咨询与建议

限定检索结果

文献类型

  • 39 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 58 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 44 篇 工学
    • 32 篇 计算机科学与技术...
    • 26 篇 软件工程
    • 11 篇 信息与通信工程
    • 10 篇 电气工程
    • 4 篇 电子科学与技术(可...
    • 4 篇 控制科学与工程
    • 3 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 机械工程
    • 1 篇 动力工程及工程热...
    • 1 篇 水利工程
    • 1 篇 林业工程
    • 1 篇 网络空间安全
  • 22 篇 理学
    • 15 篇 数学
    • 6 篇 物理学
    • 3 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 化学
  • 12 篇 管理学
    • 10 篇 图书情报与档案管...
    • 3 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 3 篇 feature extracti...
  • 3 篇 feature selectio...
  • 3 篇 visual languages
  • 2 篇 deep learning
  • 2 篇 face recognition
  • 2 篇 convolution
  • 2 篇 visualization
  • 2 篇 machine learning
  • 2 篇 steganography
  • 2 篇 computer vision
  • 1 篇 lesions
  • 1 篇 mouth
  • 1 篇 object detection
  • 1 篇 ultrasonic imagi...
  • 1 篇 approximation al...
  • 1 篇 smartphones
  • 1 篇 deep neural netw...
  • 1 篇 training data
  • 1 篇 diabetic retinop...
  • 1 篇 transistors

机构

  • 27 篇 guangdong labora...
  • 17 篇 beijing key labo...
  • 4 篇 guangdong labora...
  • 4 篇 guangxi key lab ...
  • 4 篇 school of comput...
  • 4 篇 department of co...
  • 4 篇 shenzhen msu-bit...
  • 3 篇 college of compu...
  • 3 篇 state key labora...
  • 3 篇 shenzhen msu-bit...
  • 3 篇 department of au...
  • 2 篇 department of co...
  • 2 篇 department of co...
  • 2 篇 school of softwa...
  • 2 篇 pengcheng labora...
  • 2 篇 department of co...
  • 2 篇 school of inform...
  • 2 篇 shenzhen campus ...
  • 2 篇 shenzhen key lab...
  • 2 篇 department of el...

作者

  • 11 篇 jia yunde
  • 11 篇 wu yuwei
  • 6 篇 wu xinxiao
  • 6 篇 gao zhi
  • 6 篇 yunde jia
  • 6 篇 yuwei wu
  • 5 篇 huang jiwu
  • 4 篇 huang faliang
  • 4 篇 zhao jie
  • 4 篇 yang shuo
  • 4 篇 luo jiebo
  • 3 篇 lu zhipeng
  • 3 篇 harandi mehrtash
  • 3 篇 li pengxiang
  • 3 篇 jiwu huang
  • 3 篇 li qing
  • 3 篇 zhi gao
  • 3 篇 zhu song-chun
  • 3 篇 wang jiahai
  • 3 篇 zhang bofei

语言

  • 55 篇 英文
  • 3 篇 其他
检索条件"机构=Guangdong Lab of Machine Perception and Intelligent Computing"
58 条 记 录,以下是11-20 订阅
排序:
In-Context Compositional Generalization for Large Vision-Language Models
In-Context Compositional Generalization for Large Vision-Lan...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Li, Chuanhao Jing, Chenchen Li, Zhen Zhai, Mingliang Wu, Yuwei Jia, Yunde Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China School of Computer Science Zhejiang University Hangzhou China
Recent work has revealed that in-context learning for large language models exhibits compositional generalization capacity, which can be enhanced by selecting in-context demonstrations similar to test cases to provide... 详细信息
来源: 评论
Watershed-based weighted graph partitioning active contours
Watershed-based weighted graph partitioning active contours
收藏 引用
2010 3rd International Congress on Image and Signal Processing, CISP 2010
作者: Wang, Shaorong Chen, Yisong Li, Sheng Wang, Guoping Li, Hua Key Lab. of Machine Perception and Intelligent MOE Beijing 100871 China HCI and Multimedia Lab. Dept. of Computer Science Peking University Beijing 100871 China National Research Center for Intelligent Computing Systems Institute of Computing Technology Chinese Academy of Sciences Beijing 100080 China
A novel Weighted Graph Partitioning Active Contours method based on weighted dissimilarity is introduced. This method is easy to be extended by defining different types of similarities. And it has been greatly acceler... 详细信息
来源: 评论
Forgery-aware Adaptive Learning with Vision Transformer for Generalized Face Forgery Detection
收藏 引用
IEEE Transactions on Circuits and Systems for Video Technology 2024年 第5期35卷 4116-4129页
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Life, Alex C. Kot Jiangxi University of Finance and Economics School of Computing and Artificial Intelligence Nanchang330013 China Sun Yat-Sen University School of Computer Science and Engineering Guangzhou510006 China Lab School of Electrical and Electronic Engineering Singapore Singapore Sun Yat-Sen University Guangdong Key Lab of Information Security School of Computer Science and Engineering Guangzhou510006 China Shenzhen MSU-BIT University Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen518116 China China-Singapore International Joint Research Institute Singapore Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
DiRLoc: Disentanglement Representation Learning for Robust Image Forgery Localization
收藏 引用
IEEE Transactions on Dependable and Secure computing 2024年 第03期22卷 2841-2854页
作者: Sheng, Ziqi Qu, Zuomin Lu, Wei Cao, Xiaochun Huang, Jiwu Sun Yat-sen University School of Computer Science and Engineering MoE Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China Shenzhen Campus of Sun Yat-sen University School of Cyber Science and Technology Shenzhen518107 China Shenzhen MSU-BIT University Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen518116 China
Deep Learning image forgery localization methods have achieved remarkable results but cannot maintain comparable performance when the forgery images are JPEG compressed, a format that is widely used in daily informati... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论
CMA: A Chromaticity Map Adapter for Robust Detection of Screen-Recapture Document Images
CMA: A Chromaticity Map Adapter for Robust Detection of Scre...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Changsheng Chen Liangwei Lin Yongqi Chen Bin Li Jishen Zeng Jiwu Huang Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Alibaba Group Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University
The rebroadcasting of screen-recaptured document images introduces a significant risk to the confidential docu-ments processed in government departments and commer-cial companies. However, detecting recaptured documen... 详细信息
来源: 评论
Data-free Multi-label Image Recognition via LLM-powered Prompt Tuning
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Shuo Shang, Zirui Wang, Yongqi Deng, Derong Chen, Hongwei Cheng, Qiyuan Wu, Xinxiao Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China
This paper proposes a novel framework for multi-label image recognition without any training data, called data-free framework, which uses knowledge of pre-trained Large Language Model (LLM) to learn prompts to adapt p... 详细信息
来源: 评论
Fine-Grained Annotation for Face Anti-Spoofing
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Xu Jia, Yunde Wu, Yuwei Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China
Face anti-spoofing plays a critical role in safeguarding facial recognition systems against presentation attacks. While existing deep learning methods show promising results, they still suffer from the lack of fine-gr... 详细信息
来源: 评论
Residual Hyperbolic Graph Convolution Networks
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Yangkai Dai, Jindou Lu, Zhipeng Wu, Yuwei Jia, Yunde Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China
Hyperbolic graph convolutional networks (HGCNs) have demonstrated representational capabilities of modeling hierarchical-structured graphs. However, as in general GCNs, over-smoothing may occur as the number of model ... 详细信息
来源: 评论
Video Anomaly Detection via Sequentially Learning Multiple Pretext Tasks
Video Anomaly Detection via Sequentially Learning Multiple P...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Chenrui Shi Che Sun Yuwei Wu Yunde Jia Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China
Learning multiple pretext tasks is a popular approach to tackle the nonalignment problem in unsupervised video anomaly detection. However, the conventional learning method of simultaneously learning multiple pretext t...
来源: 评论