咨询与建议

限定检索结果

文献类型

  • 851 篇 会议
  • 456 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,308 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 934 篇 工学
    • 693 篇 计算机科学与技术...
    • 572 篇 软件工程
    • 248 篇 信息与通信工程
    • 111 篇 控制科学与工程
    • 101 篇 生物工程
    • 96 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 78 篇 光学工程
    • 65 篇 生物医学工程(可授...
    • 62 篇 机械工程
    • 37 篇 化学工程与技术
    • 35 篇 仪器科学与技术
    • 33 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 29 篇 交通运输工程
    • 22 篇 材料科学与工程(可...
  • 446 篇 理学
    • 241 篇 数学
    • 113 篇 生物学
    • 110 篇 物理学
    • 64 篇 统计学(可授理学、...
    • 42 篇 化学
    • 35 篇 系统科学
  • 246 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 51 篇 临床医学
    • 42 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 38 篇 semantics
  • 31 篇 training
  • 30 篇 convolution
  • 30 篇 accuracy
  • 28 篇 deep learning
  • 28 篇 computational mo...
  • 26 篇 image segmentati...
  • 25 篇 data mining
  • 24 篇 speech processin...
  • 23 篇 signal processin...
  • 20 篇 object detection
  • 20 篇 optimization
  • 20 篇 convolutional ne...
  • 18 篇 information proc...
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 robustness
  • 15 篇 visualization
  • 14 篇 computer science

机构

  • 104 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 59 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 fujian provincia...
  • 43 篇 shandong provinc...
  • 43 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 27 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 23 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 17 篇 shandong provinc...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 jiao ge
  • 12 篇 xu lin
  • 12 篇 jiang feibo
  • 11 篇 li chenglong

语言

  • 1,146 篇 英文
  • 128 篇 其他
  • 40 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1308 条 记 录,以下是921-930 订阅
排序:
Cross-domain attribute representation based on convolutional neural network*
arXiv
收藏 引用
arXiv 2018年
作者: Zhang, Guohui Liang, Gaoyuan Su, Fang Qu, Fanxin Wang, Jing-Yan Huawei Technologies Co. Ltd. Shanghai China Jiangsu University of Technology Jiangsu213001 China Shaanxi University of Science & Technology Xi’an China Northwestern Polytechnical University Xi’an China Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China
In the problem of domain transfer learning, we learn a model for the prediction in a target domain from the data of both some source domains and the target domain, where the target domain is in lack of labels while th... 详细信息
来源: 评论
A novel supervised bimodal emotion recognition approach based on facial expression and body gesture
A novel supervised bimodal emotion recognition approach base...
收藏 引用
作者: Yan, Jingjie Lu, Guanming Bai, Xiaodong Li, Haibo Sun, Ning Liang, Ruiyu Jiangsu Provincial Key Laboratory of Image Processing and Image Communication College of Telecommunications and Information Engineering Nanjing University of Posts and Telecommunications Nanjing210003 China Engineering Research Center of Wide Band Wireless Communication Technology Nanjing University of Posts and Telecommunications Nanjing211167 China School of Communication Engineering Nanjing Institute of Technology Nanjing211167 China
In this letter, we propose a supervised bimodal emotion recognition approach based on two important human emotion modalities including facial expression and body gesture. A effectively supervised feature fusion algori... 详细信息
来源: 评论
FPGA optimal implementation of PRINCE against power analysis attacks  5
FPGA optimal implementation of PRINCE against power analysis...
收藏 引用
5th International Conference on information Science and Cloud Computing, ISCC 2017
作者: Zou, Yi Li, Lang College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the IoT. It's studied to achieve the optimal implementation of PRINCE encryp... 详细信息
来源: 评论
Web server security evaluation method based on multi-source data
Web server security evaluation method based on multi-source ...
收藏 引用
International Conference on Cloud Computing, Big Data and Blockchain (ICCBB)
作者: Kedong Wu Xiaoling Gao Yanhua Liu Provincial Key Laboratory of Network Computing and Intelligent Information Processing College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian Fujian Fuzhou Fujian China
Traditional web security assessments are evaluated using a single data source, and the results of the calculations from different data sources are different. Based on multi-source data, this paper uses Analytic Hierar... 详细信息
来源: 评论
A Dynamic Community Detection Algorithm Based on Parallel Incremental Related Vertices  2
A Dynamic Community Detection Algorithm Based on Parallel In...
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Guohui Li Kun Guo YuZhong Chen Ling Wu Danhong Zhu College of Mathematics and Computer Sciences Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University) Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education
One of the traditional ways for detecting dynamic communities is to find the communities at each interval through the static community detection ***,it usually leads to high computation *** this paper,a novel algorith... 详细信息
来源: 评论
A Generation Method of Automation Test Cases Based on Android
A Generation Method of Automation Test Cases Based on Androi...
收藏 引用
2017 5th International Conference on Machinery,Materials and Computing technology(ICMMCT 2017)
作者: Ming Zhang Baolei Cheng Weizhong Zha Jiwen Yang School of Computer Science and Technology Soochow University Provincial Key Laboratory for Computer Information Processing Technology
Aiming at the problems that complex testing process, incomplete testing and poor reusability of test cases for Android automated testing methods, we propose a generation method of automation test cases based on contro... 详细信息
来源: 评论
Research on power attack comprehensive experiment platform based on SAKURA -G hardware circuit  7
Research on power attack comprehensive experiment platform b...
收藏 引用
7th International Conference on computer Engineering and Networks, CENet 2017
作者: Jiao, Ge Li, Lang Zou, Yi College of Computer Science and Technology Hengyang Normal UniversityHunan Provincial Engineering Laboratory for Technology of Traditional Settlements Digitalization Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Hunan421002 China
The power attack of the hardware circuit is going through the steps of algorithm writen in FPGA, power consumption, data processing and analysis. In order to solve the problem of the existing power attack experimental... 详细信息
来源: 评论
Modelling of synchronisation and energy performance of FBE- and LBE-based standalone LTE-U networks
收藏 引用
Journal of Engineering 2017年 第7期2017卷 292-299页
作者: Li, Jiamin Shan, Hangguan Huang, Aiping Yuan, Jiantao Cai, Lin X. Zhejiang Provincial Key Laboratory of Information Processing and Communication Networks Hangzhou China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago United States
Without the aid of licensed channel, deploying long-term evolution (LTE) networks over unlicensed spectrum (named standalone LTE-U networks) faces the difficulty of establishing and maintaining synchronisation between... 详细信息
来源: 评论
Application of Deep Learning in Software Security Detection
Application of Deep Learning in Software Security Detection
收藏 引用
2018 International Conference on Computational Science and Engineering(ICCSE 2018)
作者: Lin Li Ying Ding Jiacheng Mao College of Computer Science and Technology Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System
Machine learning is knowledge of learning rules from data through computational models and algorithms. It has been applied in various fields that require mining rules from complex data, and has become one of the most ... 详细信息
来源: 评论
Research on the key technology of Safety Protection in Application Environment of Blockchain
收藏 引用
IOP Conference Series: Materials Science and Engineering 2019年 第3期569卷
作者: Hua Zhang Jiong Wang Ge Xu Zhiqiang Ruan College of Computer and Control Engineering Mmjiang University Fuzhou 350108 china Fujian Provincial Key Laboratory of Information Processing and Intelligent Control (Minjiang University)
This paper analyzes the current situation of blockchain application security. Then, makes a concrete analysis on the problems existing in the application safety of blockchain, including the attack of consensus algorit...
来源: 评论