咨询与建议

限定检索结果

文献类型

  • 3,534 篇 会议
  • 2,549 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,100 篇 工学
    • 2,830 篇 计算机科学与技术...
    • 2,301 篇 软件工程
    • 1,050 篇 信息与通信工程
    • 515 篇 电气工程
    • 472 篇 生物工程
    • 468 篇 控制科学与工程
    • 458 篇 电子科学与技术(可...
    • 383 篇 光学工程
    • 298 篇 生物医学工程(可授...
    • 284 篇 机械工程
    • 256 篇 化学工程与技术
    • 202 篇 仪器科学与技术
    • 137 篇 动力工程及工程热...
    • 137 篇 网络空间安全
    • 134 篇 材料科学与工程(可...
    • 110 篇 建筑学
    • 106 篇 交通运输工程
  • 2,210 篇 理学
    • 1,192 篇 数学
    • 661 篇 物理学
    • 525 篇 生物学
    • 363 篇 统计学(可授理学、...
    • 270 篇 化学
    • 166 篇 系统科学
  • 1,065 篇 管理学
    • 567 篇 图书情报与档案管...
    • 538 篇 管理科学与工程(可...
    • 191 篇 工商管理
  • 249 篇 医学
    • 211 篇 临床医学
    • 186 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 148 篇 法学
    • 117 篇 社会学
  • 81 篇 教育学
  • 76 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 262 篇 feature extracti...
  • 234 篇 semantics
  • 164 篇 training
  • 131 篇 accuracy
  • 121 篇 computational mo...
  • 111 篇 deep learning
  • 105 篇 convolution
  • 87 篇 data mining
  • 84 篇 image segmentati...
  • 78 篇 object detection
  • 78 篇 data models
  • 76 篇 visualization
  • 70 篇 contrastive lear...
  • 70 篇 robustness
  • 70 篇 convolutional ne...
  • 66 篇 optimization
  • 64 篇 predictive model...
  • 63 篇 neural networks
  • 61 篇 federated learni...
  • 59 篇 face recognition

机构

  • 210 篇 shandong provinc...
  • 192 篇 key laboratory o...
  • 187 篇 hubei province k...
  • 143 篇 key laboratory o...
  • 141 篇 school of comput...
  • 141 篇 school of inform...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 99 篇 fujian provincia...
  • 85 篇 shandong provinc...
  • 76 篇 national key lab...
  • 74 篇 university of ch...
  • 73 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 62 篇 hubei province k...
  • 62 篇 shanghai key lab...
  • 60 篇 shanghai key lab...
  • 52 篇 fujian provincia...
  • 52 篇 school of comput...

作者

  • 64 篇 li zuoyong
  • 56 篇 huang qingming
  • 52 篇 zhaohui li
  • 51 篇 li zhaohui
  • 46 篇 li chenglong
  • 44 篇 zhang fuquan
  • 34 篇 tang jin
  • 33 篇 li wei
  • 32 篇 fan li
  • 32 篇 shen linlin
  • 31 篇 guo di
  • 31 篇 wang wei
  • 30 篇 zuoyong li
  • 30 篇 boxin shi
  • 29 篇 feng rui
  • 28 篇 yang zhiyong
  • 27 篇 wang xiao
  • 25 篇 liu yang
  • 25 篇 gao guanglai
  • 25 篇 li fan

语言

  • 5,516 篇 英文
  • 432 篇 其他
  • 145 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6084 条 记 录,以下是491-500 订阅
排序:
Adaptive Image Steganographic Analysis System Based on Deep Convolutional Neural Network  11th
Adaptive Image Steganographic Analysis System Based on Deep ...
收藏 引用
11th International Conference on computer Engineering and Networks, CENet2021
作者: Jiao, Ge College of Computer Science and Technology Hengyang Normal University HengyangHunan421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application HengyangHunan421002 China
Adaptive steganography emplaces the message into the hard-to-detect noise area or the complex texture area of the image, so the steganography analysis method based on artificial design features needs to design a very ... 详细信息
来源: 评论
A Novel Two-Stage Method for Texture Defect Detection  4
A Novel Two-Stage Method for Texture Defect Detection
收藏 引用
4th International Conference on Consumer Electronics and computer Engineering, ICCECE 2024
作者: Liu, Lu Jiang, Min Xu, Lifa School of Computer Science and Technology Wuhan University of Science and Technology Hubei WuHan430065 China Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Hubei Wuhan430065 China
Texture defect detection has wide applications in both textiles and industry, where traditional defect detection methods focus on costly manual labeling and defect samples are complex to collect in real-world industri... 详细信息
来源: 评论
C3LRSO: A Chinese Corpus for Complex Logical Reasoning in Sentence Ordering  31
C3LRSO: A Chinese Corpus for Complex Logical Reasoning in Se...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Guo, Xiaotao Li, Jiang Su, Xiangdong Zhang, Fujun College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Inner Mongolia Key Laboratory of Multilingual Artificial Intelligence Technology Hohhot China
Sentence ordering is the task of rearranging a set of unordered sentences into a coherent and logically consistent sequence. Recent work has primarily used pre-trained language models, achieving significant success in... 详细信息
来源: 评论
Semi-supervised Speech Lie Detection Algorithm Based on Multiple Features and Adaptive Threshold
IAENG International Journal of Computer Science
收藏 引用
IAENG International Journal of computer Science 2025年 第6期52卷 2015-2021页
作者: Zheng, Shuailong Tao, Huawei Yu, Hang Xi, Ji Zhu, Chunhua Wang, Xuemei Key Laboratory for Grain Information Processing and Control Henan Key Laboratory of Grain Storage Information Intelligent Perception and Decision Making Henan University of Technology Zhengzhou450001 China Computer Information Engineering Changzhou Institute of Technology Jiangsu213000 China
The limited number of labeled samples can significantly affect the accuracy of speech lie detection systems. However, semi-supervised algorithms have been shown to effectively improve detection performance under such ... 详细信息
来源: 评论
Data-Driven Group Formation Control of Cyber-Physical Systems via Distributed Cloud Computing
IEEE Transactions on Industrial Cyber-Physical Systems
收藏 引用
IEEE Transactions on Industrial Cyber-Physical Systems 2025年 3卷 341-350页
作者: Ren, Hongru Long, Yinren Li, Hongyi Huang, Tingwen Guangdong University of Technology School of Automation Guangdong-Hong Kong Joint Laboratory for Intelligent Decision and Cooperative Control Guangdong Provincial Key Laboratory for Intelligent Decision and Cooperative Control Guangzhou510006 China Southwest University College of Electronic and Information Engineering Chongqing400715 China Shenzhen University of Advanced Technology Faculty of Computer Science and Control Engineering Shenzhen518055 China
This paper investigates the group formation control problem for cyber-physical systems (CPSs) with random communication constraints. The distributed cloud computing system is constructed to divide agents into groups a... 详细信息
来源: 评论
Dynamic detection technology of encryption algorithm based on Pin  9
Dynamic detection technology of encryption algorithm based o...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Qu, Junpeng Du, Gaolei Sun, Yunge Fu, Yong Shandong Computer Science Center National Supercomputer Center in Jinan Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Aiming at the problem that malicious software uses encryption algorithm to hide its own malicious code and avoid detection, a dynamic detection technology based on Pin encryption algorithm is proposed. Use Pin to get ... 详细信息
来源: 评论
Distance-Adaptive Quaternion Knowledge Graph Embedding with Bidirectional Rotation  31
Distance-Adaptive Quaternion Knowledge Graph Embedding with ...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Wang, Weihua Liang, Qiuyu Bao, Feilong Gao, Guanglai College of Computer Science Inner Mongolia University Hohhot China National and Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Inner Mongolia Key Laboratory of Multilingual Artificial Intelligence Technology Hohhot China
Quaternion contains one real part and three imaginary parts, which provided a more expressive hypercomplex space for learning knowledge graph. Existing quaternion embedding models measure the plausibility of a triplet... 详细信息
来源: 评论
An Encryption Algorithm Cycle Identification Method Based on Bit Execution  9
An Encryption Algorithm Cycle Identification Method Based on...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Sun, Yunge Du, Gaolei Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Ransomware uses symmetric encryption algorithms to lock user files to extort money. This paper proposes a cryptographic algorithm loop identification method based on bit-precise execution, aiming to solve the problem ... 详细信息
来源: 评论
An automated construction method for symmetric encryption round function models based on dynamic analysis  9
An automated construction method for symmetric encryption ro...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Du, Gaolei Sun, Yunge Qu, Junpeng Fu, Yong Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan250014 China Quan Cheng Laboratory Jinan250103 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
With the deepening of informatization, the incidence of cybercrimes utilizing malicious software for attacks is on the rise. This paper addresses the detection issue of symmetric encryption in malicious software from ... 详细信息
来源: 评论
On Real-time Optical Subcarrier Management in P2MP Networks with Mixed-strategy Gaming
On Real-time Optical Subcarrier Management in P2MP Networks ...
收藏 引用
2023 Optical Fiber Communications Conference and Exhibition, OFC 2023
作者: Wang, Qian Shakespear-Miles, H. Chen, Xiaoliang Ruiz, Marc Li, Zhaohui Velasco, Luis Sun Yat-sen University School of Electronics and Information Technology Guangdong Provincial Key Labratory of Optoelectronic Information Processing Chips and Systems Guangzhou China Barcelona Spain Southern Marine Science and Engineering Guangdong Laboratory Zhuhai China
We developed a mixed-strategy gaming approach for distributed and real-time optical subscarrier management in point-to-multipoint networks, achieving traffic loss rates close to those by ILP-based centralized optimiza...
来源: 评论