咨询与建议

限定检索结果

文献类型

  • 142 篇 会议
  • 59 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 157 篇 工学
    • 111 篇 计算机科学与技术...
    • 91 篇 软件工程
    • 37 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 18 篇 化学工程与技术
    • 17 篇 生物工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 光学工程
    • 11 篇 机械工程
    • 11 篇 电气工程
    • 10 篇 农业工程
    • 10 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 6 篇 仪器科学与技术
    • 5 篇 交通运输工程
  • 86 篇 理学
    • 55 篇 数学
    • 19 篇 生物学
    • 18 篇 物理学
    • 16 篇 化学
    • 13 篇 统计学(可授理学、...
    • 8 篇 系统科学
  • 48 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 12 篇 农学
    • 10 篇 作物学
  • 8 篇 医学
    • 6 篇 临床医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 公共卫生与预防医...
  • 4 篇 法学
    • 4 篇 社会学
  • 4 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10 篇 semantics
  • 7 篇 support vector m...
  • 6 篇 training
  • 5 篇 image segmentati...
  • 5 篇 accuracy
  • 5 篇 privacy
  • 3 篇 trees (mathemati...
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 vectors
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 natural language...
  • 3 篇 malware
  • 3 篇 labeling
  • 3 篇 forecasting
  • 3 篇 image reconstruc...
  • 3 篇 adaptation model...

机构

  • 15 篇 school of comput...
  • 11 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 8 篇 key laboratory o...
  • 6 篇 provincial key l...
  • 6 篇 school of cyber ...
  • 6 篇 shanghai key lab...
  • 5 篇 jiangsu provinci...
  • 5 篇 school of inform...
  • 4 篇 jiangsu provinci...
  • 4 篇 institute of inf...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of inte...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 school of comput...

作者

  • 14 篇 kong fang
  • 13 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 7 篇 cao xiaochun
  • 6 篇 yang zhiyong
  • 6 篇 huang chongwen
  • 5 篇 chen chen
  • 5 篇 li peifeng
  • 4 篇 li yang
  • 4 篇 qian longhua
  • 4 篇 yang bo
  • 4 篇 yuen chau
  • 4 篇 zhang chao
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 chen yang

语言

  • 195 篇 英文
  • 5 篇 中文
  • 3 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology"
202 条 记 录,以下是171-180 订阅
排序:
Hand Hygiene Assessment via Joint Step Segmentation and key Action Scorer
arXiv
收藏 引用
arXiv 2022年
作者: Li, Chenglong Zhu, Qiwen Liu, Tubiao Tang, Jin Su, Yu Information Materials and Intelligent Sensing Laboratory of Anhui Province Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Artificial Intelligence Anhui University Hefei230601 China Information Materials and Intelligent Sensing Laboratory of Anhui Province Key Lab of Intelligent Computing and Signal Processing of Ministry of Education Anhui Provincial Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Hefei Normal University Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei230061 China
Hand hygiene is a standard six-step hand-washing action proposed by the World Health Organization (WHO). However, there is no good way to supervise medical staff to do hand hygiene, which brings the potential risk of ... 详细信息
来源: 评论
Converged reconfigurable intelligent surface and mobile edge computing for space information networks
arXiv
收藏 引用
arXiv 2021年
作者: Cao, Xuelin Yang, Bo Huang, Chongwen Yuen, Chau Zhang, Yan Niyato, Dusit Han, Zhu Engineering Product Development Pillar Singapore University of Technology and Design Singapore Singapore College of Information Science and Electronic Engineering Zhejiang Provincial Key Lab of information processing communication and networking International Joint Innovation Center Zhejiang University China Department of Informatics University of Oslo Norway School of Computer Science and Engineering Nanyang Technological University Singapore Singapore Department of Electrical and Computer Engineering University of Houston United States
Space information networks (SIN) are facing an ever-increasing thirst for high-speed and high-capacity seamless data transmission due to the integration of ground, air, and space communications. However, this imposes ... 详细信息
来源: 评论
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论
A method of phrase sentiment analysis based on potential sentiment expectation of context aspects
收藏 引用
ICIC Express Letters 2013年 第10期7卷 2855-2860页
作者: Yang, Yuzhen Liu, Peiyu Fei, Shaodong Du, Wentao School of Information Science and Engineering Shandong Normal University No. 88 East Wenhua Road Jinan 250014 China Shandong Provincial Key Lab. for Distributed Computer Software Novel Technology Shandong Province No. 88 East Wenhua Road Jinan 250014 China Shandong University of Finance and Economics No. 7366 East Second Ring Road Jinan China
The sentiment analysis of phrases occupies important positions among the multiple application domains of sentiment analysis. The previous work of the sentiment analysis of phrases is still dependent on sentiment words... 详细信息
来源: 评论
Subtopic partitioning strategy based on improved ant colony clustering algorithm
收藏 引用
ICIC Express Letters 2013年 第10期7卷 2881-2886页
作者: Fei, Shaodong Liu, Peiyu Yang, Yuzhen Zhang, Zhen School of Information Science and Engineering Shandong Normal University No. 88 East Wenhua Road Jinan 250014 China Shandong Provincial Key Lab. for Distributed Computer Software Novel Technology Shandong Province No. 88 East Wenhua Road Jinan 250014 China Shandong University of Finance and Economics No. 7366 East Second Ring Road Jinan China
Aiming at the problem of topic correlated detection caused by the fact that one topic contains many subtopics, this paper proposes a subtopic partitioning method based on the improved ant colony clustering algorithm. ... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collab.rative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
AdvFAS: a robust face anti-spoofing framework against adversarial examples
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Jiawei Yang, Xiao Yin, Heng Ma, Mingzhi Chen, Bihui Peng, Jianteng Guo, Yandong Yin, Zhaoxia Su, Hang Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Hefei230601 China Department of Computer Science and Technology Institute for AI THBI Lab Tsinghua University Beijing100084 China Zhongguancun Laboratory Beijing100080 China OPPO Research Institute Beijing China Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai200241 China
Ensuring the reliability of face recognition systems against presentation attacks necessitates the deployment of face anti-spoofing techniques. Despite considerable advancements in this domain, the ability of even the... 详细信息
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
Intra-Guided Dual-Energy Material Decomposition Method for Dual-Source CBCT Systems
Intra-Guided Dual-Energy Material Decomposition Method for D...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Xinyun Zhong Tianling Lyu Zhan Wu Wei Gao Yan Xi Wei Zhao Wentao Zhu Yang Chen Laboratory of Image Science and Technology School of Computer Science and Engineering Southeast University Nanjing China Zhejiang Lab Hangzhou China First-Imaging Tech. Shanghai China Beihang University Beijing China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Nanjing China
Dual-energy CBCT imaging plays a crucial role in advanced imaging applications due to its ability to quantify material components. Although there are multiple established systems for dual-energy imaging, they often co... 详细信息
来源: 评论
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论