咨询与建议

限定检索结果

文献类型

  • 1,398 篇 会议
  • 1,014 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,414 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,490 篇 工学
    • 1,054 篇 计算机科学与技术...
    • 880 篇 软件工程
    • 335 篇 信息与通信工程
    • 177 篇 控制科学与工程
    • 170 篇 电气工程
    • 146 篇 电子科学与技术(可...
    • 137 篇 生物工程
    • 121 篇 机械工程
    • 96 篇 光学工程
    • 75 篇 化学工程与技术
    • 73 篇 生物医学工程(可授...
    • 53 篇 仪器科学与技术
    • 53 篇 动力工程及工程热...
    • 43 篇 材料科学与工程(可...
    • 39 篇 网络空间安全
    • 37 篇 建筑学
    • 35 篇 土木工程
    • 30 篇 交通运输工程
  • 910 篇 理学
    • 588 篇 数学
    • 233 篇 物理学
    • 165 篇 生物学
    • 153 篇 统计学(可授理学、...
    • 80 篇 化学
    • 73 篇 系统科学
  • 412 篇 管理学
    • 224 篇 图书情报与档案管...
    • 202 篇 管理科学与工程(可...
    • 73 篇 工商管理
  • 62 篇 医学
    • 49 篇 临床医学
    • 38 篇 基础医学(可授医学...
  • 46 篇 法学
    • 35 篇 社会学
  • 36 篇 农学
  • 23 篇 经济学
  • 20 篇 教育学
  • 9 篇 哲学
  • 6 篇 艺术学
  • 4 篇 军事学
  • 3 篇 文学

主题

  • 110 篇 feature extracti...
  • 93 篇 semantics
  • 67 篇 information proc...
  • 62 篇 training
  • 59 篇 laboratories
  • 50 篇 computers
  • 44 篇 computational mo...
  • 43 篇 face recognition
  • 42 篇 visualization
  • 41 篇 data mining
  • 40 篇 image segmentati...
  • 40 篇 optimization
  • 37 篇 deep learning
  • 36 篇 machine learning
  • 36 篇 humans
  • 36 篇 accuracy
  • 34 篇 robustness
  • 30 篇 support vector m...
  • 28 篇 object detection
  • 28 篇 contrastive lear...

机构

  • 432 篇 key laboratory o...
  • 217 篇 university of ch...
  • 83 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 65 篇 peng cheng labor...
  • 64 篇 college of compu...
  • 53 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 48 篇 school of comput...
  • 46 篇 hunan provincial...
  • 46 篇 the key laborato...
  • 45 篇 key laboratory o...
  • 43 篇 college of infor...
  • 43 篇 graduate univers...
  • 40 篇 fujian provincia...
  • 40 篇 chinese academy ...
  • 36 篇 key laboratory o...
  • 34 篇 fujian key labor...
  • 34 篇 national enginee...
  • 32 篇 school of comput...

作者

  • 95 篇 zhongzhi shi
  • 89 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 72 篇 shiguang shan
  • 66 篇 huang qingming
  • 62 篇 liu qun
  • 48 篇 li yingsong
  • 48 篇 xu qianqian
  • 41 篇 feng yang
  • 39 篇 huang zhixiang
  • 35 篇 yingsong li
  • 35 篇 he qing
  • 32 篇 yang zhiyong
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 guo wenzhong
  • 28 篇 zhuang fuzhen
  • 28 篇 zhixiang huang
  • 27 篇 jiang kai
  • 26 篇 li hua

语言

  • 2,046 篇 英文
  • 327 篇 其他
  • 59 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing&Information Processing"
2414 条 记 录,以下是111-120 订阅
排序:
Two Physics-Based Schwarz Preconditioners for Three-Temperature Radiation Diffusion Equations in High Dimensions
收藏 引用
Communications in Computational Physics 2022年 第8期32卷 829-849页
作者: Xiaoqiang Yue Jianmeng He Xiaowen Xu Shi Shu Libo Wang National Center for Applied Mathematics in Hunan Key Laboratory of Intelligent Computing&Information Processing of Ministry of EducationHunan Key Laboratory for Computation and Simulation in Science and EngineeringXiangtan UniversityXiangtan 411105P.R.China Laboratory of Computational Physics Institute of Applied Physics and ComputationalMathematicsBeijing 100094P.R.China College of Information Science and Technology JinanUniversityGuangzhou 510632P.R.China
We concentrate on the parallel,fully coupled and fully implicit solution of the sequence of 3-by-3 block-structured linear systems arising from the symmetrypreserving finite volume element discretization of the unstea... 详细信息
来源: 评论
IGED:Towards intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论
Principled Design of Translation, Scale, and Rotation Invariant Variation Operators for Metaheuristics
收藏 引用
Chinese Journal of Electronics 2023年 第1期32卷 111-129页
作者: TIAN Ye ZHANG Xingyi HE Cheng TAN Kay Chen JIN Yaochu Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Anhui University School of Artificial Intelligence Anhui University School of Electrical and Electronic Engineering Huazhong University of Science and Technology Department of Computing The Hong Kong Polytechnic University Faculty of Technology Bielefeld University
A large number of metaheuristics have been proposed and shown high performance in solving complex optimization problems. While most variation operators in existing metaheuristics are empirically designed,new operators... 详细信息
来源: 评论
mmFAS: Multimodal Face Anti-Spoofing Using Multi-Level Alignment and Switch-Attention Fusion  39
mmFAS: Multimodal Face Anti-Spoofing Using Multi-Level Align...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Chen, Geng Xie, Wuyuan Lin, Di Liu, Ye Wang, Miaohui College of CSSE Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University China State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications China College of Intelligence and Computing Tianjin University China School of Automation Nanjing University of Posts and Telecommunications China
The increasing number of presentation attacks on reliable face matching has raised concerns and garnered attention towards face anti-spoofing (FAS). However, existing methods for FAS modeling commonly fuse multiple vi... 详细信息
来源: 评论
The Adjacency Codes of the First Yellow Graphs
收藏 引用
Journal of Systems Science & Complexity 2023年 第4期36卷 1757-1768页
作者: SHI Minjia LI Shitao KIM Jon-Lark SOLE Patrick Key Laboratory of Intelligent Computing and Signal Processing Ministry of EducationSchool of Mathematical SciencesAnhui UniversityHefei 230601China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China School of Mathematical Sciences Anhui UniversityHefei 230026China Department of Math Sogang UniversitySeoulSouth Korea Aix Marseille Univ CNRSCentrale MarseilleI2MMarseilleFrance
The authors study the binary codes spanned by the adjacency matrices of the strongly regular graphs(SRGs)on at most two hundred vertices whose existence is *** authors show that in length less than one hundred they ca... 详细信息
来源: 评论
Representation of Semantic Word Embeddings Based on SLDA and Word2vec Model
收藏 引用
Chinese Journal of Electronics 2023年 第3期32卷 647-654页
作者: TANG Huanling ZHU Hui WEI Hongmin ZHENG Han MAO Xueli LU Mingyu GUO Jin School of Computer Science and Technology Shandong Technology and Business University Co-innovation Center of Shandong Colleges and Universities: Future Intelligent Computing Key Laboratory of Intelligent Information Processing in Universities of Shandong Shandong Technology and Business University School of Information and Electronic Engineering Shandong Technology and Business University Information Science and Technology College Dalian Maritime University School of Computer and Information Technology Liaoning Normal University
To solve the problem of semantic loss in text representation, this paper proposes a new embedding method of word representation in semantic space called wt2svec based on supervised latent Dirichlet allocation(SLDA) an... 详细信息
来源: 评论
Deep Representation Learning for Electron Ionization Mass Spectra Retrieval
Deep Representation Learning for Electron Ionization Mass Sp...
收藏 引用
2024 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2024
作者: Liu, Shibo Zhang, Xuan Jiao, Anlei Sun, Shiwei Dian, Longyang Cui, Xuefeng Shandong University School of Computer Science and Technology Qingdao China Chinese Academy of Sciences Key Lab of Intelligent Information Processing Institute of Computing Technology Beijing China Shandong University State Key Laboratory of Microbial Technology Qingdao China
The task of retrieving and analyzing mass spectra is indispensable for the identification of compounds in mass spectrometry (MS). This methodology is of critical importance as it enables researchers to correlate obser... 详细信息
来源: 评论
Interpretable multi-view attention network for drug-drug interaction prediction
Interpretable multi-view attention network for drug-drug int...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Lin, Xuan Wen, Qi Yang, Sijie Yu, Zu-Guo Long, Yahui Zeng, Xiangxiang Xiangtan University College of Computer Science China Xiangtan University Key Laboratory of Intelligent Computing and Information Processing of Ministry of Education China Singapore Hunan University College of Information Science and Engineering China
Drug-drug interaction (DDI) plays an increasingly crucial role in drug discovery. Predicting potential DDI is also essential for clinical research. Given the high cost and risk of wet-lab experiments, in-silico DDI pr... 详细信息
来源: 评论
Few-Shot Class-Incremental Semantic Segmentation via Pseudo-Labeling and Knowledge Distillation  4
Few-Shot Class-Incremental Semantic Segmentation via Pseudo-...
收藏 引用
4th International Conference on information Science, Parallel and Distributed Systems, ISPDS 2023
作者: Jiang, Chengjia Wang, Tao Li, Sien Wang, Jinyang Wang, Shirui Antoniou, Antonios Minjiang University Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Fuzhou China Fujian Education Institutions Wuyi University The Key Laboratory of Cognitive Computing and Intelligent Information Processing Wuyishan China College of Computer and Data Science Fuzhou University Fuzhou China European University Cyprus Department of Computer Science and Engineering Nicosia Cyprus
We address the problem of learning new classes for semantic segmentation models from few examples, which is challenging because of the following two reasons. Firstly, it is difficult to learn from limited novel data t... 详细信息
来源: 评论
Privacy protection oriented on data stream computing
Privacy protection oriented on data stream computing
收藏 引用
2022 International Conference on Computer Application and information Security, ICCAIS 2022
作者: He, Renjie Zheng, Xianghan Wang, Gong School of Computer and Big Data Fuzhou University Fujian Fuzhou China The Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fujian Fuzhou China
Data security has always been one of the public concerns, and homomorphic encryption technology, as one of the effective means to ensure data security, has always been a hot topic of academic research. Traditional mac... 详细信息
来源: 评论