咨询与建议

限定检索结果

文献类型

  • 3,448 篇 会议
  • 2,514 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 5,963 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,009 篇 工学
    • 2,747 篇 计算机科学与技术...
    • 2,290 篇 软件工程
    • 1,028 篇 信息与通信工程
    • 513 篇 电气工程
    • 471 篇 生物工程
    • 431 篇 电子科学与技术(可...
    • 407 篇 控制科学与工程
    • 389 篇 光学工程
    • 300 篇 生物医学工程(可授...
    • 286 篇 机械工程
    • 266 篇 化学工程与技术
    • 207 篇 仪器科学与技术
    • 137 篇 材料科学与工程(可...
    • 136 篇 动力工程及工程热...
    • 134 篇 网络空间安全
    • 110 篇 建筑学
    • 109 篇 交通运输工程
  • 2,200 篇 理学
    • 1,191 篇 数学
    • 660 篇 物理学
    • 524 篇 生物学
    • 366 篇 统计学(可授理学、...
    • 274 篇 化学
    • 168 篇 系统科学
  • 1,062 篇 管理学
    • 563 篇 图书情报与档案管...
    • 541 篇 管理科学与工程(可...
    • 196 篇 工商管理
  • 248 篇 医学
    • 213 篇 临床医学
    • 185 篇 基础医学(可授医学...
    • 117 篇 药学(可授医学、理...
  • 150 篇 法学
    • 117 篇 社会学
  • 84 篇 教育学
  • 77 篇 农学
  • 54 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 12 篇 艺术学
  • 5 篇 哲学

主题

  • 259 篇 feature extracti...
  • 235 篇 semantics
  • 168 篇 training
  • 129 篇 accuracy
  • 122 篇 computational mo...
  • 104 篇 deep learning
  • 104 篇 convolution
  • 88 篇 data mining
  • 82 篇 image segmentati...
  • 79 篇 object detection
  • 77 篇 visualization
  • 76 篇 data models
  • 75 篇 convolutional ne...
  • 73 篇 robustness
  • 69 篇 optimization
  • 66 篇 predictive model...
  • 63 篇 neural networks
  • 60 篇 contrastive lear...
  • 59 篇 face recognition
  • 55 篇 support vector m...

机构

  • 208 篇 shandong provinc...
  • 186 篇 hubei province k...
  • 184 篇 key laboratory o...
  • 145 篇 school of inform...
  • 141 篇 key laboratory o...
  • 133 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 101 篇 fujian provincia...
  • 89 篇 shandong provinc...
  • 75 篇 shandong provinc...
  • 74 篇 national key lab...
  • 72 篇 university of ch...
  • 70 篇 peng cheng labor...
  • 64 篇 school of comput...
  • 61 篇 shanghai key lab...
  • 60 篇 shanghai key lab...
  • 55 篇 hubei province k...
  • 52 篇 fujian provincia...
  • 51 篇 school of comput...

作者

  • 66 篇 li zuoyong
  • 57 篇 li zhaohui
  • 55 篇 huang qingming
  • 51 篇 zhaohui li
  • 42 篇 zhang fuquan
  • 41 篇 li chenglong
  • 34 篇 li wei
  • 31 篇 fan li
  • 31 篇 tang jin
  • 30 篇 guo di
  • 30 篇 wang wei
  • 30 篇 shen linlin
  • 29 篇 zuoyong li
  • 29 篇 boxin shi
  • 26 篇 liu yang
  • 26 篇 yang zhiyong
  • 26 篇 feng rui
  • 25 篇 wang xiao
  • 25 篇 li fan
  • 25 篇 he liang

语言

  • 5,589 篇 英文
  • 235 篇 其他
  • 146 篇 中文
  • 4 篇 德文
  • 4 篇 法文
  • 1 篇 意大利文
检索条件"机构=The Provincial Key Laboratory for Computer Information Processing Technology"
5963 条 记 录,以下是4891-4900 订阅
排序:
Submodularity-based False Data Injection Attack Scheme in Multi-agent Dynamical Systems
arXiv
收藏 引用
arXiv 2022年
作者: Luo, Xiaoyu Zhao, Chengcheng Fang, Chongrong He, Jianping The Department of Automation Shanghai Jiao Tong University Key Laboratory of System Control and Information Processing Ministry of Education of China Shanghai200240 China The State Key Laboratory of Industrial Control Technology Institute of Cyberspace Research Zhejiang University China The Department of Electrical and Computer Engineering University of Victoria BC Canada
Consensus in multi-agent dynamical systems is prone to be sabotaged by the adversary, which has attracted much attention due to its key role in broad applications. In this paper, we study a new false data injection (F... 详细信息
来源: 评论
Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
收藏 引用
Journal of information Hiding and Multimedia Signal processing 2015年 第3期6卷 523-533页
作者: Lyu, Wan-Li Chang, Chin-Chen Wang, Feng Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui University Hefei230039 China Department of Information Engineering and Computer Science Feng Chia University 100 Wenhwa Rd Seatwen Taichung40724 Taiwan Department of Mathematics and Physics Fujian University of Technology Fuzhou Fujian350108 China
An authentication scheme that uses rehashing and secret sharing methods to verify the reality of a color image’s content is proposed in this paper. First, the proposed scheme uses Shamir’s secret sharing method to s... 详细信息
来源: 评论
Feature selection method for 3d terrain model based on profile recognition and polygon-breaking algorithm
收藏 引用
ICIC Express Letters 2013年 第3 A期7卷 741-746页
作者: Zhang, Huijie Ma, Zhiqiang Ren, Guangxu Wu, Di Yang, Fengqin School of Computer Science and Information Technology Jilin Universities Northeast Normal University No. 2555 Jingyue Street Changchun 130117 China Key Laboratory of Intelligent Information Processing Jilin Universities Northeast Normal University No. 2555 Jingyue Street Changchun 130117 China Aviation University of Air Force Changchun 130022 China
This paper presents a framework to support feature visualization in 3D terrain roaming. In this framework, feature points are redefined based on the target points of profile recognition and polygon-breaking algorithm,... 详细信息
来源: 评论
A new warped discrete fourier transform algorithm and its application to whisper enhancement
收藏 引用
ICIC Express Letters, Part B: Applications 2012年 第1期3卷 21-28页
作者: Zhou, Jian Liang, Ruiyu Tao, Liang Zhao, Li Zou, Cairong Key Laboratory of Underwater Acoustic Signal Processing of Ministry of Education Southeast University No. 2 Sipailou Nanjing 210096 China School of Computer Science and Technology Anhui University No. 3 Feixi Road Hefei 230601 China College of Computer and Information Hohai University No. 1 Xikang Road Nanjing 210098 China
Warped Discrete Fourier Transform (WDFT) is able to increase frequency resolution at any selected parts of spectral axis without extending the number of sampling points. However, in ordinary WDFT synthesis block, inve... 详细信息
来源: 评论
Distributed resource scheduling for large-scale MEC systems: A multi-agent ensemble deep reinforcement learning with imitation acceleration
arXiv
收藏 引用
arXiv 2020年
作者: Jiang, Feibo Dong, Li Wang, Kezhi Yang, Kun Pan, Cunhua Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China Key Laboratory of Hunan Province for New Retail Virtual Reality Technology Hunan University of Commerce Changsha China Department of Computer and Information Sciences Northumbria University United Kingdom School of Computer Sciences and Electrical Engineering University of Essex ColchesterCO4 3SQ United Kingdom School of Electronic Engineering and Computer Science Queen Mary University of London LondonE1 4NS United Kingdom
We consider the optimization of distributed resource scheduling to minimize the sum of task latency and energy consumption for all the Internet of things devices (IoTDs) in a large-scale mobile edge computing (MEC) sy... 详细信息
来源: 评论
Hyperspectral light field stereo matching
arXiv
收藏 引用
arXiv 2017年
作者: Zhu, Kang Xue, Yujia Fu, Qiang Kang, Sing Bing Chen, Xilin Yu, Jingyi School of Information Science and Technology ShanghaiTech University Shanghai China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China Plex-VR Inc. Shanghai Microsoft Research RedmondWA United States Department of Computer and Information Sciences University of Delaware NewarkDE United States
In this paper, we describe how scene depth can be extracted using a hyperspectral light field capture (H-LF) system. Our H-LF system consists of a 5 × 6 array of cameras, with each camera sampling a different nar... 详细信息
来源: 评论
A Defense Framework for Backdoor Attacks in Federated Learning Based on Client-Server Detection
A Defense Framework for Backdoor Attacks in Federated Learni...
收藏 引用
Industrial Automation, Robotics and Control Engineering (IARCE), International Conference on
作者: Ding Chen Tianrui Li Cai Yu Rasha Al-Huthaifi Wei Huang School of Computing and Artificial Intelligence Southwest Jiaotong University Chengdu China Sichuan Provincial Key Laboratory of Cyberspace Security School of Cybersecurity Chengdu University of Information Technology Chengdu China School of Cybersecurity Chengdu University of Information Technology Chengdu China College of Computer and Data Science Fuzhou University Fuzhou China
Addressing the challenge of backdoor attacks in federated learning (FL), various defense schemes are examined, resulting in the proposal of a comprehensive strategy that incorporates both client-side and server-side m... 详细信息
来源: 评论
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
Research on liquid crystal display technology based on regional dynamic dimming algorithm
Research on liquid crystal display technology based on regio...
收藏 引用
IEEE International Conference on Data Science in Cyberspace (DSC)
作者: Zhitao Yu Peng Sun Mingle Zhou Qianlong Liu Shilong Zhao Hisense Video Technology Co. Ltd Qing Dao China Hisense Visual Technology Co. Ltd Qing Dao China Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computer Networks Shandong Fundamental Research Center for Computer Science Jinan China
In vehicle liquid crystal display (LCD) technology has attracted much attention for its wide range of applications in automotive infotainment systems. However, conventional LCD technologies have limitations in terms o... 详细信息
来源: 评论