咨询与建议

限定检索结果

文献类型

  • 55 篇 会议
  • 50 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 110 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 77 篇 工学
    • 56 篇 计算机科学与技术...
    • 48 篇 软件工程
    • 19 篇 信息与通信工程
    • 14 篇 生物工程
    • 13 篇 电气工程
    • 9 篇 生物医学工程(可授...
    • 8 篇 控制科学与工程
    • 5 篇 机械工程
    • 3 篇 光学工程
    • 3 篇 网络空间安全
    • 2 篇 电子科学与技术(可...
    • 2 篇 建筑学
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
  • 33 篇 管理学
    • 20 篇 图书情报与档案管...
    • 14 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 31 篇 理学
    • 18 篇 数学
    • 14 篇 生物学
    • 4 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 化学
    • 2 篇 系统科学
  • 8 篇 医学
    • 7 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 4 篇 药学(可授医学、理...
    • 2 篇 公共卫生与预防医...
  • 3 篇 法学
    • 3 篇 社会学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 农学
    • 2 篇 作物学
  • 1 篇 经济学

主题

  • 6 篇 fuzzy cognitive ...
  • 5 篇 semantics
  • 5 篇 artificial intel...
  • 4 篇 knowledge graph
  • 3 篇 object detection
  • 3 篇 computer communi...
  • 3 篇 knowledge manage...
  • 3 篇 neural networks
  • 3 篇 contrastive lear...
  • 3 篇 monitoring
  • 3 篇 intelligent netw...
  • 3 篇 computational mo...
  • 3 篇 bars
  • 3 篇 decision making
  • 3 篇 feature extracti...
  • 3 篇 machine learning
  • 3 篇 humans
  • 3 篇 mathematical mod...
  • 2 篇 internet of thin...
  • 2 篇 transient analys...

机构

  • 15 篇 school of cyber ...
  • 13 篇 school of comput...
  • 11 篇 key laboratory o...
  • 10 篇 peng cheng labor...
  • 10 篇 key laboratory o...
  • 9 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 key laboratory o...
  • 8 篇 microscopic imag...
  • 8 篇 department of kn...
  • 8 篇 key laboratory o...
  • 6 篇 key laboratory o...
  • 6 篇 state key labora...
  • 6 篇 institute of med...
  • 5 篇 institute of inf...
  • 5 篇 china knowledge ...
  • 5 篇 institute of inf...
  • 4 篇 zju-ant group jo...
  • 4 篇 zhejiang key lab...
  • 4 篇 university of ch...

作者

  • 22 篇 huang qingming
  • 20 篇 xu qianqian
  • 15 篇 yang zhiyong
  • 10 篇 cao xiaochun
  • 10 篇 george georgoula...
  • 9 篇 bao shilong
  • 7 篇 li chen
  • 7 篇 grzegorzek marci...
  • 7 篇 yang jinzhu
  • 7 篇 chrysostomos d. ...
  • 7 篇 chrysostomos sty...
  • 6 篇 voula c. georgop...
  • 5 篇 wang zitai
  • 4 篇 liu jinyuan
  • 4 篇 zhang wen
  • 4 篇 hai zhuge
  • 4 篇 chen huajun
  • 4 篇 stylios chrysost...
  • 4 篇 li jiawei
  • 4 篇 zhou shihua

语言

  • 96 篇 英文
  • 10 篇 其他
  • 4 篇 中文
检索条件"机构=Knowledge and Intelligent Computing Laboratory"
110 条 记 录,以下是91-100 订阅
排序:
No reference video quality assessment based on 3D convolutional neural network
收藏 引用
Ruan Jian Xue Bao/Journal of Software 2016年 27卷 103-112页
作者: Wang, Chun-Feng Su, Li Zhang, Wei-Gang Huang, Qing-Ming Key Laboratory on Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Key Laboratory of Intelligent Information Processing Institute of Computing Technology The Chinese Academy of Sciences Beijing100190 China Weihai264209 China
No reference video quality assessment (NR-VQA) measures distorted videos quantitatively without the reference of original high quality videos. Conventional NR-VQA methods are generally designed for specific types of d... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
Towards Unified Token Learning for Vision-Language Tracking
arXiv
收藏 引用
arXiv 2023年
作者: Zheng, Yaozong Zhong, Bineng Liang, Qihua Li, Guorong Ji, Rongrong Li, Xianxian The Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Key Laboratory of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Media Analytics and Computing Lab Department of Artificial Intelligence School of Informatics Xiamen University 361005 China
In this paper, we present a simple, flexible and effective vision-language (VL) tracking pipeline, termed MMTrack, which casts VL tracking as a token generation task. Traditional paradigms address VL tracking task ind... 详细信息
来源: 评论
ReconBoost: Boosting Can Achieve Modality Reconcilement
arXiv
收藏 引用
arXiv 2024年
作者: Hua, Cong Xu, Qianqian Bao, Shilong Yang, Zhiyong Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
This paper explores a novel multi-modal alternating learning paradigm pursuing a reconciliation between the exploitation of uni-modal features and the exploration of cross-modal interactions. This is motivated by the ... 详细信息
来源: 评论
AdAUC: End-to-end Adversarial AUC Optimization Against Long-tail Problems
arXiv
收藏 引用
arXiv 2022年
作者: Hou, Wenzheng Xu, Qianqian Yang, Zhiyong Bao, Shilong He, Yuan Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China State Key Laboratory of Information Security Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Alibaba Group Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen China
It is well-known that deep learning models are vulnerable to adversarial examples. Existing studies of adversarial training have made great progress against this challenge. As a typical trait, they often assume that t... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
The Minority Matters: A Diversity-Promoting Collaborative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collaborative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collaborative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
Poisoning attack against estimating from pairwise comparisons
arXiv
收藏 引用
arXiv 2021年
作者: Ma, Ke Xu, Qianqian Zeng, Jinshan Cao, Xiaochun Huang, Qingming The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Artificial Intelligence Research Center Peng Cheng Laboratory Shenzhen518055 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer and Information Engineering Jiangxi Normal University Jiangxi Nanchang330022 China Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Cyber Security University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China The School of Computer Science and Technology University of Chinese Academy of Sciences Beijing100049 China The Key Laboratory of Big Data Mining and Knowledge Management The School of Economics and Management University of Chinese Academy of Sciences Beijing100049 China
As pairwise ranking becomes broadly employed for elections, sports competitions, recommendation, information retrieval and so on, attackers have strong motivation and incentives to manipulate or disrupt the ranking li... 详细信息
来源: 评论
Application of Graph-Curvature Features in Auxiliary Diagnosis for Histopathological Image Identification of Gastric Cancer
SSRN
收藏 引用
SSRN 2023年
作者: He, Ruilin Li, Chen Yang, Xinyi Yang, Jinzhu Jiang, Tao Grzegorzek, Marcin Sun, Hongzan Microscopic Image and Medical Image Analysis Group College of Medicine and Biological Information Engineering Northeastern University Shenyang China Key Laboratory of Intelligent Computing in Medical Image Ministry of Education Northeastern University Liaoning Shenyang China School of Intelligent Medicine Chengdu University of Traditional Chinese Medicine Chengdu China International Joint Institute of Robotics and Intelligent Systems Chengdu University of Information Technology Chengdu China Institute for Medical Informatics University of Luebeck Luebeck Germany Department of Knowledge Engineering University of Economics in Katowice Katowice Poland Shengjing Hospital of China Medical University Shenyang China School of Computer Science and Engineering
Background: Histopathology diagnosis is often regarded as the final diagnostic method for malignant tumors, but it has some drawbacks. This paper explores a computer-aided diagnostic method that can identify benign an... 详细信息
来源: 评论