咨询与建议

限定检索结果

文献类型

  • 6,487 篇 会议
  • 4,139 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 10,631 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,842 篇 工学
    • 4,457 篇 计算机科学与技术...
    • 3,805 篇 软件工程
    • 1,698 篇 信息与通信工程
    • 913 篇 控制科学与工程
    • 859 篇 生物工程
    • 791 篇 电子科学与技术(可...
    • 738 篇 电气工程
    • 619 篇 机械工程
    • 581 篇 光学工程
    • 507 篇 生物医学工程(可授...
    • 412 篇 化学工程与技术
    • 336 篇 仪器科学与技术
    • 252 篇 动力工程及工程热...
    • 207 篇 材料科学与工程(可...
    • 195 篇 交通运输工程
    • 171 篇 土木工程
    • 163 篇 建筑学
  • 4,101 篇 理学
    • 2,372 篇 数学
    • 1,060 篇 物理学
    • 955 篇 生物学
    • 671 篇 统计学(可授理学、...
    • 416 篇 化学
    • 379 篇 系统科学
  • 1,721 篇 管理学
    • 916 篇 图书情报与档案管...
    • 855 篇 管理科学与工程(可...
    • 277 篇 工商管理
  • 365 篇 医学
    • 310 篇 临床医学
    • 278 篇 基础医学(可授医学...
    • 189 篇 药学(可授医学、理...
  • 225 篇 法学
    • 192 篇 社会学
  • 138 篇 农学
  • 99 篇 经济学
  • 86 篇 教育学
  • 35 篇 军事学
  • 34 篇 文学
  • 26 篇 艺术学
  • 9 篇 哲学

主题

  • 440 篇 feature extracti...
  • 318 篇 semantics
  • 237 篇 training
  • 190 篇 computational mo...
  • 187 篇 deep learning
  • 156 篇 convolution
  • 151 篇 optimization
  • 150 篇 accuracy
  • 148 篇 object detection
  • 146 篇 image segmentati...
  • 139 篇 laboratories
  • 136 篇 data mining
  • 132 篇 visualization
  • 122 篇 face recognition
  • 114 篇 predictive model...
  • 105 篇 machine learning
  • 103 篇 neural networks
  • 99 篇 support vector m...
  • 93 篇 clustering algor...
  • 90 篇 simulation

机构

  • 435 篇 key laboratory o...
  • 378 篇 university of ch...
  • 210 篇 key laboratory o...
  • 188 篇 shanghai key lab...
  • 169 篇 hubei province k...
  • 159 篇 shanghai key lab...
  • 135 篇 school of comput...
  • 128 篇 shandong provinc...
  • 125 篇 school of comput...
  • 117 篇 school of inform...
  • 115 篇 college of compu...
  • 110 篇 department of au...
  • 110 篇 shanghai enginee...
  • 104 篇 peng cheng labor...
  • 101 篇 key laboratory o...
  • 98 篇 guangdong key la...
  • 95 篇 fujian provincia...
  • 93 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 78 篇 shanghai key lab...

作者

  • 95 篇 shiguang shan
  • 82 篇 liu qun
  • 75 篇 huang qingming
  • 59 篇 huang zhixiang
  • 57 篇 yingsong li
  • 52 篇 liu yang
  • 49 篇 xianliang wu
  • 42 篇 li chen
  • 40 篇 licheng jiao
  • 40 篇 qing he
  • 39 篇 li hua
  • 39 篇 huang xuanjing
  • 38 篇 shen linlin
  • 37 篇 yang bo
  • 37 篇 feng zhiquan
  • 36 篇 jiao licheng
  • 36 篇 li zuoyong
  • 35 篇 liu jun
  • 35 篇 xilin chen
  • 35 篇 zhongzhi shi

语言

  • 10,101 篇 英文
  • 335 篇 其他
  • 209 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing Information Processing"
10631 条 记 录,以下是231-240 订阅
排序:
Mitigating Shortcut Learning via Smart Data Augmentation based on Large Language Model  31
Mitigating Shortcut Learning via Smart Data Augmentation bas...
收藏 引用
31st International Conference on Computational Linguistics, COLING 2025
作者: Sun, Xinyi Tan, Hongye Guo, Yaxin Qiang, Pengpeng Li, Ru Zhang, Hu School of Computer and Information Technology Shanxi University Taiyuan China Institute of Intelligent Information Processing Shanxi University Taiyuan China Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education Shanxi University Taiyuan China
Data-driven pre-trained language models typically perform shortcut learning wherein they rely on the spurious correlations between the data and the ground truth. This reliance can undermine the robustness and generali... 详细信息
来源: 评论
FSA-Net:A Cost-efficient Face Swapping Attention Network with Occlusion-Aware Normalization
收藏 引用
intelligent Automation & Soft computing 2023年 第7期37卷 971-983页
作者: Zhipeng Bin Huihuang Zhao Xiaoman Liang Wenli Chen College of Computer Science and Technology Hengyang Normal UniversityHengyang421002China Hunan Provincial Key Laboratory of Intelligent Information Processing and Application Hengyang421002China
The main challenges in face swapping are the preservation and adaptive superimposition of attributes of two *** this study,the Face Swapping Attention Network(FSA-Net)is proposed to generate photoreal-istic face *** e... 详细信息
来源: 评论
An Algebraic Multigrid-Based Physical Factorization Preconditioner for the Multi-Group Radiation Diffusion Equations in Three Dimensions
收藏 引用
Numerical Mathematics(Theory,Methods and Applications) 2023年 第2期16卷 410-432页
作者: Xiaoqiang Yue Zekai Zhang Xiaowen Xu Shuying Zhai Shi Shu National Center for Applied Mathematics in Hunan Key Laboratory of Intelligent Computing&Information Processing of Ministry of EducationHunan Key Laboratory for Computation and Simulation in Science and EngineeringXiangtan UniversityXiangtan 411105China Laboratory of Computational Physics Institute of Applied Physics and Computational MathematicsBeijing 100094China School of Mathematical Sciences Huaqiao UniversityQuanzhou 362021China.
The paper investigates the robustness and parallel scaling properties of a novel physical factorization preconditioner with algebraic multigrid subsolves in the iterative solution of a cell-centered finite volume disc... 详细信息
来源: 评论
EBVS: An Efficient Pseudonymous Batch Verification Scheme for Vehicular Networks  2nd
EBVS: An Efficient Pseudonymous Batch Verification Scheme fo...
收藏 引用
2nd International Conference on Data Security and Privacy Protection, DSPP 2024
作者: Wang, Ping Wang, Shuokang College of Electronics and Information Engineering Shenzhen University Guangdong Shenzhen518060 China Guangdong Provincial Key Laboratory of Intelligent Information Processing Guangdong Shenzhen518060 China
With the rapid development of intelligent transportation systems, the security of vehicular network communication architectures has become a focal point of research. This paper introduces a vehicular network comm... 详细信息
来源: 评论
Deep Multi-image Hiding with Random key  1
收藏 引用
1st International Conference on Artificial Intelligence Security and Privacy, AIS and P 2023
作者: Zhang, Wei Tang, Weixuan Rao, Yuan Li, Bin Huang, Jiwu Institute of Artificial Intelligence Guangzhou University Guangzhou China Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Multi-image hiding is the technique of hiding multiple secret images within one cover image. In most existing methods, it is possible for one receiver to reveal other receivers’ secret images. To improve the privacy ... 详细信息
来源: 评论
An Enhanced Particle Swarm Algorithm Based on Fitness Landscape information  13
An Enhanced Particle Swarm Algorithm Based on Fitness Landsc...
收藏 引用
13th IEEE Congress on Evolutionary Computation, CEC 2024
作者: Diao, Zhenya Yu, Fei Guan, Jian Liu, Meitong School of Physics and Information Engineering Minnan Normal University Key Lab of Intelligent Optimization and Information Processing Zhangzhou36300 China School of Physics and Information Engineering Minnan Normal University Key Laboratory of Light Field Manipulation and System Integration Applications in Fujian Province Key Lab of Intelligent Optimization and Information Processing Zhangzhou36300 China
In the original Particle Swarm Optimization (PSO), the selection of parameters significantly impacts the search capability of PSO. The paper introduces an innovative algorithm called Fitness Landscape-based PSO (FLPSO... 详细信息
来源: 评论
A Local Regression-Based SLA-Aware Energy-Efficient Virtual Machine Consolidation Algorithm in Data Centers  9
A Local Regression-Based SLA-Aware Energy-Efficient Virtual ...
收藏 引用
9th International Conference on Big Data computing and Communications, BigCom 2023
作者: Wu, Xiaodong Wang, Ronghai Lin, Guoxin Quanzhou Normal University School of Mathmatics and Computer Science China Fujian Province University Fujian Provincial Key Laboratory of Data-Intensive Computing Key Laboratory of Intelligent Computing and Information Processing Fujian China Provincial Big Data Research Institute of Intelligent Manufacturing Quanzhou China
Virtual Machine Consolidation (VMC) is an effective means to improve the resource utilization and reduce energy consumption of data centers. However, the VMC optimization that only considers energy consumption may lea... 详细信息
来源: 评论
Permittivity inversion of GPR images based on DeepLab  3
Permittivity inversion of GPR images based on DeepLab
收藏 引用
3rd International Conference on Artificial Intelligence and Computer Engineering, ICAICE 2022
作者: Liu, Hongwei Wang, Jinpeng Talukdar, Masud Yuan, Da Key Laboratory of Intelligent Information Processing Shandong Technology and Business University Yantai Shandong264005 China
Ground Penetrating Radar (GPR) is usually used to detect unknown underground structure information, but it is very difficult to extract the underground target structure information from original GPR signal. This paper... 详细信息
来源: 评论
Near-field Beamforming Technique Based on 3-D Cylindrical Array: Enlarging Region and Improving Spectral Efficiency  12
Near-field Beamforming Technique Based on 3-D Cylindrical Ar...
收藏 引用
12th IEEE Asia-Pacific Conference on Antennas and Propagation, APCAP 2024
作者: Gao, Shuai Zhou, Kai Wang, Ying Xiang, Jianhong Zhong, Yu Harbin Engineering University College of Information and Communication Engineering Harbin China Agile and Intelligent Computing Key Laboratory Chengdu China
For large incidence/emergence angles in uniform linear arrays, the near-field region shrinks sharply. In this paper, we present Uniform 3D Cylindrical Array (UCA-3D), which can enlarge the near-field region and improv... 详细信息
来源: 评论
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 473-481页
作者: Qi Li Gaozhan Liu Qianqian Zhang Lidong Han Wei Chen Rui Li Jinbo Xiong School of Computer Science Nanjing University of Posts and Telecommunications Key Laboratory of Cryptography of Zhejiang Province Hangzhou Normal University Tongda College of Nanjing University of Posts and Telecommunications Henan Key Laboratory of Network Cryptography Technology School of Computer Science and Technology Xidian University State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Normal University Faculty of Software Fujian Normal University
Ciphertext-Policy Attribute-Based Encryption(CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing sc... 详细信息
来源: 评论