咨询与建议

限定检索结果

文献类型

  • 23,000 篇 会议
  • 126 册 图书
  • 92 篇 期刊文献

馆藏范围

  • 23,217 篇 电子文献
  • 1 种 纸本馆藏

日期分布

学科分类号

  • 13,623 篇 工学
    • 11,107 篇 计算机科学与技术...
    • 3,479 篇 软件工程
    • 2,444 篇 机械工程
    • 1,717 篇 光学工程
    • 1,076 篇 电气工程
    • 1,014 篇 控制科学与工程
    • 784 篇 信息与通信工程
    • 411 篇 仪器科学与技术
    • 352 篇 生物工程
    • 251 篇 生物医学工程(可授...
    • 196 篇 电子科学与技术(可...
    • 114 篇 化学工程与技术
    • 107 篇 安全科学与工程
    • 100 篇 测绘科学与技术
    • 88 篇 建筑学
    • 86 篇 交通运输工程
    • 84 篇 土木工程
  • 3,493 篇 医学
    • 3,480 篇 临床医学
    • 81 篇 基础医学(可授医学...
  • 3,241 篇 理学
    • 1,939 篇 物理学
    • 1,640 篇 数学
    • 563 篇 统计学(可授理学、...
    • 500 篇 生物学
    • 249 篇 系统科学
    • 106 篇 化学
  • 521 篇 管理学
    • 311 篇 图书情报与档案管...
    • 223 篇 管理科学与工程(可...
    • 76 篇 工商管理
  • 276 篇 艺术学
    • 276 篇 设计学(可授艺术学...
  • 66 篇 法学
    • 63 篇 社会学
  • 38 篇 农学
  • 28 篇 教育学
  • 22 篇 经济学
  • 10 篇 军事学
  • 3 篇 文学

主题

  • 10,187 篇 computer vision
  • 3,967 篇 pattern recognit...
  • 3,010 篇 training
  • 2,002 篇 computational mo...
  • 1,816 篇 cameras
  • 1,814 篇 visualization
  • 1,515 篇 feature extracti...
  • 1,482 篇 shape
  • 1,459 篇 three-dimensiona...
  • 1,439 篇 image segmentati...
  • 1,289 篇 robustness
  • 1,203 篇 computer archite...
  • 1,158 篇 semantics
  • 1,148 篇 conferences
  • 1,106 篇 layout
  • 1,093 篇 computer science
  • 1,088 篇 object detection
  • 1,024 篇 benchmark testin...
  • 967 篇 codes
  • 921 篇 face recognition

机构

  • 136 篇 univ sci & techn...
  • 121 篇 univ chinese aca...
  • 118 篇 chinese univ hon...
  • 107 篇 carnegie mellon ...
  • 101 篇 tsinghua univers...
  • 101 篇 microsoft resear...
  • 97 篇 swiss fed inst t...
  • 93 篇 zhejiang univ pe...
  • 82 篇 university of sc...
  • 81 篇 zhejiang univers...
  • 80 篇 university of ch...
  • 77 篇 shanghai ai lab ...
  • 72 篇 shanghai jiao to...
  • 69 篇 national laborat...
  • 68 篇 microsoft res as...
  • 66 篇 alibaba grp peop...
  • 64 篇 adobe research
  • 60 篇 peking univ peop...
  • 59 篇 univ oxford oxfo...
  • 59 篇 tsinghua univ pe...

作者

  • 81 篇 van gool luc
  • 71 篇 timofte radu
  • 64 篇 zhang lei
  • 51 篇 luc van gool
  • 41 篇 li stan z.
  • 40 篇 yang yi
  • 37 篇 loy chen change
  • 35 篇 chen chen
  • 33 篇 xiaoou tang
  • 33 篇 qi tian
  • 32 篇 liu yang
  • 32 篇 pascal fua
  • 31 篇 tian qi
  • 31 篇 sun jian
  • 30 篇 murino vittorio
  • 29 篇 darrell trevor
  • 28 篇 li xin
  • 28 篇 li fei-fei
  • 27 篇 vasconcelos nuno
  • 27 篇 hanqing lu

语言

  • 23,023 篇 英文
  • 166 篇 其他
  • 22 篇 中文
  • 5 篇 土耳其文
  • 2 篇 日文
检索条件"任意字段=IEEE Conference on Computer Vision and Pattern Recognition Workshops"
23218 条 记 录,以下是991-1000 订阅
排序:
Ante-Hoc Generation of Task-Agnostic Interpretation Maps
Ante-Hoc Generation of Task-Agnostic Interpretation Maps
收藏 引用
2023 ieee/CVF conference on computer vision and pattern recognition workshops, CVPRW 2023
作者: Akash Guna, R.T. Benitez, Raul Sikha, O.K. Amrita School of Engineering Department of Computer Science and Engineering Coimbatore India Universitat Politècnica de Catalunya BarcelonaTech Departament of Automatic Control Spain
Existing explainability approaches for convolutional neural networks (CNNs) are mainly applied after training (post-hoc) which is generally unreliable. Ante-hoc explainers trained simultaneously with the CNN are more ... 详细信息
来源: 评论
Fast and Memory-Efficient Network Towards Efficient Image Super-Resolution
Fast and Memory-Efficient Network Towards Efficient Image Su...
收藏 引用
ieee/CVF conference on computer vision and pattern recognition (CVPR)
作者: Du, Zongcai Liu, Ding Liu, Jie Tang, Jie Wu, Gangshan Fu, Lean Nanjing Univ State Key Lab Novel Software Technol Nanjing Peoples R China ByteDance Inc Beijing Peoples R China
Runtime and memory consumption are two important aspects for efficient image super-resolution (EISR) models to be deployed on resource-constrained devices. Recent advances in EISR [16, 32] exploit distillation and agg... 详细信息
来源: 评论
EFE: End-to-end Frame-to-Gaze Estimation
EFE: End-to-end Frame-to-Gaze Estimation
收藏 引用
2023 ieee/CVF conference on computer vision and pattern recognition workshops, CVPRW 2023
作者: Balim, Haldun Park, Seonwook Wang, Xi Zhang, Xucong Hilliges, Otmar ETH Zürich Department of Computer Science Switzerland Lunit Inc. Delft University of Technology Computer Vision Lab Netherlands
Despite the recent development of learning-based gaze estimation methods, most methods require one or more eye or face region crops as inputs and produce a gaze direction vector as output. Cropping results in a higher... 详细信息
来源: 评论
Dual Attention Poser: Dual Path Body Tracking Based on Attention
Dual Attention Poser: Dual Path Body Tracking Based on Atten...
收藏 引用
2023 ieee/CVF conference on computer vision and pattern recognition workshops, CVPRW 2023
作者: Di, Xinhan Dai, Xiaokun Zhang, Xinkang Chen, Xinrong Fudan Universiry Academy for Engineering&Technology China Deepearthgo Fudan University Shanghai Key Laboratory of Medical Image Computing and Computer Assisted Intervention China
Currently, mixed reality head-mounted displays tracking the full body of users is an important human-computer interaction mode through the pose of the head and the hands. Unfortunately, users' virtual representati... 详细信息
来源: 评论
MARRS: Modern Backbones Assisted Co-training for Rapid and Robust Semi-Supervised Domain Adaptation
MARRS: Modern Backbones Assisted Co-training for Rapid and R...
收藏 引用
2023 ieee/CVF conference on computer vision and pattern recognition workshops, CVPRW 2023
作者: Jain, Saurabh Kumar Das, Sukhendu Indian Institute of Technology Visualization and Perception Lab Department of Computer Science Engineering Madras India
Semi-Supervised Domain Adaptation (SSDA) aims to develop domain invariant models from scarcely labeled target domain in addition to the fully labeled source domain. Current SSDA works are often applied in conjunction ... 详细信息
来源: 评论
A Hybrid Network of CNN and Transformer for Lightweight Image Super-Resolution
A Hybrid Network of CNN and Transformer for Lightweight Imag...
收藏 引用
ieee/CVF conference on computer vision and pattern recognition (CVPR)
作者: Fang, Jinsheng Lin, Hanjiang Chen, Xinyu Zeng, Kun Minnan Normal Univ Zhangzhou Peoples R China Minjiang Univ Fuzhou Fujian Peoples R China
Recently, a number of CNN based methods have made great progress in single image super-resolution. However, these existing architectures commonly build massive number of network layers, bringing high computational com... 详细信息
来源: 评论
CLIP2Protect: Protecting Facial Privacy using Text-Guided Makeup via Adversarial Latent Search
CLIP2Protect: Protecting Facial Privacy using Text-Guided Ma...
收藏 引用
ieee/CVF conference on computer vision and pattern recognition (CVPR)
作者: Shamshad, Fahad Naseer, Muzammal Nandakumar, Karthik Mohamed Bin Zayed Univ AI Abu Dhabi U Arab Emirates
The success of deep learning based face recognition systems has given rise to serious privacy concerns due to their ability to enable unauthorized tracking of users in the digital world. Existing methods for enhancing... 详细信息
来源: 评论
A Unified Model for Face Matching and Presentation Attack Detection using an Ensemble of vision Transformer Features
A Unified Model for Face Matching and Presentation Attack De...
收藏 引用
23rd ieee/CVF Winter conference on Applications of computer vision (WACV)
作者: Al-Refai, Rouqaiah Nandakumar, Karthik Mohamed Bin Zayed Univ Artificial Intelligence Abu Dhabi U Arab Emirates
A typical automated face recognition system is composed of three main component tasks: face detection and alignment (FDA), face presentation attack detection (FPAD), and face representation and matching (FRM). These t... 详细信息
来源: 评论
Contrastive Learning-based Robust Object Detection under Smoky Conditions
Contrastive Learning-based Robust Object Detection under Smo...
收藏 引用
ieee/CVF conference on computer vision and pattern recognition (CVPR)
作者: Wu, Wei Chang, Hao Zheng, Yonghua Li, Zhu Chen, Zhiwen Zhang, Ziheng Xidian Univ State Key Lab Integrated Serv Networks Xian Peoples R China Univ Missouri Dept Comp Sci & Elect Engn Kansas City MO 64110 USA
Object detection is to effectively find out interested targets in images and then accurately determine their categories and positions. Recently many excellent methods have been developed to provide powerful detection ... 详细信息
来源: 评论
Strengthening the Transferability of Adversarial Examples Using Advanced Looking Ahead and Self-CutMix
Strengthening the Transferability of Adversarial Examples Us...
收藏 引用
ieee/CVF conference on computer vision and pattern recognition (CVPR)
作者: Jang, Donggon Son, Sanghyeok Kim, Dae-Shik Korea Adv Inst Sci & Technol KAIST Daejeon South Korea
Deep neural networks (DNNs) are vulnerable to adversarial examples generated by adding malicious noise imperceptible to a human. The adversarial examples successfully fool the models under the white-box setting, but t... 详细信息
来源: 评论