咨询与建议

限定检索结果

文献类型

  • 6,471 篇 会议
  • 4,188 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 10,664 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6,875 篇 工学
    • 4,466 篇 计算机科学与技术...
    • 3,823 篇 软件工程
    • 1,703 篇 信息与通信工程
    • 909 篇 控制科学与工程
    • 862 篇 生物工程
    • 782 篇 电子科学与技术(可...
    • 773 篇 电气工程
    • 620 篇 机械工程
    • 585 篇 光学工程
    • 513 篇 生物医学工程(可授...
    • 417 篇 化学工程与技术
    • 339 篇 仪器科学与技术
    • 253 篇 动力工程及工程热...
    • 212 篇 材料科学与工程(可...
    • 196 篇 交通运输工程
    • 174 篇 土木工程
    • 167 篇 建筑学
  • 4,128 篇 理学
    • 2,389 篇 数学
    • 1,061 篇 物理学
    • 958 篇 生物学
    • 675 篇 统计学(可授理学、...
    • 419 篇 化学
    • 380 篇 系统科学
  • 1,729 篇 管理学
    • 915 篇 图书情报与档案管...
    • 864 篇 管理科学与工程(可...
    • 284 篇 工商管理
  • 371 篇 医学
    • 313 篇 临床医学
    • 275 篇 基础医学(可授医学...
    • 189 篇 药学(可授医学、理...
  • 222 篇 法学
    • 190 篇 社会学
  • 140 篇 农学
  • 102 篇 经济学
  • 84 篇 教育学
  • 35 篇 军事学
  • 34 篇 文学
  • 27 篇 艺术学
  • 9 篇 哲学

主题

  • 441 篇 feature extracti...
  • 320 篇 semantics
  • 247 篇 training
  • 190 篇 computational mo...
  • 182 篇 deep learning
  • 156 篇 convolution
  • 153 篇 optimization
  • 149 篇 object detection
  • 148 篇 accuracy
  • 146 篇 image segmentati...
  • 139 篇 laboratories
  • 135 篇 data mining
  • 134 篇 visualization
  • 124 篇 face recognition
  • 116 篇 predictive model...
  • 105 篇 neural networks
  • 105 篇 machine learning
  • 99 篇 support vector m...
  • 93 篇 clustering algor...
  • 90 篇 simulation

机构

  • 433 篇 key laboratory o...
  • 375 篇 university of ch...
  • 207 篇 key laboratory o...
  • 189 篇 shanghai key lab...
  • 168 篇 hubei province k...
  • 157 篇 shanghai key lab...
  • 136 篇 school of comput...
  • 128 篇 shandong provinc...
  • 124 篇 school of comput...
  • 116 篇 college of compu...
  • 116 篇 school of inform...
  • 113 篇 shanghai enginee...
  • 111 篇 department of au...
  • 105 篇 peng cheng labor...
  • 102 篇 key laboratory o...
  • 97 篇 guangdong key la...
  • 96 篇 fujian provincia...
  • 95 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 77 篇 shanghai key lab...

作者

  • 95 篇 shiguang shan
  • 82 篇 liu qun
  • 77 篇 huang qingming
  • 60 篇 huang zhixiang
  • 56 篇 yingsong li
  • 51 篇 liu yang
  • 48 篇 xianliang wu
  • 42 篇 li chen
  • 40 篇 li hua
  • 40 篇 licheng jiao
  • 40 篇 qing he
  • 39 篇 shen linlin
  • 38 篇 feng zhiquan
  • 37 篇 liu jun
  • 37 篇 huang xuanjing
  • 35 篇 yang bo
  • 35 篇 jiao licheng
  • 35 篇 xilin chen
  • 35 篇 zhongzhi shi
  • 34 篇 jiang shuqiang

语言

  • 10,137 篇 英文
  • 332 篇 其他
  • 211 篇 中文
  • 6 篇 德文
  • 6 篇 法文
  • 1 篇 意大利文
检索条件"机构=Key Laboratory of Intelligent Computing and Information Processing"
10664 条 记 录,以下是4871-4880 订阅
排序:
Temporal Transformation Network Based On Scale Sequences for Cloth-Changing Person Re-Identification in Video Datasets  9
Temporal Transformation Network Based On Scale Sequences for...
收藏 引用
9th International Conference on Computer and Communications, ICCC 2023
作者: Zhu, Xiaoke Zhao, Bo Dong, Zhiwei Dong, Lingyun Li, Danyang School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Engineering Research Center of Intelligent Technology and Application China Henan Key Laboratory of Big Data Analysis and Processing Henan University Kaifeng China
This paper introduces the Temporal Transform Network based on Scale Sequences (TTS) for cloth-changing person re-identification in video datasets. The TTS network is designed to capture multi-scale temporal cues withi... 详细信息
来源: 评论
A graph-based model for joint chinese word segmentation and dependency parsing
arXiv
收藏 引用
arXiv 2019年
作者: Yan, Hang Qiu, Xipeng Huang, Xuanjing School of Computer Science Fudan University Shanghai Key Laboratory of Intelligent Information Processing Fudan University
Chinese word segmentation and dependency parsing are two fundamental tasks for Chinese natural language processing. The dependency parsing is defined on wordlevel. Therefore word segmentation is the precondition of de... 详细信息
来源: 评论
GAN-based Symmetric Embedding Costs Adjustment for Enhancing Image Steganographic Security  24
GAN-based Symmetric Embedding Costs Adjustment for Enhancing...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Ye, Miaoxin Zhou, Saixing Luo, Weiqi Tan, Shunquan Huang, Jiwu Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou China Shenzhen Key Laboratory of Media Security College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen MSU-BIT University Shenzhen China
Designing embedding costs is pivotal in modern image steganography. Many studies have shown adjusting symmetric embedding costs to asymmetric ones can enhance steganographic security. However, most existing methods he... 详细信息
来源: 评论
Point-Level and Set-Level Deep Representation Learning for Cross-Modal Person Re-identification  8
Point-Level and Set-Level Deep Representation Learning for C...
收藏 引用
8th IEEE International Conference on Computer and Communications, ICCC 2022
作者: Hu, Jihui Ye, Pengfei Li, Danyang Dong, Lingyun Chen, Xiaopan Zhu, Xiaoke School of Computer and Information Engineering Henan University Kaifeng China Henan University Henan Key Laboratory of Big Data Analysis and Processing Kaifeng China Henan University Henan Engineering Research Center of Intelligent Technology and Application China
In practice, significant modality differences usually exist between visible and infrared images, which makes visible-infrared Person Re-Identification (VI-ReID) a challenging research task. Due to the existing influen... 详细信息
来源: 评论
Toward diverse text generation with inverse reinforcement learning
arXiv
收藏 引用
arXiv 2018年
作者: Shi, Zhan Chen, Xinchi Qiu, Xipeng Huang, Xuanjing Shanghai Key Laboratory of Intelligent Information Processing Fudan University School of Computer Science Fudan University
Text generation is a crucial task in NLP. Recently, several adversarial generative models have been proposed to improve the exposure bias problem in text generation. Though these models gain great success, they still ... 详细信息
来源: 评论
An Improved K-means Algorithm Based on the Bayesian Inference  7th
An Improved K-means Algorithm Based on the Bayesian Inferenc...
收藏 引用
7th China National Conference on Big Data and Social computing, BDSC 2022
作者: Chen, Rumeng Wang, Feng Hu, Feng Computer College of Qinghai Normal University Qinghai Xining810008 China The State Key Laboratory of Tibetan Intelligent Information Processing and Application Qinghai Xining810008 China Academy of Plateau Science and Sustainability Qinghai Xining810016 China
As one of the most widely used algorithms in machine learning, the fs algorithm is known for its simplicity and efficiency. However, it also has certain limitations, including pre-selecting the K value, which leads to... 详细信息
来源: 评论
Facial StO2: A New Promising Biometric Identity
Facial StO2: A New Promising Biometric Identity
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Dairong Peng Sirui Sun Xinyu Liu Ju Zhou Tong Chen Institute of Legal Psychology and Intelligent Computing Southwest University Chongqing China Chongqing Key Laboratory of Non-linear Circuit and Intelligent Information Processing Chongqing China School of Electronic and Information Engineering Southwest University Chongqing China
In this paper, we introduce a new biometric identity, facial tissue oxygen saturation (StO2). StO2 is an index of blood oxygen content in tissues and is related to blood vessel distribution pattern and metabolic rate.... 详细信息
来源: 评论
Pseudo-Centroid Representation Learning for Cross-domain Few-shot Classification from Remote Sensing Imagery
Pseudo-Centroid Representation Learning for Cross-domain Few...
收藏 引用
Signal, information and Data processing (ICSIDP), IEEE International Conference on
作者: Can Li Jianlin Xie He Chen Yin Zhuang Jiahao Li Liang Chen National Key Laboratory of Space-Born Intelligent Information Processing Beijing Institute of Technology Beijing China
Cross-domain few-shot classification is gaining significant attention due to its potential to address challenges in remote sensing applications, such as large domain gaps and limited labeled data. Recent approaches ha... 详细信息
来源: 评论
QR Code Detection with Faster-RCNN Based on FPN  6th
QR Code Detection with Faster-RCNN Based on FPN
收藏 引用
6th International Conference on Artificial Intelligence and Security, ICAIS 2020
作者: Peng, Jinbo Yuan, Song Yuan, Xin School of Computer Science and Technology Wuhan University of Science and Technology Wuhan430065 China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan430065 China
Nowadays, the QR code is often used in many popular fields, such as payment and social networking. Therefore, it is particularly important to quickly and accurately detect the position of QR code in real complex scene... 详细信息
来源: 评论
Thinking clearly, talking fast: Concept-guided non-autoregressive generation for open-domain dialogue systems
arXiv
收藏 引用
arXiv 2021年
作者: Zou, Yicheng Liu, Zhihua Hu, Xingwu Zhang, Qi Shanghai Key Laboratory of Intelligent Information Processing Fudan UniversitySchool of Computer Science Fudan UniversityShanghai China
Human dialogue contains evolving concepts, and speakers naturally associate multiple concepts to compose a response. However, current dialogue models with the seq2seq framework lack the ability to effectively manage c... 详细信息
来源: 评论