咨询与建议

限定检索结果

文献类型

  • 391 篇 会议
  • 218 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 610 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 470 篇 工学
    • 347 篇 计算机科学与技术...
    • 274 篇 软件工程
    • 115 篇 信息与通信工程
    • 67 篇 控制科学与工程
    • 50 篇 生物工程
    • 47 篇 电子科学与技术(可...
    • 42 篇 生物医学工程(可授...
    • 40 篇 电气工程
    • 31 篇 光学工程
    • 27 篇 机械工程
    • 27 篇 网络空间安全
    • 25 篇 化学工程与技术
    • 16 篇 仪器科学与技术
    • 15 篇 交通运输工程
    • 13 篇 材料科学与工程(可...
    • 13 篇 动力工程及工程热...
  • 215 篇 理学
    • 115 篇 数学
    • 58 篇 生物学
    • 49 篇 物理学
    • 28 篇 化学
    • 28 篇 统计学(可授理学、...
    • 20 篇 系统科学
  • 126 篇 管理学
    • 75 篇 管理科学与工程(可...
    • 54 篇 图书情报与档案管...
    • 24 篇 工商管理
  • 42 篇 医学
    • 33 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 16 篇 药学(可授医学、理...
  • 17 篇 法学
    • 14 篇 社会学
  • 17 篇 农学
    • 16 篇 作物学
  • 6 篇 教育学
  • 5 篇 军事学
  • 4 篇 经济学
  • 3 篇 艺术学
  • 1 篇 文学

主题

  • 21 篇 feature extracti...
  • 16 篇 image segmentati...
  • 15 篇 convolution
  • 13 篇 semantics
  • 12 篇 deep learning
  • 11 篇 data mining
  • 10 篇 training
  • 10 篇 information proc...
  • 8 篇 object detection
  • 8 篇 optimization
  • 8 篇 clustering algor...
  • 7 篇 support vector m...
  • 7 篇 signal processin...
  • 7 篇 genetic algorith...
  • 7 篇 convolutional ne...
  • 6 篇 computer science
  • 6 篇 generative adver...
  • 6 篇 transformers
  • 6 篇 education
  • 6 篇 contrastive lear...

机构

  • 48 篇 provincial key l...
  • 46 篇 college of compu...
  • 40 篇 hunan provincial...
  • 31 篇 school of comput...
  • 29 篇 hubei province k...
  • 26 篇 fujian provincia...
  • 22 篇 college of compu...
  • 21 篇 fujian provincia...
  • 16 篇 college of compu...
  • 16 篇 jiangsu provinci...
  • 14 篇 hunan provincial...
  • 12 篇 college of elect...
  • 12 篇 jiangsu provinci...
  • 11 篇 school of comput...
  • 11 篇 hunan provincial...
  • 10 篇 school of comput...
  • 9 篇 school of comput...
  • 8 篇 school of comput...
  • 8 篇 key laboratory o...
  • 8 篇 jiangsu provinci...

作者

  • 34 篇 li zuoyong
  • 17 篇 yu fei
  • 17 篇 zhang fuquan
  • 16 篇 zhu qiaoming
  • 16 篇 chen yang
  • 16 篇 li lang
  • 16 篇 lang li
  • 14 篇 kong fang
  • 13 篇 jiao ge
  • 12 篇 zuoyong li
  • 11 篇 zhou guodong
  • 11 篇 teng shenghua
  • 11 篇 tang jin
  • 11 篇 kong youyong
  • 9 篇 yue guangxue
  • 9 篇 youyong kong
  • 8 篇 li chenglong
  • 8 篇 zou yi
  • 8 篇 fan haoyi
  • 8 篇 shu huazhong

语言

  • 566 篇 英文
  • 27 篇 其他
  • 18 篇 中文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology Jiangsu Province"
610 条 记 录,以下是21-30 订阅
排序:
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and TelecommunicationsNanjing 210023China Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal UniversityHangzhou 311121China Tongda College of Nanjing University of Posts and Telecommunications Yangzhou 225127China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China School of Computer Science and Technology Xidian UniversityXi'an 710071China State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal UniversityXining 810008China Faculty of Software Fujian Normal UniversityFuzhou 350108China
Ciphertext-Policy Attribute-Based Encryption(CP-ABE)enables fine-grained access control on ciphertexts,making it a promising approach for managing data stored in the cloud-enabled Internet of *** existing schemes ofte... 详细信息
来源: 评论
A Lightweight and key Escrow-Free Access Control Scheme on Encrypted Data in Edge Computing  12
A Lightweight and Key Escrow-Free Access Control Scheme on E...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: He, Heng Chen, Yuejia Lu, Jianfeng Zheng, Jiacheng School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan China
Attribute-based encryption provides fine-grained access control, ensuring data security in edge computing. However, existing access control schemes face issues such as high computational complexity due to bilinear pai... 详细信息
来源: 评论
Design and Implementation of Warning Signs for Vehicles Based on Automatic Navigation Algorithms  1
收藏 引用
13th International Conference on computer Engineering and Networks, CENet 2023
作者: Wang, Fangyan Jiao, Ge Lu, Jinjia Yuan, Yiping College of Computer Science and Technology Hengyang Normal University Hunan Hengyang421002 China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hunan Hengyang421002 China
Traditional warning signs use human retrograde placement;there are problems such as short warning distances, imprecise placement positions, and difficult positioning of accident points. According to statistics, the us... 详细信息
来源: 评论
Event-Triggered Cooperative Tracking Control of Multiagent Systems with a Dynamic Leader via Approximate Dynamic Programming
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第6期5卷 2752-2765页
作者: Fu, Hao He, Haodong Chen, Yang Wuhan University of Science and Technology Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System The School of Computer Science and Technology Wuhan430081 China Wuhan University of Science and Technology Eng. Res. Center for Metallurgical Automation and Measurement Technology of Ministry of Education Wuhan430081 China
This article investigates the optimal cooperative tracking control problem for unknown nonlinear multiagent systems with a real dynamic leader and uncertainties. Its main difficulty lies in eliminating effect of the u... 详细信息
来源: 评论
Topology Uncertainty Modeling For Imbalanced Node Classification on Graphs  48
Topology Uncertainty Modeling For Imbalanced Node Classifica...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Gao, Jiayi Li, Jiaxing Zhang, Ke Kong, Youyong Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Nanjing China Key Laboratory of Computer Network and Information Integration Southeast University Ministry of Education Nanjing China
Most existing graph neural networks work under a class-balanced assumption, while ignoring class-imbalanced scenarios that widely exist in real-world graphs. Although there are many methods in other fields that can al... 详细信息
来源: 评论
Topgformer: Topological-Based Graph Transformer for Mapping Brain Structural Connectivity to Functional Connectivity  48
Topgformer: Topological-Based Graph Transformer for Mapping ...
收藏 引用
48th IEEE International Conference on Acoustics, Speech and Signal processing, ICASSP 2023
作者: Guo, Dalu Zhang, Ke Li, Jiaxing Kong, Youyong Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing School of Computer Science and Engineering Nanjing China Southeast University Ministry of Education Key Laboratory of Computer Network and Information Integration Nanjing China
Exploring the mapping between structural connectivity (SC) and functional connectivity (FC) is of essential importance to understanding the working mechanism of the human brain. Traditional methods are difficult to re... 详细信息
来源: 评论
Multi-Query Vehicle Re-Identification: Viewpoint-Conditioned Network, Unified Dataset and New Metric
收藏 引用
IEEE Transactions on Image processing 2023年 32卷 5948-5960页
作者: Zheng, Aihua Zhang, Chaobin Li, Chenglong Tang, Jin Tan, Chang Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Artificial Intelligence Hefei230601 China Anhui University Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Hefei230601 China Iflytek Company Ltd. Hefei230088 China
Existing vehicle re-identification methods mainly rely on the single query, which has limited information for vehicle representation and thus significantly hinders the performance of vehicle Re-ID in complicated surve... 详细信息
来源: 评论
Energy-Efficient Virtual Machine Migration Algorithm in Data Centers  3
Energy-Efficient Virtual Machine Migration Algorithm in Data...
收藏 引用
3rd International conference on computer, Big Data and Artificial Intelligence, ICCBDAI 2022
作者: Wu, Xiaodong Zeng, Taisheng School of Mathmatics and Computer Science Quanzhou Normal University Fujian Province Quanzhou362000 China Fujian Provincial Key Laboratory of Intensive Computing Fujian Province Quanzhou362000 China Key Laboratory of Intelligent Computing and Information Processing Fujian Province University Fujian Province Quanzhou362000 China
The issue of data center power consumption is becoming increasingly serious. One of the most effective techniques for increasing resource utilization and lowering power consumption is virtual machine consolidation. Th... 详细信息
来源: 评论
NEAT-Net: An Unsupervised Cross-View Prior Inpainting Network for CBCT Metal Artifact Reduction  46
NEAT-Net: An Unsupervised Cross-View Prior Inpainting Networ...
收藏 引用
46th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2024
作者: Yang, Yang Tong, Zhan Zhong, Xinyun Shi, Yijie Xi, Yan Yu, Wenxue Wu, Zhan Chen, Yang First-Imaging Tech Shanghai China Southeast University Laboratory of Image Science and Technology The School of Computer Science and Engineering Nanjing China Southeast University Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing The Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Nanjing China
Intraoperative Cone-Beam Computed Tomography (CBCT) facilitates intraoperative navigation for Minimally Invasive Spine Surgery (MISS). However, high-attenuation metal implants used in MISS often cause metal artifacts ... 详细信息
来源: 评论
A New Method of Image Restoration technology Based on WGAN
收藏 引用
computer Systems Science & Engineering 2022年 第5期41卷 689-698页
作者: Wei Fang Enming Gu Weinan Yi Weiqing Wang Victor S.Sheng School of Computer&Software Engineering Research Center of Digital ForensicsMininstry of EducationNanjing University of Information Science&TechnologyNanjing210044China Provincial Key Laboratory for Computer Information Processing Technology Soochow UniversitySuzhou215325China Texas Tech University USA
With the development of image restoration technology based on deep learning,more complex problems are being solved,especially in image semantic inpainting based on ***,image semantic inpainting techniques are becoming... 详细信息
来源: 评论