咨询与建议

限定检索结果

文献类型

  • 142 篇 会议
  • 59 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 155 篇 工学
    • 110 篇 计算机科学与技术...
    • 90 篇 软件工程
    • 37 篇 信息与通信工程
    • 24 篇 控制科学与工程
    • 18 篇 化学工程与技术
    • 17 篇 生物工程
    • 16 篇 电子科学与技术(可...
    • 14 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 电气工程
    • 10 篇 农业工程
    • 9 篇 生物医学工程(可授...
    • 7 篇 动力工程及工程热...
    • 7 篇 网络空间安全
    • 5 篇 仪器科学与技术
    • 5 篇 交通运输工程
    • 4 篇 材料科学与工程(可...
    • 4 篇 环境科学与工程(可...
  • 86 篇 理学
    • 55 篇 数学
    • 19 篇 生物学
    • 18 篇 物理学
    • 16 篇 化学
    • 13 篇 统计学(可授理学、...
    • 8 篇 系统科学
  • 48 篇 管理学
    • 25 篇 图书情报与档案管...
    • 23 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 12 篇 农学
    • 10 篇 作物学
  • 7 篇 医学
    • 5 篇 临床医学
  • 4 篇 法学
    • 4 篇 社会学
  • 4 篇 艺术学
  • 1 篇 经济学
  • 1 篇 教育学

主题

  • 10 篇 semantics
  • 7 篇 support vector m...
  • 6 篇 training
  • 5 篇 image segmentati...
  • 5 篇 accuracy
  • 5 篇 privacy
  • 3 篇 trees (mathemati...
  • 3 篇 educational inst...
  • 3 篇 convolution
  • 3 篇 vectors
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 3 篇 syntactics
  • 3 篇 feature extracti...
  • 3 篇 natural language...
  • 3 篇 malware
  • 3 篇 labeling
  • 3 篇 forecasting
  • 3 篇 image reconstruc...
  • 3 篇 adaptation model...

机构

  • 15 篇 school of comput...
  • 11 篇 key lab. of inte...
  • 9 篇 school of comput...
  • 9 篇 peng cheng labor...
  • 8 篇 school of cyber ...
  • 8 篇 beijing key lab....
  • 8 篇 guangxi collabor...
  • 8 篇 key laboratory o...
  • 6 篇 provincial key l...
  • 6 篇 school of cyber ...
  • 6 篇 shanghai key lab...
  • 5 篇 jiangsu provinci...
  • 5 篇 school of inform...
  • 4 篇 jiangsu provinci...
  • 4 篇 institute of inf...
  • 4 篇 first-imaging te...
  • 4 篇 key lab. of inte...
  • 4 篇 school of inform...
  • 4 篇 school of comput...
  • 4 篇 school of comput...

作者

  • 14 篇 kong fang
  • 13 篇 zhu qiaoming
  • 11 篇 zhou guodong
  • 8 篇 huang qingming
  • 8 篇 xu qianqian
  • 7 篇 chunhe xia
  • 7 篇 tianbo wang
  • 7 篇 cao xiaochun
  • 6 篇 yang zhiyong
  • 6 篇 huang chongwen
  • 5 篇 chen chen
  • 5 篇 li peifeng
  • 4 篇 li yang
  • 4 篇 qian longhua
  • 4 篇 yang bo
  • 4 篇 yuen chau
  • 4 篇 zhang chao
  • 4 篇 xizhao luo
  • 4 篇 yanqin zhu
  • 4 篇 chen yang

语言

  • 196 篇 英文
  • 5 篇 中文
  • 2 篇 其他
检索条件"机构=Provincial Key Lab. for Computer Information Processing Technology"
202 条 记 录,以下是181-190 订阅
排序:
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
Dual-Source CBCT for Larger Longitudinal Coverage: System Design and Image Reconstruction
Dual-Source CBCT for Larger Longitudinal Coverage: System De...
收藏 引用
Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC)
作者: Xusheng Zhang Tianling Lyu Yijie Shi Xinyun Zhong Zhan Wu Yan Xi Shijie Wang Yang Chen Wentao Zhu School of Software Southeast University Nanjing China Zhejiang Lab Hangzhou China Laboratory of Image Science and Technology the School of Computer Science and Engineering Southeast University Nanjing China First-Imaging Tech. Shanghai China Jiangsu Provincial Joint International Research Laboratory of Medical Information Processing the Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications Southeast University Nanjing China
The application of CBCT systems in intraoperative environments has become increasingly common, but concurrent CBCT systems are unsuitable for situations that require a large longitudinal imaging FoV, such as orthopedi... 详细信息
来源: 评论
Efficient spatialtemporal context modeling for action recognition?
arXiv
收藏 引用
arXiv 2021年
作者: Cao, Congqi Lu, Yue Zhang, Yifan Jiang, Dongmei Zhang, Yanning Natl. Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Provincial Key Lab on Speech and Image Information Processing School of Computer Science Northwestern Poly-technical University Xi'an710129 China National Laboratory of Pattern Recognition Institute of Automation Chinese Academy of Sciences University of Chinese Academy of Sciences Beijing100190 China
Contextual information plays an important role in action recognition. Local operations have difficulty to model the relation between two elements with a long-distance interval. However, directly modeling the contextua... 详细信息
来源: 评论
A hierarchical image matting model for blood vessel segmentation in fundus images
arXiv
收藏 引用
arXiv 2017年
作者: Fan, Zhun Lu, Jiewei Li, Wenji Wei, Caimin Huang, Han Cai, Xinye Chen, Xinjian Guangdong Provincial Key Laboratory of Digital Signal and Image Processing College of Engineering Shantou University Shan'tou515063 China Department of Mathematics Shantou University Shan'tou515063 China School of Software Engineering South China University of Technology Guang'zhou510006 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Jiang'su210016 China Medical Image Processing and Analysis Lab School of Electronics and Information Engineering Soochow University Su'zhou215006 China
In this paper, a hierarchical image matting model is proposed to extract blood vessels from fundus images. More specifically, a hierarchical strategy utilizing the continuity and extendibility of retinal blood vessels... 详细信息
来源: 评论
AIDE: Attack Inference Based on Heterogeneous Dependency Graphs with MITRE ATT&CK
AIDE: Attack Inference Based on Heterogeneous Dependency Gra...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Chunhe Xia Nan Feng Xinyi Pan Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Software & Microelectronics Peking University Beijing China School of Cyber Science and Technology Beihang University Beijing China School of Computer Science and Engineering Guangxi Normal University Guilin China
The MITRE ATT&CK Framework provides a rich and actionable repository of adversarial tactics, techniques, and procedures (TTPs). By leveraging the associations among these techniques, we can infer unobserved techni... 详细信息
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques
arXiv
收藏 引用
arXiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Denoising of 3D magnetic resonance images using a residual encoder-decoder wasserstein generative adversarial network
arXiv
收藏 引用
arXiv 2018年
作者: Ran, Maosong Hu, Jinrong Chen, Yang Chen, Hu Sun, Huaiqiang Zhou, Jiliu Zhang, Yi College of Computer Science Sichuan University Chengdu610065 China Department of Computer Science Chengdu University of Information Technology Chengdu610225 China Lab of Image Science and Technology School of Computer Science and Engineering Southeast University Nanjing210096 China School of Cyber Science and Engineering Southeast University Nanjing210096 China Ministry of Education Nanjing210096 China Department of Radiology West China Hospital of Sichuan University Chengdu610041 China Guangdong Provincial Key Laboratory of Medical Image Processing Southern Medical University Guangzhou510515 China
Structure-preserved denoising of 3D magnetic resonance imaging (MRI) images is a critical step in medical image analysis. Over the past few years, many algorithms with impressive performances have been proposed. In th... 详细信息
来源: 评论
Facilities collab.ration in cloud manufacturing based on generalized collab.ration network
Facilities collaboration in cloud manufacturing based on gen...
收藏 引用
International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE)
作者: Wenxiang Li Chunsheng Zhu Edith C.-H. Ngai Laurence T. Yang Lei Shu Yuxia Sheng Engineering Research Center for Metallurgical Automation and Detecting Technology of Ministry of Education Wuhan University of Science and Technology Wuhan China Department of Electrical and Computer Engineering The University of British Columbia Vancouver BC Canada Department of Information Technology Uppsala University 751 05 Uppsala Sweden Department of Computer Science St. Francis Xavier University Antigonish NS B2G 2W5 Canada Guangdong Provincial Key Lab. of Petrochemical Equipment Fault Diagnosis Guangdong University of Petrochemical Technology Maoming Guangdong China
In cloud manufacturing for regional industrial cluster, there is increasing necessity of collab.ration among enterprises or facilities. It is valuable to explore the characteristics of these collab.ration behaviors fo... 详细信息
来源: 评论
A review of uncertainty quantification in deep learning: Techniques, applications and challenges
arXiv
收藏 引用
arXiv 2020年
作者: Abdar, Moloud Pourpanah, Farhad Hussain, Sadiq Rezazadegan, Dana Liu, Li Ghavamzadeh, Mohammad Fieguth, Paul Cao, Xiaochun Khosravi, Abbas Rajendra Acharya, U. Makarenkov, Vladimir Nahavandi, Saeid Deakin University Australia College of Mathematics and Statistics Guangdong Key Lab. of Intelligent Information Processing Shenzhen University Shenzhen518060 China Dibrugarh University Dibrugarh India Department of Computer Science and Software Engineering Swinburne University of Technology Melbourne Australia Center for Machine Vision and Signal Analysis University of Oulu Oulu Finland Google research United States Department of Systems Design Engineering University of Waterloo Waterloo Canada State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Department of Electronics and Computer Engineering Ngee Ann Polytechnic Clementi Singapore Department of Computer Science University of Quebec in Montreal MontrealQC Canada
—Uncertainty quantification (UQ) plays a pivotal role in the reduction of uncertainties during both optimization and decision making, applied to solve a variety of real-world applications in science and engineering. ... 详细信息
来源: 评论