咨询与建议

限定检索结果

文献类型

  • 3,603 篇 会议
  • 2,557 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,161 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,107 篇 工学
    • 2,825 篇 计算机科学与技术...
    • 2,317 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 530 篇 电气工程
    • 473 篇 电子科学与技术(可...
    • 473 篇 生物工程
    • 441 篇 控制科学与工程
    • 390 篇 光学工程
    • 297 篇 生物医学工程(可授...
    • 291 篇 机械工程
    • 261 篇 化学工程与技术
    • 212 篇 仪器科学与技术
    • 152 篇 网络空间安全
    • 138 篇 材料科学与工程(可...
    • 135 篇 动力工程及工程热...
    • 112 篇 建筑学
    • 111 篇 交通运输工程
  • 2,238 篇 理学
    • 1,200 篇 数学
    • 676 篇 物理学
    • 532 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 283 篇 化学
    • 165 篇 系统科学
  • 1,075 篇 管理学
    • 572 篇 图书情报与档案管...
    • 548 篇 管理科学与工程(可...
    • 195 篇 工商管理
  • 250 篇 医学
    • 215 篇 临床医学
    • 185 篇 基础医学(可授医学...
    • 119 篇 药学(可授医学、理...
  • 152 篇 法学
    • 120 篇 社会学
  • 89 篇 教育学
  • 79 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 277 篇 feature extracti...
  • 237 篇 semantics
  • 174 篇 training
  • 155 篇 accuracy
  • 137 篇 computational mo...
  • 111 篇 deep learning
  • 106 篇 convolution
  • 92 篇 data mining
  • 87 篇 federated learni...
  • 85 篇 image segmentati...
  • 85 篇 robustness
  • 84 篇 data models
  • 83 篇 object detection
  • 78 篇 visualization
  • 76 篇 optimization
  • 74 篇 contrastive lear...
  • 68 篇 convolutional ne...
  • 65 篇 neural networks
  • 64 篇 predictive model...
  • 63 篇 transformers

机构

  • 228 篇 key laboratory o...
  • 210 篇 shandong provinc...
  • 189 篇 hubei province k...
  • 146 篇 key laboratory o...
  • 145 篇 school of comput...
  • 144 篇 school of inform...
  • 115 篇 college of compu...
  • 104 篇 provincial key l...
  • 101 篇 fujian provincia...
  • 88 篇 shandong provinc...
  • 76 篇 national key lab...
  • 76 篇 university of ch...
  • 72 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 64 篇 school of comput...
  • 63 篇 hubei province k...
  • 61 篇 shanghai key lab...
  • 61 篇 shanghai key lab...
  • 60 篇 shandong provinc...
  • 53 篇 school of comput...

作者

  • 65 篇 li zuoyong
  • 62 篇 huang qingming
  • 53 篇 zhaohui li
  • 50 篇 li zhaohui
  • 44 篇 li chenglong
  • 44 篇 zhang fuquan
  • 35 篇 tang jin
  • 34 篇 li wei
  • 33 篇 yang zhiyong
  • 33 篇 shen linlin
  • 32 篇 fan li
  • 31 篇 wang wei
  • 30 篇 guo di
  • 30 篇 boxin shi
  • 29 篇 zuoyong li
  • 28 篇 xiaoming wu
  • 28 篇 feng rui
  • 27 篇 li fan
  • 26 篇 wang xiao
  • 26 篇 liu yang

语言

  • 5,050 篇 英文
  • 975 篇 其他
  • 164 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6161 条 记 录,以下是3621-3630 订阅
排序:
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论
Superposed Transparency Effect and Entanglement Generation with Hybrid System of Photonic Molecule and Dipole Emitter
收藏 引用
Chinese Physics Letters 2019年 第3期36卷 41-44页
作者: Ji-Bing Yuan Zhao-Hui Peng Shi-Qing Tang Deng-Yu Zhang College of Physics and Electronic Engineering and Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang Normal University Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education Department of Physics and Synergetic Innovation Center for Quantum Effects and ApplicationsHunan Normal University Institute of Modern Physics and Department of Physics Hunan University of Science and Technology
We theoretically investigate the transparency effect with a hybrid system composed of a photonic molecule and dipole emitter. It is shown that the transparency effect incorporates both the coupled resonator-induced tr... 详细信息
来源: 评论
Attack intent analysis method based on attack path graph  9
Attack intent analysis method based on attack path graph
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Chen, Biqiong Liu, Yanhua Li, Shijin Gao, Xiaoling College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
A comprehensive assessment method of asset importance for key asset protection  9
A comprehensive assessment method of asset importance for ke...
收藏 引用
9th International Conference on Communication and Network Security, ICCNS 2019
作者: Gao, Xiaoling Liu, Yanhua Qiu, Yanbin Liu, Huajun College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
Enhanced Sparse Model for Blind Deblurring  16th
Enhanced Sparse Model for Blind Deblurring
收藏 引用
16th European Conference on computer Vision, ECCV 2020
作者: Chen, Liang Fang, Faming Lei, Shen Li, Fang Zhang, Guixu Shanghai Key Laboratory of Multidimensional Information Processing School of Computer Science and Technology East China Normal University Shanghai China School of Software Engineering East China Normal University Shanghai China School of Mathematical Sciences East China Normal University Shanghai China
Existing arts have shown promising efforts to deal with the blind deblurring task. However, most of the recent works assume the additive noise involved in the blurring process to be simple-distributed (i.e. Gaussian o... 详细信息
来源: 评论
A Comprehensive Assessment Method of Asset Importance for key Asset Protection  2019
A Comprehensive Assessment Method of Asset Importance for Ke...
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Xiaoling Gao Yanhua Liu Yanbin Qiu Huajun Liu College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
In a given system network, an important prerequisite for security risk control is how to accurately calculate the impact of different host assets in the topology on the spread of attack risk. In this regard, we propos... 详细信息
来源: 评论
The aging effect in evolving scientific citation networks
arXiv
收藏 引用
arXiv 2021年
作者: Hu, Feng Ma, Lin Zhan, Xiu-Xiu Zhou, Yinzuo Liu, Chuang Zhao, Haixing Zhang, Zi-Ke School of Computer Qinghai Normal University Xining810016 China Key Laboratory of Tibetan Information Processing Ministry of Education Xining810008 China Tibetan Information Processing and Machine Translation Key Laboratory of Qinghai Province Xining810008 China Alibaba Research Center for Complexity Sciences Hangzhou Normal University Hangzhou311121 China Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands College of Media and International Culture Zhejiang University Hangzhou310058 China
The study of citation networks is of interest to the scientific community. However, the underlying mechanism driving individual citation behavior remains imperfectly understood, despite the recent proliferation of qua... 详细信息
来源: 评论
A data clustering strategy for enhancing mutual privacy in healthcare system of IoT
A data clustering strategy for enhancing mutual privacy in h...
收藏 引用
2019 IEEE International Conferences on Ubiquitous Computing and Communications and Data Science and Computational Intelligence and Smart Computing, Networking and Services, IUCC/DSCI/SmartCNS 2019
作者: Guo, Xuancheng Lin, Hui Xu, Chuanfeng Lin, Wenzhong School of Mathematics and Computer Science Fujian Normal University Fuzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China
Recent advances in the healthcare system of Internet of Things (IoT) has led to a generation of a large amount of physic sensor data. Data analyst collects and analyzes these sensor data through wireless sensor networ... 详细信息
来源: 评论
Attack Intent Analysis Method Based on Attack Path Graph  2019
Attack Intent Analysis Method Based on Attack Path Graph
收藏 引用
Proceedings of the 2019 the 9th International Conference on Communication and Network Security
作者: Biqiong Chen Yanhua Liu Shijin Li Xiaoling Gao College of Mathematics and Computer Science Fuzhou University Fuzhou Fujian China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou Fujian China
With the rapid development of network technology, network security problems are gradually increasing, and the network attack situation is very severe. In a complex attack scenario, timely detection of potential attack... 详细信息
来源: 评论
Research on Assistant Diagnostic Method of TCM Based on BERT
Research on Assistant Diagnostic Method of TCM Based on BERT
收藏 引用
IEEE International Symposium on information (IT) in Medicine and Education, ITME
作者: Chuanjie Xu Feng Yuan Shouqiang Chen Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology Jinan China School of Information Engineering Shandong Management University Jinan China Center of Hear of the Second Affiliated Hospital of Shandong University of Traditional Chinese Medicine Jinan China
Traditional Chinese medicine (TCM) auxiliary diagnosis is a systematic diagnosis platform that uses computer modeling technology to assist TCM doctors in recording diseases, providing on time diagnoses, writing prescr... 详细信息
来源: 评论