咨询与建议

限定检索结果

文献类型

  • 446 篇 会议
  • 319 篇 期刊文献

馆藏范围

  • 765 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 503 篇 工学
    • 337 篇 计算机科学与技术...
    • 302 篇 软件工程
    • 101 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 91 篇 生物工程
    • 81 篇 生物医学工程(可授...
    • 60 篇 光学工程
    • 56 篇 机械工程
    • 40 篇 电气工程
    • 40 篇 化学工程与技术
    • 31 篇 电子科学与技术(可...
    • 30 篇 仪器科学与技术
    • 19 篇 交通运输工程
    • 18 篇 建筑学
    • 16 篇 力学(可授工学、理...
    • 16 篇 土木工程
    • 11 篇 动力工程及工程热...
    • 11 篇 安全科学与工程
  • 290 篇 理学
    • 128 篇 数学
    • 96 篇 生物学
    • 91 篇 物理学
    • 36 篇 化学
    • 36 篇 统计学(可授理学、...
    • 22 篇 系统科学
  • 114 篇 管理学
    • 59 篇 图书情报与档案管...
    • 56 篇 管理科学与工程(可...
    • 17 篇 工商管理
  • 61 篇 医学
    • 58 篇 临床医学
    • 34 篇 基础医学(可授医学...
    • 30 篇 药学(可授医学、理...
  • 10 篇 法学
  • 9 篇 经济学
  • 5 篇 农学
  • 1 篇 教育学

主题

  • 34 篇 feature extracti...
  • 26 篇 training
  • 19 篇 computational mo...
  • 19 篇 semantics
  • 18 篇 task analysis
  • 17 篇 deep learning
  • 17 篇 neural networks
  • 17 篇 cameras
  • 15 篇 computer vision
  • 13 篇 object detection
  • 13 篇 robots
  • 12 篇 deep neural netw...
  • 12 篇 generative adver...
  • 12 篇 electroencephalo...
  • 11 篇 visualization
  • 11 篇 machine learning
  • 11 篇 mathematical mod...
  • 11 篇 forecasting
  • 10 篇 robustness
  • 9 篇 conferences

机构

  • 250 篇 key laboratory o...
  • 200 篇 school of comput...
  • 79 篇 school of data a...
  • 62 篇 guangdong provin...
  • 57 篇 peng cheng labor...
  • 52 篇 university of ch...
  • 48 篇 shenzhen college...
  • 35 篇 guangdong-hong k...
  • 34 篇 cas key laborato...
  • 34 篇 guangdong provin...
  • 27 篇 key laboratory o...
  • 27 篇 sun yat-sen univ...
  • 24 篇 guangdong key la...
  • 22 篇 cas key laborato...
  • 21 篇 cas key laborato...
  • 20 篇 school of electr...
  • 19 篇 guangdong key la...
  • 19 篇 shenzhen institu...
  • 19 篇 research institu...
  • 18 篇 the school of co...

作者

  • 125 篇 zheng wei-shi
  • 56 篇 wu xinyu
  • 45 篇 wei-shi zheng
  • 39 篇 yunong zhang
  • 36 篇 xie xiaohua
  • 30 篇 lai jianhuang
  • 25 篇 lai jian-huang
  • 24 篇 xinyu wu
  • 24 篇 guanglin li
  • 23 篇 li guanglin
  • 21 篇 wang ruixuan
  • 19 篇 wang chang-dong
  • 18 篇 hu jian-fang
  • 17 篇 wang can
  • 17 篇 wu ancong
  • 15 篇 yang lingxiao
  • 14 篇 wu xiao-ming
  • 14 篇 zhang yunong
  • 14 篇 chen shixiong
  • 13 篇 feng wei

语言

  • 707 篇 英文
  • 56 篇 其他
  • 2 篇 中文
检索条件"机构=Guangdong Key Laboratory of Machine Intelligence and Advanced Computing"
765 条 记 录,以下是201-210 订阅
排序:
Bone Layer Perception in Milling Process Based on Video Sequence Images during Robot-assisted Laminectomy
Bone Layer Perception in Milling Process Based on Video Sequ...
收藏 引用
2022 IEEE International Conference on Robotics and Biomimetics, ROBIO 2022
作者: Li, Haiyang Li, Meng Qi, Xiaozhi Yang, Yuanyuan Hu, Ying Shenyang Aerospace University China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Harbin Institute of Technology China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Guangdong-Hong Kong-Macao Joint Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
To optimize the operation ability of the autonomous robot under the background of complex surgery, this paper extracted the state features of milling video sequence images to realize bone layer perception and improve ... 详细信息
来源: 评论
IMPROVING WEAKLY SUPERVISED OBJECT LOCALIZATION BY UNCERTAINTY ESTIMATION OF PSEUDO SUPERVISION
IMPROVING WEAKLY SUPERVISED OBJECT LOCALIZATION BY UNCERTAIN...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Chen, Xi Ma, Andy J. Guo, Nanxi Chen, Jiajia School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Pseudo bounding box supervision is a promising approach for weakly supervised object localization (WSOL) with only image-level labels. However, the generated pseudo bounding boxes may be inaccurate or even completely ... 详细信息
来源: 评论
Human-Centric Transformer for Domain Adaptive Action Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Lin, Kun-Yu Zhou, Jiaming Zheng, Wei-Shi The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510275 China The Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou510275 China The Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510275 China The Peng Cheng Laboratory Shenzhen518005 China
We study the domain adaptation task for action recognition, namely domain adaptive action recognition, which aims to effectively transfer action recognition power from a label-sufficient source domain to a label-free ... 详细信息
来源: 评论
When Prompt-based Incremental Learning Does Not Meet Strong Pretraining
When Prompt-based Incremental Learning Does Not Meet Strong ...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Yu-Ming Tang Yi-Xing Peng Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Peng Cheng Laboratory Shenzhen China
Incremental learning aims to overcome catastrophic forgetting when learning deep networks from sequential tasks. With impressive learning efficiency and performance, prompt-based methods adopt a fixed backbone to sequ...
来源: 评论
A Neuroinspired Contrast Mechanism Enables Few-Shot Object Detection
SSRN
收藏 引用
SSRN 2023年
作者: Yang, Lingxiao Chen, Dapeng Chen, Yifei Peng, Wei Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Huawei Technlogies Shenzhen China
Object detectors based on deep neural networks often require a large number of annotated images for training. In the most realistic scenario, only a few training data are available;thus, Few-Shot Object Detection (FSO... 详细信息
来源: 评论
Fine-Grained Depth Knowledge Distillation for Cloth-Changing Person Re-identification
Fine-Grained Depth Knowledge Distillation for Cloth-Changing...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Yuhan Yao Jiawei Feng Ancong Wu Jiangqun Ni Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China School of Cyber Science and Technology Sun Yat-sen University Shenzhen China Department of New Networks Peng Cheng Laboratory Shenzhen China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Key Laboratory of Information Security Technology China
The mission of cloth-changing person re-identification (CC-ReID) is to discover cloth-invariant and identity-related cues, while traditional person ReID methods rely on appearance features that are biased to cloth-rel... 详细信息
来源: 评论
Resampling Factor Estimation via Dual-Stream Convolutional Neural Network
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 647-657页
作者: Shangjun Luo Junwei Luo Wei Lu Yanmei Fang Jinhua Zeng Shaopei Shi Yue Zhang School of Data and Computer Science Guangdong Province Key Laboratory of Information Security TechnologyMinistry of Education Key Laboratory of Machine Intelligence and Advanced ComputingSun Yat-sen UniversityGuangzhou510006China Academy of Forensic Science Shanghai200063China College of Information Science and Technology Jinan UniversityGuangzhou510632China Department of Computer Science University of Massachusetts LowellLowellMA 01854USA
The estimation of image resampling factors is an important problem in image *** all the resampling factor estimation methods,spectrumbased methods are one of the most widely used methods and have attracted a lot of re... 详细信息
来源: 评论
Mixture of Online and Offline Experts for Non-Stationary Time Series  39
Mixture of Online and Offline Experts for Non-Stationary Tim...
收藏 引用
39th Annual AAAI Conference on Artificial intelligence, AAAI 2025
作者: Zhao, Zhilin Cao, Longbing Wan, Yuanyu School of Computer Science and Engineering Sun Yat-sen University Guangzhou China School of Computing Macquarie University Sydney Australia Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China School of Software Technology Zhejiang University Ningbo China
We consider a general and realistic scenario involving nonstationary time series, consisting of several offline intervals with different distributions within a fixed offline time horizon, and an online interval that c...
来源: 评论
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units  7th
Halftone Image Steganography Based on Maximizing Visual Sim...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Yin, Xiaolin Yu, Mujian Chen, Lili Wang, Ke Lu, Wei School of Computer Science and Engineering Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangdong Science and Technology Innovation Monitoring and Research Center Guangzhou510033 China
Steganography focuses on imperceptibility of both the human eyes but also to potential analyzers. Based on the human visual system (HVS) of halftone image, most previous visual quality measurements for multi-tone imag... 详细信息
来源: 评论
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition  7th
Halftone Image Steganography Based on Minimizing Distortion...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Yu, Mujian Luo, Junwei Xu, Bozhi Chen, Guoliang Lu, Wei School of Computer Science and Engineering Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangdong Science and Technology Innovation Monitoring and Research Center Guangzhou510033 China
Many advanced halftone steganographic schemes focus only on the distortion of human visual perception or the distortion according to statistics. In this paper, a halftone image steganography based on minimizing distor... 详细信息
来源: 评论