咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 466 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 944 篇 工学
    • 697 篇 计算机科学与技术...
    • 579 篇 软件工程
    • 252 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 101 篇 生物工程
    • 98 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 81 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 30 篇 交通运输工程
    • 24 篇 材料科学与工程(可...
  • 451 篇 理学
    • 243 篇 数学
    • 113 篇 生物学
    • 112 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 248 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 29 篇 training
  • 28 篇 accuracy
  • 27 篇 deep learning
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 20 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 103 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,216 篇 英文
  • 64 篇 其他
  • 34 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1313 条 记 录,以下是331-340 订阅
排序:
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
A Community Detection Approach for Academic Social Network: The Case of the Cross-Strait Academic Conference Network  3
A Community Detection Approach for Academic Social Network: ...
收藏 引用
3rd International Conference on Electronics, Communications and information technology, CECIT 2022
作者: Zhang, Xinxin Xu, Li Gao, Min Fan, Jianxi Sun, Hung-Min Fujian Normal University College of Computer and Cyber Security Fujian Provincial Key Laboratory of Network Security and Cryptology Fuzhou China Fudan University The School of Computer Science Shanghai China Soochow University The School of Computer Science and Technology Suzhou China National Tsing Hua University The Department of Computer Science Hsinchu Taiwan
With the fast development of information networks, academic social network analysis has attracted significant attention, we regard these researchers sharing common interests as a research community. The community has ... 详细信息
来源: 评论
Theme-Based Literature Analysis in the Field of Transportation  16th
Theme-Based Literature Analysis in the Field of Transportati...
收藏 引用
16th International Conference on Intelligent information Hiding and Multimedia Signal processing, IIH-MSP 2020 in conjunction with the 13th International Conference on Frontiers of information technology, Applications and Tools, FITAT 2020
作者: Zhang, Sifan Lu, Hao Zhang, Fuquan Zhu, Yifan Wang, Rongrong Computer School Beijing Institute of Technology Beijing10089 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Min-Jiang University Fuzhou350121 China
Transportation is an important research field of engineering science, and its related research covers multiple fields and links in policies, methods, technologies, and applications. In order to sort out the research c... 详细信息
来源: 评论
A Triangular Stable Node Network based on Self-supervised Learning for personalized prediction
A Triangular Stable Node Network based on Self-supervised Le...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal processing, ICASSP 2025
作者: Liu, Qing Gao, Qian Fan, Jun Zhang, Zhiqiang Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Jinan250014 China Shandong Engineering Research Center of Big Data Applied Technology Faculty of Computer Science and Technology Qilu University of Technology Shandong Academy of Sciences Jinan250353 China Shandong Provincial Key Laboratory of Industrial Network and Information System Security Shandong Fundamental Research Center for Computer Science Jinan250014 China China Telecom Digital Intelligence Techonology Co Ltd. No.1999 Shunhua road Shandong Jinan250101 China
In recent years, research has illuminated the potency of implicit data processing in enhancing user preferences. Nevertheless, barriers remain in breaking through the constraints of implicit information. This study ai... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ... 详细信息
来源: 评论
Attention Residual Network for White Blood Cell Classification with WGAN Data Augmentation  11
Attention Residual Network for White Blood Cell Classificati...
收藏 引用
11th International Conference on information technology in Medicine and Education, ITME 2021
作者: Zhao, Meng Jin, Lingmin Teng, Shenghua Li, Zuoyong College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control College of Computer and Control Engineering Minjiang University Fuzhou China
In medicine, white blood cell (WBC) classification plays an important role in clinical diagnosis and treatment. Due to the similarity between classes and lack of training data, the precise classification of WBC is sti... 详细信息
来源: 评论
Fine Classification Method of Product Image Based on Multi-Level Convolutional Neural Networks  2
Fine Classification Method of Product Image Based on Multi-L...
收藏 引用
2nd Asia Symposium on Signal processing, ASSP 2021
作者: Jin, Xuesong Du, Xin Han, Xiaowei Sun, Huadong Li, Jing School of Computer And Information Engineering Harbin University of Commerce Harbin China Heilongjiang Provincial Key Laboratory of Electronic Commerce And Information Processing Harbin University of Commerce Harbin China
To improve the classification accuracy of e-commerce product images, a classification method for multi-category product images is proposed. The classification method is based on Convolutional Neural Networks, imitatin... 详细信息
来源: 评论
Parallel Pattern Matching over Brotli Compressed Network Traffic
Parallel Pattern Matching over Brotli Compressed Network Tra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Xiuwen Sun Guangzheng Zhang Di Wu Qingying Yu Jie Cui Hong Zhong School of Computer Science and Technology Anhui University Anhui Provincial Key Laboratory of Network and Information Security Anhui Normal Unviersity
Pattern matching is a crucial technique for network traffic detection applications. As a fundamental computation model used by pattern matching, the finite state automata execute sequential matching due to the state d... 详细信息
来源: 评论
ALCencryption:A Secure and Efficient Algorithm for Medical Image Encryption
收藏 引用
computer Modeling in Engineering & Sciences 2020年 第12期125卷 1083-1100页
作者: Jiao Ge College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
With the rapid development of medical informatization and the popularization of digital imaging equipment,DICOM images contain the personal privacy of patients,and there are security risks in the process of storage an... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论