咨询与建议

限定检索结果

文献类型

  • 3,473 篇 会议
  • 2,501 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,975 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,998 篇 工学
    • 2,737 篇 计算机科学与技术...
    • 2,270 篇 软件工程
    • 1,038 篇 信息与通信工程
    • 500 篇 电气工程
    • 469 篇 生物工程
    • 445 篇 电子科学与技术(可...
    • 411 篇 控制科学与工程
    • 382 篇 光学工程
    • 294 篇 生物医学工程(可授...
    • 282 篇 机械工程
    • 256 篇 化学工程与技术
    • 201 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 132 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 108 篇 交通运输工程
  • 2,190 篇 理学
    • 1,184 篇 数学
    • 655 篇 物理学
    • 521 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 269 篇 化学
    • 166 篇 系统科学
  • 1,057 篇 管理学
    • 563 篇 图书情报与档案管...
    • 536 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 246 篇 医学
    • 209 篇 临床医学
    • 185 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 149 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 77 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 258 篇 feature extracti...
  • 235 篇 semantics
  • 165 篇 training
  • 130 篇 accuracy
  • 121 篇 computational mo...
  • 105 篇 deep learning
  • 105 篇 convolution
  • 86 篇 data mining
  • 82 篇 image segmentati...
  • 77 篇 object detection
  • 77 篇 visualization
  • 76 篇 data models
  • 71 篇 robustness
  • 69 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 60 篇 face recognition
  • 59 篇 contrastive lear...
  • 58 篇 federated learni...

机构

  • 208 篇 shandong provinc...
  • 187 篇 key laboratory o...
  • 185 篇 hubei province k...
  • 142 篇 key laboratory o...
  • 141 篇 school of inform...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 87 篇 shandong provinc...
  • 74 篇 national key lab...
  • 73 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 65 篇 school of comput...
  • 62 篇 shanghai key lab...
  • 59 篇 shanghai key lab...
  • 56 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 55 篇 huang qingming
  • 53 篇 li zhaohui
  • 52 篇 zhaohui li
  • 45 篇 zhang fuquan
  • 44 篇 li chenglong
  • 35 篇 tang jin
  • 32 篇 li wei
  • 31 篇 guo di
  • 31 篇 fan li
  • 30 篇 zuoyong li
  • 30 篇 boxin shi
  • 30 篇 shen linlin
  • 29 篇 wang wei
  • 28 篇 feng rui
  • 26 篇 wang xiao
  • 26 篇 yang zhiyong
  • 25 篇 liu yang
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,594 篇 英文
  • 246 篇 其他
  • 143 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology"
5975 条 记 录,以下是351-360 订阅
排序:
A English Pronunciation Error Detection and Quality Evaluation Model Based on English Text  4
A English Pronunciation Error Detection and Quality Evaluati...
收藏 引用
4th International Symposium on computer Engineering and Intelligent Communications, ISCEIC 2023
作者: Guo, Qingkai Huang, Guimin Lin, Jianxing Zhou, Ya Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology School of Computer Science and Information Security Guilin541004 China
In English learning, speaking practice is crucial, but traditional classroom teaching can hardly meet the needs of most learners. In this paper, we investigate and improve the two essential techniques of pronunciation... 详细信息
来源: 评论
Spatio-Temporal Context Modeling for Road Obstacle Detection  1
收藏 引用
4th International Conference on Machine Learning for Cyber Security, ML4CS 2022
作者: Wu, Xiuen Wang, Tao Liang, Lingyu Li, Zuoyong Ching, Fum Yew College of Computer and Data Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350108 China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University Wuyishan354300 China School of Electronic and Information Engineering South China University of Technology Guangzhou510641 China Ministry of Education Key Laboratory of Computer Network and Information Integration Southeast University Nanjing211189 China Guangzhou510320 China Penang11800 Malaysia
Road obstacle detection is an important problem for vehicle driving safety. In this paper, we aim to obtain robust road obstacle detection based on spatio-temporal context modeling. Firstly, a data-driven spatial cont... 详细信息
来源: 评论
A New Image Encryption Strategy Based on Arnold Transformation and Logistic Map  11th
A New Image Encryption Strategy Based on Arnold Transformati...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Sun, Xiyu Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Aiming at the problem of digital image encryption, an image encryption algorithm is proposed. The algorithm is divided into preparation stage and permutation diffusion stage. In the preparation stage, Arnold algorithm... 详细信息
来源: 评论
Brainnetformer: Decoding Brain Cognitive States with Spatial-Temporal Cross Attention  48
Brainnetformer: Decoding Brain Cognitive States with Spatial...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Sheng, Leheng Wang, Wenhan Shi, Zhiyi Zhan, Jichao Kong, Youyong Southeast University Chien-Shiung Wu College China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Learning about the cognitive state of the brain has always been a popular topic. Based on the fact that fluctuations of brain signals and functional connectome (FC) relate to specific human behaviors, deep learning ba... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and Applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
A new S-box construction method meeting strict avalanche criterion
A new S-box construction method meeting strict avalanche cri...
收藏 引用
作者: Li, Lang Liu, Jinggen Guo, Ying Liu, Botao College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
S-box is the main security component in lightweight block ciphers. Finding new algorithms and technical applications to generate S-box is still a current research topic. We proposed an S-box construction method that s... 详细信息
来源: 评论
Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM
收藏 引用
Tsinghua Science and technology 2025年 第1期30卷 68-86页
作者: Yahang Qin Zhenni Li Shengli Xie Bo Li Ming Liu Victor Kuzin School of Automation Guangdong University of Technologyand also with Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete ManufacturingGuangzhou 510006China School of Automation Guangdong University of TechnologyGuangdong Key Laboratory of IoT Information TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Key Laboratory of Intelligent Information Processing and System Integration of IoTMinistry of EducationGuangzhou 510006China Department of Electronic and Computer Engineering Hong Kong University of Science and TechnologHong Kong 999077China Academician of Russian Engineering Academy Moscow Moscow 125009Russia
Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite System(BDS).However,most existing approaches to this issue involve supervi... 详细信息
来源: 评论
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag Transformation and DNA Coding  12th
Hyperchaotic Image Encryption Algorithm Based on BD-Zigzag T...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: Wang, Lujie Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For the features of Zigzag transformation, a Bidirectional Deformed Zigzag (BD-Zigzag) transformation is proposed in this paper, which starts from both sides of the diagonal and crosses in both directions. This method... 详细信息
来源: 评论
A New Encryption Scheme Based on RSA Encryption Algorithm and Chen Chaotic System  12th
A New Encryption Scheme Based on RSA Encryption Algorithm an...
收藏 引用
12th International Conference on computer Engineering and Networks, CENet 2022
作者: He, Chenchen Chen, Zhong College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
Nowadays the security of images is obviously more important. Some scholars have applied Rivest-Shamir-Adleman (RSA) algorithm and Chen chaotic system to image encryption. However, the application of the two methods in... 详细信息
来源: 评论
SSD object detection algorithm based on knowledge map
收藏 引用
International Journal of Wireless and Mobile Computing 2024年 第2期27卷 152-160页
作者: Huang, Li Wang, Xiaofeng Lu, Jianhua Hu, Wei Zhang, Changrong College of Computer Science and Technology Wuhan University of Science and Technology Hubei Wuhan China China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Hubei Wuhan China Key Laboratory of Metallurgical Equipment and Control Technology of the Ministry of Education Wuhan University of Science and Technology Hubei Wuhan China Precision Manufacturing Research Institute Research Centre for Biomimetic Robot and Intelligent Measurement and Control Wuhan University of Science and Technology Hubei Wuhan China
With the pervasive integration of artificial intelligence into all aspects of human life, talent emerges as a primary resource. Upon analysing the current state of talent training in higher education institutions, iss... 详细信息
来源: 评论