咨询与建议

限定检索结果

文献类型

  • 306 篇 期刊文献
  • 248 篇 会议

馆藏范围

  • 554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 386 篇 工学
    • 303 篇 计算机科学与技术...
    • 268 篇 软件工程
    • 73 篇 信息与通信工程
    • 50 篇 生物工程
    • 46 篇 控制科学与工程
    • 44 篇 电气工程
    • 43 篇 光学工程
    • 35 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 27 篇 机械工程
    • 23 篇 化学工程与技术
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 交通运输工程
    • 13 篇 安全科学与工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
  • 211 篇 理学
    • 99 篇 数学
    • 68 篇 物理学
    • 58 篇 生物学
    • 38 篇 统计学(可授理学、...
    • 25 篇 化学
    • 15 篇 系统科学
  • 103 篇 管理学
    • 54 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 28 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 19 篇 药学(可授医学、理...
  • 9 篇 法学
  • 7 篇 经济学
  • 5 篇 农学
  • 4 篇 教育学

主题

  • 21 篇 semantics
  • 18 篇 training
  • 16 篇 deep learning
  • 15 篇 feature extracti...
  • 14 篇 neural networks
  • 12 篇 contrastive lear...
  • 10 篇 computational mo...
  • 10 篇 computer vision
  • 9 篇 conferences
  • 9 篇 object detection
  • 9 篇 task analysis
  • 8 篇 semantic segment...
  • 8 篇 benchmark testin...
  • 8 篇 machine learning
  • 8 篇 forecasting
  • 7 篇 data models
  • 6 篇 deep neural netw...
  • 6 篇 transformers
  • 6 篇 signal processin...
  • 6 篇 speech processin...

机构

  • 191 篇 school of comput...
  • 156 篇 key laboratory o...
  • 54 篇 guangdong provin...
  • 41 篇 peng cheng labor...
  • 35 篇 laboratory for a...
  • 20 篇 college of intel...
  • 19 篇 key laboratory o...
  • 17 篇 the school of co...
  • 16 篇 guangdong key la...
  • 13 篇 sun yat-sen univ...
  • 13 篇 tianjin key labo...
  • 12 篇 pazhou lab
  • 12 篇 guangdong key la...
  • 11 篇 japan advanced i...
  • 11 篇 tianjin key labo...
  • 10 篇 institute of art...
  • 10 篇 tianjin key labo...
  • 10 篇 ministry of educ...
  • 9 篇 school of comput...
  • 9 篇 guangdong key la...

作者

  • 85 篇 zheng wei-shi
  • 31 篇 xie xiaohua
  • 29 篇 wei-shi zheng
  • 23 篇 lai jianhuang
  • 20 篇 lai jian-huang
  • 19 篇 wang ruixuan
  • 16 篇 wang chang-dong
  • 16 篇 yang lingxiao
  • 13 篇 wu xiao-ming
  • 12 篇 lin kun-yu
  • 12 篇 yunong zhang
  • 12 篇 wu ancong
  • 11 篇 lu wei
  • 10 篇 yan junkai
  • 9 篇 meng jingke
  • 9 篇 jianhuang lai
  • 9 篇 wei yi-lin
  • 9 篇 qu dan
  • 9 篇 hu jian-fang
  • 8 篇 dang jianwu

语言

  • 507 篇 英文
  • 47 篇 其他
  • 3 篇 中文
检索条件"机构=Laboratory for Advanced Computing and Intelligence Engineering"
554 条 记 录,以下是151-160 订阅
排序:
SpEx+: A complete time domain speaker extraction network  21
SpEx+: A complete time domain speaker extraction network
收藏 引用
21st Annual Conference of the International Speech Communication Association, INTERSPEECH 2020
作者: Ge, Meng Xu, Chenglin Wang, Longbiao Chng, Eng Siong Dang, Jianwu Li, Haizhou Tianjin Key Laboratory of Cognitive Computing and Application College of Intelligence and Computing Tianjin University Tianjin China School of Computer Science and Engineering Nanyang Technological University Singapore Japan Advanced Institute of Science and Technology Ishikawa Japan Department of Electrical and Computer Engineering National University of Singapore Singapore Machine Listening Lab University of Bremen Germany
Speaker extraction aims to extract the target speech signal from a multi-talker environment given a target speaker's reference speech. We recently proposed a time-domain solution, SpEx, that avoids the phase estim... 详细信息
来源: 评论
Halftone Image Steganography Based on Maximizing Visual Similarity of Block Units  7th
Halftone Image Steganography Based on Maximizing Visual Sim...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Yin, Xiaolin Yu, Mujian Chen, Lili Wang, Ke Lu, Wei School of Computer Science and Engineering Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangdong Science and Technology Innovation Monitoring and Research Center Guangzhou510033 China
Steganography focuses on imperceptibility of both the human eyes but also to potential analyzers. Based on the human visual system (HVS) of halftone image, most previous visual quality measurements for multi-tone imag... 详细信息
来源: 评论
Halftone Image Steganography Based on Minimizing Distortion with Pixel Density Transition  7th
Halftone Image Steganography Based on Minimizing Distortion...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Yu, Mujian Luo, Junwei Xu, Bozhi Chen, Guoliang Lu, Wei School of Computer Science and Engineering Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangdong Science and Technology Innovation Monitoring and Research Center Guangzhou510033 China
Many advanced halftone steganographic schemes focus only on the distortion of human visual perception or the distortion according to statistics. In this paper, a halftone image steganography based on minimizing distor... 详细信息
来源: 评论
Answer-Centric Local and Global Information Fusion for Conversational Question Generation  12
Answer-Centric Local and Global Information Fusion for Conve...
收藏 引用
12th IEEE International Conference on Big Knowledge, ICBK 2021
作者: Lei, Panpan Sun, Xiao Hefei University of Technology Anhui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer Science and Information Engineering Anhui Hefei China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anhui Hefei China
Conversational Question Generation (CQG) is a new concern in Question Generation (QG) study. Recently Seq2Seq neural network model has been widely used in the QG area. CQG model is also based on the Seq2Seq neural net... 详细信息
来源: 评论
EmoDamp: A Model for Speaker Emotion Inference in Dialogues with Bidirectional Emotion Damping Mechanism  6
EmoDamp: A Model for Speaker Emotion Inference in Dialogues ...
收藏 引用
6th International Conference on Algorithms, computing and Artificial intelligence, ACAI 2023
作者: Jiang, Yueqi Sun, Xiao Wang, Jiamin AnHui Province Key Laboratory of Affective Computing and Advanced Intelligent Machine School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anhui Hefei China
Emotion analysis in conversation has been a popular research topic in the natural language processing field. While much of the existing research has focused on emotion recognition in conversation, the emotion inferenc... 详细信息
来源: 评论
Halftone Image Steganalysis by Reconstructing Grayscale Image  7th
Halftone Image Steganalysis by Reconstructing Grayscale Imag...
收藏 引用
7th International Conference on Artificial intelligence and Security, ICAIS 2021
作者: Luo, Junwei Lin, Cong Zeng, Lingwen Liang, Jifan Lu, Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China
Utilizing some special pixels patterns constructing the steganalytic features is popular in binary image steganalysis, which could be also used in halftone image. There is almost no specific image steganalysis for hal... 详细信息
来源: 评论
Frozen-DETR: Enhancing DETR with Image Understanding from Frozen Foundation Models  38
Frozen-DETR: Enhancing DETR with Image Understanding from Fr...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518055 China Tongyi Lab Alibaba Group China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China Guangdong Guangzhou510555 China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin...
来源: 评论
New Entanglement-Assisted Concatenated Quantum Codes Exceed Quantum Gilbert-Varshamov Bound
New Entanglement-Assisted Concatenated Quantum Codes Exceed ...
收藏 引用
International Conference on Computer and Communications (ICCC)
作者: Renxu Wang Jihao Fan School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Quantum error-correction codes leverage encoding and redundancy to effectively detect and correct errors, thereby enhancing the reliability and accuracy of signal detection. Based on the scheme of entanglement-assiste... 详细信息
来源: 评论
Genetic and phenotypic relationships between coronary atherosclerotic heart disease and electrocardiographic traits
Genetic and phenotypic relationships between coronary athero...
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Wang, Xinfeng Zhang, Haoyang Xiu, Xuehao Qi, Mengling Yang, Yuedong Zhao, Huiying Sun Yat-sen University Key Laboratory of Machine Intelligence and Advanced Computing of Moe School of Computer Science and Engineering Guangzhou China Sun Yat-sen Memorial Hospital Guangdong Provincial Key Laboratory of Malignant Tumor Epigenetics and Gene Regulation Department of Medical Research Center Guangzhou China
Observational studies have revealed that Coronary Atherosclerotic Heart Disease (CAHD) is associated with abnormal electrocardiogram (ECG) traits. However, it remains unclear whether there are genetic correlations bet... 详细信息
来源: 评论
LLMUZZ: LLM-based seed optimization for black-box device fuzzing
LLMUZZ: LLM-based seed optimization for black-box device fuz...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Guangming Gao Shuitao Gan Xiaofeng Wang Shengkai Zhu School of Artificial Intelligence and Computer Science Jiangnan University China Labortory for Advanced Computing and Intelligence Engineering Wuxi China Pengcheng Laboratory Shenzhen China
As an increasing number of Internet of Things (IoT) devices are being deployed, the threat from vulnerabilities inside these devices is growing. Fuzzing is a primary method used for discovering vulnerabilities in IoT ... 详细信息
来源: 评论