 篇 collaborative in...
  • 5 篇 department of co...
  • 5 篇 key laboratory o...
  • 5 篇 key laboratory o...
  • 4 篇 national collabo...
  • 4 篇 key laboratory o...
  • 4 篇 hunan university...
  • 4 篇 college of compu...
  • 3 篇 the key laborato...
  • 3 篇 department of el...
  • 3 篇 school of comput...
  • 3 篇 school of mathem...
  • 3 篇 key laboratory o...
  • 3 篇 college of infor...
  • 3 篇 embedded systems...

作者

  • 19 篇 renfa li
  • 17 篇 li renfa
  • 13 篇 xie guoqi
  • 13 篇 guoqi xie
  • 7 篇 wang junli
  • 7 篇 wu di
  • 7 篇 wanli chang
  • 6 篇 liu yan
  • 6 篇 wang yi
  • 5 篇 yi wang
  • 5 篇 junli wang
  • 5 篇 changjun jiang
  • 5 篇 chungang yan
  • 4 篇 yan chungang
  • 4 篇 kehua yang
  • 4 篇 wenhong ma
  • 4 篇 xu cheng
  • 4 篇 xiongren xiao
  • 4 篇 jiang changjun
  • 4 篇 li zhiyong

语言

  • 152 篇 英文
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan"
153 条 记 录,以下是31-40 订阅
排序:
Optimizing Word Embedding for Fine-Grained Sentiment Analysis  1
收藏 引用
5th International Conference on Artificial Intelligence and Security, ICAIS 2019
作者: Zhang, Wei Zhang, Yue Yang, Kehua Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
Word embeddings have been extensively used for various Natural Language Processing tasks. However, word vectors trained based on corpus context information fail to distinguish words with the same context but different... 详细信息
来源: 评论
Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2015年 第4期2卷 422-430页
作者: Yong Xie Liangjiao Liu Renfa Li Jianqiang Hu Yong Han Xin Peng Key Laboratory for Application Technology of Internet of Things of Fujian Educational Bureau Xiamen University of Technology Key Laboratory of Embedded and Networking Computing of Hunan Province Hunan University Key Laboratory on Complex Systems Optimization & Controlling of Hunan High Education Institutions Hunan Institute of Science and Technology
network and software integration pose severe challenges in cyber-security for controller area network (CAN)-based automotive cyber-physical system (ACPS), therefore we employ message authentication code (MAC) to defen... 详细信息
来源: 评论
Real-time depth estimation with an optimized encoder-decoder architecture on embedded devices  21
Real-time depth estimation with an optimized encoder-decoder...
收藏 引用
21st IEEE International Conference on High Performance computing and Communications, 17th IEEE International Conference on Smart City and 5th IEEE International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2019
作者: Tu, Xiaohan Xu, Cheng Liu, Siping Xie, Guoqi Li, Renfa Key Laboratory for Embedded and Network Computing of Hunan Province China College of Computer Science and Electronic Engineering Hunan University Changsha410082 China
As a strategy to obtain dense depth maps from a single image, sparse depths, or the fusion of both (RGBd), depth estimation receives much attention. Usually relying on high-performance workstations, existing depth pre... 详细信息
来源: 评论
Locally differentially private high-dimensional data synthesis
收藏 引用
Science China(Information Sciences) 2023年 第1期66卷 25-42页
作者: Xue CHEN Cheng WANG Qing YANG Teng HU Changjun JIANG Key Laboratory of Embedded System and Service Computing (Tongji University) Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University
In local differential privacy(LDP), a challenging problem is the ability to generate highdimensional data while efficiently capturing the correlation between attributes in a dataset. Existing solutions for low-dimensi... 详细信息
来源: 评论
A Novel Neighborhood-Weighted Sampling Method for Imbalanced Datasets
收藏 引用
Chinese Journal of Electronics 2022年 第5期31卷 969-979页
作者: GUANG Mingjian YAN Chungang LIU Guanjun WANG Junli JIANG Changjun Key Laboratory of Embedded System and Service Computing Tongji University Ministry of Education National (Province-Ministry Joint) Collaborative Innovation Center for Financial Network Security Tongji University
The weighted sampling methods based on k-nearest neighbors have been demonstrated to be effective in solving the class imbalance problem. However,they usually ignore the positional relationship between a sample and th... 详细信息
来源: 评论
TMI: Two-dimensional maintainability index for automotive software maintainability measurement
收藏 引用
Journal of Systems Architecture 2025年 166卷
作者: Jiao Xie Jialing Yang Sirong Zhao Jianmei Lei Kaiwei Fan Guoqi Xie Key Laboratory for Embedded and Network Computing of Hunan Province College of Computer Science and Electronic Engineering Hunan University Changsha 410082 Hunan China Center of Convergence of Automobile and Cyberspace Research Institute of Hunan University in Chongqing Chongqing 401120 China China Automotive Engineering Research Institute Co Ltd Electronic Communication and Software Evaluation Research Center Chongqing 401122 China
The mass adoption of autonomous driving and Advanced Driver-Assistance System (ADAS) technologies increases the complexity and maintenance cost of automotive-embedded software during model-based development. Through m... 详细信息
来源: 评论
FPGA based optimized SHA-3 finalist in reconfigurable hardware
FPGA based optimized SHA-3 finalist in reconfigurable hardwa...
收藏 引用
2011 International Symposium on Integrated Circuits, ISIC 2011
作者: Song, Qian Wang, Yi Li, Zhican Zhou, Quan Wu, Wufei Han, Demin Xu, Wenlong Chen, Zuo Li, Renfa Embedded Systems and Networking Laboratory Hunan University Hunan Provincial Key Laboratory of Network and Information Security China
A hash function is well-defined procedure to convert large, uncertain long message into fixed small integers. Secure Hash Algorithm (SHA) is an one-way message digest algorithm which is usually used in cryptographic a... 详细信息
来源: 评论
Instance-Aware Style-Swap for Disentangled Attribute-Level Image Editing  17th
Instance-Aware Style-Swap for Disentangled Attribute-Level ...
收藏 引用
17th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2022
作者: Zhou, Xinjiao Jiang, Bin Yang, Chao Hu, Haotian Sun, Minyu College of Computer Science and Electronic Engineering Hunan University Hunan Changsha410082 China Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Hunan Changsha410082 China
Recent studies have shown that attribute-level image editing could be achieved by modifying the latent code of style-based Generative Adversarial network (StyleGAN). However, many existing methods suffer from semantic... 详细信息
来源: 评论
Collaborative Multi-head Contextualized Sparse Representations for Real-Time Open-Domain Question Answering  17th
Collaborative Multi-head Contextualized Sparse Representatio...
收藏 引用
17th CCF Conference on Computer Supported Cooperative Work and Social computing, ChineseCSCW 2022
作者: Sun, Minyu Jiang, Bin Zhou, Xinjiao Zhang, Bolin Yang, Chao College of Computer Science and Electronic Engineering Hunan University Hunan Changsha410082 China Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University Hunan Changsha410082 China
An efficient method of representing and retrieving information is an essential component of open domain QA. There are question and answer models that allow for real-time responses with speed benefit and scalability. N... 详细信息
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
2011 International Symposium on Integrated Circuits, ISIC 2011
作者: Wang, Yi Yuan, Zheng Li, Zhican Li, Renfa Embedded Systems and Networking Laboratory Hunan University Hunan Provincial Key Laboratory of Network and Information Security Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论