咨询与建议

限定检索结果

文献类型

  • 173 篇 期刊文献
  • 88 篇 会议

馆藏范围

  • 261 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 148 篇 工学
    • 100 篇 计算机科学与技术...
    • 78 篇 软件工程
    • 35 篇 信息与通信工程
    • 23 篇 电气工程
    • 21 篇 生物工程
    • 11 篇 控制科学与工程
    • 9 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 光学工程
    • 8 篇 环境科学与工程(可...
    • 6 篇 安全科学与工程
    • 6 篇 网络空间安全
    • 5 篇 机械工程
    • 4 篇 动力工程及工程热...
  • 77 篇 理学
    • 41 篇 数学
    • 24 篇 生物学
    • 9 篇 化学
    • 8 篇 物理学
    • 8 篇 系统科学
    • 8 篇 统计学(可授理学、...
  • 49 篇 管理学
    • 25 篇 管理科学与工程(可...
    • 24 篇 图书情报与档案管...
    • 11 篇 工商管理
  • 18 篇 农学
    • 15 篇 作物学
  • 17 篇 医学
    • 13 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 14 篇 法学
    • 9 篇 社会学
  • 9 篇 经济学
    • 8 篇 应用经济学
  • 1 篇 文学
  • 1 篇 艺术学

主题

  • 13 篇 optimum fertiliz...
  • 13 篇 fertilizer utili...
  • 13 篇 relative abundan...
  • 13 篇 optimum yield
  • 12 篇 nutrient convers...
  • 9 篇 training
  • 7 篇 feature extracti...
  • 7 篇 data models
  • 6 篇 image segmentati...
  • 6 篇 semantics
  • 5 篇 three-dimensiona...
  • 5 篇 speech processin...
  • 5 篇 privacy
  • 4 篇 object detection
  • 4 篇 predictive model...
  • 4 篇 differential pri...
  • 4 篇 blockchains
  • 4 篇 forecasting
  • 4 篇 adaptation model...
  • 3 篇 semantic segment...

机构

  • 19 篇 school of cyber ...
  • 15 篇 school of cyber ...
  • 13 篇 school of comput...
  • 13 篇 key laboratory o...
  • 13 篇 guangxi key labo...
  • 13 篇 guangxi geograph...
  • 13 篇 agro-environment...
  • 12 篇 key laboratory o...
  • 11 篇 peng cheng labor...
  • 11 篇 key laboratory o...
  • 10 篇 national institu...
  • 10 篇 south china univ...
  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 singapore manage...
  • 9 篇 gaoling school o...
  • 9 篇 center for digit...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 8 篇 cyber science re...

作者

  • 23 篇 huang qingming
  • 21 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 13 篇 shutian liu
  • 13 篇 xianda hou
  • 13 篇 changhong mi
  • 13 篇 hongyan zheng
  • 13 篇 yanlin hou
  • 13 篇 zhiping huang
  • 13 篇 shuojin wang
  • 13 篇 jian ding
  • 13 篇 ling lu
  • 10 篇 cao xiaochun
  • 9 篇 bao shilong
  • 9 篇 junfeng yao
  • 7 篇 yao junfeng
  • 7 篇 weixing xie
  • 6 篇 zheng baihua
  • 5 篇 wen ji-rong
  • 5 篇 xie weixing

语言

  • 241 篇 英文
  • 18 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory of Data Protection and Intelligent Management"
261 条 记 录,以下是81-90 订阅
排序:
Trustworthy Hate Speech Detection Through Visual Augmentation
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Ziyuan Yan, Ming Chen, Yingyu Wang, Hui Lu, Zexin Zhang, Yi College of Computer Science Sichuan University China Key Laboratory of Data Protection and Intelligent Management Ministry of Education Sichuan University China Centre for Frontier AI Research Agency for Science Technology and Research
The surge of hate speech on social media platforms poses a significant challenge, with hate speech detection (HSD) becoming increasingly critical. Current HSD methods focus on enriching contextual information to enhan... 详细信息
来源: 评论
Landslide hazard susceptibility evaluation based on SBAS-InSAR technology and SSA-BP neural network algorithm:A case study of Baihetan Reservoir Area
收藏 引用
Journal of Mountain Science 2024年 第3期21卷 952-972页
作者: GUO Junqi XI Wenfei YANG Zhiquan SHI Zhengtao HUANG Guangcai YANG Zhengrong YANG Dongqing Faculty of Geography Yunnan Normal UniversityKunming 650500China Key Laboratory of Early Rapid Identification Prevention and Control of Geological Diseases in Traffic Corridor of High Intensity Earthquake Mountainous Area of Yunnan ProvinceKunming 650093China Faculty of Public Safety and Emergency Management Kunming University of Science and TechnologyKunming 650093China Key Laboratory of Geological Disaster Risk Prevention and Control and Emergency Disaster Reduction of Ministry of Emergency Management of the People’s Republic of China Kunming University of Science and TechnologyKunming 650093China Guizhou Geological Survey Institute Guiyang 550081China College of Big Data and Intelligent Engineering Southwest Forestry UniversityKunming 650224China
Landslide hazard susceptibility evaluation takes on critical significance in early warning and disaster prevention and *** order to solve the problems of poor effectiveness of landslide data and complex calculation of... 详细信息
来源: 评论
CertRV: an Efficient Certificate Revocation Scheme via Consortium Blockchain, Chameleon Hash and Cuckoo Filter
CertRV: an Efficient Certificate Revocation Scheme via Conso...
收藏 引用
IEEE International Conference on Web Services (ICWS)
作者: Huiying Zhang Yuxian Chen Wei Ren Tao Li School of Computer Science China University of Geosciences Wuhan China Key Laboratory of Data Protection and Intelligent Management Sichuan University Ministry of Education School of Cyber Science and Engineering Sichuan University Chengdu China
Certificate revocation management is one of the primary tasks of Public key Infrastructure (PKI), and it is crucial to the security of PKI. Existing blockchain-based certificate revocation schemes commonly suffer from... 详细信息
来源: 评论
Preemptive Image protection against Steganography
Preemptive Image Protection against Steganography
收藏 引用
Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)
作者: Yusheng Guo Nan Zhong Zhenxing Qian Xinpeng Zhang Hsunfang Cho School of Computer Science Fudan University Shanghai China Key Laboratory of Digital Culture Protection and Tourism Data Intelligent Computing Shanghai China Shanghai Data Exchange Corporation Shanghai China
Image steganography plays a vital role in the realm of information hiding, involving the discreet embedding of confidential data within an image. However, the misuse of this technology by malicious actors on social me...
来源: 评论
Research on the psychological classification of violent crime based on a convolutional neural network
收藏 引用
Journal of Ambient Intelligence and Humanized Computing 2023年 第12期14卷 16397-16408页
作者: Li, Hui Gao, Guandong Xiao, Ke Song, Shengzun College of Information Science and Technology Hebei Agricultural University Hebei Baoding071001 China Department of Information Management The National Police University for Criminal Justice Hebei Baoding071001 China The Centre of Data Science and Intelligent Correction Technology The National Police University for Criminal Justice Hebei Baoding071001 China Hebei Key Laboratory of Agricultural Big Data Hebei Agricultural University Hebei Baoding071001 China Department of Penology The National Police University for Criminal Justice Hebei Baoding071001 China
This paper uses a text classification algorithm in the context of criminal psychology to scientifically evaluate the correctional effects among offenders in the hopes of preventing recidivism. The proposed algorithm u... 详细信息
来源: 评论
A Multi-Stream Structure-Enhanced Network for Mesh Denoising
A Multi-Stream Structure-Enhanced Network for Mesh Denoising
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yutian Yang Lingyu Liang Jie Yan Yong Xu South China University of Technology Guangzhou China Henan Key Laboratory of Chronic Disease Prevention and Therapy & Intelligent Health Management Henan China Guangdong Provincial Key Laboratory of Multimodal Big Data Intelligent Analysis China
Triangular meshes provide an efficient representation of 3D shapes. Various applications such as 3D simulation suffer from degradation in geometric quality. This paper proposes a novel Multi-stream Structure-Enhanced ... 详细信息
来源: 评论
SE-Chain:A Scalable Storage and Efficient Retrieval Model for Blockchain
收藏 引用
Journal of Computer Science & Technology 2021年 第3期36卷 693-706页
作者: Da-Yu Jia Jun-Chang Xin Zhi-Qiong Wang Han Lei Guo-Ren Wang School of Computer Science and Engineering Northeastern UniversityShenyang 110819China Key Laboratory of Big Data Management and Analytics of Liaoning Province Shenyang 110819China College of Medicine and Biological Information Engineering Northeastern UniversityShenyang 110169China Neusoft Institute of Intelligent Healthcare Technology Co.Ltd. Shenyang 110179China School of Electrical and Electronic Engineering Nanyang Technological UniversitySingapore 639798Singapore School of Computer Science and Technology Beijing Institute of TechnologyBeijing 100081China
Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they ... 详细信息
来源: 评论
Target detection method based on deep learning applied in integrity evaluation of explosion proof electrical equipment
Target detection method based on deep learning applied in in...
收藏 引用
2022 International Conference on Cyber Security, Artificial Intelligence, and Digital Economy, CSAIDE 2022
作者: Li, Bohan Liu, Weijing Lin, Yuchen Lin, Tao School of Artificial Intelligence and Data Sciences Hebei University of Technology Tianjin300130 China Tianjin Key Laboratory of Aerospace Intelligent Equipment Technology Tianjin Institute of Aerospace Mechanical and Electrical Equipment Tianjin300130 China School of Economics and Management Hebei University of Technology Tianjin300130 China
There are many types of explosion-proof equipment, so the problems in use are not the same. In view of these situations, this project takes the explosion-proof electrical equipment as the research object, and develops... 详细信息
来源: 评论
Reconfiguration of the brain during aesthetic experience on Chinese calligraphy—Using brain complex networks
收藏 引用
Visual Informatics 2022年 第1期6卷 35-46页
作者: Rui Li Xiaofei Jia Changle Zhou Junsong Zhang National Engineering Laboratory for Educational Big Data Central China Normal UniversityWuhanHubeiChina Mind Art&Computation GroupDepartment of Artificial IntelligenceSchool of InformaticsXiamen UniversityChina Key Laboratory of Digital Protection and Intelligent Processing of Intangible Cultural Heritage of Fujian and Taiwan Ministry of Culture and TourismChina Center for the Study of Brain and Language Qufu Normal UniversityRizhaoChina Faculty of Education The Edmond J.Safra Brain Research Center for the Study of Learning DisabilitiesUniversity of HaifaHaifaIsrael
Chinese calligraphy,as a well-known performing art form,occupies an important role in the intangible cultural heritage of *** studies focused on the psychophysiological benefits of Chinese *** attention has been paid ... 详细信息
来源: 评论
Learning Representation for Clustering via Dual Correlation  6
Learning Representation for Clustering via Dual Correlation
收藏 引用
6th IEEE Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2023
作者: Zhang, Tao Hu, Mingming Shenyang Institute of Automation Chinese Academy of Sciences State Key Laboratory of Robotics Shenyang China University of Chinese Academy of Sciences Chinese Academy of Sciences Institutes for Robotics and Intelligent Manufacturing Shenyang Institute of Automation Shenyang China Center for Clinical Studies Data Management Department Beijing China
Contrastive learning is a self-supervised learning method used to learn the general features of a dataset without labels by letting the model learn which data points are similar or different. It constructs labeled sam... 详细信息
来源: 评论