咨询与建议

限定检索结果

文献类型

  • 2,040 篇 会议
  • 1,579 篇 期刊文献

馆藏范围

  • 3,619 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,380 篇 工学
    • 1,812 篇 计算机科学与技术...
    • 1,455 篇 软件工程
    • 591 篇 信息与通信工程
    • 319 篇 电气工程
    • 275 篇 控制科学与工程
    • 233 篇 电子科学与技术(可...
    • 232 篇 生物工程
    • 171 篇 网络空间安全
    • 136 篇 机械工程
    • 113 篇 光学工程
    • 95 篇 生物医学工程(可授...
    • 87 篇 化学工程与技术
    • 85 篇 安全科学与工程
    • 82 篇 交通运输工程
    • 80 篇 仪器科学与技术
    • 62 篇 材料科学与工程(可...
    • 61 篇 建筑学
    • 59 篇 动力工程及工程热...
  • 1,072 篇 理学
    • 611 篇 数学
    • 256 篇 物理学
    • 248 篇 生物学
    • 207 篇 统计学(可授理学、...
    • 102 篇 系统科学
    • 87 篇 化学
  • 593 篇 管理学
    • 326 篇 管理科学与工程(可...
    • 302 篇 图书情报与档案管...
    • 96 篇 工商管理
  • 118 篇 法学
    • 71 篇 社会学
  • 80 篇 医学
    • 70 篇 临床医学
    • 63 篇 基础医学(可授医学...
  • 42 篇 经济学
  • 31 篇 军事学
  • 16 篇 农学
  • 15 篇 教育学
  • 8 篇 艺术学
  • 6 篇 文学

主题

  • 152 篇 feature extracti...
  • 124 篇 semantics
  • 99 篇 accuracy
  • 96 篇 training
  • 95 篇 deep learning
  • 93 篇 computational mo...
  • 76 篇 federated learni...
  • 74 篇 privacy
  • 66 篇 cryptography
  • 63 篇 data models
  • 59 篇 authentication
  • 56 篇 protocols
  • 54 篇 security
  • 52 篇 object detection
  • 51 篇 data privacy
  • 49 篇 neural networks
  • 47 篇 information secu...
  • 47 篇 cloud computing
  • 46 篇 robustness
  • 45 篇 machine learning

机构

  • 227 篇 key laboratory o...
  • 203 篇 shandong provinc...
  • 95 篇 university of ch...
  • 82 篇 school of comput...
  • 81 篇 key laboratory o...
  • 64 篇 information secu...
  • 63 篇 cas key laborato...
  • 63 篇 school of cyber ...
  • 60 篇 guangdong provin...
  • 52 篇 shandong fundame...
  • 52 篇 tianjin key labo...
  • 49 篇 network and data...
  • 48 篇 peng cheng labor...
  • 48 篇 state key labora...
  • 47 篇 state key labora...
  • 46 篇 college of compu...
  • 46 篇 shandong enginee...
  • 45 篇 school of comput...
  • 43 篇 shandong provinc...
  • 43 篇 shaanxi key labo...

作者

  • 98 篇 cheng xueqi
  • 47 篇 shen huawei
  • 47 篇 guo jiafeng
  • 43 篇 zheng wei-shi
  • 35 篇 xie xiaohua
  • 33 篇 yixian yang
  • 33 篇 cao xiaochun
  • 32 篇 huang qingming
  • 30 篇 yang yixian
  • 29 篇 yichuan wang
  • 28 篇 jin xiaolong
  • 26 篇 xu qianqian
  • 25 篇 li wei
  • 24 篇 xinhong hei
  • 24 篇 jin hai
  • 22 篇 lai jianhuang
  • 21 篇 hu shengshan
  • 21 篇 meng deyu
  • 21 篇 wang yichuan
  • 20 篇 xiaoming wu

语言

  • 3,231 篇 英文
  • 311 篇 其他
  • 82 篇 中文
检索条件"机构=Key Laboratory of Network Computing and Security Technology"
3619 条 记 录,以下是2951-2960 订阅
排序:
Coherence-based Automated Essay Scoring using Self-Attention
Coherence-based Automated Essay Scoring using Self-Attention
收藏 引用
第十七届全国计算语言学学术会议暨第六届基于自然标注大数据的自然语言处理国际学术研讨会(CCL 2018)
作者: Xia Li Minping Chen Jianyun Nie Zhenxing Liu Ziheng Feng Yingdan Cai Key Laboratory of Language Engineering and Computing Guangdong university of foreign studies Guangzh School of Information Science and Technology/School of Cyber Security Guangdong university of foreig Department of Computer Science and Operations Research University of montreal MontrealCanada
Automated essay scoring aims to score an essay automatically without any human *** methods heavily rely on manual feature engi-neering,making it expensive to extract the *** recent studies used neural-network-based sc... 详细信息
来源: 评论
A geometric image segmentation method based on a bi-convex, fuzzy, variational principle with teaching-learning optimization
A geometric image segmentation method based on a bi-convex, ...
收藏 引用
作者: Jin, Haiyan Li, Yaning Xing, Bei Wang, Lei Department of Computer Science and Engineering Xi'An University of Technology No. 5 South Jinhua Road Xi'an Shaanxi710048 China Shaanxi Key Laboratory for Network Computing and Security Technology Xi'an China
This paper proposes an efficient, bi-convex, fuzzy, variational (BFV) method with teaching and learning based optimization (TLBO) for geometric image segmentation. Firstly, we adopt a bi-convex, object function to pro... 详细信息
来源: 评论
A Two-grid Method for Linearizing and Symmetrizing the Steady-state Poisson-Nernst-Planck Equations
arXiv
收藏 引用
arXiv 2017年
作者: Li, Xuefang Yang, Ying Cheng, Hang School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin Guangxi541004 China School of Mathematics and Computing Science Guangxi Colleges Universities Key Laboratory of Data Analysis and Computation Guangxi Key Laboratory of Cryptography and information Security Guilin University of Electronic Technology Guilin Guangxi541004 China School of Mathematics and Computing Science Guilin University of Electronic Technology Guilin Guangxi541004 China
In this paper, a two-grid method is proposed to linearize and symmetrize the steady-state Poisson-Nernst-Planck equations. The computational system is decoupled to linearize and symmetrize equations by using this meth... 详细信息
来源: 评论
Overdue Prediction of Bank Loans Based on Deep Neural network
Overdue Prediction of Bank Loans Based on Deep Neural Networ...
收藏 引用
2017 International Symposium on Computer Science and Artificial Intelligence(ISCSAI 2017)
作者: Li Xin Sun Guozi Li Huakang Jiangsu Key Lab of Big Data and Security and Intelligent Processing Nanjing University of Posts and Telecommunications Collaborative Innovation Center for Economics crime investigation and prevention technology State Key Laboratory of Mathematical Engineering and Advanced Computing
With the development of information technology, the application of big data in financial aspects becomes more and more deepening. However, in the aspect of bank loans, the accuracy of traditional user loan risk predic... 详细信息
来源: 评论
Deep hybrid residual learning with statistic priors for single image super-resolution
Deep hybrid residual learning with statistic priors for sing...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Risheng Liu Xiangyu Wang Xin Fan Haojie Li Zhongxuan Luo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province Department of Computing The Hong Kong Polytechnic University DUT-RU International School of Information & Software Engineering Dalian University of Technology
This paper considers single image super-resolution (SISR), which is an important low-level vision task and has various applications in multimedia society. Recently, deep neural networks have archived good performance ... 详细信息
来源: 评论
Leveraging geometric correlation for input-adaptive facial landmark regression
Leveraging geometric correlation for input-adaptive facial l...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yuyao Feng Risheng Liu Xin Fan Kang Huyan Zhongxuan Luo Key Laboratory for Ubiquitous Network and Service Software of Liaoning Province DUT-RU International School of Information & Software Engineering Dalian University of Technology Department of Computing The Hong Kong Polytechnic University
Facial analysis plays very important role in many vision applications, such as authentication and entertainments. The very early works in the 1990s mostly focus on estimating geometric deformations of facial landmarks... 详细信息
来源: 评论
Least squares twin SVM decision tree for multi-class classification
Least squares twin SVM decision tree for multi-class classif...
收藏 引用
International Congress on Image and Signal Processing, BioMedical Engineering and Informatics
作者: Qing Yu Lihui Wang Tianjin Key Laboratory of Intelligence Computing and Network Security Tianjin University of Technology China
In order to solve multi-class classification problem in real world, we improved TSVM in this paper. We combined LSTSVM with partial binary tree to improve classification efficiency. Binary tree hierarchy can solved th... 详细信息
来源: 评论
Learning aggregated transmission propagation networks for haze removal and beyond
arXiv
收藏 引用
arXiv 2017年
作者: Liu, Risheng Fan, Xin Hou, Minjun Jiang, Zhiying Luo, Zhongxuan Zhang, Lei DUT-RU International School of Information Science and Engineering Key Laboratory for Ubiquitous Network Service Software of Liaoning Province Dalian University of Technology Dalian Department of Computing Hong Kong Polytechnic University
Single image dehazing is an important low-level vision task with many applications. Early researches have inves-tigated different kinds of visual priors to address this problem. However, they may fail when their assum... 详细信息
来源: 评论
Multiple influence maximization in social networks  10
Multiple influence maximization in social networks
收藏 引用
10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016
作者: Sun, Honglin Gao, Xiaofeng Chen, Guihai Gu, Jian Wang, Yongjian Shanghai Key Lab. of Scalable Computing and Systems Dept. of Computer Science and Engineering Shanghai Jiao Tong University Shanghai China Key Laboratory of Information Network Security of Ministry of Public Security Third Research Institute of Ministry of Public Security Shanghai China
Influence Maximization, a technique of social analysis to help marketers select a small group of users to promote their products with the goal of maximizing their influence spread, has been studied for a long time. Ho... 详细信息
来源: 评论
Robust Multi-Exposure Image Fusion: A Structural Patch Decomposition Approach
Robust Multi-Exposure Image Fusion: A Structural Patch Decom...
收藏 引用
作者: Ma, Kede Li, Hui Yong, Hongwei Wang, Zhou Meng, Deyu Zhang, Lei Department of Electrical and Computer Engineering University of Waterloo WaterlooONN2L 3G1 Canada Department of Computing Hong Kong Polytechnic University Hong Kong Hong Kong Department of Computing. Hong Kong Polytechnic University Hong Kong Hong Kong Institute for Information and System Sciences and Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi'an Jiaotong University Xi'an710049 China Inst. for Info. and Syst. Sci. and Min. of Educ. Key Lab. of Intelligent Networks and Netwk. Secty. Xi'an Jiaotong University Xi'an710049 China
We propose a simple yet effective structural patch decomposition approach for multi-exposure image fusion (MEF) that is robust to ghosting effect. We decompose an image patch into three conceptually independent compon... 详细信息
来源: 评论