咨询与建议

限定检索结果

文献类型

  • 940 篇 会议
  • 724 篇 期刊文献

馆藏范围

  • 1,664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,067 篇 工学
    • 566 篇 计算机科学与技术...
    • 424 篇 软件工程
    • 310 篇 信息与通信工程
    • 257 篇 电子科学与技术(可...
    • 211 篇 电气工程
    • 137 篇 控制科学与工程
    • 80 篇 光学工程
    • 74 篇 机械工程
    • 71 篇 生物工程
    • 66 篇 仪器科学与技术
    • 64 篇 化学工程与技术
    • 50 篇 动力工程及工程热...
    • 49 篇 生物医学工程(可授...
    • 43 篇 材料科学与工程(可...
    • 31 篇 网络空间安全
    • 28 篇 力学(可授工学、理...
    • 26 篇 建筑学
    • 22 篇 土木工程
    • 18 篇 环境科学与工程(可...
  • 746 篇 理学
    • 488 篇 数学
    • 236 篇 物理学
    • 103 篇 统计学(可授理学、...
    • 92 篇 生物学
    • 81 篇 系统科学
    • 70 篇 化学
  • 183 篇 管理学
    • 114 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 40 篇 工商管理
  • 26 篇 法学
    • 21 篇 社会学
  • 26 篇 医学
    • 21 篇 临床医学
  • 22 篇 农学
  • 14 篇 经济学
  • 9 篇 军事学
  • 5 篇 教育学
  • 3 篇 文学
  • 2 篇 艺术学

主题

  • 35 篇 bandwidth
  • 35 篇 feature extracti...
  • 28 篇 simulation
  • 26 篇 signal processin...
  • 25 篇 semantics
  • 24 篇 image segmentati...
  • 24 篇 signal processin...
  • 23 篇 optimization
  • 18 篇 computational mo...
  • 18 篇 accuracy
  • 17 篇 wireless communi...
  • 17 篇 slot antennas
  • 17 篇 training
  • 16 篇 complex networks
  • 16 篇 deep learning
  • 16 篇 neural networks
  • 16 篇 interference
  • 15 篇 laboratories
  • 15 篇 resonant frequen...
  • 14 篇 metals

机构

  • 207 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 62 篇 key laboratory o...
  • 54 篇 anhui university...
  • 54 篇 school of comput...
  • 43 篇 college of infor...
  • 34 篇 key laboratory o...
  • 33 篇 key laboratory o...
  • 29 篇 college of compu...
  • 24 篇 fujian key labor...
  • 24 篇 key lab of intel...
  • 24 篇 anhui province k...
  • 24 篇 the key laborato...
  • 24 篇 anhui university
  • 23 篇 school of electr...
  • 23 篇 key lab of intel...
  • 23 篇 school of mathem...
  • 20 篇 engineering rese...
  • 17 篇 college of mathe...
  • 17 篇 key laboratory o...

作者

  • 80 篇 huang zhixiang
  • 77 篇 li yingsong
  • 59 篇 shi minjia
  • 58 篇 zhixiang huang
  • 56 篇 yingsong li
  • 40 篇 xianliang wu
  • 37 篇 wu xianliang
  • 30 篇 luo bin
  • 29 篇 zhang xingyi
  • 28 篇 jiang kai
  • 28 篇 solé patrick
  • 24 篇 li liping
  • 23 篇 zou juan
  • 23 篇 bin luo
  • 22 篇 tang jin
  • 21 篇 wu xian-liang
  • 21 篇 liping li
  • 21 篇 li xiaohui
  • 19 篇 minquan li
  • 19 篇 li chenglong

语言

  • 1,587 篇 英文
  • 44 篇 其他
  • 39 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education"
1664 条 记 录,以下是21-30 订阅
排序:
MSMAE-Net: multi-semantic and multi-attention enhanced network for image forgery localization
收藏 引用
signal, Image and Video processing 2025年 第7期19卷 1-11页
作者: Liao, Jianjun Su, Lichao Lu, Menghan Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou China
The popularization of modern digital image technology has brought convenience to us, but it also poses many risks. The advancement of image editing software allows anyone to modify image content effortlessly. If these...
来源: 评论
Controlled-source electromagnetic noise attenuation via a deep convolutional neural network and high-quality sounding curve screening mechanism
收藏 引用
Geophysics 2025年 第3期90卷 WA125-WA140页
作者: Liu, Yecheng Li, Diquan Li, Jin Zhang, Xian Central South University Monitoring Ministry of Education Key Laboratory of Metallogenic Prediction of Nonferrous Metals and Geological Environment Changsha China Hunan Provincial Key Laboratory of Non-ferrous Resources and Geological Hazard Detection Changsha China Central South University School of Geoscience and Info-physics Changsha China Hunan Normal University College of Information Science and Engineering Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Changsha China Hunan University of Finance and Economics School of Information Technology and Management Hunan Provincial Key Laboratory of Finance & Economics Big Data Science and Technology Changsha China
Strong noise is one of the biggest challenges in controlled-source electromagnetic (CSEM) exploration, which severely affects the quality of the recorded signal. We develop a novel and effective CSEM noise attenuation... 详细信息
来源: 评论
Enhancing bone-conducted speech with spectrum similarity metric in adversarial learning
收藏 引用
Speech Communication 2025年 170卷
作者: Pan, Yan Zhou, Jian Wang, Huabin Zheng, Wenming Tao, Liang Kwan, Hon Keung Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei230601 China Key Laboratory of Child Development and Learning Science Ministry of Education and School of Biological Science and Medical Engineering Southeast University Nanjing210096 China Department of Electrical and Computer Engineering University of Windsor Windsor Canada
Although bone-conducted (BC) speech offers the advantage of being insusceptible to background noise, its transmission path through bone tissue entails not only serious attenuation of high-frequency components but also... 详细信息
来源: 评论
Network intrusion detection based on feature fusion of attack dimension
收藏 引用
Journal of Supercomputing 2025年 第6期81卷 1-33页
作者: Sun, Xiaolong Gu, Zhengyao Zhang, Hao Gu, Jason Liu, Yanhua Dong, Chen Ye, Junwei College of Computer and Data Science Fuzhou University Fuzhou350116 China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou University Fuzhou350116 China Engineering Research Center of Big Data Intelligence Chinese Ministry of Education Fuzhou350116 China Department of Electrical and Computer Engineering Dalhousie University HalifaxNSB3J 1Z1 Canada
Network traffic anomaly detection involves the rapid identification of intrusions within a network through the detection, analysis, and classification of network traffic data. The variety of cyberattacks encompasses d... 详细信息
来源: 评论
BAST: Blockchain-Assisted Secure and Traceable Data Sharing Scheme for Vehicular Networks
收藏 引用
IEEE Transactions on Information Forensics and Security 2025年 20卷 4664-4678页
作者: Liu, Xinzhong Cui, Jie Zhang, Jing Yin, Rongwang Zhong, Hong Wei, Lu Bolodurina, Irina He, Debiao School of Computer Science and Technology Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Hefei230039 China Anhui University Anhui Engineering Laboratory of IoT Security Technologies Hefei230039 China Hefei University Department of Basic Experiment and Training Hefei230601 China Orenburg State University Faculty of Mathematics and Information Technologies Orenburg460018 Russia Wuhan University School of Cyber Science and Engineering 430072 China MatrixElements Technologies Shanghai Key Laboratory of Privacy Preserving Computation Shanghai201204 China
In vehicular networks, caching service content on edge servers (ESs) is a widely accepted strategy for promptly responding to vehicle requests, reducing communication overhead, and improving service experience. Howeve... 详细信息
来源: 评论
Comments and extensions on "State-equivalent form and minimum-order compensator design for rectangular descriptor systems"
arXiv
收藏 引用
arXiv 2025年
作者: Shi, Shuo Zhang, Juan Hunan Key Laboratory for Computation and Simulation in Science and Engineering Key Laboratory of Intelligent Computing and Information Processing Ministry of Education School of Mathematics and Computational Science Xiangtan University Xiangtan411105 China
This technical note presents a counterexample showing that the equivalence conditions proposed by Geng et al. (IEEE Trans. Automat. Control, 2024), which use a minimum-order compensator (MOC) to achieve desired design... 详细信息
来源: 评论
On four conjectures of Heng-Ding and p-ary linear codes from monomials
收藏 引用
IEEE Transactions on Information Theory 2025年
作者: Qian, Liqin Shi, Minjia Anhui University School of Mathematical Sciences Anhui Hefei230601 China Anhui University Key Laboratory of Intelligent Computing Signal Processing Ministry of Education School of Mathematical Sciences Anhui Hefei230601 China Xidian University State Key Laboratory of Integrated Service Networks Xi'an710071 China
Subfield codes of linear codes over finite fields have recently attracted great attention due to their wide applications in secret sharing schemes, authentication codes and association schemes. There are two major ing... 详细信息
来源: 评论
Boosting polyp screening with improved point-teacher weakly semi-supervised
收藏 引用
Computers in Biology and Medicine 2025年 191卷 109998-109998页
作者: Du, Xiuquan Zhang, Xuejun Chen, Jiajia Li, Lei Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Anhui University Hefei China Department of Neurology Shuyang Affiliated Hospital of Nanjing University of Traditional Chinese Medicine Suqian China School of Computer Science and Technology Anhui University Hefei China
Polyps, like a silent time bomb in the gut, are always lurking and can explode into deadly colorectal cancer at any time. Many methods are attempted to maximize the early detection of colon polyps by screening, howeve... 详细信息
来源: 评论
Blockchain-Assisted Revocable Cross-Domain Authentication for Vehicular Ad-Hoc Networks
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Li, Ru Cui, Jie Zhang, Jing Wei, Lu Zhong, Hong He, Debiao Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and Technology Hefei230039 China Anhui University Anhui Engineering Laboratory of IoT Security Technologies Hefei230039 China Wuhan University School of Cyber Science and Engineering 430072 China
With the rapid development of vehicular ad-hoc networks (VANETs) and the increasing diversification of user demands, interactions between different management domains have become more frequent. Identity authentication... 详细信息
来源: 评论
Transductive Few-shot Learning via Joint Message Passing and Prototype-based Soft-label Propagation
收藏 引用
ACM Transactions on Multimedia computing, Communications and Applications 2025年 第4期21卷
作者: Wang, Jiahui Xu, Qin Jiang, Bo Luo, Bin The Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China The Information Materials and Intelligent Sensing Laboratory of Anhui Province School of Computer Science and Technology Anhui University The Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China
The transductive Few-shot Learning (FSL) mostly employs either prototype learning or label propagation methods to generalize to new classes by using the information of all query samples. However, existing methods have... 详细信息
来源: 评论