咨询与建议

限定检索结果

文献类型

  • 3,442 篇 会议
  • 2,461 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,904 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,952 篇 工学
    • 2,713 篇 计算机科学与技术...
    • 2,260 篇 软件工程
    • 1,014 篇 信息与通信工程
    • 480 篇 电气工程
    • 470 篇 生物工程
    • 422 篇 电子科学与技术(可...
    • 400 篇 控制科学与工程
    • 379 篇 光学工程
    • 297 篇 生物医学工程(可授...
    • 284 篇 机械工程
    • 264 篇 化学工程与技术
    • 204 篇 仪器科学与技术
    • 137 篇 材料科学与工程(可...
    • 135 篇 动力工程及工程热...
    • 133 篇 网络空间安全
    • 108 篇 建筑学
    • 107 篇 交通运输工程
  • 2,182 篇 理学
    • 1,181 篇 数学
    • 652 篇 物理学
    • 524 篇 生物学
    • 364 篇 统计学(可授理学、...
    • 271 篇 化学
    • 168 篇 系统科学
  • 1,053 篇 管理学
    • 557 篇 图书情报与档案管...
    • 537 篇 管理科学与工程(可...
    • 192 篇 工商管理
  • 247 篇 医学
    • 212 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 150 篇 法学
    • 117 篇 社会学
  • 83 篇 教育学
  • 75 篇 农学
  • 53 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 257 篇 feature extracti...
  • 235 篇 semantics
  • 165 篇 training
  • 126 篇 accuracy
  • 121 篇 computational mo...
  • 103 篇 convolution
  • 102 篇 deep learning
  • 88 篇 data mining
  • 81 篇 image segmentati...
  • 77 篇 object detection
  • 77 篇 visualization
  • 77 篇 data models
  • 73 篇 convolutional ne...
  • 71 篇 robustness
  • 68 篇 optimization
  • 66 篇 predictive model...
  • 63 篇 neural networks
  • 60 篇 contrastive lear...
  • 58 篇 face recognition
  • 55 篇 support vector m...

机构

  • 207 篇 shandong provinc...
  • 187 篇 hubei province k...
  • 183 篇 key laboratory o...
  • 145 篇 school of inform...
  • 141 篇 key laboratory o...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 105 篇 provincial key l...
  • 101 篇 fujian provincia...
  • 89 篇 shandong provinc...
  • 75 篇 shandong provinc...
  • 73 篇 national key lab...
  • 70 篇 university of ch...
  • 69 篇 peng cheng labor...
  • 64 篇 school of comput...
  • 60 篇 shanghai key lab...
  • 59 篇 shanghai key lab...
  • 55 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 51 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 57 篇 li zhaohui
  • 55 篇 huang qingming
  • 51 篇 zhaohui li
  • 42 篇 zhang fuquan
  • 41 篇 li chenglong
  • 34 篇 li wei
  • 32 篇 fan li
  • 30 篇 guo di
  • 30 篇 tang jin
  • 29 篇 zuoyong li
  • 29 篇 boxin shi
  • 29 篇 wang wei
  • 29 篇 shen linlin
  • 27 篇 feng rui
  • 26 篇 liu yang
  • 26 篇 yang zhiyong
  • 25 篇 he liang
  • 24 篇 wang xiao
  • 24 篇 gao guanglai

语言

  • 5,547 篇 英文
  • 220 篇 其他
  • 144 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 意大利文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology"
5904 条 记 录,以下是61-70 订阅
排序:
Plasmonic nano-disc-shaped optical fiber probe
收藏 引用
Optics and Laser technology 2025年 188卷
作者: Wu, Wenjie Ni, Haibin Cai, Tong Rong, Taimin Han, Jiansheng Wang, Yajie Ye, Sheng Ni, Bo Ge, Yixian Lu, Linlin Chang, Jianhua Jiangsu Provincial Key Laboratory of Meteorological Observation and Information Processing School of Electronics and Information Engineering Nanjing University of Information Science and Technology Nanjing210044 China
Miniature plasmonic fiber probes hold vast potential in nanophotonics and label-free biosensing. However, their further use and development are hindered by complex fabrication processes. Therefore, developing low-cost... 详细信息
来源: 评论
Fully Distributed Model-Free Adaptive Sliding Mode Control for MASs With Hybrid-Attacked Topology
收藏 引用
IEEE Transactions on Automation Science and Engineering 2025年 22卷 12336-12346页
作者: Duan, Shitao Chen, Guangdeng Zhou, Qi Li, Hongyi Huang, Tingwen Guangdong University of Technology School of Automation Guangdong-Hong Kong Joint Laboratory for Intelligent Decision and Cooperative Control Guangdong Provincial Key Laboratory for Intelligent Decision and Cooperative Control Guangzhou510006 China Southwest University College of Electronic and Information Engineering Chongqing400715 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
A fully distributed model-free adaptive sliding mode control (MFASMC) strategy is proposed in this paper for unknown nonlinear multi-agent systems (MASs), in which topology networks are exposed to hybrid attacks consi... 详细信息
来源: 评论
Optimization algorithm for global k-means algorithm  13
Optimization algorithm for global k-means algorithm
收藏 引用
13th International Conference on Intelligent Control and information processing, ICICIP 2025
作者: Li, Sen Li, Fang Luo, Xiaonan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
The k-means method is widely utilized for clustering. Its simplicity, efficacy, and swiftness make it a favored choice among clustering algorithms. It faces the challenge of sensitivity to the initial class center. Th... 详细信息
来源: 评论
A Holistic Evaluation of Piano Sound Quality  10th
A Holistic Evaluation of Piano Sound Quality
收藏 引用
10th Conference on Sound and Music technology, CSMT 2023
作者: Zhou, Monan Wu, Shangda Ji, Shaohua Li, Zijin Li, Wei Central Conservatory of Music Beijing China School of Computer Science and Technology Fudan University Shanghai200438 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai200433 China
This paper aims to develop a holistic evaluation method for piano sound quality to assist in purchasing decisions. Unlike previous studies that focused on the effect of piano performance techniques on sound quality, t... 详细信息
来源: 评论
Tomato Leaf Disease Identification and Growth Dataset Augmentation Based on UAE-GAN  13
Tomato Leaf Disease Identification and Growth Dataset Augmen...
收藏 引用
13th International Conference on Intelligent Control and information processing, ICICIP 2025
作者: Li, Xin Li, Fang Luo, Xiaonan School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China Guilin541004 China Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin541004 China
To delve into the characterization of growth disorders in different crops, it is important to support the model with a large amount of image data that includes a variety of disease types and disease levels to capture ... 详细信息
来源: 评论
A Stronger Leakage Model Based on Conditional Generative Adversarial Networks for Correlation Power Analysis
收藏 引用
International Journal of Circuit Theory and Applications 2025年 第0期
作者: Tang, Cheng Li, Lang Ou, Yu College of Computer Science and Technology Hengyang Normal University Hengyang China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang China
Deep learning-based side-channel attacks (DL-SCA) have attracted widespread attention in recent years, and most of the researchers are devoted to finding the optimal DL-SCA method. At the same time, traditional SCA me... 详细信息
来源: 评论
Non-Line-of-Sight Multipath Classification Method for BDS Using Convolutional Sparse Autoencoder with LSTM
收藏 引用
Tsinghua Science and technology 2025年 第1期30卷 68-86页
作者: Yahang Qin Zhenni Li Shengli Xie Bo Li Ming Liu Victor Kuzin School of Automation Guangdong University of Technologyand also with Guangdong-Hong Kong-Macao Joint Laboratory for Smart Discrete ManufacturingGuangzhou 510006China School of Automation Guangdong University of TechnologyGuangdong Key Laboratory of IoT Information TechnologyGuangzhou 510006China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Key Laboratory of Intelligent Information Processing and System Integration of IoTMinistry of EducationGuangzhou 510006China Department of Electronic and Computer Engineering Hong Kong University of Science and TechnologHong Kong 999077China Academician of Russian Engineering Academy Moscow Moscow 125009Russia
Multipath signal recognition is crucial to the ability to provide high-precision absolute-position services by the BeiDou Navigation Satellite System(BDS).However,most existing approaches to this issue involve supervi... 详细信息
来源: 评论
TSGFormer: temporal-aware network and spatial encoding GCN for three-dimensional human pose estimation
收藏 引用
Multimedia Systems 2025年 第3期31卷 1-19页
作者: Xiao, Xinwang Zhao, Huihuang Li, Yuhang Tang, Peng Deng, Yue College of Computer Science and Technology Hengyang Normal University Hengyang421008 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Hengyang421008 China
Transformer-based approaches have significantly driven recent progress in three-dimensional human pose estimation. However, existing transformer-based approaches are still deficient in capturing localized features, an... 详细信息
来源: 评论
Adaptive Occlusion Face Recognition Feature Fusion Network Based on Precise Guidance Mask Extraction
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2025年 1-12页
作者: Ye, Jihua Zhang, Lei Wang, Chao Tu, Qixuan Zheng, Rehua Huang, Huiyuan Jiang, Aiwen School of Computer and Information Engineering Jiangxi Normal University Nanchang330022 China Jiangxi Provincial Key Laboratory for High Performance Computing Jiangxi Normal University Nanchang330022 China State International Science & Technology Cooperation Base of Networked Supporting Software Jiangxi Normal University Nanchang330022 China
The uncertainty in the position and size of occluding objects greatly affects the extraction of identity features in facial recognition, which is a challenge that existing methods fail to effectively address. To tackl... 详细信息
来源: 评论
Detection of Perfect Stealthy Attacks on Cyber-Physical Systems Subject to Measurement Quantizations: A Watermark-Based Strategy
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2025年 第1期12卷 114-125页
作者: Yu-Ang Wang Zidong Wang Lei Zou Bo Shen Hongli Dong the College of Information Science and Technology Donghua University the Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of Education IEEE the College of Electrical Engineering and Automation Shandong University of Science and Technology the Department of Computer Science Brunel University London Uxbridge the Sanya Offshore Oil and Gas Research Institute Northeast Petroleum University the Artificial Intelligence Energy Research Institute Northeast Petroleum University Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum University
In this paper, the attack detection problem is investigated for a class of closed-loop systems subjected to unknownbutbounded noises in the presence of stealthy attacks. The measurement outputs from the sensors are qu... 详细信息
来源: 评论