咨询与建议

限定检索结果

文献类型

  • 3,534 篇 会议
  • 2,549 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,100 篇 工学
    • 2,830 篇 计算机科学与技术...
    • 2,301 篇 软件工程
    • 1,050 篇 信息与通信工程
    • 515 篇 电气工程
    • 472 篇 生物工程
    • 468 篇 控制科学与工程
    • 458 篇 电子科学与技术(可...
    • 383 篇 光学工程
    • 298 篇 生物医学工程(可授...
    • 284 篇 机械工程
    • 256 篇 化学工程与技术
    • 202 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 137 篇 网络空间安全
    • 134 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 106 篇 交通运输工程
  • 2,210 篇 理学
    • 1,192 篇 数学
    • 661 篇 物理学
    • 525 篇 生物学
    • 363 篇 统计学(可授理学、...
    • 270 篇 化学
    • 166 篇 系统科学
  • 1,065 篇 管理学
    • 567 篇 图书情报与档案管...
    • 538 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 249 篇 医学
    • 211 篇 临床医学
    • 186 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 148 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 76 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 262 篇 feature extracti...
  • 234 篇 semantics
  • 164 篇 training
  • 131 篇 accuracy
  • 121 篇 computational mo...
  • 111 篇 deep learning
  • 105 篇 convolution
  • 87 篇 data mining
  • 84 篇 image segmentati...
  • 78 篇 object detection
  • 78 篇 data models
  • 76 篇 visualization
  • 70 篇 contrastive lear...
  • 70 篇 robustness
  • 70 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 61 篇 federated learni...
  • 59 篇 face recognition

机构

  • 210 篇 shandong provinc...
  • 192 篇 key laboratory o...
  • 187 篇 hubei province k...
  • 143 篇 key laboratory o...
  • 141 篇 school of comput...
  • 141 篇 school of inform...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 85 篇 shandong provinc...
  • 76 篇 national key lab...
  • 74 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 62 篇 hubei province k...
  • 62 篇 shanghai key lab...
  • 60 篇 shanghai key lab...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 64 篇 li zuoyong
  • 56 篇 huang qingming
  • 52 篇 zhaohui li
  • 51 篇 li zhaohui
  • 46 篇 li chenglong
  • 44 篇 zhang fuquan
  • 34 篇 tang jin
  • 33 篇 li wei
  • 32 篇 fan li
  • 32 篇 shen linlin
  • 31 篇 guo di
  • 31 篇 wang wei
  • 30 篇 zuoyong li
  • 30 篇 boxin shi
  • 29 篇 feng rui
  • 28 篇 yang zhiyong
  • 27 篇 wang xiao
  • 25 篇 liu yang
  • 25 篇 gao guanglai
  • 25 篇 li fan

语言

  • 5,516 篇 英文
  • 432 篇 其他
  • 145 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6084 条 记 录,以下是4351-4360 订阅
排序:
Mitigate the obstructing effect of vehicles on the propagation of VANETs safety-related information
Mitigate the obstructing effect of vehicles on the propagati...
收藏 引用
作者: Huang, Rui Wu, Jing Long, Chengnian Zhu, Yanmin Li, Bo Lin, Yi-Bing Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China Department of Computer Science School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Shanghai200240 China Department of Computer Science and Engineering The Hong Kong University of Science and Technology Hong Kong China Department of Computer Science and Information Engineering National Chiao Tung University Taiwan
As physical obstacles, vehicles have significant impacts on the efficient propagations of safety-related information in vehicular ad hoc networks (VANETs) by frequently obstructing the LOS links between transmitters a... 详细信息
来源: 评论
Logic could be learned from images
arXiv
收藏 引用
arXiv 2019年
作者: Guo, Qian Qian, Yuhua Liang, Xinyan She, Yanhong Li, Deyu Liang, Jiye Institute of Big Data Science and Industry Shanxi University Shanxi Taiyuan030006 China Key Laboratory of Computational Intelligence Chinese Information Processing of Ministry of Education Shanxi University Shanxi Taiyuan030006 China School of Computer and Information Technology Shanxi University Shanxi Taiyuan030006 China College of Science Xi’an Shiyou University Shanxi Xi'an710065 China
Logic reasoning is a significant ability of human intelligence and also an important task in artificial intelligence. The existing logic reasoning methods, quite often, need to design some reasoning patterns beforehan... 详细信息
来源: 评论
A Dynamic Community Detection Algorithm Based on Parallel Incremental Related Vertices  2
A Dynamic Community Detection Algorithm Based on Parallel In...
收藏 引用
2017 IEEE 2nd International Conference on Big Data Analysis(ICBDA 2017)
作者: Guohui Li Kun Guo YuZhong Chen Ling Wu Danhong Zhu College of Mathematics and Computer Sciences Fuzhou University Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing(Fuzhou University) Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education
One of the traditional ways for detecting dynamic communities is to find the communities at each interval through the static community detection ***,it usually leads to high computation *** this paper,a novel algorith... 详细信息
来源: 评论
Andro-MD: Android malware detection based on convolutional neural networks
收藏 引用
International Journal of Performability Engineering 2018年 第3期14卷 547-558页
作者: Xie, Nannan Di, Xiaoqiang Wang, Xing Zhao, Jianping School of Computer Science and Technology Changchun University of Science and Technology Changchun130022 China Jilin Provincial Key Laboratory of Network and Information Security Changchun130022 China School of Computer Science and Information Technology Beijing Jiaotong University Beijing100044 China
Android OS maintains its dominance in smart terminal markets, which brings growing threats of malicious applications (apps). The research on Android malware detection has attracted attention from both academia and ind... 详细信息
来源: 评论
Efficient attribute-based encryption with blackbox traceability  12th
Efficient attribute-based encryption with blackbox traceabil...
收藏 引用
12th International Conference on Provable Security, ProvSec 2018
作者: Xu, Shengmin Yang, Guomin Mu, Yi Liu, Ximeng Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong Wollongong Australia School of Information Systems Singapore Management University Singapore Singapore College of Mathematics and Computer Science Fuzhou University FuzhouFujian China Fujian Provincial Key Laboratory of Network Security and Cryptology Fujian Normal University Fuzhou China
Traitor tracing scheme can be used to identify a decryption key is illegally used in public-key encryption. In CCS’13, Liu et al. proposed an attribute-based traitor tracing (ABTT) scheme with blackbox traceability w... 详细信息
来源: 评论
Attention-based end-to-end models for small-footprint keyword spotting
arXiv
收藏 引用
arXiv 2018年
作者: Shan, Changhao Zhang, Junbo Wang, Yujun Xie, Lei Shaanxi Provincial Key Laboratory of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University Xi’an China Xiaomi Inc. Beijing China
In this paper, we propose an attention-based end-to-end neural approach for small-footprint keyword spotting (KWS), which aims to simplify the pipelines of building a production-quality KWS system. Our model consists ... 详细信息
来源: 评论
GLA: Global-Local Attention for Image Description
GLA: Global-Local Attention for Image Description
收藏 引用
作者: Li, Linghui Tang, Sheng Zhang, Yongdong Deng, Lixi Tian, Qi Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of the ChineseAcademy of Sciences BeijingTX100049 China Department of Computer Science University of Texas at San Antonio San Antonio78249-1604 United States
In recent years, the task of automatically generating image description has attracted a lot of attention in the field of artificial intelligence. Benefitting from the development of convolutional neural networks (CNNs... 详细信息
来源: 评论
RESIDUAL SHUFFLING CONVOLUTIONAL NEURAL NETWORKS for DEEP SEMANTIC IMAGE SEGMENTATION USING MULTI-MODAL DATA
RESIDUAL SHUFFLING CONVOLUTIONAL NEURAL NETWORKS for DEEP SE...
收藏 引用
2018 ISPRS TC II Mid-term Symposium "Towards Photogrammetry 2020"
作者: Chen, K. Weinmann, M. Gao, X. Yan, M. Hinz, S. Jutzi, B. Weinmann, M. Key Laboratory of Spatial Information Processing and Application System Technology Institute of Electronics Chinese Academy of Sciences Beijing China University of Chinese Academy of Sciences Beijing China Institute of Computer Science II University of Bonn Bonn Germany Institute of Photogrammetry and Remote Sensing Karlsruhe Institute of Technology Karlsruhe Germany
In this paper, we address the deep semantic segmentation of aerial imagery based on multi-modal data. Given multi-modal data composed of true orthophotos and the corresponding Digital Surface Models (DSMs), we extract... 详细信息
来源: 评论
Modelling of synchronisation and energy performance of FBE- and LBE-based standalone LTE-U networks
收藏 引用
Journal of Engineering 2017年 第7期2017卷 292-299页
作者: Li, Jiamin Shan, Hangguan Huang, Aiping Yuan, Jiantao Cai, Lin X. Zhejiang Provincial Key Laboratory of Information Processing and Communication Networks Hangzhou China College of Information Science and Electronic Engineering Zhejiang University Hangzhou China Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago United States
Without the aid of licensed channel, deploying long-term evolution (LTE) networks over unlicensed spectrum (named standalone LTE-U networks) faces the difficulty of establishing and maintaining synchronisation between... 详细信息
来源: 评论
Attention-Based End-to-End Speech Recognition on Voice Search
Attention-Based End-to-End Speech Recognition on Voice Searc...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Changhao Shan Junbo Zhang Yujun Wang Lei Xie Shaanxi Provincial Key Laboratory of Speech and Image Information Processing School of Computer Science Northwestern Polytechnical University Xi'an China Xiaomi Inc. Beijing China
Recently, there has been a growing interest in end-to-end speech recognition that directly transcribes speech to text without any predefined alignments. In this paper, we explore the use of attention-based encoder-dec... 详细信息
来源: 评论