咨询与建议

限定检索结果

文献类型

  • 11,745 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 11,753 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8,139 篇 工学
    • 7,674 篇 计算机科学与技术...
    • 804 篇 机械工程
    • 580 篇 软件工程
    • 376 篇 电气工程
    • 252 篇 控制科学与工程
    • 208 篇 光学工程
    • 85 篇 生物工程
    • 83 篇 信息与通信工程
    • 29 篇 生物医学工程(可授...
    • 23 篇 电子科学与技术(可...
    • 21 篇 化学工程与技术
    • 15 篇 交通运输工程
    • 14 篇 安全科学与工程
    • 10 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 6 篇 材料科学与工程(可...
    • 6 篇 动力工程及工程热...
  • 3,194 篇 医学
    • 3,190 篇 临床医学
    • 11 篇 基础医学(可授医学...
    • 7 篇 公共卫生与预防医...
  • 481 篇 理学
    • 216 篇 物理学
    • 203 篇 系统科学
    • 88 篇 生物学
    • 55 篇 数学
    • 29 篇 统计学(可授理学、...
    • 24 篇 化学
  • 55 篇 管理学
    • 29 篇 图书情报与档案管...
    • 28 篇 管理科学与工程(可...
    • 12 篇 工商管理
  • 17 篇 法学
    • 15 篇 社会学
  • 6 篇 农学
  • 4 篇 教育学
  • 2 篇 经济学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 5,434 篇 computer vision
  • 2,516 篇 training
  • 2,087 篇 pattern recognit...
  • 1,621 篇 computational mo...
  • 1,435 篇 visualization
  • 1,306 篇 three-dimensiona...
  • 1,060 篇 semantics
  • 981 篇 codes
  • 968 篇 benchmark testin...
  • 898 篇 computer archite...
  • 884 篇 deep learning
  • 762 篇 task analysis
  • 681 篇 feature extracti...
  • 536 篇 face recognition
  • 527 篇 conferences
  • 515 篇 transformers
  • 515 篇 neural networks
  • 479 篇 object detection
  • 466 篇 image segmentati...
  • 454 篇 cameras

机构

  • 168 篇 univ sci & techn...
  • 144 篇 univ chinese aca...
  • 144 篇 tsinghua univ pe...
  • 143 篇 carnegie mellon ...
  • 135 篇 chinese univ hon...
  • 112 篇 peng cheng lab p...
  • 108 篇 zhejiang univ pe...
  • 97 篇 swiss fed inst t...
  • 92 篇 tsinghua univers...
  • 92 篇 sensetime res pe...
  • 88 篇 shanghai ai lab ...
  • 85 篇 zhejiang univers...
  • 84 篇 shanghai jiao to...
  • 78 篇 peng cheng labor...
  • 77 篇 university of sc...
  • 77 篇 alibaba grp peop...
  • 76 篇 univ hong kong p...
  • 76 篇 tech univ munich...
  • 76 篇 stanford univ st...
  • 73 篇 university of ch...

作者

  • 76 篇 timofte radu
  • 64 篇 van gool luc
  • 50 篇 zhang lei
  • 44 篇 yang yi
  • 40 篇 loy chen change
  • 34 篇 tao dacheng
  • 32 篇 liu yang
  • 32 篇 chen chen
  • 30 篇 zhou jie
  • 30 篇 tian qi
  • 30 篇 sun jian
  • 28 篇 zha zheng-jun
  • 27 篇 qi tian
  • 26 篇 li xin
  • 26 篇 vasconcelos nuno
  • 26 篇 ying shan
  • 25 篇 liu xiaoming
  • 25 篇 luc van gool
  • 25 篇 boxin shi
  • 24 篇 zheng wei-shi

语言

  • 11,746 篇 英文
  • 7 篇 其他
检索条件"任意字段=2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition, CVPR 2023"
11753 条 记 录,以下是4191-4200 订阅
排序:
Few-shot Image Generation via Cross-domain Correspondence
Few-shot Image Generation via Cross-domain Correspondence
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (cvpr)
作者: Ojha, Utkarsh Li, Yijun Lu, Jingwan Efros, Alexei A. Lee, Yong Jae Shechtman, Eli Zhang, Richard Adobe Res San Jose CA 95110 USA Univ Calif Davis Davis CA 95616 USA Univ Calif Berkeley Berkeley CA USA
Training generative models, such as GANs, on a target domain containing limited examples (e.g., 10) can easily result in overfitting. In this work, we seek to utilize a large source domain for pretraining and transfer... 详细信息
来源: 评论
SemiCVT: Semi-Supervised Convolutional vision Transformer for Semantic Segmentation
SemiCVT: Semi-Supervised Convolutional Vision Transformer fo...
收藏 引用
conference on computer vision and pattern recognition (cvpr)
作者: Huimin Huang Shiao Xie Lanfen Lin Ruofeng Tong Yen-Wei Chen Yuexiang Li Hong Wang Yawen Huang Yefeng Zheng Zhejiang University Zhejiang Lab Ritsumeikan University Tencent Jarvis Lab
Semi-supervised learning improves data efficiency of deep models by leveraging unlabeled samples to alleviate the reliance on a large set of labeled samples. These successes concentrate on the pixel-wise consistency b...
来源: 评论
Learning Discriminative Representations for Skeleton Based Action recognition
Learning Discriminative Representations for Skeleton Based A...
收藏 引用
conference on computer vision and pattern recognition (cvpr)
作者: Huanyu Zhou Qingjie Liu Yunhong Wang State Key Laboratory of Virtual Reality Technology and Systems Beihang University Beijing China Zhongguancun Laboratory Hangzhou Innovation Institute of Beihang University
Human action recognition aims at classifying the category of human action from a segment of a video. Recently, people have dived into designing GCN-based models to extract features from skeletons for performing this t...
来源: 评论
X-Pruner: eXplainable Pruning for vision Transformers
X-Pruner: eXplainable Pruning for Vision Transformers
收藏 引用
conference on computer vision and pattern recognition (cvpr)
作者: Lu Yu Wei Xiang James Cook University La Trobe University
Recently vision transformer models have become prominent models for a range of tasks. These models, however, usually suffer from intensive computational costs and heavy memory requirements, making them impractical for...
来源: 评论
Nutrition5k: Towards Automatic Nutritional Understanding of Generic Food
Nutrition5k: Towards Automatic Nutritional Understanding of ...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (cvpr)
作者: Thames, Quin Karpur, Arjun Norris, Wade Xia, Fangting Panait, Liviu Weyand, Tobias Sim, Jack Google Res Mountain View CA 94043 USA Percept Labs Great Falls VA USA
Understanding the nutritional content of food from visual data is a challenging computer vision problem, with the potential to have a positive and widespread impact on public health. Studies in this area are limited t... 详细信息
来源: 评论
Dual-bridging with Adversarial Noise Generation for Domain Adaptive rPPG Estimation
Dual-bridging with Adversarial Noise Generation for Domain A...
收藏 引用
conference on computer vision and pattern recognition (cvpr)
作者: Jingda Du Si-Qi Liu Bochao Zhang Pong C. Yuen Department of Computer Science Hong Kong Baptist University Hong Kong
The remote photoplethysmography (rPPG) technique can estimate pulse-related metrics (e.g. heart rate and respiratory rate) from facial videos and has a high potential for health monitoring. The latest deep rPPG method...
来源: 评论
AdaBins: Depth Estimation Using Adaptive Bins
AdaBins: Depth Estimation Using Adaptive Bins
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (cvpr)
作者: Bhat, Shariq Farooq Alhashim, Ibraheem Wonka, Peter KAUST Thuwal Saudi Arabia
We address the problem of estimating a high quality dense depth map from a single RGB input image. We start out with a baseline encoder-decoder convolutional neural network architecture and pose the question of how th... 详细信息
来源: 评论
Adaptive Convolutions for Structure-Aware Style Transfer
Adaptive Convolutions for Structure-Aware Style Transfer
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (cvpr)
作者: Chandran, Prashanth Zoss, Gaspard Gotardo, Paulo Gross, Markus Bradley, Derek DisneyRes Studios Zurich Switzerland Swiss Fed Inst Technol Dept Comp Sci Zurich Switzerland
Style transfer between images is an artistic application of CNNs, where the 'style' of one image is transferred onto another image while preserving the latter's content. The state of the art in neural styl... 详细信息
来源: 评论
CoSMo: Content-Style Modulation for Image Retrieval with Text Feedback
CoSMo: Content-Style Modulation for Image Retrieval with Tex...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (cvpr)
作者: Lee, Seungmin Kim, Dongwan Han, Bohyung Seoul Natl Univ Seoul South Korea
We tackle the task of image retrieval with text feedback, where a reference image and modifier text are combined to identify the desired target image. We focus on designing an image-text compositor, i.e., integrating ... 详细信息
来源: 评论
Transferable Adversarial Attacks on vision Transformers with Token Gradient Regularization
Transferable Adversarial Attacks on Vision Transformers with...
收藏 引用
conference on computer vision and pattern recognition (cvpr)
作者: Jianping Zhang Yizhan Huang Weibin Wu Michael R. Lyu Department of Computer Science and Engineering The Chinese University of Hong Kong School of Software Engineering Sun Yat-sen University
vision transformers (ViTs) have been successfully deployed in a variety of computer vision tasks, but they are still vulnerable to adversarial samples. Transfer-based attacks use a local model to generate adversarial ...
来源: 评论