咨询与建议

限定检索结果

文献类型

  • 251 篇 会议
  • 157 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 409 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 281 篇 工学
    • 193 篇 计算机科学与技术...
    • 146 篇 软件工程
    • 60 篇 信息与通信工程
    • 37 篇 机械工程
    • 37 篇 控制科学与工程
    • 26 篇 光学工程
    • 20 篇 仪器科学与技术
    • 20 篇 电气工程
    • 20 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 生物医学工程(可授...
    • 9 篇 动力工程及工程热...
    • 9 篇 网络空间安全
    • 8 篇 建筑学
    • 8 篇 化学工程与技术
    • 7 篇 材料科学与工程(可...
    • 7 篇 交通运输工程
    • 6 篇 冶金工程
    • 6 篇 土木工程
    • 6 篇 航空宇航科学与技...
  • 143 篇 理学
    • 93 篇 数学
    • 35 篇 物理学
    • 33 篇 统计学(可授理学、...
    • 22 篇 生物学
    • 12 篇 系统科学
  • 90 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 39 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 14 篇 医学
    • 13 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 6 篇 法学
  • 6 篇 教育学
  • 4 篇 经济学
  • 3 篇 农学
  • 3 篇 艺术学

主题

  • 25 篇 computer vision
  • 21 篇 educational tech...
  • 18 篇 laboratories
  • 11 篇 feature extracti...
  • 9 篇 clustering algor...
  • 8 篇 neural networks
  • 8 篇 training
  • 7 篇 servers
  • 7 篇 semantics
  • 7 篇 genetic algorith...
  • 7 篇 ontology
  • 6 篇 deep learning
  • 6 篇 image segmentati...
  • 6 篇 electronic mail
  • 6 篇 algorithm design...
  • 6 篇 computer science...
  • 6 篇 web services
  • 5 篇 image enhancemen...
  • 5 篇 target tracking
  • 5 篇 association rule...

机构

  • 116 篇 key laboratory o...
  • 91 篇 tianjin key labo...
  • 44 篇 key laboratory o...
  • 38 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 20 篇 school of comput...
  • 19 篇 tianjin key labo...
  • 19 篇 national enginee...
  • 16 篇 tianjin key lab ...
  • 14 篇 tianjin universi...
  • 13 篇 tianjin key lab....
  • 11 篇 school of comput...
  • 10 篇 guangdong key la...
  • 9 篇 tianjin key lab ...
  • 9 篇 tianjin universi...
  • 8 篇 shenzhen institu...
  • 8 篇 guangdong provin...
  • 7 篇 computer vision ...
  • 7 篇 key laboratory o...
  • 7 篇 tianjin key labo...

作者

  • 26 篇 zhang hua
  • 24 篇 wang chundong
  • 17 篇 shen linlin
  • 16 篇 gao zan
  • 14 篇 chen shengyong
  • 14 篇 xiao yingyuan
  • 14 篇 xu guangping
  • 13 篇 wen xianbin
  • 13 篇 wang huaibin
  • 13 篇 xue yanbing
  • 12 篇 zhang degan
  • 12 篇 zhang de-gan
  • 11 篇 de-gan zhang
  • 10 篇 wang xiaoye
  • 10 篇 guangping xu
  • 9 篇 shi fan
  • 9 篇 hua zhang
  • 9 篇 degan zhang
  • 8 篇 shengyong chen
  • 8 篇 yanbing xue

语言

  • 390 篇 英文
  • 13 篇 中文
  • 6 篇 其他
检索条件"机构=Key Laboratory of Computer Vision and System"
409 条 记 录,以下是151-160 订阅
排序:
Android Malware Detection Based on Sensitive Permissions and APIs  2nd
Android Malware Detection Based on Sensitive Permissions and...
收藏 引用
2nd EAI International Conference on Security and Privacy in New Computing Environments, SPNCE 2019
作者: Zhao, Chunhui Wang, Chundong Zheng, Wenbai Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
With the widespread use of the Android operating system, the number of applications based on the Android platform is growing. How to effectively identify malware is critical to the security of phones. This paper propo... 详细信息
来源: 评论
Android Malware Detection Using Ensemble Learning on Sensitive APIs  1st
Android Malware Detection Using Ensemble Learning on Sensiti...
收藏 引用
1st EAI International Conference on Edge Computing and IoT: systems, Management and Security, ICECI 2020
作者: Yu, Junhui Zhao, Chunlei Zheng, Wenbai Li, Yunlong Zhang, Chunxiang Chen, Chao Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Ministry of Education Tianjin University of Technology Tianjin300384 China
In recent years, with the quiet popularity of mobile payment methods, mobile terminal equipment also have potential security problems while facilitating people’s lives. Behavior-based Android malware detection is mos... 详细信息
来源: 评论
Multi-block SSD based on small object detection for UAV railway scene surveillance
收藏 引用
Chinese Journal of Aeronautics 2020年 第6期33卷 1747-1755页
作者: Yundong LI Han DONG Hongguang LI Xueyan ZHANG Baochang ZHANG Zhifeng XIAO North China University of Technology Beijing 100144China Key Laboratory of Large Structure Health Monitoring and Control Shijiazhuang 050043China Unmanned System Research Institute Beihang UniversityBeijing 100083China Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen Institutes of Advanced TechnologyChinese Academy of SciencesShenzhen 518055China School of Automation Science and Electrical Engineering Beihang UniversityBeijing 100083China State Key Laboratory of Information Engineering in Surveying Wuhan UniversityWuhan 430079China
A method of multi-block Single Shot Multi Box Detector(SSD)based on small object detection is proposed to the railway scene of unmanned aerial vehicle *** address the limitation of small object detection,a multi-block... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
Redundant data composition of peers in p2p streaming systems using cauchy reed-solomon codes
Redundant data composition of peers in p2p streaming systems...
收藏 引用
6th International Conference on Fuzzy systems and Knowledge Discovery, FSKD 2009
作者: Xu, Guangping Wang, Fayu Zhang, Hua Li, Jingxing Key Lab of Intelligent Computing and New Software Technology Tianjin University of Technology Tianjin 300191 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin 300191 China
Erasure codes are used in many distributed applications. This paper applies Cauchy Reed-Solomon codes to P2P streaming systems which is different from classical Reed-Solomon codes. Due to churn in these systems, strea... 详细信息
来源: 评论
A new method of mobile Ad Hoc network routing based on improved GF strategy  3
A new method of mobile Ad Hoc network routing based on impro...
收藏 引用
3rd IEEE International Conference on Smart Internet of Things, SmartIoT 2019
作者: Li, Ke Zhang, De-Gan Qiu, Jian-Ning Chen, Lu Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education Tianjin China
We propose a new mobile ad hoc network routing method based on improved GF (greedy forwarding) strategy in this paper. In the greedy forwarding phase, the reliable communication area is calculated, and then the qualit... 详细信息
来源: 评论
A kind of novel RSAR protocol for mobile vehicular Ad hoc network
收藏 引用
CCF Transactions on Networking 2019年 第2期2卷 111-125页
作者: De-gan Zhang Xiao-huan Liu Yu-ya Cui Lu Chen Ting Zhang Key Laboratory of Computer Vision and System and (Tianjin University of Technology) Ministry of Education Tianjin University of Technology
来源: 评论
An efficient image processing method based on web services for mobile devices
An efficient image processing method based on web services f...
收藏 引用
2009 2nd International Congress on Image and Signal Processing, CISP'09
作者: Yi, Liang Yingyuan, Xiao Jing, Huang Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education Tianjin University of Technology Tianjin China
The resource limitation of mobile devices causes the problem that the existing image processing software based on the centralized computing mode had difficulty running in mobile devices. A solution is given in the pap... 详细信息
来源: 评论
New Method of Traffic Flow Forecasting Based on QPSO Strategy for Internet of Vehicles  4
New Method of Traffic Flow Forecasting Based on QPSO Strateg...
收藏 引用
4th IEEE International Conference on Smart Internet of Things, SmartIoT 2020
作者: Zhang, De-Gan Du, Jing-Yu Zhang, Ting Fan, Hong-Rui Tianjin University of Technology Tianjin Key Lab of Intelligent Computing Novel Software Technology Tianjin300384 China Tianjin University of Technology Ministry of Education Key Laboratory of Computer Vision and System Tianjin China
We propose a new method of traffic flow forecasting based on quantum particle swarm optimization strategy (QPSO) for Internet of Vehicles (IOV). Establish a corresponding model based on the characteristics of the traf... 详细信息
来源: 评论
A new method of image data fusion based on FNN
A new method of image data fusion based on FNN
收藏 引用
2010 6th International Conference on Natural Computation, ICNC'10
作者: Zhang, De-Gan Li, Chao Wang, Dong Zhang, Xiao-Li Tianjin Key Lab. of Intelligent Computing and Novel Software Technology Tianjin University of Technology 300191 China Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300191 China
The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in... 详细信息
来源: 评论