咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,532 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,064 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,081 篇 工学
    • 2,801 篇 计算机科学与技术...
    • 2,324 篇 软件工程
    • 1,040 篇 信息与通信工程
    • 510 篇 电气工程
    • 471 篇 生物工程
    • 453 篇 电子科学与技术(可...
    • 430 篇 控制科学与工程
    • 393 篇 光学工程
    • 299 篇 生物医学工程(可授...
    • 286 篇 机械工程
    • 254 篇 化学工程与技术
    • 204 篇 仪器科学与技术
    • 136 篇 动力工程及工程热...
    • 136 篇 网络空间安全
    • 135 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 107 篇 交通运输工程
  • 2,211 篇 理学
    • 1,193 篇 数学
    • 663 篇 物理学
    • 525 篇 生物学
    • 364 篇 统计学(可授理学、...
    • 268 篇 化学
    • 166 篇 系统科学
  • 1,068 篇 管理学
    • 567 篇 图书情报与档案管...
    • 543 篇 管理科学与工程(可...
    • 195 篇 工商管理
  • 246 篇 医学
    • 212 篇 临床医学
    • 184 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 151 篇 法学
    • 118 篇 社会学
  • 85 篇 教育学
  • 76 篇 农学
  • 52 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 262 篇 feature extracti...
  • 234 篇 semantics
  • 167 篇 training
  • 131 篇 accuracy
  • 121 篇 computational mo...
  • 108 篇 deep learning
  • 105 篇 convolution
  • 88 篇 data mining
  • 85 篇 image segmentati...
  • 78 篇 object detection
  • 78 篇 data models
  • 76 篇 visualization
  • 72 篇 robustness
  • 70 篇 contrastive lear...
  • 70 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 61 篇 federated learni...
  • 59 篇 face recognition

机构

  • 210 篇 shandong provinc...
  • 190 篇 key laboratory o...
  • 187 篇 hubei province k...
  • 143 篇 key laboratory o...
  • 142 篇 school of inform...
  • 141 篇 school of comput...
  • 116 篇 college of compu...
  • 103 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 85 篇 shandong provinc...
  • 76 篇 national key lab...
  • 74 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 62 篇 hubei province k...
  • 61 篇 shanghai key lab...
  • 60 篇 shanghai key lab...
  • 53 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 64 篇 li zuoyong
  • 56 篇 huang qingming
  • 52 篇 zhaohui li
  • 52 篇 li zhaohui
  • 45 篇 li chenglong
  • 44 篇 zhang fuquan
  • 35 篇 tang jin
  • 33 篇 li wei
  • 32 篇 guo di
  • 32 篇 fan li
  • 32 篇 wang wei
  • 32 篇 shen linlin
  • 30 篇 boxin shi
  • 29 篇 zuoyong li
  • 28 篇 yang zhiyong
  • 28 篇 feng rui
  • 27 篇 wang xiao
  • 25 篇 liu yang
  • 25 篇 gao guanglai
  • 25 篇 li fan

语言

  • 5,551 篇 英文
  • 375 篇 其他
  • 147 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6064 条 记 录,以下是1011-1020 订阅
排序:
FaceCat: Enhancing Face Recognition Security with a Unified Diffusion Model
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Jiawei Yang, Xiao Dong, Yinpeng Su, Hang Yin, Zhaoxia Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University China Department of Computer Science & Technology Tsinghua University China
Face anti-spoofing (FAS) and adversarial detection (FAD) have been regarded as critical technologies to ensure the safety of face recognition systems. However, due to limited practicality, complex deployment, and the ... 详细信息
来源: 评论
Analysis and Design of Image Encryption Algorithms Based on Interlaced Chaos  10th
Analysis and Design of Image Encryption Algorithms Based on ...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Li, Kangman Li, Qiuping College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit... 详细信息
来源: 评论
Design and Implementation of Handwritten Digit Recognition Based on K-Nearest Neighbor Algorithm  10th
Design and Implementation of Handwritten Digit Recognition B...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Wang, Ying Liu, Qingyun Sun, Yaqi Zhang, Feng Zhu, Yining College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
In this paper, a handwritten digit recognition system based on K-nearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine lear... 详细信息
来源: 评论
Modeling Rumor Unidirectional Spreading from Online Social Networks to Offline  23
Modeling Rumor Unidirectional Spreading from Online Social N...
收藏 引用
Proceedings of the 2023 7th International Conference on Electronic information technology and computer Engineering
作者: Qiyi Han Yi Chen Key Laboratory of Pattern Recognition and Intelligent Information Processing School of Computer Science Chengdu University China College of Electronic Engineering Chengdu University of Information Technology China
Online social networks not only facilitate the dissemination of information, but also increase the risk of rumors. This paper focuses on studying the unidirectional spread of rumors from online social networks to offl...
来源: 评论
Modality Unified Attack for Omni-Modality Person Re-Identification
收藏 引用
IEEE Transactions on information Forensics and Security 2025年 20卷 5577-5587页
作者: Bian, Yuan Liu, Min Yi, Yunqi Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning based person re-identification (re-id) models have been widely employed in surveillance systems. Recent studies have demonstrated that black-box single-modality and cross-modality re-id models are vulner... 详细信息
来源: 评论
Dynamic Student Classification with Forgetting Mechanisms on Memory Networks for Knowledge Tracing
Dynamic Student Classification with Forgetting Mechanisms on...
收藏 引用
Intelligent Computing and Human-computer Interaction (ICHCI), International Conference on
作者: Guimin Huang Xiangqian Qin Guangxi Key Laboratory of Image and Graphic Intelligent Processing School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China
Knowledge Tracing (KT), a technique for modeling students' knowledge levels and predicting their future question-answering performance based on their historical answer data, is one of the key research areas to str... 详细信息
来源: 评论
RMSLRS: Real-Time Multi-terminal Sign Language Recognition System  13th
RMSLRS: Real-Time Multi-terminal Sign Language Recognition S...
收藏 引用
13th International Conference on Innovations in Bio-Inspired Computing and Applications, IBICA 2022, and 12th World Congress on information and Communication Technologies, WICT 2022
作者: Zhao, Yilin Zhang, Biao Ma, Kun Business School of Jinan University University of Jinan Jinan250022 China School of Computer and Information Hefei University of Technology Hefei230009 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China
Sign language is commonly used by deaf or speech-impaired people to convey meaning. Sign language recognition (SLR) aims to help users learn and use sign language by recognizing the signs from given videos. Although s... 详细信息
来源: 评论
Polarization-Insensitive Orbital Angular Momentum Converter Based on Helically Twisted Anti-Resonant Fiber
Polarization-Insensitive Orbital Angular Momentum Converter ...
收藏 引用
2024 Asia Communications and Photonics Conference, ACP 2024 and International Conference on information Photonics and Optical Communications, IPOC 2024
作者: Zhang, Jie Tu, Jiajing Wang, Yingying Gao, Shoufei Huang, Dongmei Gao, Shecheng Liu, Weiping Li, Zhaohui Department of Electronic Engineering Jinan University Guangzhou China College of Physics & Optoelectronic Engineering Jinan University Guangzhou China The Photonics Research Centre Department of Electrical Engineering The Hong Kong Polytechnic University Hung Hom Hong Kong School of Electronics and Information Technology Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Sun Yat-sen University Guangzhou China
Based on the topological charge matching principle and mode coupling theory, the higher-order orbital angular momentum (OAM) generating mechanism in a helically-twisted antiresonant fiber (HARF) is illustrated. We suc... 详细信息
来源: 评论
TMFIF:Transformer-based multi-focus image fusion  5
TMFIF:Transformer-based multi-focus image fusion
收藏 引用
5th International Conference on computer Vision, Image and Deep Learning, CVIDL 2024
作者: Li, Rui Geng, Shengling Zhang, Dan Zhou, Mingquan Qinghai Normal University School of Computer Science Xining China Nanyang Institute of Technology School of Computer and Software Nanyang China People's Government of Qinghai Province & Beijing Normal University Academy of Plateau Science and Sustainability Xining China Qinghai Normal University The State Key Laboratory of Tibetan Intelligent Information Processing and Application China
Multi-focus image fusion is a hot topic in the field of image processing, and it is a fundamental problem in the fields of image editing, image synthesis, and target retrieval. In previous fusion methods, although fea... 详细信息
来源: 评论
Research on Differential Power Analysis of Lightweight Block Cipher LED  10th
Research on Differential Power Analysis of Lightweight Block...
收藏 引用
10th International Conference on computer Engineering and Networks, CENet 2020
作者: Zou, Yi Li, Lang Zhao, Hui-huang Jiao, Ge College of Computer Science and Technology Hengyang Normal University Hengyang421002 China Human Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002 China
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retriev... 详细信息
来源: 评论