咨询与建议

限定检索结果

文献类型

  • 4,582 篇 会议
  • 3,176 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 7,761 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5,065 篇 工学
    • 3,303 篇 计算机科学与技术...
    • 2,820 篇 软件工程
    • 1,277 篇 信息与通信工程
    • 711 篇 控制科学与工程
    • 659 篇 生物工程
    • 531 篇 电子科学与技术(可...
    • 529 篇 电气工程
    • 489 篇 光学工程
    • 429 篇 机械工程
    • 364 篇 生物医学工程(可授...
    • 313 篇 化学工程与技术
    • 238 篇 仪器科学与技术
    • 184 篇 动力工程及工程热...
    • 151 篇 材料科学与工程(可...
    • 150 篇 交通运输工程
    • 139 篇 土木工程
    • 129 篇 建筑学
    • 127 篇 安全科学与工程
  • 3,141 篇 理学
    • 1,788 篇 数学
    • 836 篇 物理学
    • 726 篇 生物学
    • 515 篇 统计学(可授理学、...
    • 325 篇 化学
    • 294 篇 系统科学
  • 1,265 篇 管理学
    • 665 篇 图书情报与档案管...
    • 641 篇 管理科学与工程(可...
    • 207 篇 工商管理
  • 263 篇 医学
    • 217 篇 临床医学
    • 192 篇 基础医学(可授医学...
  • 169 篇 法学
    • 147 篇 社会学
  • 90 篇 农学
  • 69 篇 经济学
  • 61 篇 教育学
  • 28 篇 军事学
  • 20 篇 文学
  • 18 篇 艺术学
  • 10 篇 哲学

主题

  • 321 篇 feature extracti...
  • 253 篇 semantics
  • 193 篇 training
  • 139 篇 deep learning
  • 126 篇 image segmentati...
  • 123 篇 computational mo...
  • 121 篇 convolution
  • 117 篇 object detection
  • 111 篇 optimization
  • 110 篇 accuracy
  • 92 篇 data mining
  • 89 篇 face recognition
  • 89 篇 visualization
  • 84 篇 laboratories
  • 80 篇 robustness
  • 79 篇 predictive model...
  • 74 篇 computer vision
  • 73 篇 machine learning
  • 72 篇 clustering algor...
  • 70 篇 support vector m...

机构

  • 356 篇 key laboratory o...
  • 300 篇 university of ch...
  • 206 篇 shanghai key lab...
  • 194 篇 hubei province k...
  • 181 篇 shanghai key lab...
  • 172 篇 school of comput...
  • 135 篇 school of comput...
  • 120 篇 fujian provincia...
  • 117 篇 college of compu...
  • 112 篇 shanghai enginee...
  • 110 篇 department of au...
  • 107 篇 key laboratory o...
  • 101 篇 guangdong key la...
  • 99 篇 peng cheng labor...
  • 90 篇 school of comput...
  • 83 篇 key laboratory o...
  • 76 篇 shanghai key lab...
  • 70 篇 college of mathe...
  • 66 篇 hubei province k...
  • 65 篇 college of compu...

作者

  • 65 篇 huang qingming
  • 65 篇 li zuoyong
  • 61 篇 huang xuanjing
  • 58 篇 shiguang shan
  • 50 篇 shen linlin
  • 50 篇 jiao licheng
  • 47 篇 qiu xipeng
  • 46 篇 xue xiangyang
  • 43 篇 li yingsong
  • 42 篇 huang zhixiang
  • 42 篇 zhang fuquan
  • 41 篇 liu qun
  • 41 篇 li bin
  • 40 篇 licheng jiao
  • 35 篇 yingsong li
  • 33 篇 zuoyong li
  • 32 篇 gui tao
  • 32 篇 xilin chen
  • 31 篇 feng rui
  • 30 篇 liu jun

语言

  • 7,380 篇 英文
  • 239 篇 其他
  • 151 篇 中文
检索条件"机构=Key University Key Laboratory of Pattern Recognition and Intelligent information Processing"
7761 条 记 录,以下是4921-4930 订阅
排序:
Reflexivity of Partitions Induced by Weighted Poset Metric and Combinatorial Metric
Reflexivity of Partitions Induced by Weighted Poset Metric a...
收藏 引用
作者: Xu, Yang Kan, Haibin Han, Guangyue Fudan University Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Shanghai200433 China The University of Hong Kong Faculty of Science Department of Mathematics Hong Kong Hong Kong Shanghai Engineering Research Center of Blockchain Shanghai200433 China Yiwu Research Institute Fudan University Yiwu City322000 China
Let H be the Cartesian product of a family of finite abelian groups. Via a polynomial approach, we give sufficient conditions for a partition of H induced by weighted poset metric to be reflexive, which also become ne... 详细信息
来源: 评论
Hierarchical background subtraction using local pixel clustering
Hierarchical background subtraction using local pixel cluste...
收藏 引用
作者: Zhong, Bineng Yao, Hongxun Shan, Shiguang Chen, Xilin Gao, Wen Department of Computer Science and Engineering Harbin Institute of Technology China Digital Media Research Center Institute of Computing Tech. CAS Beijing China Key Laboratory of Intelligent Information Processing CAS Beijing China Digital Media Institute Peking University Beijing China
We propose a robust hierarchical background subtraction technique which takes the spatial relations of neighboring pixels in a local region into account to detect objects in difficult conditions. Our algorithm combine... 详细信息
来源: 评论
A Detection Method Toward Yellow Dragon Disease Spreads Using Spark and Deep Learning  3
A Detection Method Toward Yellow Dragon Disease Spreads Usin...
收藏 引用
3rd International Conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Xie, Wu Su, Zhenzhao Zhang, Huimin Kang, Ping Qin, Kun Fan, Yong Zhao, Quanyou Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin541214 China Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China Lingchuan Science and Technology Information Institute Guilin541299 China Guilin Hivision Technology Co. Ltd. Guilin541004 China School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin541214 China School of Computer Science and Engineering Guilin University of Aerospace Technology Guilin541004 China
The detection methods of yellow dragon disease spread via wood lice transmission networks like social networks are very important for diverse citrus trees and farmers. Although current methods have some detection accu... 详细信息
来源: 评论
Extensive Techniques to Detect Defects in Tyres through Radiography
Extensive Techniques to Detect Defects in Tyres through Radi...
收藏 引用
IEEE International Conference on Multi Topic
作者: Muhammad Ahmad Shabir Muhammad Umair Hassan Xiangru Yu Jinping Li Shandong College and University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year Jinan China School of Information Science and Engineering Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
The present paper highlights the experimentation procedure and decomposition of vehicle tyres through the extensive technique of radiography by the incorporation of total changes occurring in the image, transformation... 详细信息
来源: 评论
Size-Invariance Matters: Rethinking Metrics and Losses for Imbalanced Multi-object Salient Object Detection  41
Size-Invariance Matters: Rethinking Metrics and Losses for I...
收藏 引用
41st International Conference on Machine Learning, ICML 2024
作者: Li, Feiran Xu, Qianqian Bao, Shilong Yang, Zhiyong Cong, Runmin Cao, Xiaochun Huang, Qingming Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Science Beijing Jiaotong University Beijing China School of Control Science and Engineering Shandong University Jinan China Key Laboratory of Machine Intelligence and System Control Ministry of Education Jinan China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores the size-invariance of evaluation metrics in Salient Object Detection (SOD), especially when multiple targets of diverse sizes co-exist in the same image. We observe that current metrics are size-s... 详细信息
来源: 评论
A Features Decoupling Method for Multiple Manipulations Identification in Image Operation Chains
A Features Decoupling Method for Multiple Manipulations Iden...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal processing
作者: Jiaxin Chen Xin Liao Wei Wang Zheng Qin College of Computer Science and Electronic Engineering Hunan University China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences China
Recently, many forensic techniques have been developed to detect the use of a certain processing operation. When utilizing several manipulations to alter an image, artifacts left by manipulations that have been applie... 详细信息
来源: 评论
Singing voice detection using multi-feature deep fusion with CNN  7th
Singing voice detection using multi-feature deep fusion with...
收藏 引用
7th Conference on Sound and Music Technology, CSMT 2019
作者: Zhang, Xulong Li, Shengchen Li, Zijin Chen, Shizhe Gao, Yongwei Li, Wei School of Computer Science Fudan University Shanghai201203 China Institute of information photonics and optical communications Beijing University of Posts and Telecommunications Beijing100876 China Department of Musicology China Conservatory of Music Beijing100101 China Department of Music Engineering Shanghai Conservatory of Music Shanghai200031 China Shanghai Key Laboratory of Intelligent Information Processing Fudan University Shanghai201203 China
The problem of singing voice detection is to segment a song into vocal and non-vocal parts. Commonly used methods usually train a model on a set of frame-based features and then predict the unknown frames by the model... 详细信息
来源: 评论
WISERNet: Wider Separate-then-reunion Network for Steganalysis of Color Images
arXiv
收藏 引用
arXiv 2018年
作者: Zeng, Jishen Tan, Shunquan Liu, Guangqing Li, Bin Huang, Jiwu Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China College of Computer Science and Software Engineering Shenzhen University Guangdong Key Lab. of Intelligent Info. Processing and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China Peng Cheng Laboratory Shenzhen518052 China
Until recently, deep steganalyzers in spatial domain have been all designed for gray-scale images. In this paper, we propose WISERNet (the wider separate-then-reunion network) for steganalysis of color images. We prov... 详细信息
来源: 评论
Tyre Defect Detection Based on GLCM and Gabor Filter
Tyre Defect Detection Based on GLCM and Gabor Filter
收藏 引用
IEEE International Conference on Multi Topic
作者: Muhammad Ahmad Shabir Muhammad Umair Hassan Xiangru Yu Jinping Li Shandong College and University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-year Jinan China School of Information Science and Engineering Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan China
Defect detection is a crucial issue at industrial level, and generally, the designers have to find out a way to select suitable features to detect the defects in textured material images. This work reports this issue ... 详细信息
来源: 评论
Adversarial Example Defense via Perturbation Grading Strategy
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Shaowei Lyu, Wanli Li, Bin Yin, Zhaoxia Luo, Bin Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Hefei China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China School of Communication & Electronic Engineering East China Normal University Shanghai China
Deep Neural Networks have been widely used in many fields. However, studies have shown that DNNs are easily attacked by adversarial examples, which have tiny perturbations and greatly mislead the correct judgment of D... 详细信息
来源: 评论