咨询与建议

限定检索结果

文献类型

  • 2,726 篇 会议
  • 2,069 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 4,796 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,224 篇 工学
    • 2,023 篇 计算机科学与技术...
    • 1,611 篇 软件工程
    • 569 篇 信息与通信工程
    • 440 篇 控制科学与工程
    • 391 篇 电子科学与技术(可...
    • 369 篇 机械工程
    • 349 篇 电气工程
    • 322 篇 生物工程
    • 294 篇 光学工程
    • 198 篇 仪器科学与技术
    • 193 篇 生物医学工程(可授...
    • 168 篇 化学工程与技术
    • 126 篇 动力工程及工程热...
    • 113 篇 材料科学与工程(可...
    • 103 篇 交通运输工程
    • 91 篇 土木工程
    • 90 篇 建筑学
  • 1,668 篇 理学
    • 889 篇 数学
    • 436 篇 物理学
    • 353 篇 生物学
    • 246 篇 统计学(可授理学、...
    • 175 篇 系统科学
    • 164 篇 化学
  • 833 篇 管理学
    • 524 篇 管理科学与工程(可...
    • 336 篇 图书情报与档案管...
    • 150 篇 工商管理
  • 164 篇 医学
    • 144 篇 临床医学
    • 115 篇 基础医学(可授医学...
    • 85 篇 药学(可授医学、理...
  • 96 篇 法学
    • 77 篇 社会学
  • 56 篇 经济学
  • 52 篇 农学
  • 29 篇 教育学
  • 16 篇 艺术学
  • 13 篇 军事学
  • 6 篇 文学

主题

  • 129 篇 laboratories
  • 124 篇 feature extracti...
  • 103 篇 computer archite...
  • 99 篇 semantics
  • 95 篇 training
  • 89 篇 computational mo...
  • 71 篇 optimization
  • 70 篇 computer science
  • 67 篇 deep learning
  • 60 篇 virtual reality
  • 58 篇 object detection
  • 54 篇 computer vision
  • 51 篇 image segmentati...
  • 49 篇 data mining
  • 48 篇 educational tech...
  • 48 篇 clustering algor...
  • 47 篇 visualization
  • 46 篇 neural networks
  • 45 篇 accuracy
  • 45 篇 delay

机构

  • 185 篇 state key labora...
  • 184 篇 hubei province k...
  • 176 篇 state key labora...
  • 125 篇 school of comput...
  • 121 篇 department of co...
  • 116 篇 key laboratory o...
  • 107 篇 college of compu...
  • 94 篇 tianjin key labo...
  • 93 篇 key laboratory o...
  • 79 篇 key laboratory o...
  • 74 篇 department of co...
  • 70 篇 university of ch...
  • 69 篇 state key labora...
  • 60 篇 key laboratory o...
  • 59 篇 college of infor...
  • 55 篇 hubei province k...
  • 54 篇 school of comput...
  • 53 篇 school of softwa...
  • 49 篇 school of comput...
  • 47 篇 peng cheng labor...

作者

  • 49 篇 xiaowei li
  • 35 篇 heng pheng-ann
  • 34 篇 dan feng
  • 33 篇 jianwei niu
  • 31 篇 li jia
  • 30 篇 huawei li
  • 29 篇 zhang hua
  • 28 篇 zhou mengchu
  • 28 篇 ren jiadong
  • 27 篇 niu jianwei
  • 25 篇 li bo
  • 25 篇 aimin hao
  • 25 篇 jin hai
  • 24 篇 hai jin
  • 23 篇 chen xiaowu
  • 23 篇 shuai li
  • 22 篇 liu jun
  • 22 篇 yu hu
  • 22 篇 wang chundong
  • 21 篇 li peng

语言

  • 4,452 篇 英文
  • 213 篇 中文
  • 139 篇 其他
检索条件"机构=Key Laboratory for Computer Virtual Technology and System"
4796 条 记 录,以下是231-240 订阅
排序:
Trimap generation with background for natural image matting  3
Trimap generation with background for natural image matting
收藏 引用
3rd International Conference on Optics and Machine Vision, ICOMV 2024
作者: Fu, Qian Liang, Yihui Kun, Zou Feng, Fujian Xu, Xiang School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu China School of Computer Science Zhongshan Institute University of Electronic Science and Technology of China Zhongshan China Guizou Key Laboratory of Pattern Recognition and Intelligent System Guizhou Minzu University Guiyang China
Image matting is a widely-used image processing technique that aims at accurately separating foreground from an image. However, this is a challenging and ill-posed problem that demands additional input, such as trimap... 详细信息
来源: 评论
Dual Consistency Learning for Semi-Supervised Airway Segmentation  2
Dual Consistency Learning for Semi-Supervised Airway Segment...
收藏 引用
2nd International Conference on Mechatronics, IoT and Industrial Informatics, ICMIII 2024
作者: Li, Mingshuang Yuan, Yunyi Wang, Qiong Qian, Yinling Zhu, Lei Southern University of Science and Technology Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen China University of Chinese Academy of Sciences Beijing China Guangdong Provincial Key Laboratory of Computer Vision and Virtual Reality Technology Shenzhen China Guangzhou China
Airway segmentation serves as an essential foundational process for both the diagnosis of lung conditions and the navigation of surgical interventions. Although numerous attempts have been proposed to address airway s... 详细信息
来源: 评论
On the Security of Smart Home systems:A Survey
收藏 引用
Journal of computer Science & technology 2023年 第2期38卷 228-247页
作者: 袁斌 万俊 吴宇晗 邹德清 金海 School of Cyber Science and Engineering Huazhong University of Science and TechnologyWuhan 430074China Hubei Key Laboratory of Distributed System Security Huazhong University of Science and Technology Wuhan 430074China Hubei Engineering Research Center on Big Data Security Huazhong University of Science and Technology Wuhan 430074China National Engineering Research Center for Big Data Technology and System Huazhong University of Science and TechnologyWuhan 430074China Services Computing Technology and System Lab Huazhong University of Science and TechnologyWuhan 430074China Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen 518057China School of Computer Science and Technology Huazhong University of Science and TechnologyWuhan 430074China Cluster and Grid Computing Lab Huazhong University of Science and TechnologyWuhan 430074China
Among the plethora of IoT(Internet of Things)applications,the smart home is one of the ***,the rapid development of the smart home has also made smart home systems a target for ***,researchers have made many efforts t... 详细信息
来源: 评论
Data quantity governance for machine learning in materials science
收藏 引用
National Science Review 2023年 第7期10卷 234-250页
作者: Yue Liu Zhengwei Yang Xinxin Zou Shuchang Ma Dahui Liu Maxim Avdeev Siqi Shi School of Computer Engineering and Science Shanghai University Shanghai Engineering Research Center of Intelligent Computing System Australian Nuclear Science and Technology Organisation School of Chemistry The University of Sydney State Key Laboratory of Advanced Special Steel School of Materials Science and Engineering Shanghai University Materials Genome Institute Shanghai University
Data-driven machine learning(ML) is widely employed in the analysis of materials structure-activity relationships,performance optimization and materials design due to its superior ability to reveal latent data pattern... 详细信息
来源: 评论
Teleoperation Based on Hybrid Mapping Method of Human-Robot Heterogeneous Workspace  18th
Teleoperation Based on Hybrid Mapping Method of Human-Robo...
收藏 引用
18th Chinese Intelligent systems Conference, CISC 2022
作者: Ye, Shuangxiu Zhang, Ning Zhao, Yongjia State Key Laboratory of Virtual Reality Technology and System Beihang University Beijing100191 China Jiangxi Research Institute Beihang University Jiangxi330000 China
In this paper, we designed a robot teleoperation system of human-robot heterogeneous workspace which is based on a hybrid mapping method, a combination of terminal pose mapping and joint angle mapping. By using this h... 详细信息
来源: 评论
AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent Threat  7
AISLE: Self-supervised Representation Learning for the Inves...
收藏 引用
7th IEEE International Conference on Data Science in Cyberspace, DSC 2022
作者: Jia, Zian Wang, Xiaosu Xiong, Yun Zhang, Yao Zhao, JinJing Shanghai Key Laboratory of Data Science School of Computer Science Fudan University China National Key Laboratory of Science and Technology on Information System Security China
Advanced Persistent Threats (APT) are difficult to detect and defend due to their high variability and concealment. Current APT detection and investigation approaches suffer from two major problems. First, most recent... 详细信息
来源: 评论
Improved Demonstration-Knowledge Utilization in Reinforcement Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第5期5卷 2139-2150页
作者: Liu, Yanyu Zeng, Yifeng Ma, Biyang Pan, Yinghui Gao, Huifan Zhang, Yuting Xiamen University Xiamen Key Laboratory of Big Data Intelligent Analysis and Decision Department of Automation Xiamen361102 China Northumbria University Department of Computer and Information Sciences NewcastleNE1 8ST United Kingdom Minnan Normal University Department of Computer Science Zhangzhou363000 China Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen518060 China
Reinforcement learning (RL) has made great success in recent years. Generally, the learning process requires a huge amount of interaction with the environment before an agent can achieve acceptable performance. This m... 详细信息
来源: 评论
Semantic recommendation through Reinforcement Learning and weighted meta-paths
Semantic recommendation through Reinforcement Learning and w...
收藏 引用
2022 International Conference on Electronic Information Engineering, Big Data, and computer technology, EIBDCT 2022
作者: Yu, Jing Lang, Yue Li, Xuewen Zhang, Jin Zheng, Shaojie Gong, Jibing School of Information Science and Engineering Yanshan University Qinhuangdao066004 China Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province Yanshan University Qinhuangdao066004 China Key Laboratory for Software Engineering of Hebei Province Yanshan University Qinhuangdao066004 China
Explainable recommendation systems, which can produce high-accuracy recommendations and help users make quick decisions, have become a hotspot in research field. Most of existing research algorithms committed to impro... 详细信息
来源: 评论
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed Problems in Malicious Traffic Detection
DSDIR: A Two-Stage Method for Addressing Noisy Long-Tailed P...
收藏 引用
2025 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2025
作者: Li, Guoliang Zhang, Ruiqi Sun, Zhe Xing, Lingkai Zhang, Yu College of Cyber Science Nankai University Tianjin China College of Computer Science Nankai University Tianjin China Tianjin Key Laboratory of Network and Data Security Technology Tianjin China Key Laboratory of Data and Intelligent System Security Ministry of Education Tianjin China
In recent years, deep learning based malicious traffic detection (MTD) systems have demonstrated remarkable success. However, their effectiveness tend to decrease because most malicious traffic datasets are suffered f... 详细信息
来源: 评论
Reputation based Adaptive Federated Learning in Medical Scenarios  9
Reputation based Adaptive Federated Learning in Medical Scen...
收藏 引用
9th IEEE International Conference on Data Science in Cyberspace, DSC 2024
作者: Wang, Lianhai Liu, Tianrui Wang, Yingxiaochun Wang, Xinlei Li, Qi Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Jinan China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Industrial Network and Information System Security Jinan China
Federated Learning (FL) is a distributed machine learning paradigm designed to address data silos and protect data privacy. However, in medical scenarios, the heterogeneity in data quality and the non-independent and ... 详细信息
来源: 评论