咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 9 篇 计算机科学与技术...
    • 8 篇 软件工程
    • 6 篇 生物工程
    • 4 篇 控制科学与工程
    • 2 篇 电气工程
    • 2 篇 电子科学与技术(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 土木工程
  • 10 篇 理学
    • 6 篇 生物学
    • 5 篇 数学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 4 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 1 篇 图书情报与档案管...

主题

  • 2 篇 object detection
  • 2 篇 feature extracti...
  • 2 篇 machine learning
  • 1 篇 sample-graph con...
  • 1 篇 support vector m...
  • 1 篇 medical report g...
  • 1 篇 cyber physical s...
  • 1 篇 anomaly detectio...
  • 1 篇 image-text match...
  • 1 篇 convolution
  • 1 篇 state estimation
  • 1 篇 evolutionary alg...
  • 1 篇 self-boosting fr...
  • 1 篇 stabilization
  • 1 篇 probability
  • 1 篇 kernel
  • 1 篇 textures
  • 1 篇 computer vision
  • 1 篇 image reconstruc...
  • 1 篇 image quality

机构

  • 4 篇 hubei key labora...
  • 4 篇 shenzhen institu...
  • 3 篇 key laboratory o...
  • 3 篇 school of comput...
  • 2 篇 national key lab...
  • 2 篇 the key laborato...
  • 2 篇 school of cyber ...
  • 2 篇 school of engine...
  • 2 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 the state key la...
  • 2 篇 the guangdong ke...
  • 2 篇 institute of inf...
  • 2 篇 school of cyber ...
  • 2 篇 key laboratory o...
  • 2 篇 school of contro...
  • 2 篇 school of artifi...
  • 2 篇 institute of inf...
  • 1 篇 algorithms netwo...
  • 1 篇 advanced systems...

作者

  • 4 篇 zhou chunjie
  • 4 篇 han lansheng
  • 3 篇 huang jiwu
  • 3 篇 chen changsheng
  • 2 篇 huang yan
  • 2 篇 cong runmin
  • 2 篇 yu zitong
  • 2 篇 yang zhiyong
  • 2 篇 huang qingming
  • 2 篇 zuo gewei
  • 2 篇 wang yujuan
  • 2 篇 zhu lijun
  • 2 篇 li feiran
  • 2 篇 fu cai
  • 2 篇 ma mingrui
  • 2 篇 sun haili
  • 2 篇 cao xiaochun
  • 2 篇 bao shilong
  • 2 篇 xu qianqian
  • 2 篇 chen zhiyong

语言

  • 16 篇 英文
  • 2 篇 其他
检索条件"机构=Intelligence Processing System and Security"
18 条 记 录,以下是1-10 订阅
排序:
C2P-Net: Comprehensive Depth Map to Planar Depth Conversion for Room Layout Estimation
收藏 引用
IEEE Transactions on Pattern Analysis and Machine intelligence 2025年 PP卷 PP页
作者: Zhang, Weidong Zhou, Mengjie Cheng, Jiyu Liu, Ying Zhang, Wei Xi'an University of Posts & Telecommunications School of Communications and Information Engineering China Xi'an Key Laboratory of Image Processing Technology and Applications for Public Security China Shandong University School of Control Science and Engineering China Ministry of Education Key Laboratory of Machine Intelligence and System Control China
Room layout estimation seeks to infer the overall spatial configuration of indoor scenes using perspective or panoramic images. As the layout is determined by the dominant indoor planes, this problem inherently requir... 详细信息
来源: 评论
Predictive Hiring system: Information Technology Consultants Soft Skills
Predictive Hiring System: Information Technology Consultants...
收藏 引用
International Conference on Advanced Intelligent systems for Sustainable Development, AI2SD 2022
作者: Lamjid, Asmaa El Bouchti, Karim Ziti, Soumia Mohamed, Reda Oussama Labrim, Hicham Riadsolh, Anouar Belkacemi, Mourad Intelligence Processing System and Security Mohammed V University in Rabat Rabat Morocco Algorithms Networks Intelligent Systems and Software Engineering Research Faculty of Sciences Mohammed V University in Rabat Rabat Morocco Advanced Systems Engineering Laboratory National School of Applied Sciences Ibn Tofail University Kenitra Morocco Faculty of Sciences Mohammed V University in Rabat Rabat Morocco
Recruiting candidates who will perform well within any organization has become a challenge in the Human Resources sector. Generally, poor recruitment can negatively reflect the progression and evolution of the organis... 详细信息
来源: 评论
Localization of Deep Inpainting Using High-Pass Fully Convolutional Network
Localization of Deep Inpainting Using High-Pass Fully Convol...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Haodong Li Jiwu Huang Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Image inpainting has been substantially improved with deep learning in the past years. Deep inpainting can fill image regions with plausible contents, which are not visually apparent. Although inpainting is originally... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical systems
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
Unsupervised Spatio-Temporal State Estimation for Fine-Grained Adaptive Anomaly Diagnosis of Industrial Cyber-Physical systems
SSRN
收藏 引用
SSRN 2024年
作者: Sun, Haili Huang, Yan Han, Lansheng Fu, Cai Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China National Key Laboratory of Science and Technology on Multispectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China
Accurate detection and diagnosis of abnormal behaviors such as network attacks from multivariate time series (MTS) are crucial for ensuring the stable and effective operation of industrial cyber-physical systems (CPS)... 详细信息
来源: 评论
Domain generalization for document authentication against practical recapturing attacks
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Changsheng Zhang, Shuzheng Lan, Fengbo Huang, Jiwu The Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
Recapturing attack can be employed as a simple but effective anti-forensic tool for digital document images. Inspired by the document inspection process that compares a questioned document against a reference sample, ... 详细信息
来源: 评论
Deep learning-based forgery attack on document images
arXiv
收藏 引用
arXiv 2021年
作者: Zhao, Lin Chen, Changsheng Huang, Jiwu the Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security National Engineering Laboratory for Big Data System Computing Technology College of Electronics and Information Engineering Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society China
With the ongoing popularization of online services, the digital document images have been used in various applications. Meanwhile, there have emerged some deep learning-based text editing algorithms which alter the te... 详细信息
来源: 评论
Research and application of artificial intelligence based webshell detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Webshell, as the"culprit" behind numerous network attacks, is one of the research hotspots in the field of cybersecurity. However, the complexity, stealthiness, and confusing nature of webshells pose signifi... 详细信息
来源: 评论
Research and application of Transformer based anomaly detection model: A literature review
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Mingrui Han, Lansheng Zhou, Chunjie Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Hubei Wuhan430074 China The Key Laboratory of Ministry of Education for Image Processing and Intelligent Control School of Artificial Intelligence and Automation Huazhong University of Science and Technology Hubei Wuhan430074 China
Transformer, as one of the most advanced neural network models in Natural Language processing (NLP), exhibits diverse applications in the field of anomaly detection. To inspire research on Transformer-based anomaly de... 详细信息
来源: 评论
Distributed Prescribed-Time Convex Optimization: Cascade Design and Time-Varying Gain Approach
arXiv
收藏 引用
arXiv 2024年
作者: Zuo, Gewei Zhu, Lijun Wang, Yujuan Chen, Zhiyong School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430072 China Key Laboratory of Imaging Processing and Intelligence Control Huazhong University of Science and Technology Wuhan430074 China The State Key Laboratory of Power Transmission Equipment & System Security and New Technology School of Automation Chongqing University Chongqing400044 China School of Engineering The University of Newcastle CallaghanNSW2308 Australia
In this paper, we address the distributed prescribed-time convex optimization (DPTCO) problem for a class of high-order nonlinear multi-agent systems (MASs) under undirected connected graphs. A cascade design framewor... 详细信息
来源: 评论