咨询与建议

限定检索结果

文献类型

  • 213 篇 期刊文献
  • 201 篇 会议

馆藏范围

  • 414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 265 篇 工学
    • 145 篇 计算机科学与技术...
    • 115 篇 软件工程
    • 61 篇 生物工程
    • 57 篇 生物医学工程(可授...
    • 55 篇 信息与通信工程
    • 45 篇 电气工程
    • 37 篇 控制科学与工程
    • 36 篇 机械工程
    • 32 篇 电子科学与技术(可...
    • 25 篇 化学工程与技术
    • 21 篇 材料科学与工程(可...
    • 20 篇 光学工程
    • 17 篇 动力工程及工程热...
    • 13 篇 土木工程
    • 11 篇 仪器科学与技术
    • 11 篇 建筑学
    • 7 篇 力学(可授工学、理...
    • 7 篇 网络空间安全
    • 6 篇 冶金工程
  • 189 篇 理学
    • 77 篇 数学
    • 68 篇 物理学
    • 66 篇 生物学
    • 25 篇 化学
    • 23 篇 系统科学
    • 18 篇 统计学(可授理学、...
  • 49 篇 管理学
    • 30 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
  • 18 篇 医学
    • 15 篇 临床医学
    • 14 篇 基础医学(可授医学...
    • 10 篇 药学(可授医学、理...
  • 8 篇 农学
  • 5 篇 教育学
  • 3 篇 法学
  • 1 篇 经济学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 13 篇 feature extracti...
  • 11 篇 dna
  • 9 篇 cryptography
  • 8 篇 semantics
  • 8 篇 algorithm design...
  • 8 篇 training
  • 7 篇 image encryption
  • 6 篇 genetic algorith...
  • 6 篇 security
  • 6 篇 dna sequences
  • 5 篇 palmprint recogn...
  • 5 篇 correlation
  • 5 篇 accuracy
  • 5 篇 chaos
  • 4 篇 semantic segment...
  • 4 篇 simulation
  • 4 篇 task analysis
  • 4 篇 pixel
  • 4 篇 discrete wavelet...
  • 4 篇 bandwidth

机构

  • 54 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 24 篇 school of comput...
  • 17 篇 key laboratory o...
  • 14 篇 school of mechan...
  • 12 篇 key laboratory o...
  • 11 篇 anhui province k...
  • 11 篇 key laboratory o...
  • 9 篇 hubei key labora...
  • 9 篇 wuhan second shi...
  • 9 篇 key lab of advan...
  • 8 篇 dalian universit...
  • 8 篇 engineering rese...
  • 7 篇 key lab of advan...
  • 7 篇 tianjin key labo...
  • 7 篇 college of medic...
  • 6 篇 dalian universit...
  • 6 篇 school of automa...
  • 5 篇 school of comput...
  • 5 篇 shenzhen institu...

作者

  • 85 篇 zhang qiang
  • 57 篇 qiang zhang
  • 52 篇 wei xiaopeng
  • 30 篇 xiaopeng wei
  • 26 篇 zhou changjun
  • 22 篇 wang bin
  • 19 篇 changjun zhou
  • 17 篇 zhou shihua
  • 17 篇 zhou dongsheng
  • 15 篇 zhang jianxin
  • 13 篇 bin wang
  • 12 篇 che chao
  • 11 篇 chao che
  • 11 篇 zheng xuedong
  • 10 篇 dongsheng zhou
  • 10 篇 zhao lasheng
  • 10 篇 xianliang wu
  • 9 篇 jianxin zhang
  • 9 篇 rui liu
  • 9 篇 dong jing

语言

  • 398 篇 英文
  • 11 篇 其他
  • 7 篇 中文
检索条件"机构=Key Laboratory of Advanced Design and Intelligent Computing of Ministry of Education"
414 条 记 录,以下是121-130 订阅
排序:
A stratified image-hiding method based on chaos
A stratified image-hiding method based on chaos
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Ying Li Qiang Zhang Na Ma Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
This paper presents a stratified image hiding scheme based on chaotic algorithm. In the pretreatment process chaotic sequences are used to encrypt the secret image. The histogram of the processed image is similar to t... 详细信息
来源: 评论
A multilevel image encryption algorithm based on chaos and DNA coding
A multilevel image encryption algorithm based on chaos and D...
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Qian Wang Qiang Zhang Changjun Zhou Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
Chaos has been attracted much attention in current research of image encryption. In this paper, we change the location of pixels and pixel values through the combination of chaos with DNA coding. First of all, we tran... 详细信息
来源: 评论
Semi-Supervised Semantic Segmentation Based on Class Balanced Framework
Semi-Supervised Semantic Segmentation Based on Class Balance...
收藏 引用
IEEE International Conference on Signal and Image Processing (ICSIP)
作者: Jiacheng Yang Jing Dong Pengfei Yi Rui Liu Ling Wang The Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
Semi-supervised semantic segmentation is a task that utilizes a small amount of labeled data and a large amount of unlabeled data to achieve pixel-level annotation. Due to the common long tail distribution phenomenon ... 详细信息
来源: 评论
Cross-Stage Mutual Distillation for Replay Attack Detection
Cross-Stage Mutual Distillation for Replay Attack Detection
收藏 引用
6th International Conference on intelligent computing and Signal Processing (ICSP)
作者: Yinqing Cheng Lasheng Zhao Ling Wang Han Wang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
Automated speaker verification systems face a higher risk of replay attacks in practice. However, the existing studies face the problem of limited detection capabilities and insufficient use of shallow fine-grained in... 详细信息
来源: 评论
Image encryption algorithm based on DNA biological properties and chaotic systems
Image encryption algorithm based on DNA biological propertie...
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Qian Wang Qiang Zhang Xiaopeng Wei Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian university Dalian China
With the rapid development of DNA computing, people began to use DNA technology to encrypt information. In this paper, we combine the biological characteristics of DNA and the improved sequence of Logistic mapping met... 详细信息
来源: 评论
Robust keyword Spotting Based on Long-Term Feature Fusion and Band-Weighted Normalization
Robust Keyword Spotting Based on Long-Term Feature Fusion an...
收藏 引用
Computer Information Science and Application Technology (CISAT), International Conference on
作者: Zepeng Qiu Lasheng Zhao Ling Wang Tingting Zhang Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
Currently, convolution-based models for keyword spotting focus predominantly on research conducted in clean speech environments. However, their recognition accuracy is lower in low signal-to-noise ratio conditions. To... 详细信息
来源: 评论
Acoustic Word Embedding Model with Transformer Encoder and Multivariate Joint Loss
Acoustic Word Embedding Model with Transformer Encoder and M...
收藏 引用
intelligent computing and Wireless Optical Communications (ICWOC), International Conference on
作者: Yunyun Gao Qiang Zhang Lasheng Zhao Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
As a representation of speech information, acoustic word embedding can enable query-by-example keyword search with low-resource speech data. An acoustic word embedding model with Transformer encoder and multivariate j...
来源: 评论
An improved collision detection algorithm based on OBB
收藏 引用
Computer Modelling and New Technologies 2014年 第1期18卷 71-79页
作者: Man, Ranran Zhou, Dongsheng Zhang, Qiang Key Laboratory of Advanced Design and Intelligent Computing Dalian University Ministry of Education Dalian China
In this paper, we present an effective algorithm based on the Oriented Bounding Box (OBB). Particularly, the article focus on how to reduce the amount of the time that the intersection of bounding boxes are detected f... 详细信息
来源: 评论
On the lower bounds of DNA word sets for DNA computing
On the lower bounds of DNA word sets for DNA computing
收藏 引用
International Conference on Bio-Inspired computing: Theories and Applications, BICTA
作者: Bin Wang Qiang Zhang Xiaopeng Wei Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education Dalian University Dalian China
DNA computing is a new research field, which has been paid attention to by more and more experts with the DNA computing bringing the flying development of mathematics, computer science and other subjects. Because the ... 详细信息
来源: 评论
A novel robust digital image watermarking using LPM and HVS
A novel robust digital image watermarking using LPM and HVS
收藏 引用
The 2013 3rd International Conference on Photonics and Image in Agriculture Engineering (PIAGENG 2013)
作者: Qiang Zhang Mingli Zhang Xiaopeng Wei Key Laboratory of Advanced Design and Intelligent Computing (Dalian University) Ministry of EducationDalian University
To resist on general attacks, such as compression, noising and geometric distortion attacks is a common requirement for digital image watermarking or data hiding techniques comparing with rotation, scaling and transla... 详细信息
来源: 评论