咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 9 篇 会议

馆藏范围

  • 20 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 11 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 信息与通信工程
    • 4 篇 控制科学与工程
    • 3 篇 网络空间安全
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 电气工程
    • 1 篇 化学工程与技术
    • 1 篇 生物工程
  • 7 篇 管理学
    • 5 篇 图书情报与档案管...
    • 2 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学

主题

  • 1 篇 object detection
  • 1 篇 semantic segment...
  • 1 篇 decentralized fi...
  • 1 篇 sparse matrices
  • 1 篇 learning algorit...
  • 1 篇 optimization
  • 1 篇 contrastive lear...
  • 1 篇 computational mo...
  • 1 篇 refining
  • 1 篇 smart contract
  • 1 篇 predictive model...
  • 1 篇 navigation
  • 1 篇 particle swarm o...
  • 1 篇 semantics
  • 1 篇 analytical model...
  • 1 篇 machine learning
  • 1 篇 steganography
  • 1 篇 embeddings
  • 1 篇 forecasting
  • 1 篇 adaptation model...

机构

  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 key laboratory o...
  • 6 篇 school of cyber ...
  • 4 篇 institute of inf...
  • 3 篇 key lab of intel...
  • 3 篇 school of cyber ...
  • 2 篇 guangxi cooperat...
  • 2 篇 school of softwa...
  • 2 篇 state key labora...
  • 2 篇 school of comput...
  • 2 篇 guangxi colleges...
  • 2 篇 alibaba group
  • 2 篇 school of cyber ...
  • 1 篇 department of ma...
  • 1 篇 college of compu...
  • 1 篇 guangdong key la...
  • 1 篇 chongqing three ...
  • 1 篇 chongqing univer...

作者

  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 6 篇 yang zhiyong
  • 6 篇 cao xiaochun
  • 4 篇 wang zitai
  • 4 篇 meng benyuan
  • 3 篇 bao shilong
  • 2 篇 huang jiwu
  • 2 篇 li yixuan
  • 2 篇 chen gang
  • 2 篇 feng lei
  • 2 篇 zhao junbo
  • 2 篇 wang haobo
  • 2 篇 xiaochun lei
  • 2 篇 jiang yangbangya...
  • 2 篇 han boyu
  • 2 篇 junyan chen
  • 2 篇 wen peisong
  • 1 篇 yuan he
  • 1 篇 xiaochun cao

语言

  • 18 篇 英文
  • 2 篇 其他
检索条件"机构=Chongqing Key Lab. of Big Data and Intelligent Computing"
20 条 记 录,以下是1-10 订阅
排序:
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation  38
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmenta...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan...
来源: 评论
Pattern Synthesis of MIMO Radar Based on Immune Differential Evolution Algorithm
Pattern Synthesis of MIMO Radar Based on Immune Differential...
收藏 引用
2020 International Conference on Modeling, big data Analytics and Simulation, MBDAS 2020
作者: Jiang, Ling Jiang, Yi Chen, Guangfu Shi, Guimin Cheng, Qi School of Mathematics and Computer Wuyi University Wuyishan354300 China Key Lab. of Cogn. Computing and Intelligent Information Processing of Fujian Education Institutions Wuyishan354300 China Big Data Development Administration of Anji County Huzhou313000 China
In order to optimize the pattern synthesis of multiple input and multiple output (MIMO) radar, immune mechanism is adopted to overcome the premature risk of differential evolution (DE) algorithm, namely immune differe... 详细信息
来源: 评论
Accurate Latent Factor Analysis via Particle Swarm Optimizers
Accurate Latent Factor Analysis via Particle Swarm Optimizer...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Jia Chen Xin Luo MengChu Zhou School of Cyber Science and Technology Beihang University Beijing China Chongqing Key Lab. of Big Data and Intelligent Computing and the Chongqing Engineering Research Center of Big Data Application for Smart Cities Chongqing Institute of Green and Intelligent Technology Chongqing School University of Chinese Academy of Sciences Chongqing China New Jersey Institute of Technology Newark NJ USA
A stochastic-gradient-descent-based Latent Factor Analysis (LFA) model is highly efficient in representative learning of a High-Dimensional and Sparse (HiDS) matrix. Its learning rate adaptation is vital in ensuring i... 详细信息
来源: 评论
Design of People Flow Monitoring System in Public Place based on MD-MCNN
Design of People Flow Monitoring System in Public Place base...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Tianmin, Xiong Xiaochun, Lei Xingwen, Zheng Junyan, Chen Yizhou, Feng School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Lab. of Intelligent Processing of Computer Images and Graphics Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
Due to the limitation of hardware resources, the traditional people flow monitoring system based on computer vision in public places can't meet different crowd-scale scenarios. Therefore, a people flow monitoring ... 详细信息
来源: 评论
Design of intelligent Robot Platform based on Multi-sensor Fusion
Design of Intelligent Robot Platform based on Multi-sensor F...
收藏 引用
2020 International Conference on 5G Mobile Communication and Information Science, MCIS-5G 2020
作者: Dajin, Ya Xiaochun, Lei Yue, Li Junyan, Chen Rongcun, Huang Lin, Lan School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Lab. of Intelligent Processing of Computer Images and Graphics Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
The mobile robot adapts to the more complicated indoor and outdoor environments, and can expand its scope of application. In order to reduce the influence of the cumulative error caused by navigation in complex enviro... 详细信息
来源: 评论
Blockchain-Based Homomorphic Transaction Framework for Enhanced Consumer Security and Business Scalab.lity
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Guo, Tao Shang, Fengjun Dai, Xiangguang Liu, Qilie Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing400065 China Chongqing Three Gorges University Key Lab. of Intelligent Info. Proc. and Contr. of Chongqing Munic. Institutions of Higher Education Chongqing Engineering Research Center of Internet of Things and Intelligent Control Technology School of Three Gorges Artificial Intelligence Chongqing400044 China Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China
Energy trading in distributed microgrids represents an effective means of enhancing the utilization of renewable energy. However, the aggregation of large-scale consumption data may encounter business scalab.lity issu... 详细信息
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan... 详细信息
来源: 评论