咨询与建议

限定检索结果

文献类型

  • 3,317 篇 会议
  • 3 篇 期刊文献

馆藏范围

  • 3,320 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,915 篇 工学
    • 1,820 篇 计算机科学与技术...
    • 376 篇 软件工程
    • 142 篇 机械工程
    • 136 篇 光学工程
    • 42 篇 生物工程
    • 28 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 9 篇 电气工程
    • 9 篇 电子科学与技术(可...
    • 9 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 8 篇 生物医学工程(可授...
    • 7 篇 安全科学与工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 建筑学
    • 3 篇 土木工程
    • 3 篇 农业工程
  • 174 篇 理学
    • 136 篇 物理学
    • 43 篇 生物学
    • 29 篇 数学
    • 16 篇 统计学(可授理学、...
    • 10 篇 化学
  • 29 篇 医学
    • 28 篇 临床医学
    • 3 篇 基础医学(可授医学...
  • 15 篇 管理学
    • 8 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 3 篇 工商管理
  • 5 篇 法学
    • 3 篇 社会学
    • 2 篇 法学
  • 2 篇 教育学
    • 2 篇 教育学
  • 2 篇 农学
  • 1 篇 经济学

主题

  • 1,179 篇 computer vision
  • 801 篇 conferences
  • 570 篇 training
  • 484 篇 pattern recognit...
  • 330 篇 computational mo...
  • 279 篇 computer archite...
  • 255 篇 visualization
  • 180 篇 feature extracti...
  • 160 篇 neural networks
  • 153 篇 semantics
  • 152 篇 task analysis
  • 145 篇 cameras
  • 143 篇 deep learning
  • 140 篇 three-dimensiona...
  • 139 篇 benchmark testin...
  • 126 篇 low-level vision
  • 117 篇 vision
  • 115 篇 language
  • 113 篇 image segmentati...
  • 112 篇 estimation

机构

  • 35 篇 tsinghua univ pe...
  • 34 篇 univ sci & techn...
  • 28 篇 shanghai ai lab ...
  • 26 篇 chinese univ hon...
  • 25 篇 university of sc...
  • 25 篇 tsinghua univers...
  • 24 篇 peng cheng labor...
  • 23 篇 swiss fed inst t...
  • 23 篇 swiss fed inst t...
  • 23 篇 peng cheng lab p...
  • 22 篇 zhejiang univ pe...
  • 22 篇 carnegie mellon ...
  • 20 篇 univ chinese aca...
  • 20 篇 university of ch...
  • 18 篇 harbin inst tech...
  • 18 篇 shanghai jiao to...
  • 18 篇 sensetime res pe...
  • 16 篇 hong kong univ s...
  • 15 篇 fudan univ peopl...
  • 14 篇 national key lab...

作者

  • 60 篇 timofte radu
  • 26 篇 radu timofte
  • 19 篇 van gool luc
  • 16 篇 lei lei
  • 15 篇 loy chen change
  • 15 篇 qiao yu
  • 14 篇 fan haoqiang
  • 13 篇 zhang yulun
  • 13 篇 liu shuaicheng
  • 13 篇 luc van gool
  • 12 篇 chen chen
  • 12 篇 chen wei-ting
  • 12 篇 li chongyi
  • 11 篇 wangmeng zuo
  • 11 篇 pan jinshan
  • 11 篇 marcos v. conde
  • 10 篇 wei dong
  • 10 篇 zhou shangchen
  • 10 篇 suiyi zhao
  • 10 篇 yu lei

语言

  • 3,319 篇 英文
  • 1 篇 其他
检索条件"任意字段=2023 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, CVPRW 2023"
3320 条 记 录,以下是21-30 订阅
排序:
On Visible Adversarial Perturbations & Digital Watermarking  31
On Visible Adversarial Perturbations & Digital Watermarking
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Hayes, Jamie UCL London England
Given a machine learning model, adversarial perturbations transform images such that the model's output is classified as an attacker chosen class. Most research in this area has focused on adversarial perturbation... 详细信息
来源: 评论
Designing a Moral Compass for the Future of computer vision using Speculative Analysis  30
Designing a Moral Compass for the Future of Computer Vision ...
收藏 引用
30th ieee/cvf conference on computer vision and pattern recognition workshops (cvprw)
作者: Skirpan, Michael Yeh, Tom Univ Colorado Boulder CO 80309 USA
In this paper we discuss and analyze possible futures for technologies in the field of computer vision (CV). Using a method we have coined speculative analysis we take a broad look at research trends in the field to c... 详细信息
来源: 评论
Intelligent Scene Caching to Improve Accuracy for Energy-Constrained Embedded vision
Intelligent Scene Caching to Improve Accuracy for Energy-Con...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Simpson, Benjamin Lubana, Ekdeep Liu, Yuchen Dick, Robert Univ Michigan Ann Arbor MI 48109 USA
We describe an efficient method of improving the performance of vision algorithms operating on video streams by reducing the amount of data captured and transferred from image sensors to analysis servers in a data-awa... 详细信息
来源: 评论
I Find Your Lack of Uncertainty in computer vision Disturbing
I Find Your Lack of Uncertainty in Computer Vision Disturbin...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Valdenegro-Toro, Matias German Res Ctr Artificial Intelligence Robert Hooke Str 1 D-28359 Bremen Germany
Neural networks are used for many real world applications, but often they have problems estimating their own confidence. This is particularly problematic for computer vision applications aimed at making high stakes de... 详细信息
来源: 评论
Delta Sampling R-BERT for limited data and low-light action recognition
Delta Sampling R-BERT for limited data and low-light action ...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Hira, Sanchit Das, Ritwik Modi, Abhinav Pakhomov, Daniil Johns Hopkins Univ Baltimore MD 21218 USA
We present an approach to perform supervised action recognition in the dark. In this work, we present our results on the ARID dataset[60]. Most previous works only evaluate performance on large, well illuminated datas... 详细信息
来源: 评论
Multi-Class Multi-Movement Vehicle Counting Based on CenterTrack
Multi-Class Multi-Movement Vehicle Counting Based on CenterT...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Kocur, Viktor Ftacnik, Milan Comenius Univ Fac Math Phys & Informat Bratislava Slovakia
In this paper we present our approach to the Track 1 of the 2021 AI City Challenge. The goal of the challenge track is to to analyse footage captured with traffic cameras by counting the number of vehicles performing ... 详细信息
来源: 评论
MIPI 2024 Challenge on Nighttime Flare Removal: Methods and Results
MIPI 2024 Challenge on Nighttime Flare Removal: Methods and ...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Dai, Yuekun Zhang, Dafeng Li, Xiaoming Yue, Zongsheng Li, Chongyi Zhou, Shangchen Feng, Ruicheng Yang, Peiqing Jin, Zhezhu Liu, Guanqun Loy, Chen Change Nanyang Technol Univ S Lab Singapore Singapore Samsung Res China Nanjing Peoples R China Nankai Univ Tianjin Peoples R China
The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the... 详细信息
来源: 评论
BOP Challenge 2023 on Detection, Segmentation and Pose Estimation of Seen and Unseen Rigid Objects
BOP Challenge 2023 on Detection, Segmentation and Pose Estim...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Hodan, Tomas Sundermeyer, Martin Labbe, Yann Nguyen, Van Nguyen Wang, Gu Brachmann, Eric Drost, Bertram Lepetit, Vincent Rother, Carsten Matas, Jiri Meta Zurich Switzerland Google Munich Germany ENPC Paris France Tsinghua Univ Beijing Peoples R China Niantic San Francisco CA USA MVTec Munich Germany Heidelberg Univ Heidelberg Germany Czech Tech Univ Prague Czech Republic
We present the evaluation methodology, datasets and results of the BOP Challenge 2023, the fifth in a series of public competitions organized to capture the state of the art in model-based 6D object pose estimation fr... 详细信息
来源: 评论
NTIRE 2021 Challenge on Quality Enhancement of Compressed Video: Dataset and Study
NTIRE 2021 Challenge on Quality Enhancement of Compressed Vi...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Yang, Ren Timofte, Radu Swiss Fed Inst Technol Comp Vis Lab Zurich Switzerland
This paper introduces a novel dataset for video enhancement and studies the state-of-the-art methods of the NTIRE 2021 challenge on quality enhancement of compressed video. The challenge is the first NTIRE challenge i... 详细信息
来源: 评论
Privacy Leakage of Adversarial Training Models in Federated Learning Systems
Privacy Leakage of Adversarial Training Models in Federated ...
收藏 引用
ieee/cvf conference on computer vision and pattern recognition (CVPR)
作者: Zhang, Jingyang Chen, Yiran Li, Hai Duke Univ Dept Elect & Comp Engn Durham NC 27706 USA
Adversarial Training (AT) is crucial for obtaining deep neural networks that are robust to adversarial attacks, yet recent works found that it could also make models more vulnerable to privacy attacks. In this work, w... 详细信息
来源: 评论