咨询与建议

限定检索结果

文献类型

  • 1,329 篇 会议
  • 1,019 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 2,350 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,536 篇 工学
    • 1,089 篇 计算机科学与技术...
    • 917 篇 软件工程
    • 338 篇 信息与通信工程
    • 201 篇 控制科学与工程
    • 165 篇 生物工程
    • 162 篇 电气工程
    • 147 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 106 篇 生物医学工程(可授...
    • 101 篇 光学工程
    • 77 篇 化学工程与技术
    • 65 篇 仪器科学与技术
    • 48 篇 材料科学与工程(可...
    • 47 篇 动力工程及工程热...
    • 46 篇 交通运输工程
    • 35 篇 网络空间安全
    • 29 篇 建筑学
  • 810 篇 理学
    • 460 篇 数学
    • 216 篇 物理学
    • 192 篇 生物学
    • 141 篇 统计学(可授理学、...
    • 75 篇 化学
    • 56 篇 系统科学
  • 439 篇 管理学
    • 243 篇 图书情报与档案管...
    • 208 篇 管理科学与工程(可...
    • 66 篇 工商管理
  • 83 篇 医学
    • 72 篇 临床医学
    • 58 篇 基础医学(可授医学...
    • 39 篇 药学(可授医学、理...
  • 41 篇 法学
    • 31 篇 社会学
  • 35 篇 农学
  • 25 篇 经济学
  • 13 篇 教育学
  • 10 篇 艺术学
  • 9 篇 哲学
  • 8 篇 文学
  • 5 篇 军事学

主题

  • 110 篇 feature extracti...
  • 77 篇 semantics
  • 69 篇 training
  • 66 篇 information proc...
  • 61 篇 laboratories
  • 52 篇 face recognition
  • 50 篇 computers
  • 43 篇 deep learning
  • 43 篇 computational mo...
  • 41 篇 visualization
  • 38 篇 humans
  • 36 篇 data mining
  • 36 篇 robustness
  • 34 篇 machine learning
  • 33 篇 predictive model...
  • 32 篇 accuracy
  • 30 篇 image segmentati...
  • 30 篇 convolution
  • 30 篇 clustering algor...
  • 30 篇 computer vision

机构

  • 439 篇 key laboratory o...
  • 222 篇 university of ch...
  • 83 篇 key laboratory o...
  • 64 篇 peng cheng labor...
  • 49 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 46 篇 the key laborato...
  • 44 篇 school of comput...
  • 43 篇 graduate univers...
  • 39 篇 chinese academy ...
  • 34 篇 national enginee...
  • 32 篇 school of comput...
  • 32 篇 school of inform...
  • 30 篇 graduate univers...
  • 28 篇 school of cyber ...
  • 26 篇 key laboratory o...
  • 26 篇 school of comput...
  • 26 篇 college of infor...
  • 25 篇 guangdong labora...
  • 24 篇 faculty of infor...

作者

  • 98 篇 zhongzhi shi
  • 93 篇 shi zhongzhi
  • 74 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 61 篇 huang qingming
  • 42 篇 xu qianqian
  • 42 篇 feng yang
  • 36 篇 he qing
  • 32 篇 wen gao
  • 31 篇 qing he
  • 29 篇 liu yang
  • 28 篇 li hua
  • 28 篇 zhuang fuzhen
  • 27 篇 yang zhiyong
  • 27 篇 yuefei sui
  • 26 篇 fuji ren
  • 25 篇 cao xiaochun
  • 24 篇 ding shifei
  • 23 篇 shen linlin

语言

  • 2,128 篇 英文
  • 170 篇 其他
  • 56 篇 中文
检索条件"机构=Key Laboratory of Intelligent Information ProcessingInstitute of Computing Technology"
2350 条 记 录,以下是381-390 订阅
排序:
DOA estimation for beam scanning radar based on sparse signal reconstruction with incomplete pulse
DOA estimation for beam scanning radar based on sparse signa...
收藏 引用
2022 IEEE International Conference on Signal Processing, Communications and computing, ICSPCC 2022
作者: Wu, Ran Zhang, Yan Ni, Lihua Zhang, Kehao Liu, Ning Wan, Qun University of Electronic Science and Technology of China School of Information and Communication Engineering Chengdu611731 China Northern Institute of Electronic Equipment Beijing100191 China Agile and Intelligent Computing Key Laboratory of Sichuan Province Chengdu611731 China
Direction of Arrival (DOA) is one of the commonly used measurement for source localization. However, the receiving equipment of modern electronic reconnaissance can not completely intercept the pulse signal in the com... 详细信息
来源: 评论
Wavelet-Driven Masked Image Modeling: A Path to Efficient Visual Representation
arXiv
收藏 引用
arXiv 2025年
作者: Xiang, Wenzhao Liu, Chang Yu, Hongyang Chen, Xilin Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China Peng Cheng Laboratory China University of Chinese Academy of Sciences China Department of Electronic Engineering Shanghai Jiao Tong University China
Masked Image Modeling (MIM) has garnered significant attention in self-supervised learning, thanks to its impressive capacity to learn scalable visual representations tailored for downstream tasks. However, images inh... 详细信息
来源: 评论
BHJO: A Novel Hybrid Metaheuristic Algorithm Combining the Beluga Whale, Honey Badger, and Jellyfish Search Optimizers for Solving Engineering Design Problems
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第10期141卷 219-265页
作者: Farouq Zitouni Saad Harous Abdulaziz S.Almazyad Ali Wagdy Mohamed Guojiang Xiong Fatima Zohra Khechiba Khadidja  Kherchouche Department of Computer Science and Information Technology Kasdi Merbah UniversityP.O.Box 30000OuarglaAlgeria Department of Computer Science College of Computing and InformaticsUniversity of SharjahP.O.Box 27272SharjahUnited Arab Emirates Department of Computer Engineering College of Computer and Information SciencesKing Saud UniversityP.O.Box 51178Riyadh11543Saudi Arabia Operations Research Department Faculty of Graduate Studies for Statistical ResearchCairo UniversityGiza12613Egypt Applied Science Research Center Applied Science Private UniversityAmman11937Jordan Guizhou Key Laboratory of Intelligent Technology in Power System College of Electrical EngineeringGuizhou UniversityGuiyang550025China
Hybridizing metaheuristic algorithms involves synergistically combining different optimization techniques to effectively address complex and challenging optimization *** approach aims to leverage the strengths of mult... 详细信息
来源: 评论
FUZZY ALIGNMENTS IN DIRECTED ACYCLIC GRAPH FOR NON-AUTOREGRESSIVE MACHINE TRANSLATION
arXiv
收藏 引用
arXiv 2023年
作者: Ma, Zhengrui Shao, Chenze Gui, Shangtong Zhang, Min Feng, Yang Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Harbin Institute of Technology Shenzhen China
Non-autoregressive translation (NAT) reduces the decoding latency but suffers from performance degradation due to the multi-modality problem. Recently, the structure of directed acyclic graph has achieved great succes... 详细信息
来源: 评论
A survey on cryptographic techniques for protecting big data security: present and forthcoming
收藏 引用
Science China(information Sciences) 2022年 第10期65卷 73-106页
作者: Siqi LU Jianhua ZHENG Zhenfu CAO Yongjuan WANG Chunxiang GU School of Cyberspace Security Information Engineering University Henan Key Laboratory of Network Cryptography Technology Institute of Security Technology Shanghai Key Laboratory of Trustworthy Computing East China Normal University Cyberspace Security Research Center Peng Cheng Laboratory Shanghai Institute of Intelligent Science and Technology Tongji University
Big data drive multidimensional convergence and profound innovations among industries and provide novel ways of exploring the world. As they significantly create economic and social value, big data meaningfully impact... 详细信息
来源: 评论
Comprehensive Feature Processing Based on Attention Mechanism for Co-Salient Object Detection
Comprehensive Feature Processing Based on Attention Mechanis...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Guohua Lv Mao Yuan Zengbin Zhang Zhengyang Zhang Zhenhui Ding Guangxiao Ma Key Laboratory of Computing Power Network and Information Security Ministry of Education Shandong Computer Science Center (National Supercomputer Center in Jinan) Qilu University of Technology (Shandong Academy of Sciences) Jinan China Shandong Provincial Key Laboratory of Computing Power Internet and Service Computing Shandong Fundamental Research Center for Computer Science Jinan China Shandong Key Laboratory of Ubiquitous Intelligent Computing Jinan China College of Computer Science and Engineering Shandong University of Science and Technology Qingdao China
Co-salient object detection (CoSOD) aims to detect common salient objects across multiple related images. However, existing methods often struggle with limited attention coverage, missing some co-salient objects. To a... 详细信息
来源: 评论
Accurate and Efficient Privacy-Preserving Feature Extraction on Encrypted Images
收藏 引用
IEEE Transactions on Dependable and Secure computing 2025年
作者: Zheng, Peijia Fang, Xiongjie Zhou, Zhipeng Yang, Rui Lu, Wei Cao, Xiaochun Huang, Jiwu Sun Yat-Sen University School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology MoE Key Laboratory of Information Technology Guangzhou510006 China Alibaba Group Hanzhou311121 China Shenzhen Campus of Sun Yat-sen University School of Cyber Science and Technology Shenzhen518100 China Shenzhen MSU-BIT University Guangdong Laboratory of Machine Perception and Intelligent Computing Faculty of Engineering Shenzhen518116 China
In cloud computing, it is necessary to outsource image processing algorithms securely without exposing private image content. The scale-invariant feature transform (SIFT) is a famous local descriptor widely used in co... 详细信息
来源: 评论
Towards High-resolution 3D Anomaly Detection via Group-Level Feature Contrastive Learning  24
Towards High-resolution 3D Anomaly Detection via Group-Level...
收藏 引用
32nd ACM International Conference on Multimedia, MM 2024
作者: Zhu, Hongze Xie, Guoyang Hou, Chengbin Dai, Tao Gao, Can Wang, Jinbao Shen, Linlin National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Computer Science City University of Hong Kong Hong Kong Hong Kong Department of Intelligent Manufacturing CATL Ningde China Fuzhou Fuyao Institute for Advanced Study Fuyao University of Science and Technology Fuzhou China College of Computer Science and Software Engineering Shenzhen University Shenzhen China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China Shenzhen University Shenzhen China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen China
High-resolution point clouds (HRPCD) anomaly detection (AD) plays a critical role in precision machining and high-end equipment manufacturing. Despite considerable 3D-AD methods that have been proposed recently, they ... 详细信息
来源: 评论
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge computing Environment
收藏 引用
China Communications 2024年 第3期21卷 149-159页
作者: Zhang Lejun Peng Minghui Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin Cyberspace Institute Advanced Technology Guangzhou UniversityGuangzhou 510006China College of Information Engineering Yangzhou UniversityYangzhou 225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou 362000China Computer Science Department City University of Hong KongHong Kong 999077China School of Computer and Software Nanjing University of Information Science and TechnologyNanjing 21004China Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei 230601China Department of Computer Science and Artificial Intelligence Wenzhou UniversityWenzhou 325035China Guangzhou University Library Guangzhou UniversityGuangzhou 510006China Central Economic and Mathematics Institute Russian Academy of Sciences MIREA-Russian Technological University Moscow RegionRussia
With the rapid development of information technology,IoT devices play a huge role in physiological health data *** exponential growth of medical data requires us to reasonably allocate storage space for cloud servers ... 详细信息
来源: 评论
Exploring the Effect of Primitives for Compositional Generalization in Vision-and-Language
Exploring the Effect of Primitives for Compositional General...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Chuanhao Li Zhen Li Chenchen Jing Yunde Jia Yuwei Wu Beijing Key Laboratory of Intelligent Information Technology School of Computer Science & Technology Beijing Institute of Technology China School of Computer Science Zhejiang University Hangzhou China Guangdong Laboratory of Machine Perception and Intelligent Computing Shenzhen MSU-BIT University China
Compositionality is one of the fundamental properties of human cognition (Fodor & Pylyshyn, 1988). Compositional generalization is critical to simulate the compositional capability of humans, and has received much...
来源: 评论