咨询与建议

限定检索结果

文献类型

  • 1,211 篇 会议
  • 1,135 篇 期刊文献

馆藏范围

  • 2,346 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,622 篇 工学
    • 1,153 篇 计算机科学与技术...
    • 787 篇 软件工程
    • 342 篇 信息与通信工程
    • 301 篇 电气工程
    • 213 篇 控制科学与工程
    • 176 篇 生物工程
    • 108 篇 光学工程
    • 103 篇 电子科学与技术(可...
    • 101 篇 生物医学工程(可授...
    • 91 篇 机械工程
    • 76 篇 化学工程与技术
    • 71 篇 仪器科学与技术
    • 59 篇 交通运输工程
    • 55 篇 土木工程
    • 52 篇 动力工程及工程热...
    • 49 篇 建筑学
    • 46 篇 网络空间安全
  • 740 篇 理学
    • 392 篇 数学
    • 201 篇 生物学
    • 181 篇 物理学
    • 118 篇 统计学(可授理学、...
    • 95 篇 化学
    • 56 篇 系统科学
  • 388 篇 管理学
    • 240 篇 管理科学与工程(可...
    • 166 篇 图书情报与档案管...
    • 77 篇 工商管理
  • 136 篇 医学
    • 113 篇 临床医学
    • 77 篇 基础医学(可授医学...
  • 57 篇 法学
    • 43 篇 社会学
  • 44 篇 教育学
    • 41 篇 教育学
  • 44 篇 农学
  • 29 篇 经济学
  • 17 篇 文学
  • 3 篇 军事学
  • 3 篇 艺术学

主题

  • 108 篇 feature extracti...
  • 90 篇 training
  • 89 篇 semantics
  • 84 篇 deep learning
  • 55 篇 computational mo...
  • 52 篇 predictive model...
  • 48 篇 data models
  • 47 篇 task analysis
  • 42 篇 convolution
  • 41 篇 accuracy
  • 39 篇 contrastive lear...
  • 39 篇 visualization
  • 38 篇 object detection
  • 37 篇 neural networks
  • 31 篇 machine learning
  • 30 篇 convolutional ne...
  • 28 篇 graph neural net...
  • 27 篇 reinforcement le...
  • 25 篇 image segmentati...
  • 25 篇 speech processin...

机构

  • 133 篇 south china univ...
  • 69 篇 key laboratory o...
  • 69 篇 minist educ key ...
  • 55 篇 south china univ...
  • 54 篇 south china univ...
  • 54 篇 school of comput...
  • 51 篇 pazhou lab peopl...
  • 45 篇 school of softwa...
  • 41 篇 south china univ...
  • 40 篇 south china univ...
  • 39 篇 jiangsu key labo...
  • 39 篇 school of electr...
  • 39 篇 national enginee...
  • 36 篇 hong kong polyte...
  • 36 篇 key laboratory o...
  • 36 篇 jiangsu key labo...
  • 35 篇 hunan provincial...
  • 35 篇 chongqing key la...
  • 32 篇 peng cheng labor...
  • 32 篇 key laboratory o...

作者

  • 99 篇 cai yi
  • 82 篇 tan mingkui
  • 48 篇 wu qingyao
  • 43 篇 shen linlin
  • 43 篇 li qing
  • 41 篇 wang guoyin
  • 38 篇 xu xiaolong
  • 28 篇 xu xuemiao
  • 27 篇 xiaolong xu
  • 26 篇 huang qingbao
  • 24 篇 zhou zhiheng
  • 24 篇 huang qingming
  • 22 篇 xu qianqian
  • 21 篇 xie jiayuan
  • 20 篇 hongyan ma
  • 19 篇 chen huajun
  • 18 篇 ren haopeng
  • 18 篇 niu shuaicheng
  • 18 篇 zhang yifan
  • 17 篇 xia shuyin

语言

  • 2,159 篇 英文
  • 162 篇 其他
  • 34 篇 中文
  • 2 篇 葡萄牙文
  • 1 篇 荷兰文
检索条件"机构=Key Laboratory of Big Data and Intelligent Robot "
2346 条 记 录,以下是621-630 订阅
排序:
Algorithmic analysis of tseng’s iterates for pseudo-monotone variational inequalities
收藏 引用
UPB Scientific Bulletin, Series A: Applied Mathematics and Physics 2021年 第1期83卷 71-78页
作者: Yao, Yonghong Li, Huayu Zhu, Li-Jun The Key Laboratory of Intelligent Information and Big Data Processing of NingXia Province North Minzu University Yinchuan750021 China Health Big Data Research Institute of North Minzu University Yinchuan750021 China School of Mathematical Sciences Tiangong University Tianjin300387 China
The iterative methods for solving the variational inequality problem are studied and reviewed. We reconsider the convergence of the Tseng’s algorithm for solving the pseudo-monotone variational inequalities. Under so... 详细信息
来源: 评论
GBSVM: Granular-ball Support Vector Machine
arXiv
收藏 引用
arXiv 2022年
作者: Xia, Shuyin Lian, Xiaoyu Wang, Guoyin Gao, Xinbo Chen, Jiancu Peng, Xiaoli The Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing University of Posts and Telecommunications Chongqing400065 China
GBSVM (Granular-ball Support Vector Machine) is a significant attempt to construct a classifier using the coarse-to-fine granularity of a granular-ball as input, rather than a single data point. It is the first classi... 详细信息
来源: 评论
Face anti-spoofing based on multi-modal and multi-scale features fusion
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2022年 第6期29卷 73-82页
作者: Kong Chao Ou Weihua Gong Xiaofeng Li Weian Han Jie Yao Yi Xiong Jiahao School of Big Data and Computer Science Guizhou Normal UniversityGuiyang 550025China Special Key Laboratory of Artificial Intelligence and Intelligent Control of Guizhou Province Guizhou Institute of TechnologyGuiyang 550003China Guizhou Science and Technology Information Center Department of Science and Technology of Guizhou ProvinceGuiyang 550002China
Face anti-spoofing is used to assist face recognition system to judge whether the detected face is real face or fake face. In the traditional face anti-spoofing methods, features extracted by hand are used to describe... 详细信息
来源: 评论
Inter-Layer Explainable Variational Autoencoder Model for Multivariate Time Series Anomaly Detection
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, Xiaoxia Wang, Guangyao Chen, Yi Liu, Qun Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
The wide application of big data and artificial intelligence has dramatically increased the dimension and quantity of monitoring data in various industries. As one of the most used common data in various industries, m... 详细信息
来源: 评论
An Effective and Real-time Time-Slot Power Detection Method  3
An Effective and Real-time Time-Slot Power Detection Method
收藏 引用
3rd International Conference on Electronic InformationTechnology and Smart Agriculture, ICEITSA 2023
作者: Zhang, Xian Luo, Xinhui Qu, Taiguo Yin, Dong Huaihua University Hunan Huaihua418000 China Key Laboratory of Intelligent Control Technology for Wuling-Mountain Ecological Agriculture in Hunan Province Huaihua University Huaihua418000 China Key Laboratory of Wuling-Mountain Health Big Data Intelligent Processing and Application in Hunan Province Universities Huaihua University Hunan Huaihua418000 China Department of Art Design Huaihua Tourism School Hunan Huaihua418000 China
To efficiently detect the time-slot power of the Time Division Multiple Access (TDMA) communication systems such as repeaters and base stations in real-time. This article designs a signal-sampling hardware circuit bas... 详细信息
来源: 评论
Each Fake News is Fake in its Own Way: An Attribution Multi-Granularity Benchmark for Multimodal Fake News Detection
arXiv
收藏 引用
arXiv 2024年
作者: Guo, Hao Ma, Zihan Zeng, Zhi Luo, Minnan Zeng, Weixin Tang, Jiuyang Zhao, Xiang Laboratory for Big Data and Decision Nation University of Defence Technology China School of Computer Science and Technology Xi’an Jiaotong University China Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University China Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi’an Jiaotong University China
Social platforms, while facilitating access to information, have also become saturated with a plethora of fake news, resulting in negative consequences. Automatic multimodal fake news detection is a worthwhile pursuit... 详细信息
来源: 评论
Designer topological flat bands in one-dimensional armchair graphene antidot lattices
收藏 引用
Physical Review B 2024年 第11期110卷 115138页
作者: Jianing Wang Weiwei Chen Zhengya Wang Jie Meng Ruoting Yin Miaogen Chen Shijing Tan Chuanxu Ma Qunxiang Li Bing Wang Hefei National Research Center for Physical Sciences at the Microscale Synergetic Innovation Center of Quantum Information & Quantum Physics and New Cornerstone Science Laboratory Key Laboratory of Intelligent Manufacturing Quality Big Data Tracing and Analysis of Zhejiang Province College of Sciences Hefei National Laboratory
We report a viable strategy to realize topological flat bands in one-dimensional armchair graphene antidot lattices. The quantum destructive interference effect leads to largely quenched intra-antidot hopping with nea... 详细信息
来源: 评论
Gb-Dbscan: A Fast Granular-Ball Based Dbscan Clustering Algorithm
SSRN
收藏 引用
SSRN 2023年
作者: Cheng, Dongdong Zhang, Cheng Li, Ya Xia, Shuyin Wang, Guoyin Huang, Jinlong Zhang, Sulan Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China College of Big Data and Intelligent Engineering Yangtze Normal University Chongqing408100 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China
DBSCAN algorithm identifies high-density connected areas as clusters, so that it has advantages in discovering arbitrary-shaped clusters. However, it has difficulty in adjusting parameters and its time complexity is O... 详细信息
来源: 评论
Simulating Bluetooth virus propagation on the real map via infectious attenuation algorithm and discrete dynamical system
收藏 引用
Iran Journal of Computer Science 2024年 第4期7卷 755-776页
作者: Zhu, Qingyi Wan, Wentao Gan, Chengquan Fan, Ziqi Yang, Lu-Xing School of Cyber Security and Information Law Chongqing University of Posts and Telecommunications Chongqing 400065 China School of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing 400065 China Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education Chongqing 400065 China School of Information Technology Deakin University Melbourne 3125 VIC Australia
In recent years, mobile smart devices have gained popularity globally due to their convenience and efficiency. However, this popularity has also attracted the attention of virus creators, resulting in a significant co... 详细信息
来源: 评论
Sara: Controllable Makeup Transfer with Semantic-Guided Alignment and Region-Adaptive Normalization
SSRN
收藏 引用
SSRN 2024年
作者: Zhong, Xiaojing Huang, Xinyi Wu, Zhonghua Lin, Guosheng Wu, Qingyao School of Software Engineering South China University of Technology China School of Computer Science and Engineering Nanyang Technological University Singapore Key Laboratory of Big Data and Intelligent Robot Ministry of Education China Peng Cheng Laboratory China SenseTime Research Hong Kong
Makeup transfer is a process of transferring the makeup style from a reference image to the source image, while preserving the source image's identity. In addition to achieving fine-grained control over the makeup... 详细信息
来源: 评论