咨询与建议

限定检索结果

文献类型

  • 846 篇 会议
  • 466 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 1,313 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 944 篇 工学
    • 697 篇 计算机科学与技术...
    • 579 篇 软件工程
    • 252 篇 信息与通信工程
    • 112 篇 控制科学与工程
    • 101 篇 生物工程
    • 98 篇 电气工程
    • 84 篇 电子科学与技术(可...
    • 81 篇 光学工程
    • 66 篇 生物医学工程(可授...
    • 61 篇 机械工程
    • 37 篇 化学工程与技术
    • 36 篇 仪器科学与技术
    • 34 篇 安全科学与工程
    • 33 篇 网络空间安全
    • 32 篇 动力工程及工程热...
    • 30 篇 交通运输工程
    • 24 篇 材料科学与工程(可...
  • 451 篇 理学
    • 243 篇 数学
    • 113 篇 生物学
    • 112 篇 物理学
    • 66 篇 统计学(可授理学、...
    • 42 篇 化学
    • 36 篇 系统科学
  • 248 篇 管理学
    • 143 篇 管理科学与工程(可...
    • 112 篇 图书情报与档案管...
    • 42 篇 工商管理
  • 59 篇 医学
    • 50 篇 临床医学
    • 43 篇 基础医学(可授医学...
    • 29 篇 药学(可授医学、理...
  • 35 篇 法学
    • 31 篇 社会学
  • 25 篇 农学
  • 17 篇 教育学
  • 9 篇 经济学
  • 8 篇 文学
  • 7 篇 军事学
  • 5 篇 艺术学

主题

  • 68 篇 feature extracti...
  • 39 篇 semantics
  • 30 篇 convolution
  • 29 篇 training
  • 28 篇 accuracy
  • 27 篇 deep learning
  • 27 篇 image segmentati...
  • 24 篇 data mining
  • 24 篇 computational mo...
  • 23 篇 signal processin...
  • 23 篇 speech processin...
  • 22 篇 object detection
  • 20 篇 convolutional ne...
  • 18 篇 optimization
  • 17 篇 transformers
  • 17 篇 computer vision
  • 17 篇 information proc...
  • 15 篇 image reconstruc...
  • 14 篇 computer science
  • 14 篇 neural networks

机构

  • 103 篇 provincial key l...
  • 70 篇 fujian provincia...
  • 61 篇 school of comput...
  • 55 篇 key laboratory o...
  • 50 篇 college of compu...
  • 44 篇 shandong provinc...
  • 44 篇 fujian provincia...
  • 42 篇 hunan provincial...
  • 28 篇 hubei province k...
  • 28 篇 guangdong provin...
  • 26 篇 college of mathe...
  • 24 篇 college of compu...
  • 22 篇 provincial key l...
  • 22 篇 national enginee...
  • 19 篇 school of comput...
  • 18 篇 college of elect...
  • 18 篇 college of compu...
  • 18 篇 hunan provincial...
  • 18 篇 college of compu...
  • 16 篇 school of comput...

作者

  • 60 篇 li zuoyong
  • 37 篇 zhang fuquan
  • 24 篇 zuoyong li
  • 19 篇 fan haoyi
  • 18 篇 zhu qiaoming
  • 17 篇 yu fei
  • 17 篇 li lang
  • 16 篇 shen linlin
  • 16 篇 lang li
  • 14 篇 kong fang
  • 14 篇 gao guangwei
  • 14 篇 teng shenghua
  • 13 篇 chen yang
  • 13 篇 jiao ge
  • 13 篇 dong li
  • 12 篇 zhou guodong
  • 12 篇 wang jinbao
  • 12 篇 guohua lv
  • 12 篇 xu lin
  • 12 篇 jiang feibo

语言

  • 1,216 篇 英文
  • 64 篇 其他
  • 34 篇 中文
检索条件"机构=Provincial Key Laboratory for Computer Information Processing Technology Soochow University"
1313 条 记 录,以下是951-960 订阅
排序:
Research of simulation of creative stage scene based on the 3DGans technology
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2018年 第6期9卷 1430-1443页
作者: Zhang, Fuquan Ding, Gangyi Lin, Qing Xu, Lin Li, Zuoyong Li, Lijie Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University School of Computer Science & Technology Beijing Institute of Technology Room A9-301 Juyuan Jinshan JiyuanFuzhou350008 China School of Computer Science & Technology Beijing Institute of Technology Room 611 Software Building 5 South Zhongguancun Street Haidian Beijing100081 China College of Foreign Languages Minjiang University Room 303 Building A13 No. 15 Binzhou road Cangshan district JiyuanFuzhou350008 China Innovative Information Industry Research Institute Fujian Normal University Fuqing Brunch of Fujian Normal University Campus County No.1 Longjiang Road FuqingFuzhou350300 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University 200 Xi-yuan-gong Road Room B201 Administrative Building Minhou350121 China School of Computer Science & Technology Beijing Institute of Technology Room 613 Software Building 5 South Zhongguancun Street Haidian Beijing100081 China
Aiming to the feature of the modern stage scenery, combined with 3DGANs technology, we make research into the creation of creative stage scenes to rapidly display problem scene design, reduce the cost of stage design ... 详细信息
来源: 评论
Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage
Semantic keyword searchable proxy re-encryption for postquan...
收藏 引用
作者: Yang, Yang Zheng, Xianghan Chang, Victor Tang, Chunming College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Province University Key Laboratory of Information Security of Network Systems Fuzhou University Fuzhou350108 China Key Laboratory of Information Security School of Mathematics and Information Science Guangzhou University Guangzhou510006 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China IBSS Xian Jiaotong-Liverpool University Suzhou215123 United Kingdom
With the advent of cloud computing, more and more consumers prefer to use the cloud services with the pay-as-you-consume mode. The cloud storage brings about great convenience to users, who store data in cloud and acc... 详细信息
来源: 评论
Association rule analysis for tour route recommendation and application to WCTSNOP
Association rule analysis for tour route recommendation and ...
收藏 引用
ISPRS Geospatial Week 2017
作者: Fang, Hui Chen, Chongcheng Lin, Jiaxiang Liu, Xianfeng Fang, Dong Laboratory of Spatial Data Mining and Information Sharing of Ministry of Education Spatial Information Research Centre of Fujian Fuzhou University District Xueyuan Road China Dept. of Computer Science Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou University District Xiyuangong Road China College of Computer and Information Sciences Fujian Agriculture and Forestry University Fuzhou China Fuzhou Silviscene Information Technology Co. Ltd. China
The increasing E-tourism systems provide intelligent tour recommendation for tourists. In this sense, recommender system can make personalized suggestions and provide satisfied information associated with their tour c... 详细信息
来源: 评论
Learning convolutional neural network to maximize Pos@Top performance measure  25
Learning convolutional neural network to maximize Pos@Top pe...
收藏 引用
25th European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning, ESANN 2017
作者: Geng, Yanyan Liang, Ru-Ze Li, Weizhi Wang, Jingbin Liang, Gaoyuan Xu, Chenhao Wang, Jing-Yan Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China King Abdullah University of Science and Technology Thuwal23955 Saudi Arabia Suning Commerce RandD Center USA Inc. Palo AltoCA94304 United States Information Technology Service Center Intermediate People's Court of Linyi City Linyi China Jiangsu University of Technology Jiangsu213001 China New York University Abu Dhabi Abu Dhabi United Arab Emirates
In the machine learning problems, the performance measure is used to evaluate the machine learning models. Recently, the number positive data points ranked at the top positions (Pos@Top) has been a popular performance... 详细信息
来源: 评论
A new certificate-based aggregate signature scheme for wireless sensor networks
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2018年 第5期9卷 1264-1280页
作者: Chen, Jian-Neng Zou, Fu-Min Wu, Tsu-Yang Zhou, Yu-Ping College of computer Minnan Normal University ZhangzhouFujian363000 China Beidou Navigation and Smart Traffic Innovation Center of Fujian Province FuzhouFujian350008 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology China National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology FuzhouFujian350008 China College of Computer Science and Engineering Shandong University of Science and Technology QingdaoShandong266590 China Key Laboratory of Applied Mathematics Putian University Fujian Province University PutianFujian351100 China
Data transmission is one of the important basic technologies in wireless sensor networks (WSN). Due to the limited energy, storage capacity, computing power and communication ability of sensor nodes, the efficiency of... 详细信息
来源: 评论
FPGA Optimal Implementation of PRINCE against Power Analysis Attacks
FPGA Optimal Implementation of PRINCE against Power Analysis...
收藏 引用
ISCC 2017-the 5th International Conference on information Science and Cloud Computing
作者: Yi Zou Lang Li College of Computer Science and Technology Hengyang Normal University Hunan Provincial Key Laboratory of Intelligent Information Processing and Application College of Computer Science and Technology Hengyang Normal University
The algorithm PRINCE proposed in ASIACRYPT 2012 is a lightweight cipher, currently suitable for the implementation on RFID Smart Card of the Io T. It's studied to achieve the optimal implementation of PRINCE encry... 详细信息
来源: 评论
Research on Power Attack Comprehensive Experiment Platform Based on SAKURA-G Hardware Circuit
Research on Power Attack Comprehensive Experiment Platform B...
收藏 引用
CENet 2017-the 7th International Conference on computer Engineering and Networks
作者: Ge Jiao Lang Li Yi Zou College of Computer Science and Technology Hengyang Normal UniversityHunan Provincial Engineering Laboratory for Technology of Traditional Settlements DigitalizationHunan Provincial Key Laboratory of Intelligent Information Processing and Application College of Computer Science and Technology Hengyang Normal University
The power attack of the hardware circuit is going through the steps of algorithm writen in FPGA,power consumption,data processing and *** order to solve the problem of the existing power attack experimental platform b... 详细信息
来源: 评论
Variational neural machine translation
Variational neural machine translation
收藏 引用
2016 Conference on Empirical Methods in Natural Language processing, EMNLP 2016
作者: Zhang, Biao Xiong, Deyi Su, Jinsong Duan, Hong Zhang, Min Provincial Key Laboratory for Computer Information Processing Technology Soochow University Suzhou215006 China Xiamen University Xiamen361005 China
Models of neural machine translation are often from a discriminative family of encoder-decoders that learn a conditional distribution of a target sentence given a source sentence. In this paper, we propose a variation... 详细信息
来源: 评论
Comments on a privacy preserving public auditing mechanism for shared cloud data  17
Comments on a privacy preserving public auditing mechanism f...
收藏 引用
4th Multidisciplinary International Social Networks Conference, MISNC 2017
作者: Wu, Tsu-Yang Lin, Yueshan Wang, King-Hang Chen, Chien-Ming Pan, Jeng-Shyang Wu, Mu-En Fujian Provincial Key Laboratory of Big Data Mining and Applications National Demonstration Center for Experimental Electronic Information and Electrical Technology Education Fujian University of Technology Fuzhou350118 China Harbin Institute of Technology Shenzhen Graduate School Shenzhen518055 China Department of Computer Science and Engineering Hong Kong University of Science and Technology Hong Kong Department of Mathematic Soochow University Taipei Taiwan
Auditing mechanisms are received much attentions from researchers due to the developing of cloud storage. Recently, Wang et al. proposed a privacy preserving public auditing mechanism for shared cloud data with suppor... 详细信息
来源: 评论
Denoising of 3D magnetic resonance images using a residual encoder-decoder wasserstein generative adversarial network
arXiv
收藏 引用
arXiv 2018年
作者: Ran, Maosong Hu, Jinrong Chen, Yang Chen, Hu Sun, Huaiqiang Zhou, Jiliu Zhang, Yi College of Computer Science Sichuan University Chengdu610065 China Department of Computer Science Chengdu University of Information Technology Chengdu610225 China Lab of Image Science and Technology School of Computer Science and Engineering Southeast University Nanjing210096 China School of Cyber Science and Engineering Southeast University Nanjing210096 China Ministry of Education Nanjing210096 China Department of Radiology West China Hospital of Sichuan University Chengdu610041 China Guangdong Provincial Key Laboratory of Medical Image Processing Southern Medical University Guangzhou510515 China
Structure-preserved denoising of 3D magnetic resonance imaging (MRI) images is a critical step in medical image analysis. Over the past few years, many algorithms with impressive performances have been proposed. In th... 详细信息
来源: 评论