咨询与建议

限定检索结果

文献类型

  • 825 篇 会议
  • 463 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,289 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 926 篇 工学
    • 680 篇 计算机科学与技术...
    • 562 篇 软件工程
    • 253 篇 信息与通信工程
    • 106 篇 控制科学与工程
    • 100 篇 生物工程
    • 98 篇 电气工程
    • 83 篇 电子科学与技术(可...
    • 79 篇 光学工程
    • 64 篇 生物医学工程(可授...
    • 60 篇 机械工程
    • 37 篇 化学工程与技术
    • 34 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 30 篇 交通运输工程
    • 23 篇 材料科学与工程(可...
  • 444 篇 理学
    • 240 篇 数学
    • 112 篇 生物学
    • 108 篇 物理学
    • 65 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 243 篇 管理学
    • 140 篇 管理科学与工程(可...
    • 110 篇 图书情报与档案管...
    • 41 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 44 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 34 篇 法学
    • 30 篇 社会学
  • 26 篇 农学
  • 16 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 29 篇 training
  • 28 篇 accuracy
  • 27 篇 deep learning
  • 26 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 21 篇 object detection
  • 19 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 visualization
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 53 篇 key laboratory o...
  • 51 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 20 篇 guangdong provin...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 17 篇 school of comput...
  • 17 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 61 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 17 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 shen linlin
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo
  • 11 篇 wang tao

语言

  • 1,211 篇 英文
  • 46 篇 其他
  • 32 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1289 条 记 录,以下是1-10 订阅
排序:
Probabilistic fault diagnosis of clustered faults for multiprocessor systems
收藏 引用
Journal of computer Science & technology 2023年 第4期38卷 821-833页
作者: 孙雪丽 樊建席 程宝雷 王岩 张力 School of Computer Science and Technology Soochow UniversitySuzhou 215006China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China
With the development of high-performance computing and the expansion of large-scale multiprocessor sys-tems,it is significant to study the reliability of *** fault diagnosis is of practical value to the reliabilityana... 详细信息
来源: 评论
DECTNet: A detail enhanced CNN-Transformer network for single-image deraining
Cognitive Robotics
收藏 引用
Cognitive Robotics 2025年 5卷 48-60页
作者: Wang, Liping Gao, Guangwei Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
Recently, Convolutional Neural Networks (CNN) and Transformers have been widely adopted in image restoration tasks. While CNNs are highly effective at extracting local information, they struggle to capture global cont... 详细信息
来源: 评论
Attention-assisted dual-branch interactive face super-resolution network
Cognitive Robotics
收藏 引用
Cognitive Robotics 2025年 5卷 77-85页
作者: Wan, Xujie Xu, Siyu Gao, Guangwei Institute of Advanced Technology Nanjing University of Posts and Telecommunications Nanjing China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
We propose a deep learning-based Attention-Assisted Dual-Branch Interactive Network (ADBINet) to improve facial super-resolution by addressing key challenges like inadequate feature extraction and poor multi-scale inf... 详细信息
来源: 评论
Multiuser Computation Offloading for Long-Term Sequential Tasks in Mobile Edge Computing Environments
收藏 引用
Tsinghua Science and technology 2023年 第1期28卷 93-104页
作者: Huanhuan Xu Jingya Zhou Wenqi Wei Baolei Cheng School of Computer Science and Technology Soochow UniversitySuzhou 215006China State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi 214125China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou 215006China School of Computer Science Georgia Institute of TechnologyAtlantaGA 30332USA
Mobile edge computing has shown its potential in serving emerging latency-sensitive mobile applications in ultra-dense 5G networks via offloading computation workloads from the remote cloud data center to the nearby n... 详细信息
来源: 评论
HRAM-VITON: High-Resolution Virtual Try-On with Attention Mechanism
收藏 引用
computers, Materials & Continua 2025年 第2期82卷 2753-2768页
作者: Yue Chen Xiaoman Liang Mugang Lin Fachao Zhang Huihuang Zhao College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The objective of image-based virtual try-on is to seamlessly integrate clothing onto a target image, generating a realistic representation of the character in the specified attire. However, existing virtual try-on met... 详细信息
来源: 评论
A Novel Stacked Network Method for Enhancing the Performance of Side-Channel Attacks
收藏 引用
computers, Materials & Continua 2025年 第4期83卷 1001-1022页
作者: Zhicheng Yin Lang Li Yu Ou College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application HengyangNormal UniversityHengyang421002China
The adoption of deep learning-based side-channel analysis(DL-SCA)is crucial for leak detection in secure *** previous studies have applied this method to break targets protected with *** the increasing number of studi... 详细信息
来源: 评论
Fusion of data dimensionality reduction algorithms baced on category representation theory  4
Fusion of data dimensionality reduction algorithms baced on ...
收藏 引用
4th International Conference on computer Vision, Application, and Algorithm, CVAA 2024
作者: Xu, Xiaoxiang Li, Fanzhang Zhang, Li School of Computer Science and Technology Joint International Research Laboratory of Machine Learning and Neuromorphic Computing Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou China
For a long time, people have believed that representation problems are one of the bottlenecks in the field of machine learning. Therefore, it is a long-term and exploratory work to study machine learning representatio... 详细信息
来源: 评论
Learning Unbiased Rewards with Mutual information in Adversarial Imitation Learning  48
Learning Unbiased Rewards with Mutual Information in Adversa...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Zhang, Lihua Liu, Quan Huang, Zhigang Wu, Lan Soochow University School of Computer Science and Technology Suzhou China Soochow University Provincial Key Laboratory for Computer Information Processing Technology Suzhou China
A powerful method for automated decision systems is Adversarial Imitation Learning (AIL). It is based on a generative adversarial framework that alternately optimizes a generator (learner) and a discriminator (reward ... 详细信息
来源: 评论
A Perturbation-Based Policy Distillation Framework with Generative Adversarial Nets  48
A Perturbation-Based Policy Distillation Framework with Gene...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Zhang, Lihua Liu, Quan Zhang, Xiongzhen Xu, Yapeng Soochow University School of Computer Science and Technology Suzhou China Soochow University Provincial Key Laboratory for Computer Information Processing Technology Suzhou China
We study the problem of imitation learning in automated decision systems, in which a learner is trained to imitate an expert demonstrator. A widely used method is adversarial imitation learning that alternately optimi... 详细信息
来源: 评论
Side-Channel Leakage Analysis of Inner Product Masking
收藏 引用
computers, Materials & Continua 2024年 第4期79卷 1245-1262页
作者: Yuyuan Li Lang Li Yu Ou College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal UniversityHengyang421002China
The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher... 详细信息
来源: 评论