咨询与建议

限定检索结果

文献类型

  • 399 篇 会议
  • 227 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 627 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 397 篇 工学
    • 303 篇 计算机科学与技术...
    • 262 篇 软件工程
    • 76 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 34 篇 机械工程
    • 34 篇 生物工程
    • 29 篇 化学工程与技术
    • 28 篇 电子科学与技术(可...
    • 27 篇 光学工程
    • 25 篇 电气工程
    • 19 篇 生物医学工程(可授...
    • 15 篇 仪器科学与技术
    • 11 篇 建筑学
    • 11 篇 农业工程
    • 9 篇 动力工程及工程热...
    • 9 篇 安全科学与工程
    • 8 篇 网络空间安全
  • 204 篇 理学
    • 123 篇 数学
    • 54 篇 物理学
    • 48 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 21 篇 化学
    • 10 篇 系统科学
  • 136 篇 管理学
    • 98 篇 图书情报与档案管...
    • 41 篇 管理科学与工程(可...
    • 18 篇 工商管理
  • 15 篇 农学
    • 12 篇 作物学
  • 14 篇 医学
    • 11 篇 临床医学
    • 9 篇 基础医学(可授医学...
  • 12 篇 法学
    • 11 篇 社会学
  • 7 篇 经济学
  • 3 篇 教育学
  • 3 篇 艺术学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 40 篇 semantics
  • 27 篇 training
  • 21 篇 feature extracti...
  • 16 篇 deep learning
  • 14 篇 data mining
  • 14 篇 computational mo...
  • 14 篇 data models
  • 13 篇 visualization
  • 13 篇 computer vision
  • 12 篇 face recognition
  • 11 篇 neural networks
  • 10 篇 robustness
  • 9 篇 object detection
  • 9 篇 forecasting
  • 8 篇 mapreduce
  • 7 篇 convolution
  • 7 篇 optimization
  • 7 篇 predictive model...
  • 7 篇 navigation
  • 7 篇 humans

机构

  • 103 篇 university of ch...
  • 65 篇 key lab of intel...
  • 51 篇 key lab of intel...
  • 30 篇 key lab. of inte...
  • 23 篇 school of comput...
  • 20 篇 key laboratory o...
  • 20 篇 peng cheng labor...
  • 19 篇 key lab. of inte...
  • 18 篇 shanghai collabo...
  • 17 篇 key lab of intel...
  • 15 篇 key lab. of inte...
  • 14 篇 shanghai key lab...
  • 14 篇 key lab. of inte...
  • 13 篇 school of cyber ...
  • 12 篇 institute of dig...
  • 12 篇 school of cyber ...
  • 11 篇 institute of com...
  • 10 篇 graduate univers...
  • 10 篇 microsoft cloud ...
  • 9 篇 microsoft resear...

作者

  • 32 篇 huang qingming
  • 28 篇 zhuge hai
  • 24 篇 xilin chen
  • 21 篇 cao juan
  • 19 篇 jiang yu-gang
  • 19 篇 gao wen
  • 18 篇 liu qun
  • 17 篇 shiguang shan
  • 17 篇 xu qianqian
  • 15 篇 wu zuxuan
  • 14 篇 qingming huang
  • 14 篇 qing he
  • 14 篇 cao xiaochun
  • 13 篇 yang zhiyong
  • 13 篇 sun xiaoping
  • 12 篇 shuqiang jiang
  • 12 篇 sheng qiang
  • 11 篇 hai zhuge
  • 11 篇 li hua
  • 11 篇 he qing

语言

  • 610 篇 英文
  • 12 篇 中文
  • 9 篇 其他
检索条件"机构=Key Lab of Cloud Computing and Intelligent Information Processing"
627 条 记 录,以下是171-180 订阅
排序:
Delving into the Frequency: Temporally Consistent Human Motion Transfer in the Fourier Space
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Guang Liu, Wu Liu, Xinchen Gu, Xiaoyan Cao, Juan Li, Jintao Institute of Computing Technology Chinese Academy of Sciences China Jd Explore Academy Institute of Information Engineering Chinese Academy of Sciences China The Key Lab of Intelligent Information Processing of Chinese Academy of Sciences The University of Chinese Academy of Sciences China
Human motion transfer refers to synthesizing photo-realistic and temporally coherent videos that enable one person to imitate the motion of others. However, current synthetic videos suffer from the temporal inconsiste... 详细信息
来源: 评论
A Novel Method for Rapidly Solving Wideband RCS by Combining UCBFM and Compressive Sensing
收藏 引用
Progress In Electromagnetics Research C 2022年 124卷 33-42页
作者: Wang, Zhonggen Li, Chenwei Sun, Yufa Nie, Wenyan Wang, Pan Lin, Han School of Electrical and Information Engineering Anhui University of Science and Technology Huainan232001 China Key Lab of Intelligent Computing & Signal Processing Anhui University Hefei230039 China School of Mechanical and Electrical Engineering Huainan Normal University Huainan232001 China
While analyzing wideband electromagnetic scattering problems using ultra-wideband characteristic basis function method (UCBFM), the reconstruction of a reduced matrix and the recalculation of an impedance matrix at ea... 详细信息
来源: 评论
Boosting the Transferability of Video Adversarial Examples via Temporal Translation
arXiv
收藏 引用
arXiv 2021年
作者: Wei, Zhipeng Chen, Jingjing Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China Shanghai Collaborative Innovation Center on Intelligent Visual Computing China
Although deep-learning based video recognition models have achieved remarkable success, they are vulnerable to adversarial examples that are generated by adding human-imperceptible perturbations on clean video samples... 详细信息
来源: 评论
Attacking Video Recognition Models with Bullet-Screen Comments
arXiv
收藏 引用
arXiv 2021年
作者: Chen, Kai Wei, Zhipeng Chen, Jingjing Wu, Zuxuan Jiang, Yu-Gang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China Shanghai Collaborative Innovation Center on Intelligent Visual Computing China
Recent research has demonstrated that Deep Neural Networks (DNNs) are vulnerable to adversarial patches which introduce perceptible but localized changes to the input. Nevertheless, existing approaches have focused on... 详细信息
来源: 评论
Harnessing Hierarchical label Distribution Variations in Test Agnostic Long-tail Recognition
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Zhiyong Xu, Qianqian Wang, Zitai Li, Sicong Han, Boyu Bao, Shilong Cao, Xiaochun Huang, Qingming School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Tech. CAS Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China BDKM University of Chinese Academy of Sciences China
This paper explores test-agnostic long-tail recognition, a challenging long-tail task where the test label distributions are unknown and arbitrarily imbalanced. We argue that the variation in these distributions can b...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task... 详细信息
来源: 评论
CREAM: Weakly Supervised Object Localization via Class RE-Activation Mapping
arXiv
收藏 引用
arXiv 2022年
作者: Xu, Jilan Hou, Junlin Zhang, Yuejie Feng, Rui Zhao, Rui-Wei Zhang, Tao Lu, Xuequan Gao, Shang School of Computer Science Shanghai Key Lab of Intelligent Information Processing Shanghai Collaborative Innovation Center of Intelligent Visual Computing Fudan University China Academy for Engineer and Technology Fudan University China Shanghai University of Finance and Economics China Deakin University Australia
Weakly Supervised Object Localization (WSOL) aims to localize objects with image-level supervision. Existing works mainly rely on Class Activation Mapping (CAM) derived from a classification model. However, CAM-based ... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
The minority matters: a diversity-promoting collaborative metric learning algorithm  22
The minority matters: a diversity-promoting collaborative me...
收藏 引用
Proceedings of the 36th International Conference on Neural information processing Systems
作者: Shilong Bao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences Alibaba Group School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Laboratory of Big Data Mining and Knowledge Management CAS and Peng Cheng Laboratory
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin...
来源: 评论
Revisiting Adversarial Robustness Distillation: Robust Soft labels Make Student Better
Revisiting Adversarial Robustness Distillation: Robust Soft ...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Bojia Zi Shihao Zhao Xingjun Ma Yu-Gang Jiang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan Univeristy Shanghai Collaborative Innovation Center on Intelligent Visual Computing School of Information Technology Deakin University Geelong Australia
Adversarial training is one effective approach for training robust deep neural networks against adversarial attacks. While being able to bring reliable robustness, adversarial training (AT) methods in general favor hi... 详细信息
来源: 评论