咨询与建议

限定检索结果

文献类型

  • 3,140 篇 会议
  • 2,049 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 5,191 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,415 篇 工学
    • 2,245 篇 计算机科学与技术...
    • 1,922 篇 软件工程
    • 856 篇 信息与通信工程
    • 473 篇 控制科学与工程
    • 411 篇 生物工程
    • 341 篇 电气工程
    • 331 篇 电子科学与技术(可...
    • 323 篇 机械工程
    • 301 篇 光学工程
    • 253 篇 生物医学工程(可授...
    • 230 篇 化学工程与技术
    • 188 篇 仪器科学与技术
    • 119 篇 动力工程及工程热...
    • 115 篇 材料科学与工程(可...
    • 96 篇 交通运输工程
    • 94 篇 安全科学与工程
    • 82 篇 建筑学
  • 1,952 篇 理学
    • 1,052 篇 数学
    • 519 篇 物理学
    • 474 篇 生物学
    • 308 篇 统计学(可授理学、...
    • 235 篇 化学
    • 182 篇 系统科学
  • 894 篇 管理学
    • 471 篇 图书情报与档案管...
    • 447 篇 管理科学与工程(可...
    • 144 篇 工商管理
  • 196 篇 医学
    • 158 篇 临床医学
    • 145 篇 基础医学(可授医学...
    • 93 篇 药学(可授医学、理...
  • 97 篇 法学
    • 83 篇 社会学
  • 74 篇 农学
  • 50 篇 教育学
  • 43 篇 经济学
  • 21 篇 军事学
  • 18 篇 艺术学
  • 11 篇 文学
  • 9 篇 哲学

主题

  • 243 篇 feature extracti...
  • 184 篇 semantics
  • 163 篇 training
  • 96 篇 accuracy
  • 91 篇 information proc...
  • 90 篇 object detection
  • 89 篇 deep learning
  • 89 篇 convolution
  • 89 篇 computational mo...
  • 86 篇 laboratories
  • 76 篇 image segmentati...
  • 75 篇 visualization
  • 68 篇 data mining
  • 66 篇 optimization
  • 60 篇 data models
  • 60 篇 robustness
  • 59 篇 face recognition
  • 58 篇 clustering algor...
  • 57 篇 support vector m...
  • 57 篇 computers

机构

  • 434 篇 key laboratory o...
  • 234 篇 university of ch...
  • 194 篇 hubei province k...
  • 134 篇 school of comput...
  • 117 篇 college of compu...
  • 83 篇 key laboratory o...
  • 78 篇 peng cheng labor...
  • 78 篇 fujian provincia...
  • 66 篇 hubei province k...
  • 65 篇 shanghai key lab...
  • 63 篇 shanghai key lab...
  • 52 篇 shaanxi key labo...
  • 51 篇 college of compu...
  • 48 篇 key laboratory o...
  • 48 篇 key laboratory o...
  • 46 篇 jiangxi province...
  • 46 篇 school of inform...
  • 46 篇 national key lab...
  • 45 篇 school of comput...
  • 45 篇 the key laborato...

作者

  • 77 篇 shiguang shan
  • 77 篇 zhongzhi shi
  • 68 篇 shi zhongzhi
  • 66 篇 xilin chen
  • 64 篇 huang qingming
  • 62 篇 liu qun
  • 54 篇 jiao licheng
  • 52 篇 li zuoyong
  • 48 篇 zhang fuquan
  • 37 篇 liu yang
  • 36 篇 xu qianqian
  • 35 篇 yang jian
  • 34 篇 licheng jiao
  • 34 篇 feng rui
  • 34 篇 li wei
  • 33 篇 he qing
  • 32 篇 feng yang
  • 31 篇 qing he
  • 29 篇 ding liu
  • 28 篇 li hua

语言

  • 4,909 篇 英文
  • 174 篇 其他
  • 112 篇 中文
检索条件"机构=Key Laboratory of Intelligent Information Perception and Processing Technology"
5191 条 记 录,以下是401-410 订阅
排序:
DiffTimb: Diffusion Models for Many-to-Many Timbre Transfer  10th
DiffTimb: Diffusion Models for Many-to-Many Timbre Transfer
收藏 引用
10th Conference on Sound and Music technology, CSMT 2023
作者: Gan, Xu Wu, Yifei Liu, Xinlu Duan, Ruilei Li, Wei School of Computer Science and Technology Fudan University Shanghai200438 China Department of Music Engineering ZheJiang Conservatory of Music Hangzhou310024 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai200433 China
The goal of the timbre transfer task is to apply the auditory characteristics of one instrument to another instrument. Past timbre transfer methods faced numerous challenges due to the limitations of the selected gene... 详细信息
来源: 评论
Topic-BiGRU-U-Net for Document-level Relation Extraction from Biomedical Literature
Topic-BiGRU-U-Net for Document-level Relation Extraction fro...
收藏 引用
2023 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2023
作者: Zhao, Yali Yan, Rong Inner Mongolia University College of Computer Science Hohhot China Inner Mongolia Key Laboratory of Mongolian Information Processing Technology Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China
Document-level biomedical relation extraction refers to extract relationship facts from unstructured biomedical literature. Due to the fact that many relationship facts span multiple sentences and involve complex inte... 详细信息
来源: 评论
Research on active defense decision-making method for cloud boundary networks based on reinforcement learning of intelligent agent
收藏 引用
High-Confidence Computing 2024年 第2期4卷 50-61页
作者: Huan Wang Yunlong Tang Yan Wang Ning Wei Junyi Deng Zhiyan Bin Weilong Li School of Computer Science and Technology Guangxi University of Science and TechnologyLiuzhou 545000China Liuzhou Key Laboratory of Big Data Intelligent Processing and Security Liuzhou 545000China Guangxi Education System Network Security Monitoring Center Liuzhou 545000China Center of Graphics and Information Guangxi ECO-Engineering Vocational&Technical CollegeLiuzhou 545004China
The cloud boundary network environment is characterized by a passive defense strategy,discrete defense actions,and delayed defense feedback in the face of network attacks,ignoring the influence of the external environ... 详细信息
来源: 评论
Polarization‑entangled photon‑pair source with van der Waals 3R‑WS_(2) crystal
收藏 引用
eLight 2024年 第1期4卷 99-106页
作者: Jiangang Feng Yun‑Kun Wu Ruihuan Duan Jun Wang Weijin Chen Jiazhang Qin Zheng Liu Guang‑Can Guo Xi‑Feng Ren Cheng‑Wei Qiu Department of Electrical and Computer Engineering National University of SingaporeSingapore 117583Singapore CAS Key Laboratory of Quantum Information University of Science and Technology of ChinaHefei 230026China CAS Center for Excellence in Quantum Information and Quantum Physics University of Science and Technology of ChinaHefei 230026China Hefei National Laboratory University of Science and Technology of ChinaHefei 230088China School of Materials Science and Engineering Nanyang Technological UniversitySingapore 639798Singapore Department of Optical Science and Engineering and Shanghai Frontiers Science Research Base of Intelligent Optoelectronics and PerceptionFudan UniversityShanghai 200433China
Ultracompact entangled photon sources are pivotal to miniaturized quantum photonic *** der Waals(vdW)nonlinear crystals promise efficient photon-pair generation and on-chip monolithic integration with nanophotonic ***... 详细信息
来源: 评论
Leveraging catastrophic forgetting to develop safe diffusion models against malicious finetuning  24
Leveraging catastrophic forgetting to develop safe diffusion...
收藏 引用
Proceedings of the 38th International Conference on Neural information processing Systems
作者: Jiadong Pan Hongcheng Gao Zongyu Wu Taihang Hu Li Su Qingming Huang Liang Li Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS and University of Chinese Academy of Sciences University of Chinese Academy of Sciences The Pennsylvania State University Nankai University Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS
Diffusion models (DMs) have demonstrated remarkable proficiency in producing images based on textual prompts. Numerous methods have been proposed to ensure these models generate safe images. Early methods attempt to i...
来源: 评论
keypoints and Action Units Jointly Drive Talking Head Generation for Video Conferencing
收藏 引用
IEEE Transactions on Circuits and Systems for Video technology 2025年
作者: Shi, Wuzhen Xue, Zibang Wen, Yang Shenzhen University Shenzhen Key Laboratory of Digital Creative Technology Guangdong Province Engineering Laboratory for Digital Creative Technology Guangdong Provincial Key Laboratory of Intelligent Information Processing College of Electronics and Information Engineering Shenzhen518060 China
This paper introduces a high-quality talking head generation method that is jointly driven by keypoints and action units, aiming to strike a balance between low-bandwidth transmission and high-quality generation in vi... 详细信息
来源: 评论
Adaptive Neural Consensus Tracking Control for Nonlinear Multiagent Systems with Dead Zone and Sensor Faults  42
Adaptive Neural Consensus Tracking Control for Nonlinear Mul...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Huang, Chengjie Chen, Ci Liu, Zhi Li, Zhenni Guangdong University of Technology Guangzhou510006 China Guangdong Key Laboratory of IoT Information Technology Guangzhou510006 China 111 Center for Intelligent Batch Manufacturing Based on IoT Technology Guangzhou510006 China Guangdong-HongKong-Macao Joint Laboratory for Smart Discrete Manufacturing Guangzhou510006 China Key Laboratory of Intelligent Information Processing and System Integration of IoT Ministry of Education Guangzhou510006 China Key Laboratory of Intelligent Detection and the Internet of Things in Manufacturing Ministry of Education Guangzhou510006 China
In this paper, an adaptive neural tracking control design is investigated for uncertain multiagent systems (MASs) with actuator dead zone and sensor faults. The adaptive control technique based on neural networks is e... 详细信息
来源: 评论
Region of interest image encryption method based on panoramic segmentation and a novel coupled chaotic map
Region of interest image encryption method based on panorami...
收藏 引用
2022 International Conference on Artificial Intelligence, Virtual Reality, and Visualization, AIVRV 2022
作者: Zhang, Hangming Hu, Hanping School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan430074 China Key Laboratory of Image Information Processing and Intelligent Control Ministry of Education Wuhan430074 China
Social media is a platform for people to share their lives and interact with others. Image sharing is an integral component. Privacy information will inevitably be compromised during the process of sharing whole photo... 详细信息
来源: 评论
A Policy-Controlled Signature Scheme for end-to-end Secure Communication  12
A Policy-Controlled Signature Scheme for end-to-end Secure C...
收藏 引用
12th International Conference on Advanced Cloud and Big Data, CBD 2024
作者: Yu, Feng Meng, Linghui Xi, Jing Li, Xianxian Lu, Qianhui Zhu, Weidong Guangxi Normal University Key Lab of Education Blockchain and Intelligent Technology GuiLin China University of SouthEast Jiangsu Provincial Key Laboratory of Netwrok and Information Security Nanjing China Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining and Security GuiLin China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University GuiLin China
In the digitalized society, end-to-end security communication is receiving increasing attention. Issues such as ma-licious sender impersonation and over-privilege communication continue to prevail in end-to-end commun... 详细信息
来源: 评论
DD-Net: Dynamic Network Architecture for Optimized Curve Segmentation and Reduce Computational Redundancy  27th
DD-Net: Dynamic Network Architecture for Optimized Curve Seg...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Cao, Yunxiang Chen, Li Wang, Yubo Feng, Zhida Tian, Jing School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Province Key Laboratory of Intelligent Information Processing and Real-time Industrial System Wuhan University of Science and Technology Wuhan China Institute of Systems Science National University of Singapore Singapore Singapore
Curvilinear Structure segmentation has numerous applications in various fields, including providing a better understanding of defects such as cracks on roads or walls, thereby assessing the structural safety of buildi... 详细信息
来源: 评论