咨询与建议

限定检索结果

文献类型

  • 1,208 篇 会议
  • 723 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,934 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,277 篇 工学
    • 973 篇 计算机科学与技术...
    • 864 篇 软件工程
    • 249 篇 信息与通信工程
    • 139 篇 生物工程
    • 130 篇 控制科学与工程
    • 111 篇 机械工程
    • 97 篇 光学工程
    • 77 篇 生物医学工程(可授...
    • 72 篇 电气工程
    • 71 篇 电子科学与技术(可...
    • 64 篇 化学工程与技术
    • 40 篇 仪器科学与技术
    • 28 篇 建筑学
    • 26 篇 农业工程
    • 24 篇 材料科学与工程(可...
    • 24 篇 动力工程及工程热...
  • 667 篇 理学
    • 408 篇 数学
    • 168 篇 生物学
    • 156 篇 物理学
    • 109 篇 统计学(可授理学、...
    • 59 篇 化学
    • 36 篇 系统科学
  • 412 篇 管理学
    • 261 篇 图书情报与档案管...
    • 163 篇 管理科学与工程(可...
    • 51 篇 工商管理
  • 60 篇 医学
    • 47 篇 临床医学
    • 38 篇 基础医学(可授医学...
  • 35 篇 农学
    • 31 篇 作物学
  • 31 篇 法学
    • 26 篇 社会学
  • 22 篇 经济学
    • 22 篇 应用经济学
  • 12 篇 教育学
  • 11 篇 艺术学
  • 9 篇 哲学
  • 4 篇 文学
  • 1 篇 军事学

主题

  • 95 篇 semantics
  • 89 篇 feature extracti...
  • 71 篇 training
  • 71 篇 information proc...
  • 57 篇 laboratories
  • 52 篇 computers
  • 48 篇 face recognition
  • 42 篇 visualization
  • 42 篇 humans
  • 40 篇 computational mo...
  • 36 篇 data mining
  • 35 篇 object detection
  • 35 篇 computer vision
  • 34 篇 machine learning
  • 33 篇 image segmentati...
  • 31 篇 decoding
  • 29 篇 support vector m...
  • 29 篇 deep learning
  • 28 篇 robustness
  • 27 篇 data models

机构

  • 434 篇 key laboratory o...
  • 296 篇 university of ch...
  • 83 篇 key laboratory o...
  • 65 篇 peng cheng labor...
  • 63 篇 key lab of intel...
  • 51 篇 key lab of intel...
  • 50 篇 graduate univers...
  • 48 篇 key laboratory o...
  • 45 篇 the key laborato...
  • 44 篇 key laboratory o...
  • 42 篇 school of comput...
  • 41 篇 chinese academy ...
  • 37 篇 graduate univers...
  • 35 篇 institute of sci...
  • 35 篇 school of cyber ...
  • 32 篇 school of comput...
  • 30 篇 key lab. of inte...
  • 29 篇 shanghai key lab...
  • 29 篇 institute of dig...
  • 26 篇 institute of com...

作者

  • 100 篇 zhongzhi shi
  • 98 篇 shi zhongzhi
  • 96 篇 xilin chen
  • 87 篇 shiguang shan
  • 85 篇 liu qun
  • 77 篇 huang qingming
  • 47 篇 xu qianqian
  • 45 篇 qing he
  • 42 篇 he qing
  • 40 篇 li hua
  • 40 篇 feng yang
  • 37 篇 wen gao
  • 33 篇 jiang shuqiang
  • 33 篇 cao juan
  • 33 篇 qingming huang
  • 32 篇 liu yang
  • 32 篇 yang zhiyong
  • 32 篇 cao xiaochun
  • 31 篇 zhuge hai
  • 30 篇 zhuang fuzhen

语言

  • 1,845 篇 英文
  • 48 篇 中文
  • 44 篇 其他
检索条件"机构=Key Lab. of Intelligent Information Processing Institute of Computing Technology"
1934 条 记 录,以下是381-390 订阅
排序:
A Kind of new parallax algorithm based on symmetric continuous optimization  5
A Kind of new parallax algorithm based on symmetric continuo...
收藏 引用
2020 5th International Seminar on Computer technology, Mechanical and Electrical Engineering, ISCME 2020
作者: Jiang, Kaiwen Zhang, Degan Xu, Haixia Key Laboratory of Computer Vision and System Tianjin University of Technology Ministry of Education 300384 China Tianjin Key Lab of Intelligent Computing and Novel Software Technology Tianjin University of Technology Tianjin China School of Electronic and Information Engineering Tianjin Vocational Institute Tianjin300410 China
With the fast development of 3D imaginations becomes more and more fascination, multi-view stereo based 3D reconstruction is a significant technique for those application. To facilitate the subsequent processing of 3D... 详细信息
来源: 评论
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels  19th
Variable Rate Syndrome-Trellis Codes for Steganography on Bu...
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Feng, Bingwen Liu, Zhiquan Wei, Kaimin Lu, Wei Lin, Yuchun College of Information Science and Technology Jinan University Guangzhou510632 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security Shenzhen518060 China School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangzhou Institute of Science and Technology Guangzhou510006 China
This paper presents a type of variable rate syndrome-trellis codes (VR-STC) for bursty channels. It can embed message bits with two different embedding rates. In the embedding, a cover vector is sliced into segments, ... 详细信息
来源: 评论
An Innovative Control Approach for Cyber-Physical Transportation Systems: The Case of Monte-Carlo Workflow Computations
An Innovative Control Approach for Cyber-Physical Transporta...
收藏 引用
Euromicro Conference on Parallel, Distributed and Network-Based processing
作者: Vladislav Kashansky Sara Agha Hossein Kashani Javier Garcia-Blas Fabrizio Marozzo Hai Zhuge Xiaoping Sun Research Laboratory Eteronix GmbH Vienna Austria Institute of Production and Logistics Management Business School Johannes Kepler Universität Linz Austria ARCOS Group Universidad Carlos III de Madrid Leganes Spain DIMES Department University of Calabria Rende Italy Key Laboratory of Intelligent Information Processing Institute of Computing Technology (ICTCAS) Beijing China
Contemporarily, in light of the intelligent transportation systems (ITS) sector, the tendency can be observed that the solution of the multi-objective cyber-physical optimization problems with imperfect information ta...
来源: 评论
Fine-Grained Access Control with Privacy-Preserving Data Retrieval for Cloud-Assisted IoV
收藏 引用
IEEE Transactions on Vehicular technology 2025年
作者: Li, Wenchao Xia, Chunhe Yang, Simiao Wang, Kangming Huang, Guotao Huang, Luqi Guo, Fuchun Susilo, Willy Wang, Tianbo Beihang University School of Cyber Science and Technology Beijing100191 China University of Wollongong School of Computing and Information Technology Institute of Cybersecurity and Cryptology WollongongNSW2522 Australia Beihang University Beijing Key Laboratory of Network Technology Beijing100191 China Guangxi Normal University Guangxi Collab. Innovation Center of Multi-source Information Integration and Intelligent Processing Guilin541004 China Beihang University Sino-French Engineer School Beijing100191 China Beihang University Computer Science and Engineering School Beijing100191 China
In addition to the autonomous driving technology of single vehicles, the inter-group control algorithm serving the data sharing of multi-vehicle cooperative driving has also attracted widespread attention. To ensure s... 详细信息
来源: 评论
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zijian Zhu Yichi Zhang Hai Chen Yinpeng Dong Shu Zhao Wenbo Ding Jiachen Zhong Shibao Zheng Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Dept. of Comp. Sci. and Tech. THBI Lab Institute for AI Tsinghua University BNRist Center Zhongguancun Laboratory Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province School of Computer Science and Technology Anhui University SAIC Motor AI Lab
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ...
来源: 评论
Facilitating Multi-turn Emotional Support Conversation with Positive Emotion Elicitation: A Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Jinfeng Chen, Zhuang Wang, Bo Huang, Minlie The CoAI Group DCST Institute for Artificial Intelligence State Key Lab of Intelligent Technology and Systems China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China College of Intelligence and Computing Tianjin University Tianjin China
Emotional support conversation (ESC) aims to provide emotional support (ES) to improve one’s mental state. Existing works stay at fitting grounded responses and responding strategies (e.g., question), which ignore th... 详细信息
来源: 评论
Online Prototype Learning for Online Continual Learning
Online Prototype Learning for Online Continual Learning
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Yujie Wei Jiaxin Ye Zhizhong Huang Junping Zhang Hongming Shan Institute of Science and Technology for Brain-Inspired Intelligence Fudan University Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University MOE Frontiers Center for Brain Science Fudan University Shanghai Center for Brain Science and Brain-Inspired Technology
Online continual learning (CL) studies the problem of learning continuously from a single-pass data stream while adapting to new data and mitigating catastrophic forgetting. Recently, by storing a small subset of old ...
来源: 评论
Aligning Recommendation and Conversation via Dual Imitation
Aligning Recommendation and Conversation via Dual Imitation
收藏 引用
2022 Conference on Empirical Methods in Natural Language processing, EMNLP 2022
作者: Zhou, Jinfeng Wang, Bo Huang, Minlie Zhao, Dongming Huang, Kun He, Ruifang Hou, Yuexian College of Intelligence and Computing Tianjin University Tianjin China State Key Laboratory of Communication Content Cognition People's Daily Online Beijing China The CoAI Group DCST Institute for Artificial Intelligence State Key Lab of Intelligent Technology and Systems China Beijing National Research Center for Information Science and Technology Tsinghua University Beijing100084 China AI Lab China Mobile Communication Group Tianjin Co. Ltd. China
Human conversations of recommendation naturally involve the shift of interests which can align the recommendation actions and conversation process to make accurate recommendations with rich explanations. However, exis... 详细信息
来源: 评论
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis
REDA: Malicious Traffic Detection Based on Record Length and...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Wanshuang Lin Chunhe Xia Tianbo Wang Chen Chen Yuan Zhao Weidong Zhou School of Cyber Science and Technology Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
The TLS encryption protocol plays a vital role in securing data transmission, but it also presents challenges for payload-based Network Intrusion Detection Systems (NIDS). Existing methods utilize statistical characte... 详细信息
来源: 评论
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph
EFwork: An Efficient Framework for Constructing a Malware Kn...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Chen Chen Chunhe Xia Tianbo Wang Wanshuang Lin Yuan Zhao Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China
Malware Knowledge Graph (MKG) serves as an essential auxiliary tool for malware detection and analysis. However, the construction of MKG faces several challenges, such as inadequate dataset quality, incomplete entity ... 详细信息
来源: 评论