咨询与建议

限定检索结果

文献类型

  • 199 篇 期刊文献
  • 158 篇 会议

馆藏范围

  • 357 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 233 篇 工学
    • 191 篇 计算机科学与技术...
    • 168 篇 软件工程
    • 49 篇 信息与通信工程
    • 29 篇 控制科学与工程
    • 22 篇 光学工程
    • 18 篇 机械工程
    • 16 篇 建筑学
    • 16 篇 土木工程
    • 15 篇 网络空间安全
    • 12 篇 电气工程
    • 11 篇 电子科学与技术(可...
    • 11 篇 测绘科学与技术
    • 11 篇 生物工程
    • 10 篇 化学工程与技术
    • 8 篇 安全科学与工程
    • 6 篇 交通运输工程
    • 6 篇 生物医学工程(可授...
    • 5 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
  • 76 篇 管理学
    • 43 篇 图书情报与档案管...
    • 40 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 67 篇 理学
    • 35 篇 数学
    • 17 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 生物学
    • 10 篇 化学
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 4 篇 法学
    • 4 篇 社会学
    • 3 篇 法学
  • 2 篇 农学
  • 2 篇 医学
  • 1 篇 教育学

主题

  • 14 篇 semantics
  • 12 篇 image segmentati...
  • 9 篇 reinforcement le...
  • 9 篇 contrastive lear...
  • 9 篇 training
  • 8 篇 visual languages
  • 7 篇 speech processin...
  • 7 篇 convolution
  • 7 篇 computer vision
  • 7 篇 image reconstruc...
  • 6 篇 semantic segment...
  • 6 篇 distillation
  • 6 篇 pipelines
  • 5 篇 visualization
  • 5 篇 costs
  • 5 篇 benchmarking
  • 5 篇 codes
  • 4 篇 object detection
  • 4 篇 signal processin...
  • 4 篇 redundancy

机构

  • 212 篇 key laboratory o...
  • 60 篇 institute of art...
  • 39 篇 key laboratory o...
  • 35 篇 tencent youtu la...
  • 31 篇 peng cheng labor...
  • 30 篇 school of inform...
  • 22 篇 fujian key labor...
  • 20 篇 fujian key labor...
  • 20 篇 key laboratory o...
  • 17 篇 key laboratory o...
  • 17 篇 youtu lab tencen...
  • 10 篇 school of inform...
  • 8 篇 tencent
  • 8 篇 skywork ai
  • 8 篇 school of comput...
  • 8 篇 the key laborato...
  • 7 篇 key laboratory o...
  • 7 篇 national univers...
  • 7 篇 department of ar...
  • 6 篇 shanghai jiao to...

作者

  • 151 篇 ji rongrong
  • 66 篇 sun xiaoshuai
  • 41 篇 rongrong ji
  • 39 篇 cao liujuan
  • 36 篇 ji jiayi
  • 30 篇 zhou yiyi
  • 30 篇 zhang shengchuan
  • 28 篇 wang cheng
  • 25 篇 ma yiwei
  • 24 篇 zhang yuxin
  • 24 篇 zheng xiawu
  • 22 篇 chao fei
  • 19 篇 luo gen
  • 18 篇 lin mingbao
  • 18 篇 zhang yan
  • 15 篇 shen yunhang
  • 15 篇 jiang guannan
  • 15 篇 wang haowei
  • 15 篇 li hui
  • 14 篇 wen chenglu

语言

  • 301 篇 英文
  • 56 篇 其他
检索条件"机构=Key Laboratory of Multimedia Trusted Perception and Efficient Computing"
357 条 记 录,以下是301-310 订阅
排序:
Exploiting Point-Language Models with Dual-Prompts for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Wang, Jiaxiang Xu, Haote Chen, Xiaolu Jakobsson, Andreas Xu, Haodi Huang, Yue Ding, Xinghao Tu, Xiaotng Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University Fujian Xiamen361005 China School of Informatics Xiamen University Fujian Xiamen361005 China Institute of Artificial Intelligence Xiamen University Fujian Xiamen361005 China Mathematical Statistics Lund University Sweden
Anomaly detection (AD) in 3D point clouds is crucial in a wide range of industrial applications, especially in various forms of precision manufacturing. Considering the industrial demand for reliable 3D AD, several me... 详细信息
来源: 评论
Bridging Synthetic-to-Real Gaps: Frequency-Aware Perturbation and Selection for Single-shot Multi-Parametric Mapping Reconstruction
arXiv
收藏 引用
arXiv 2025年
作者: Fan, Linyu Wang, Che Ye, Ming Yang, Qizhi Wu, Zejun Ding, Xinghao Huang, Yue Bao, Jianfeng Cai, Shuhui Cai, Congbo Department of Electronic Science Fujian Provincial Key Laboratory of Plasma and Magnetic Resonance Xiamen University Xiamen361005 China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University Xiamen361005 China Department of Magnetic Resonance Imaging The First Affiliated Hospital of Zhengzhou University Zhengzhou University Zhengzhou450052 China
Data-centric artificial intelligence (AI) has remarkably advanced medical imaging, with emerging methods using synthetic data to address data scarcity while introducing synthetic-to-real gaps. Unsupervised domain adap... 详细信息
来源: 评论
PartFormer: Awakening Latent Diverse Representation from Vision Transformer for Object Re-Identification
arXiv
收藏 引用
arXiv 2024年
作者: Tan, Lei Dai, Pingyang Chen, Jie Cao, Liujuan Wu, Yongjian Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University Xiamen China Institute of Artificial Intelligence Xiamen University Xiamen University Xiamen China School of Electronic and Computer Engineering Peking University Shenzhen China Peng Cheng Laboratory Shenzhen China Youtu Lab Tencent Shanghai China
Extracting robust feature representation is critical for object re-identification to accurately identify objects across non-overlapping cameras. Although having a strong representation ability, the Vision Transformer ...
来源: 评论
CIMI4D: A Large Multimodal Climbing Motion Dataset under Human-scene Interactions
CIMI4D: A Large Multimodal Climbing Motion Dataset under Hum...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Ming Yan Xin Wang Yudi Dai Siqi Shen Chenglu Wen Lan Xu Yuexin Ma Cheng Wang Fujian Key Laboratory of Sensing and Computing for Smart Cities Xiamen University National Institute for Data Science in Health and Medicine Xiamen University Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Xiamen University Shanghai Engineering Research Center of Intelligent Vision and Imaging ShanghaiTech University
Motion capture is a long-standing research problem. Although it has been studied for decades, the majority of research focus on ground-based movements such as walking, sitting, dancing, etc. Off- grounded actions such...
来源: 评论
Approximated Prompt Tuning for Vision-Language Pre-trained Models
arXiv
收藏 引用
arXiv 2023年
作者: Wu, Qiong Huang, Shubin Zhou, Yiyi Dai, Pingyang Shu, Annan Jiang, Guannan Ji, Rongrong Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University 361005 China Institute of Artificial Intelligence Xiamen University 361005 China Intelligent Manufacturing Department Contemporary Amperex Technology Co. Limited China
Prompt tuning is a parameter-efficient way to deploy large-scale pre-trained models to downstream tasks by adding task-specific tokens. In terms of vision-language pre-trained (VLP) models, prompt tuning often require... 详细信息
来源: 评论
Learning a Simple Low-Light Image Enhancer from Paired Low-Light Instances
Learning a Simple Low-Light Image Enhancer from Paired Low-L...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zhenqi Fu Yan Yang Xiaotong Tu Yue Huang Xinghao Ding Kai-Kuang Ma Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Xiamen University China School of Computer Science and Technology Hangzhou Dianzi University China School of Electrical and Electronic Engineering Nanyang Technological University Singapore
Low-light Image Enhancement (LIE) aims at improving contrast and restoring details for images captured in lowlight conditions. Most of the previous LIE algorithms adjust illumination using a single input image with se...
来源: 评论
Mind the Gap: Confidence Discrepancy Can Guide Federated Semi-Supervised Learning Across Pseudo-Mismatch
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Yijie Shang, Xinyi Zhang, Yiqun Lu, Yang Gong, Chen Xue, Jing-Hao Wang, Hanzi Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University Xiamen China Fujian Key Laboratory of Sensing and Computing for Smart City School of Informatics Xiamen University Xiamen China Department of Statistical Science University College London United Kingdom School of Computer Science and Technology Guangdong University of Technology Guangzhou China Department of Automation Shanghai Jiao Tong University China
Federated Semi-Supervised Learning (FSSL) aims to leverage unlabeled data across clients with limited labeled data to train a global model with strong generalization ability. Most FSSL methods rely on consistency regu... 详细信息
来源: 评论
Super Vision Transformer
arXiv
收藏 引用
arXiv 2022年
作者: Lin, Mingbao Chen, Mengzhao Zhang, Yuxin Shen, Chunhua Ji, Rongrong Cao, Liujuan Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Xiamen China Tencent Youtu Lab Shanghai China Zhejiang University Hangzhou China
We attempt to reduce the computational costs in vision transformers (ViTs), which increase quadratically in the token number. We present a novel training paradigm that trains only one ViT model at a time, but is capab... 详细信息
来源: 评论
GraCo: Granularity-Controllable Interactive Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Zhao, Yian Li, Kehan Cheng, Zesen Qiao, Pengchong Zheng, Xiawu Ji, Rongrong Liu, Chang Yuan, Li Chen, Jie School of Electronic and Computer Engineering Peking University Shenzhen China Peng Cheng Laboratory Shenzhen China -Preferred Program Peking University Shenzhen Graduate School China Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China Department of Automation and BNRist Tsinghua University Beijing China
Interactive Segmentation (IS) segments specific objects or parts in the image according to user input. Current IS pipelines fall into two categories: single-granularity output and multi-granularity output. The latter ... 详细信息
来源: 评论
OCRT: Boosting Foundation Models in the Open World with Object-Concept-Relation Triad
arXiv
收藏 引用
arXiv 2025年
作者: Tang, Luyao Yuan, Yuxuan Chen, Chaoqi Zhang, Zeyu Huang, Yue Zhang, Kun Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China Xiamen University China School of Informatics Xiamen University China Shenzhen University China The Australian National University Australia Carnegie Mellon University United States Mohamed bin Zayed University of Artificial Intelligence United Arab Emirates
Although foundation models (FMs) claim to be powerful, their generalization ability significantly decreases when faced with distribution shifts, weak supervision, or malicious attacks in the open world. On the other h... 详细信息
来源: 评论