咨询与建议

限定检索结果

文献类型

  • 45 篇 期刊文献
  • 28 篇 会议

馆藏范围

  • 73 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 52 篇 工学
    • 36 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 12 篇 电气工程
    • 11 篇 信息与通信工程
    • 7 篇 控制科学与工程
    • 5 篇 电子科学与技术(可...
    • 4 篇 生物工程
    • 3 篇 机械工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 材料科学与工程(可...
    • 2 篇 动力工程及工程热...
    • 2 篇 化学工程与技术
    • 1 篇 冶金工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 农业工程
    • 1 篇 林业工程
  • 25 篇 理学
    • 12 篇 数学
    • 9 篇 物理学
    • 4 篇 生物学
    • 2 篇 统计学(可授理学、...
    • 1 篇 化学
  • 12 篇 管理学
    • 9 篇 图书情报与档案管...
    • 5 篇 管理科学与工程(可...
  • 3 篇 法学
    • 3 篇 社会学
  • 2 篇 医学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 农学

主题

  • 4 篇 feature extracti...
  • 3 篇 steganography
  • 3 篇 visual languages
  • 2 篇 object detection
  • 2 篇 deep learning
  • 2 篇 face recognition
  • 2 篇 convolution
  • 2 篇 visualization
  • 2 篇 benchmarking
  • 2 篇 machine learning
  • 2 篇 clustering algor...
  • 2 篇 computer vision
  • 1 篇 lesions
  • 1 篇 mouth
  • 1 篇 ultrasonic imagi...
  • 1 篇 query languages
  • 1 篇 形状结构
  • 1 篇 support vector m...
  • 1 篇 optical imaging
  • 1 篇 smartphones

机构

  • 27 篇 guangdong labora...
  • 17 篇 beijing key labo...
  • 6 篇 cloud computing ...
  • 6 篇 guangdong key la...
  • 6 篇 guangdong instit...
  • 6 篇 engineering rese...
  • 6 篇 xinjiang product...
  • 4 篇 guangdong labora...
  • 4 篇 shenzhen msu-bit...
  • 3 篇 college of compu...
  • 3 篇 state key labora...
  • 3 篇 school of cybers...
  • 3 篇 shenzhen msu-bit...
  • 3 篇 department of au...
  • 3 篇 department of sy...
  • 3 篇 department of au...
  • 2 篇 department of co...
  • 2 篇 key laboratory o...
  • 2 篇 department of co...
  • 2 篇 school of softwa...

作者

  • 11 篇 jia yunde
  • 11 篇 wu yuwei
  • 6 篇 huang jiwu
  • 6 篇 wu xinxiao
  • 6 篇 gao zhi
  • 6 篇 yunde jia
  • 6 篇 yuwei wu
  • 5 篇 yang rui
  • 4 篇 hu ruihan
  • 4 篇 yang shuo
  • 4 篇 luo jiebo
  • 4 篇 li yuhong
  • 4 篇 lu wei
  • 3 篇 lu zhipeng
  • 3 篇 harandi mehrtash
  • 3 篇 li pengxiang
  • 3 篇 jiwu huang
  • 3 篇 xu chen
  • 3 篇 li qing
  • 3 篇 mo qinglong

语言

  • 69 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Guangdong Laboratory of Machine Perception and Intelligent Computing"
73 条 记 录,以下是1-10 订阅
排序:
CONVOLUTIONAL OPTIMIZATION WITH CONVEX KERNEL AND POWER LIFT
arXiv
收藏 引用
arXiv 2025年
作者: Lu, Zhipeng Shenzhen MSU-BIT University Guangdong Laboratory of Machine Perception and Intelligent Computing Guangdong Shenzhen518172 China
We focus on establishing the foundational paradigm of a novel optimizationtheory based on convolution with convex kernels. Our goal is to devise amorally deterministic model of locating the global optima of an arbitra... 详细信息
来源: 评论
Speaker Extraction with Verification of Present and Absent Target Speakers
收藏 引用
Journal of Shanghai Jiaotong University (Science) 2025年 1-6页
作者: Zhang, Ke Borsdorf, Marvin Liu, Tianchi Wang, Shuai Wei, Yangjie Li, Haizhou Key Laboratory of Intelligent Computing in Medical Image Northeastern University Shenyang110819 China Shenzhen Guangdong518000 China Machine Listening Lab University of Bremen Bremen28359 Germany Department of Electrical and Computer Engineering National University of Singapore Singapore119077 Singapore
Target speaker extraction (TSE) models are expected to extract the target speech from a cocktail party mixture signal. When only trained with present target speaker samples (PT), these models output noise in the absen... 详细信息
来源: 评论
Large-Scale Riemannian Meta-Optimization via Subspace Adaptation
arXiv
收藏 引用
arXiv 2025年
作者: Yu, Peilin Wu, Yuwei Gao, Zhi Fan, Xiaomeng Jia, Yunde Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China
Riemannian meta-optimization provides a promising approach to solving non-linear constrained optimization problems, which trains neural networks as optimizers to perform optimization on Riemannian manifolds. However, ... 详细信息
来源: 评论
Exploiting Robust Model Watermarking Against the Model Fine-Tuning Attack via Flat Minima Aware Optimizers
Exploiting Robust Model Watermarking Against the Model Fine-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Dongdong Lin Yue Li Bin Li Jiwu Huang Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China SZU-AFS Joint Innovation Center for AI Technology Shenzhen University Shenzhen China Xiamen Key Laboratory of Data Security and Blockchain Technology Huaqiao University Xiamen China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Shenzhen China
With the rapid advancement of deep neural networks (DNNs), model watermarking has emerged as a widely adopted technique for safeguarding model copyrights. A prevalent method involves utilizing a watermark decoder to r... 详细信息
来源: 评论
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Zheng, Peijia Fang, Xiongjie Zhou, Zhipeng Yang, Rui Lu, Wei Cao, Xiaochun Huang, Jiwu Sun Yat-Sen University School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology MoE Key Laboratory of Information Technology Guangzhou510006 China Alibaba Group Hanzhou311121 China Shenzhen Campus of Sun Yat-sen University School of Cyber Science and Technology Shenzhen518100 China Shenzhen MSU-BIT University Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen518116 China
In cloud computing, it is necessary to outsource image processing algorithms securely without exposing private image content. The scale-invariant feature transform (SIFT) is a famous local descriptor widely used in co... 详细信息
来源: 评论
End-to-End Open-Vocabulary Video Visual Relationship Detection Using Multi-Modal Prompting
收藏 引用
IEEE Transactions on Pattern Analysis and machine Intelligence 2025年
作者: Wang, Yongqi Wu, Xinxiao Yang, Shuo Luo, Jiebo Beijing Institute of Technology Beijing Key Laboratory of Intelligent Information Technology School of Computer Science and Technology Beijing100081 China Shenzhen MSU-BIT University Guangdong Provincial Laboratory of Machine Perception and Intelligent Computing Shenzhen518172 China University of Rochester Department of Computer Science RochesterNY14627 United States
Open-vocabulary video visual relationship detection aims to expand video visual relationship detection beyond annotated categories by detecting unseen relationships between both seen and unseen objects in videos. Exis... 详细信息
来源: 评论
Block-diagonal structure learning for subspace clustering
收藏 引用
Expert Systems with Applications 2025年 285卷
作者: Xing, Zheng Zhao, Weibing College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University Guangdong Shenzhen518172 China
Subspace clustering plays a pivotal role in discovering underlying structures within high-dimensional data by identifying clusters in lower-dimensional subspaces. However, existing works devote less attention to the p... 详细信息
来源: 评论
Real-world Cyber Security Demonstration for Networked Electric Drives
收藏 引用
IEEE Journal of Emerging and Selected Topics in Power Electronics 2025年
作者: Yang, He Yang, Bowen Coshatt, Stephen Li, Qi Hu, Kun Hammond, Bryan Cooper Ye, Jin Parasuraman, Ramviyas Song, Wenzhan The Intelligent Power Electronics and Electric Machine Laboratory University of Georgia AthensGA30602 United States The Power Systems Engineering Center National Renewable Energy Laboratory GoldenCO80401 United States The Center for Cyber-Physical Systems University of Georgia AthensGA30602 United States Eaton ClevelandOH44122 United States Sino-German College of Intelligent Manufacturing Shenzhen Technology University Guangdong Shenzhen518118 China Research Lab the School of Computing University of Georgia AthensGA30602 United States
In this paper, we present the design and implementation of a cyber-physical security testbed for networked electric drive systems, aimed at conducting real-world security demonstrations. To our knowledge, this is one ... 详细信息
来源: 评论
2-D shape completion with shape priors
收藏 引用
Chinese Science Bulletin 2013年 第27期58卷 3430-3436页
作者: GUO Ge JIANG TingTing WANG YiZhou GAO Wen Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Graduate University of Chinese Academy of Sciences National Engineering Laboratory for Video Technology Key Laboratory of Machine Perception School of EECS Peking University
We propose new techniques for 2-D shape/contour completion, which is one of the important research topics related to shape analysis and computer vision, e.g. the detection of incomplete objects due to occlusion and no... 详细信息
来源: 评论
A customized CNN architecture for detecting double and multiple JPEG compression in small blocks
收藏 引用
Engineering Analysis with Boundary Elements 2025年 178卷
作者: Israr Hussain Naeem Hussain Shunquan Tan College of Computer Science and Software Engineering Shenzhen University Shenzhen 518060 China College of Electronic and Information Engineering Shenzhen 518060 China School of Information and Communications Technology Shenzhen City Polytechnic Shenzhen 518116 China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen 518116 China
Detecting double JPEG compression is crucial for verifying the authenticity and integrity of JPEG images. However, this poses significant challenges, particularly when the quality factor (QF) of the first compression ...
来源: 评论