咨询与建议

限定检索结果

文献类型

  • 326 篇 期刊文献
  • 270 篇 会议

馆藏范围

  • 596 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 410 篇 工学
    • 289 篇 计算机科学与技术...
    • 254 篇 软件工程
    • 126 篇 信息与通信工程
    • 74 篇 生物工程
    • 55 篇 电子科学与技术(可...
    • 54 篇 控制科学与工程
    • 50 篇 电气工程
    • 42 篇 光学工程
    • 32 篇 生物医学工程(可授...
    • 30 篇 机械工程
    • 19 篇 仪器科学与技术
    • 17 篇 动力工程及工程热...
    • 17 篇 化学工程与技术
    • 14 篇 网络空间安全
    • 13 篇 交通运输工程
    • 11 篇 材料科学与工程(可...
    • 11 篇 安全科学与工程
    • 9 篇 航空宇航科学与技...
  • 236 篇 理学
    • 118 篇 数学
    • 74 篇 生物学
    • 49 篇 物理学
    • 44 篇 统计学(可授理学、...
    • 21 篇 化学
    • 20 篇 系统科学
  • 97 篇 管理学
    • 52 篇 图书情报与档案管...
    • 47 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 21 篇 医学
    • 20 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 9 篇 法学
    • 9 篇 社会学
  • 7 篇 教育学
  • 4 篇 农学
  • 2 篇 经济学
  • 2 篇 军事学

主题

  • 25 篇 training
  • 20 篇 feature extracti...
  • 13 篇 deep learning
  • 11 篇 generative adver...
  • 11 篇 convolution
  • 11 篇 contrastive lear...
  • 10 篇 object detection
  • 10 篇 deep neural netw...
  • 10 篇 computational mo...
  • 10 篇 convolutional ne...
  • 9 篇 image reconstruc...
  • 8 篇 semantic segment...
  • 8 篇 optimization
  • 8 篇 energy efficienc...
  • 7 篇 reverberation
  • 7 篇 neural networks
  • 7 篇 face recognition
  • 7 篇 predictive model...
  • 7 篇 steganography
  • 7 篇 clustering algor...

机构

  • 73 篇 guangdong key la...
  • 51 篇 college of compu...
  • 51 篇 college of elect...
  • 45 篇 peng cheng labor...
  • 42 篇 guangdong key la...
  • 39 篇 guangdong key la...
  • 35 篇 guangdong provin...
  • 33 篇 national enginee...
  • 28 篇 shenzhen institu...
  • 19 篇 school of cyber ...
  • 16 篇 school of comput...
  • 15 篇 computer vision ...
  • 14 篇 computer vision ...
  • 14 篇 university of ch...
  • 14 篇 college of elect...
  • 12 篇 key laboratory o...
  • 11 篇 college of infor...
  • 10 篇 school of comput...
  • 10 篇 guangdong-hong k...
  • 9 篇 guangdong provin...

作者

  • 52 篇 shen linlin
  • 25 篇 huang qingming
  • 23 篇 cao xiaochun
  • 23 篇 xu qianqian
  • 22 篇 qiu guoping
  • 21 篇 li bin
  • 16 篇 yang zhiyong
  • 16 篇 linlin shen
  • 15 篇 huang jiwu
  • 14 篇 li xia
  • 14 篇 xie weicheng
  • 13 篇 gao can
  • 13 篇 xie shengli
  • 13 篇 zou wenbin
  • 12 篇 wang jinbao
  • 12 篇 kang jiawen
  • 10 篇 cao wenming
  • 10 篇 hou xianxu
  • 10 篇 pei jihong
  • 10 篇 yu zitong

语言

  • 540 篇 英文
  • 52 篇 其他
  • 4 篇 中文
检索条件"机构=Shenzhen Engineering Laboratory of Intelligent Information Processing for IoT"
596 条 记 录,以下是361-370 订阅
排序:
Delay Constraint Energy Efficient Cooperative Offloading in MEC for iot  16th
Delay Constraint Energy Efficient Cooperative Offloading in ...
收藏 引用
16th EAI International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020
作者: Sun, Haifeng Wang, Jun Peng, Haixia Song, Lili Qin, Mingwei School of Computer Science and Technology Southwest University of Science and Technology Mianyang621010 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518061 China Department of Electrical and Computer Engineering University of Waterloo WaterlooN2L 3G1 Canada School of Information Engineering Southwest University of Science and Technology Mianyang621010 China
Mobile edge computing (MEC) is a promising approach to execute delay-sensitive and computation-intensive applications in the resource-limited iot mobile devices (IMDs) by offloading computing tasks to MEC servers. In ... 详细信息
来源: 评论
Energy Efficiency Maximization for Backscatter-Enabled Coded-Cooperative NOMA Under Imperfect SIC
arXiv
收藏 引用
arXiv 2022年
作者: Asif, Muhammad Ihsan, Asim Khan, Wali Ullah Zhang, Shengli Wu, Sissi Xiaoxiao The Guangdong Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen518060 China The School of Computer Science and Electronic Engineering Bangor University BangorLL57 1UT United Kingdom University of Luxembourg Luxembourg City1855 Luxembourg
The beyond fifth-generation (B5G) communication networks would require efficient utilization of available resources in terms of spectrum and energy to support billion of internet of things (iot) devices. In this regar... 详细信息
来源: 评论
Performance analysis and comparison of PoW,PoS and DAG based blockchains
收藏 引用
Digital Communications and Networks 2020年 第4期6卷 480-485页
作者: Bin Cao Zhenghui Zhang Daquan Feng Shengli Zhang Lei Zhang Mugen Peng Yun Li The State Key Laboratory of Networking and Switching Technology Beijing University of Posts and TelecommunicationsBeijing100876China The State Key Laboratory of Integrated Services Networks(Xidian University) Xian710000China School of Communications and Information Engineering and Chongqing Key Lab of Mobile Communications Technology Chongqing University of Posts and TelecommunicationsChongqing400065China The Guangdong Key Laboratory of Intelligent Information Processing College of Electronic and Information EngineeringShenzhen UniversityShenzhen518060China College of Information Engineering Shenzhen UniversityShenzhen518060China School of Engineering University of GlasgowGlasgowG128QQUK
In the blockchain,the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the *** blockchain consensus mechanisms have been ***,there is no technical analysis and ... 详细信息
来源: 评论
Analysis of non-Markovian passive quantum linear systems’ response to single-photon input fields*
收藏 引用
IFAC-PapersOnLine 2023年 第2期56卷 5179-5184页
作者: Zhengyi Sun Shibei Xue Zibo Miao Zhiyuan Dong Dewei Li Lulu Pan Min Jiang Department of Automation Shanghai Jiao Tong University Shanghai 200240 P. R. China Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai 200240 P. R. China Shanghai Engineering Research Center of Intelligent Control and Management Shanghai 200240 P. R. China School of Mechanical Engineering and Automation Harbin Institute of Technology Shenzhen Shenzhen 518055 P. R. China School of Electronics and Information Engineering Soochow University Suzhou 215006 P. R. China
In this paper, we analyze the response of passive quantum linear systems in a non-Markovian environment to single photon input fields. Based on an augmented modelling method for non-Markovian quantum systems, analytic... 详细信息
来源: 评论
Gated SwitchGAN for multi-domain facial image translation
arXiv
收藏 引用
arXiv 2021年
作者: Zhang, Xiaokang Zhu, Yuanlue Chen, Wenting Liu, Wenshuang Shen, Linlin Computer Vision Institute School of Computer Science & Software Engineering Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China
Recent studies on multi-domain facial image translation have achieved impressive results. The existing methods generally provide a discriminator with an auxiliary classifier to impose domain translation. However, thes... 详细信息
来源: 评论
SATGAN: Augmenting Age Biased Dataset for Cross-Age Face Recognition
SATGAN: Augmenting Age Biased Dataset for Cross-Age Face Rec...
收藏 引用
International Conference on Pattern Recognition
作者: Wenshuang Liu Wenting Chen Yuanlue Zhu Linlin Shen Computer Vision Institute College of Computer Science and Software Engineering Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University
In this paper, we propose a Stable Age Translation GAN (SATGAN) to generate fake face images at different ages to augment age biased face datasets for Cross-Age Face Recognition (CAFR). The proposed SATGAN consists of... 详细信息
来源: 评论
Dynamic Dense Graph Convolutional Network for Skeleton-based Human Motion Prediction
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Xinshun Zhang, Wanying Wang, Can Gao, Yuan Liu, Mengyuan the National Key Laboratory of General Artificial Intelligence Peking University Shenzhen Graduate School China the School of Intelligent Systems Engineering Sun Yat-sen University China the Multimedia Information Processing Laboratory the Department of Computer Science Kiel University Germany Peking University China the Unit of Computing Sciences CS Faculty of Information Technology and Communication Sciences ITC Tampere University Finland
Graph Convolutional Networks (GCN) which typically follows a neural message passing framework to model dependencies among skeletal joints has achieved high success in skeleton-based human motion prediction task. Never... 详细信息
来源: 评论
MC3D-AD: A Unified Geometry-aware Reconstruction Model for Multi-category 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Cheng, Jiayi Gao, Can Zhou, Jie Wen, Jiajun Dai, Tao Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D Anomaly Detection (AD) is a promising means of controlling the quality of manufactured products. However, existing methods typically require carefully training a task-specific model for each category independently,... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
Decentralized Nonconvex Robust Optimization over Unsafe Multiagent Systems: System Modeling, Utility, Resilience, and Privacy Analysis
arXiv
收藏 引用
arXiv 2024年
作者: Hu, Jinhui Chen, Guo Li, Huaqing Cheng, Huqiang Guo, Xiaoyu Huang, Tingwen School of Automation Central South University Changsha410083 China Department of Biomedical Engineering City University of Hong Kong Kowloon Hong Kong School of Electrical Engineering and Telecommunications University of New South Wales SydneyNSW2052 Australia Chongqing Key Laboratory of Nonlinear Circuits and Intelligent Information Processing College of Electronic and Information Engineering Southwest University Chongqing400715 China Key Laboratory of Dependable Services Computing in Cyber Physical Society Ministry of Education College of Computer Science Chongqing University Chongqing400044 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen518055 China
Privacy leakage and Byzantine failures are two adverse factors to the intelligent decision-making process of multiagent systems (MASs). Considering an unsafe MAS with these two issues, this paper targets the resolutio... 详细信息
来源: 评论