咨询与建议

限定检索结果

文献类型

  • 1,395 篇 会议
  • 1,067 篇 期刊文献
  • 4 册 图书

馆藏范围

  • 2,466 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,588 篇 工学
    • 1,133 篇 计算机科学与技术...
    • 970 篇 软件工程
    • 342 篇 信息与通信工程
    • 197 篇 控制科学与工程
    • 173 篇 生物工程
    • 162 篇 电气工程
    • 155 篇 机械工程
    • 119 篇 电子科学与技术(可...
    • 113 篇 生物医学工程(可授...
    • 107 篇 光学工程
    • 83 篇 化学工程与技术
    • 68 篇 仪器科学与技术
    • 55 篇 动力工程及工程热...
    • 50 篇 材料科学与工程(可...
    • 48 篇 交通运输工程
    • 39 篇 网络空间安全
    • 31 篇 建筑学
  • 846 篇 理学
    • 480 篇 数学
    • 221 篇 物理学
    • 203 篇 生物学
    • 154 篇 统计学(可授理学、...
    • 76 篇 化学
    • 60 篇 系统科学
  • 457 篇 管理学
    • 256 篇 图书情报与档案管...
    • 214 篇 管理科学与工程(可...
    • 69 篇 工商管理
  • 85 篇 医学
    • 74 篇 临床医学
    • 62 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
  • 43 篇 法学
    • 33 篇 社会学
  • 35 篇 农学
  • 27 篇 经济学
  • 14 篇 教育学
  • 11 篇 艺术学
  • 9 篇 哲学
  • 9 篇 文学
  • 5 篇 军事学

主题

  • 111 篇 feature extracti...
  • 77 篇 semantics
  • 73 篇 information proc...
  • 71 篇 training
  • 70 篇 laboratories
  • 55 篇 computers
  • 53 篇 face recognition
  • 48 篇 computational mo...
  • 44 篇 deep learning
  • 43 篇 visualization
  • 39 篇 humans
  • 38 篇 data mining
  • 37 篇 accuracy
  • 36 篇 predictive model...
  • 36 篇 machine learning
  • 36 篇 robustness
  • 34 篇 image segmentati...
  • 34 篇 clustering algor...
  • 32 篇 computer vision
  • 31 篇 support vector m...

机构

  • 435 篇 key laboratory o...
  • 219 篇 university of ch...
  • 83 篇 key laboratory o...
  • 62 篇 peng cheng labor...
  • 48 篇 key laboratory o...
  • 46 篇 the key laborato...
  • 44 篇 key laboratory o...
  • 44 篇 graduate univers...
  • 43 篇 school of comput...
  • 40 篇 chinese academy ...
  • 32 篇 school of comput...
  • 32 篇 school of inform...
  • 30 篇 graduate univers...
  • 29 篇 school of cyber ...
  • 28 篇 national enginee...
  • 26 篇 key laboratory o...
  • 26 篇 school of comput...
  • 25 篇 college of infor...
  • 24 篇 faculty of infor...
  • 24 篇 beijing key labo...

作者

  • 101 篇 zhongzhi shi
  • 95 篇 shi zhongzhi
  • 73 篇 xilin chen
  • 72 篇 shiguang shan
  • 62 篇 liu qun
  • 60 篇 huang qingming
  • 41 篇 feng yang
  • 40 篇 xu qianqian
  • 37 篇 he qing
  • 33 篇 wen gao
  • 31 篇 qing he
  • 29 篇 li hua
  • 28 篇 liu yang
  • 28 篇 zhuang fuzhen
  • 27 篇 yuefei sui
  • 26 篇 fuji ren
  • 25 篇 yang zhiyong
  • 25 篇 cao xiaochun
  • 24 篇 cao cungen
  • 24 篇 ding shifei

语言

  • 2,317 篇 英文
  • 96 篇 其他
  • 55 篇 中文
检索条件"机构=Laboratory of Intelligent Information ProcessingInstitute of Computing Technology"
2466 条 记 录,以下是81-90 订阅
排序:
Imperceptible and Sparse Adversarial Attacks via a Dual-Population-Based Constrained Evolutionary Algorithm
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第2期4卷 268-281页
作者: Tian, Ye Pan, Jingwen Yang, Shangshang Zhang, Xingyi He, Shuping Jin, Yaochu Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China Hefei Comprehensive National Science Center Institute of Artificial Intelligence Hefei230088 China Anhui University School of Computer Science and Technology Hefei230601 China Anhui University Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Artificial Intelligence Hefei230601 China Anhui University Anhui Engineering Laboratory of Human-Robot Integration System and Intelligent Equipment School of Electrical Engineering and Automation Hefei230601 China Bielefeld University Faculty of Technology Bielefeld33619 Germany
The sparse adversarial attack has attracted increasing attention due to the merit of a low attack cost via changing a small number of pixels. However, the generated adversarial examples are easily detected in vision s... 详细信息
来源: 评论
A Weighted Ensemble Causal Discovery Method for Effective Connectivity Estimation  9
A Weighted Ensemble Causal Discovery Method for Effective Co...
收藏 引用
9th IEEE Smart World Congress, SWC 2023
作者: Zhang, Qiqi Zhang, Yingwei Ding, Yanhui Chen, Yiqiang Song, Shuchao Wu, Shuang Shandong Normal University School of Information Science and Engineering Jinan China Shandong Academy of Intelligent Computing Technology Jinan China Chinese Academy of Sciences Institute of Computing Technology Beijing China Beijing Key Laboratory of Mobile Computing and Pervasive Device Beijing China
Exploring and explaining the effective connectivity (EC) between brain regions can help us understand the mechanisms behind neurodegenerative diseases such as Alzheimer's disease, thus helping us to diagnose patie... 详细信息
来源: 评论
Context-Driven Index Trimming: A Data Quality Perspective to Enhancing Precision of RALMs
Context-Driven Index Trimming: A Data Quality Perspective to...
收藏 引用
2024 Conference on Empirical Methods in Natural Language Processing, EMNLP 2024
作者: Ma, Kexin Jin, Ruochun Wang, Haotian Wang, Xi Chen, Huan Tang, Yuhua Wang, Qian Institute for Quantum Information State Key Laboratory of High Performance Computing China College of Computer Science and Technology National University of Defense Technology Changsha China Intelligent Game and Decision Lab Academy of Military Science Beijing China
Retrieval-Augmented Large Language Models (RALMs) have made significant strides in enhancing the accuracy of generated responses. However, existing research often overlooks the data quality issues within retrieval res... 详细信息
来源: 评论
Design of Control Circuit for Active Metasurface Based on Varactor Diode
Design of Control Circuit for Active Metasurface Based on Va...
收藏 引用
2023 International Applied Computational Electromagnetics Society Symposium, ACES-China 2023
作者: Zhang, Yue Liu, Yuefei Yang, Guohui Zhang, Kuang Li, Yingsong School of Electronics and Information Engineering Harbin Institute of Technology Harbin China Ministry of Education Anhui University Key Laboratory of Intelligent Computing and Signal Processing Hefei China
A control circuit for active metasurface based on varactor diode is designed in this paper. By varying the reverse bias voltage on the varactor diode, the designed circuit can regulate the additional phase of the acti... 详细信息
来源: 评论
Reinforcement Learning with Token-level Feedback for Controllable Text Generation
Reinforcement Learning with Token-level Feedback for Control...
收藏 引用
2024 Findings of the Association for Computational Linguistics: NAACL 2024
作者: Li, Wendi Wei, Wei Xu, Kaihe Xie, Wenfeng Chen, Dangyang Cheng, Yu Cognitive Computing and Intelligent Information Processing Laboratory School of Computer Science and Technology Huazhong University of Science and Technology China China Ping An Property & Casualty Insurance Company of China China The Chinese University of Hong Kong Hong Kong
To meet the requirements of real-world applications, it is essential to control generations of large language models (LLMs). Prior research has tried to introduce reinforcement learning (RL) into controllable text gen... 详细信息
来源: 评论
Improving Fake News Video Detection by Correlating with Neighbors  61
Improving Fake News Video Detection by Correlating with Neig...
收藏 引用
Findings of the Association for Computational Linguistics, ACL 2023
作者: Qi, Peng Zhao, Yuyang Shen, Yufeng Ji, Wei Cao, Juan Chua, Tat-Seng Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China National University of Singapore Singapore
The prevalence of short video platforms has spawned a lot of fake news videos, which have stronger propagation ability than textual fake news. Thus, automatically detecting fake news videos has been an important count... 详细信息
来源: 评论
Boosting Meaningful Dependency Mining with Clustering and Covariance Analysis  40
Boosting Meaningful Dependency Mining with Clustering and Co...
收藏 引用
40th IEEE International Conference on Data Engineering, ICDE 2024
作者: Wang, Xi Jin, Ruochun Huang, Wanrong Tang, Yuhua Institute for Quantum Information State Key Laboratory of High Performance Computing College of Computer Science and Technology National University of Defense Technology Changsha China College of Computer Science and Technology Department of Intelligent Data Science National University of Defense Technology Changsha China
Functional dependencies (FDs) form a valuable ingredient for various data management tasks. However, existing methods can hardly discover practical and interpretable FDs, especially in large noisy real-life datasets. ... 详细信息
来源: 评论
Retrievable Image Encryption Based on Adaptive Block Compressed Sensing
Retrievable Image Encryption Based on Adaptive Block Compres...
收藏 引用
International Conference on Image, Vision and intelligent Systems, ICIVIS 2023
作者: Fang, Jiuchuan Zhao, Hui Zheng, Mingwen Wang, Zijian Niu, Sijie Gao, Xizhan Shandong Provincial Key Laboratory of Network Based Intelligent Computing School of Information Science and Engineering University of Jinan Jinan250022 China School of Mathematics and Statistics Shandong University of Technology Zibo255000 China
The increasing popularity of the internet and mobile devices, cloud storage has emerged as a popular storage method. However, because data carries a lot of information, untrustworthy servers can access users’ private... 详细信息
来源: 评论
Stable Learning via Triplex Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第10期5卷 5267-5276页
作者: Yang, Shuai Jiang, Tingting Dang, Qianlong Gu, Lichuan Wu, Xindong Anhui Agricultural University School of Information and Artificial Intelligence Hefei230036 China Anhui Provincial Engineering Research Center for Agricultural Information Perception and Intelligent Computing Hefei230036 China Northwest A & F University College of Science Yangling712100 China Hefei University of Technology Key Laboratory of Knowledge Engineering with Big Data The Ministry of Education of China Hefei230601 China Hefei University of Technology School of Computer Science and Information Engineering Hefei230601 China
Stable learning aims to learn a model that generalizes well to arbitrary unseen target domain by leveraging a single source domain. Recent advances in stable learning have focused on balancing the distribution of conf... 详细信息
来源: 评论
IGED:Towards intelligent DDoS Detection Model Using Improved Generalized Entropy and DNN
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 1851-1866页
作者: Yanhua Liu Yuting Han HuiChen Baokang Zhao XiaofengWang Ximeng Liu College of Computer and Data Science Fuzhou UniversityFuzhou350108China Engineering Research Center of Big Data Intelligence Ministry of EducationFuzhou350108China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350108China College of Computer National University of Defense TechnologyChangsha410073China
As the scale of the networks continually expands,the detection of distributed denial of service(DDoS)attacks has become increasingly *** propose an intelligent detection model named IGED by using improved generalized ... 详细信息
来源: 评论