咨询与建议

限定检索结果

文献类型

  • 77 篇 会议
  • 58 篇 期刊文献

馆藏范围

  • 135 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 83 篇 工学
    • 59 篇 计算机科学与技术...
    • 45 篇 软件工程
    • 30 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 15 篇 电气工程
    • 12 篇 生物工程
    • 8 篇 机械工程
    • 8 篇 电子科学与技术(可...
    • 7 篇 交通运输工程
    • 6 篇 光学工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 安全科学与工程
    • 2 篇 仪器科学与技术
    • 2 篇 化学工程与技术
    • 2 篇 网络空间安全
  • 42 篇 理学
    • 25 篇 数学
    • 13 篇 生物学
    • 10 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 3 篇 系统科学
  • 16 篇 管理学
    • 10 篇 管理科学与工程(可...
    • 7 篇 图书情报与档案管...
    • 2 篇 工商管理
  • 7 篇 法学
    • 5 篇 社会学
    • 2 篇 法学
  • 4 篇 医学
    • 4 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 3 篇 农学
    • 2 篇 作物学
  • 2 篇 教育学
    • 1 篇 教育学
    • 1 篇 心理学(可授教育学...

主题

  • 12 篇 feature extracti...
  • 6 篇 convolutional ne...
  • 5 篇 generative adver...
  • 5 篇 convolution
  • 5 篇 software
  • 5 篇 training
  • 4 篇 costs
  • 4 篇 accuracy
  • 3 篇 image fusion
  • 3 篇 deep learning
  • 3 篇 three-dimensiona...
  • 3 篇 software algorit...
  • 3 篇 speech processin...
  • 3 篇 neural networks
  • 3 篇 face recognition
  • 3 篇 knowledge graph
  • 3 篇 computational mo...
  • 3 篇 predictive model...
  • 3 篇 fuses
  • 3 篇 prediction algor...

机构

  • 11 篇 school of comput...
  • 10 篇 key laboratory o...
  • 9 篇 key laboratory o...
  • 8 篇 shandong provinc...
  • 8 篇 school of comput...
  • 7 篇 state key labora...
  • 7 篇 college of compu...
  • 6 篇 shandong key lab...
  • 6 篇 key laboratory o...
  • 6 篇 key laboratory o...
  • 6 篇 department of co...
  • 6 篇 the key laborato...
  • 5 篇 inner mongolia e...
  • 5 篇 the key laborato...
  • 5 篇 key laboratory o...
  • 5 篇 inner mongolia k...
  • 5 篇 key laboratory o...
  • 4 篇 inner mongolia e...
  • 4 篇 shandong fundame...
  • 4 篇 beihang universi...

作者

  • 12 篇 wu xiaojun
  • 9 篇 jian-tao zhou
  • 8 篇 xiaojun wu
  • 8 篇 shi minjia
  • 7 篇 zhang yumei
  • 6 篇 yang honghong
  • 5 篇 yumei zhang
  • 5 篇 zhao junqiao
  • 4 篇 zhou jian-tao
  • 4 篇 wang cheng
  • 4 篇 kim jon-lark
  • 4 篇 lv guohua
  • 4 篇 wang hanli
  • 4 篇 solé patrick
  • 4 篇 peng li
  • 4 篇 gao yongbiao
  • 4 篇 honghong yang
  • 3 篇 li peng
  • 3 篇 zhou jiantao
  • 3 篇 ye chen

语言

  • 113 篇 英文
  • 20 篇 其他
  • 4 篇 中文
检索条件"机构=Key Laboratory of Intelligent Computing and Service"
135 条 记 录,以下是41-50 订阅
排序:
Log-Concave Sequences in Coding Theory
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Minjia Wang, Xuan An, Junmin Kim, Jon-Lark The Key Laboratory of Intelligent Computing Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Hefei230601 China State Key Laboratory of integrated Service Networks Xidian University Xi’an710071 China Department of Mathematics Sogang University Seoul Korea Republic of
We introduce the notion of logarithmically concave (or log-concave) sequences in Coding Theory. A sequence a0, a1, . . ., an of real numbers is called log-concave if a2i ≥ ai−1ai+1 for all 1 ≤ i ≤ n−1. A natural se... 详细信息
来源: 评论
Facial StO2-based Stress Recognition using Automatic Graph Generation and Dual-Stream GNN
Facial StO2-based Stress Recognition using Automatic Graph G...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yingjuan Jia Hanpu Wang Xinyu Liu Tong Chen College of Electronic and Information Engineering Southwest University China Chongqing Key Laboratory of Generic Technology and System of Service Robots Southwest University China Institute of Legal Psychology and Intelligent Computing Southwest University China
The recognition of stress responses in health, resilience, and psychopathology holds significant scientific importance. The biological information carried by the facial tissue oxygen saturation (StO2) is a useful indi... 详细信息
来源: 评论
Joint Extraction of Entities and Relations by Adversarial Training and Mixup Data Augmentation  7
Joint Extraction of Entities and Relations by Adversarial Tr...
收藏 引用
7th International Conference on Computer and Communications, ICCC 2021
作者: Chen, Hongjing Lu, Gang Wu, Xiaojun Zhang, Yumei SNNU Key Laboratory of Intelligent Computing and Service Technology For Folk Song Ministry of Culture and Tourism Shaanxi Normal University School of Computer Science Xi'an China
Joint extraction of entities and relations is an important task for building a knowledge graph and information extraction. However, small interference in the text can greatly change the semantics of words and sentence... 详细信息
来源: 评论
Expanding self-orthogonal codes over a ring Z4 to self-dual codes and unimodular lattices
arXiv
收藏 引用
arXiv 2024年
作者: Shi, Minjia Tao, Sihui Hong, Jihoon Kim, Jon-Lark The Key Laboratory of Intelligent Computing Signal Processing Ministry of Education School of Mathematical Sciences Anhui University Anhui Hefei230601 China State Key Laboratory of Integrated Service Networks Xidian University Xi’an710071 China The Department of Mathematics Sogang University Seoul Korea Republic of
Self-dual codes have been studied actively because they are connected with mathematical structures including block designs and lattices and have practical applications in quantum error-correcting codes and secret shar... 详细信息
来源: 评论
KF-TMIAF: An Efficient key-Frames-Based Temporal Modeling of Images and AU Features structure for Masked Facial Expression Recognition
KF-TMIAF: An Efficient Key-Frames-Based Temporal Modeling of...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Huijie Gu Hanpu Wang Shiwei He Mengyan Li Jianmeng Zhou Tong Chen College of Electronic and Information Engineering Southwest University Chongqing China Chongqing Key Laboratory of Generic Technology and System of Service Robots SWU China Institute of Legal Psychology and Intelligent Computing Southwest University Chongqing China
Masked Facial Expression refers to facial expression that people deliberately make which do not correspond to their true emotions. The purpose of masked facial expression is to conceal one’s genuine feelings. Precise... 详细信息
来源: 评论
Unsupervised Multivariate Time Series Anomaly Detection by Feature Decoupling in Federated Learning Scenarios
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: He, Yifan Ding, Xi Tang, Yateng Guan, Jihong Zhou, Shuigeng Fudan University School of Computer Science Shanghai200433 China Shanghai Key Laboratory of Intelligent Information Processing Shanghai200433 China Tencent Weixin Group Guangzhou510308 China Tongji University Department of Computer Science and Technology Shanghai201804 China Ministry of Education Key Laboratory of Embedded System and Service Computing Tongji University Shanghai200092 China
Anomalies are usually regarded as data errors or novel patterns previously unseen, which are quite different from most observed data. Accurate detection of anomalies is crucial in various application scenarios. This p... 详细信息
来源: 评论
Behavioral Unicity: On the Limits of Anonymized Social Behavior Metadata  1st
Behavioral Unicity: On the Limits of Anonymized Social Beh...
收藏 引用
1st Conference on Blockchain and Web3.0 Technology Innovation and Application, BWTAC 2024
作者: Tang, Hao Wang, Cheng Tongji University Shanghai201804 China The Key Laboratory of Embedded System and Service Computing Ministry of Education Shanghai201804 China Shanghai Artificial Intelligence Laboratory Shanghai200030 China Shanghai Institute of Intelligent Science and Technology Tongji University Shanghai200092 China
Social behavior metadata has altered business models and human lifestyles. However, the inclusion of personal information in social behavior metadata poses risks of identity exposure for users. Under the requirements ... 详细信息
来源: 评论
MixSA: Training-free Reference-based Sketch Extraction via Mixture-of-Self-Attention
arXiv
收藏 引用
arXiv 2025年
作者: Yang, Rui Wu, Xiaojun He, Shengfeng The School of Computer Sciences Shaanxi Normal University Xi'An China The School of Computer Science The Key Laboratory of Intelligent Computing and Service Technology for Folk Song of the Ministry of Culture and Tourism Shaanxi Normal University Xi'An710119 China The School of Computing and Information Systems Singapore Management University Singapore
Current sketch extraction methods either require extensive training or fail to capture a wide range of artistic styles, limiting their practical applicability and versatility. We introduce Mixture-of-Self-Attention (M... 详细信息
来源: 评论
A Fine-Grained Anomaly Detection Method Fusing Isolation Forest and Knowledge Graph Reasoning  19th
A Fine-Grained Anomaly Detection Method Fusing Isolation For...
收藏 引用
19th International Conference on Web Information Systems and Applications, WISA 2022
作者: Xu, Jie Zhou, Jiantao College of Computer Science Engineering Research Center of Ecological Big Data Ministry of Education National and Local Joint Engineering Research Center of Mongolian Intelligent Information Processing Technology Inner Mongolia Cloud Computing and Service Software Engineering Laboratory Inner Mongolia Social Computing and Data Processing Key Laboratory Inner Mongolia Discipline Inspection and Supervision Big Data Key Laboratory Inner Mongolia Big Data Analysis Technology Engineering Laboratory Inner Mongolia University Hohhot China
Anomaly detection aims to find outliers data that do not conform to expected behaviors in a specific scenario, which is indispensable and critical in current safety environments related studies. However, when performi... 详细信息
来源: 评论
Adaptive ELM-Based Time-Constrained Control of Uncertain Robotic Manipulators With Minimum Learning Computation
收藏 引用
IEEE Transactions on Emerging Topics in computing 2025年
作者: Jin, Xiaozheng Hou, Yuhan Wu, Xiaoming Chi, Jing Qilu University of Technology Shandong Academy of Sciences Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center National Supercomputer Center in Jinan Shandong Jinan250353 China Shandong Fundamental Research Center for Computer Science Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Jinan250013 China Qilu Institute of Technology School of Intelligent Manufacturing and Control Engineering Shandong Jinan250200 China Shandong University of Finance and Economics School of Computing and Artificial Intelligence Shandong Jinan250014 China
This paper studies the extreme learning machine (ELM)-based time-constrained trajectory tracking control of a class of robotic manipulator systems with model/input uncertainties, matched and mismatched disturbances. A... 详细信息
来源: 评论