咨询与建议

限定检索结果

文献类型

  • 3,574 篇 会议
  • 2,509 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,084 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,048 篇 工学
    • 2,782 篇 计算机科学与技术...
    • 2,295 篇 软件工程
    • 1,033 篇 信息与通信工程
    • 492 篇 电气工程
    • 469 篇 生物工程
    • 450 篇 电子科学与技术(可...
    • 424 篇 控制科学与工程
    • 385 篇 光学工程
    • 295 篇 生物医学工程(可授...
    • 286 篇 机械工程
    • 256 篇 化学工程与技术
    • 204 篇 仪器科学与技术
    • 136 篇 材料科学与工程(可...
    • 136 篇 网络空间安全
    • 135 篇 动力工程及工程热...
    • 110 篇 建筑学
    • 105 篇 交通运输工程
  • 2,201 篇 理学
    • 1,190 篇 数学
    • 657 篇 物理学
    • 527 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 270 篇 化学
    • 165 篇 系统科学
  • 1,062 篇 管理学
    • 567 篇 图书情报与档案管...
    • 538 篇 管理科学与工程(可...
    • 193 篇 工商管理
  • 243 篇 医学
    • 211 篇 临床医学
    • 183 篇 基础医学(可授医学...
    • 118 篇 药学(可授医学、理...
  • 152 篇 法学
    • 120 篇 社会学
  • 84 篇 教育学
  • 78 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 274 篇 feature extracti...
  • 237 篇 semantics
  • 172 篇 training
  • 152 篇 accuracy
  • 135 篇 computational mo...
  • 107 篇 deep learning
  • 106 篇 convolution
  • 92 篇 data mining
  • 85 篇 image segmentati...
  • 83 篇 federated learni...
  • 83 篇 robustness
  • 82 篇 object detection
  • 82 篇 data models
  • 78 篇 visualization
  • 73 篇 optimization
  • 71 篇 contrastive lear...
  • 67 篇 convolutional ne...
  • 64 篇 neural networks
  • 64 篇 predictive model...
  • 63 篇 transformers

机构

  • 221 篇 key laboratory o...
  • 210 篇 shandong provinc...
  • 189 篇 hubei province k...
  • 144 篇 school of inform...
  • 143 篇 key laboratory o...
  • 143 篇 school of comput...
  • 116 篇 college of compu...
  • 104 篇 provincial key l...
  • 101 篇 fujian provincia...
  • 88 篇 shandong provinc...
  • 75 篇 national key lab...
  • 75 篇 university of ch...
  • 72 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 63 篇 school of comput...
  • 62 篇 hubei province k...
  • 62 篇 shanghai key lab...
  • 61 篇 shanghai key lab...
  • 56 篇 shandong provinc...
  • 52 篇 fujian provincia...

作者

  • 64 篇 li zuoyong
  • 57 篇 huang qingming
  • 53 篇 zhaohui li
  • 51 篇 li zhaohui
  • 44 篇 li chenglong
  • 44 篇 zhang fuquan
  • 35 篇 tang jin
  • 33 篇 shen linlin
  • 33 篇 li wei
  • 32 篇 fan li
  • 31 篇 wang wei
  • 30 篇 guo di
  • 30 篇 boxin shi
  • 29 篇 zuoyong li
  • 29 篇 yang zhiyong
  • 28 篇 xiaoming wu
  • 27 篇 feng rui
  • 26 篇 wang xiao
  • 25 篇 liu yang
  • 25 篇 gao guanglai

语言

  • 5,223 篇 英文
  • 724 篇 其他
  • 159 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6084 条 记 录,以下是1181-1190 订阅
排序:
Learning to Learn Transferable Generative Attack for Person Re-Identification
收藏 引用
IEEE Transactions on Image processing 2025年 PP卷 PP页
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning-based person re-identification (reid) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely consider... 详细信息
来源: 评论
Improving Global Precipitation in Numerical Weather Prediction Systems based on Deep Learning Techniques
Improving Global Precipitation in Numerical Weather Predicti...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Haixiang Zhao Guojing Zhang Ming Du Xiaoying Wang Department of Computer Technology and Applications Qinghai University Xining China Geospatial Information Technology and Application Qinghai Provincial Key Laboratory Xining China
Accurate weather forecasts are crucial for many aspects of people's lives. Traditional short-term precipitation forecasting methods mainly rely on numerical weather predictions based on meteorological dynamics mod...
来源: 评论
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论
A Genuine-Equilibrium Monte Carlo Sampling-Based Effective Algorithm for Fully-Connected Ising Models
A Genuine-Equilibrium Monte Carlo Sampling-Based Effective A...
收藏 引用
IEEE International Conference on Integrated Circuits, Technologies and Applications (ICTA)
作者: Xiangrui Wang Dong Jiang Yang Zhang Hongyuan Kang Enyi Yao School of Microelectronics South China University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Guangzhou China
Ising machines have emerged as a potential technique for hardware acceleration in solving combinatorial optimization problems. However, an effective and hardware-implementation-friendly algorithm is still required to ...
来源: 评论
Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论
A Detection Method Toward Yellow Dragon Disease Spreads Using Spark and Deep Learning  3
A Detection Method Toward Yellow Dragon Disease Spreads Usin...
收藏 引用
3rd International Conference on High Performance Computing and Communication Engineering, HPCCE 2023
作者: Xie, Wu Su, Zhenzhao Zhang, Huimin Kang, Ping Qin, Kun Fan, Yong Zhao, Quanyou Guangxi Key Laboratory of Image and Graphic Intelligent Processing Guilin University of Electronic Technology Guilin541214 China Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China Lingchuan Science and Technology Information Institute Guilin541299 China Guilin Hivision Technology Co. Ltd. Guilin541004 China School of Mechanical and Electrical Engineering Guilin University of Electronic Technology Guilin541214 China School of Computer Science and Engineering Guilin University of Aerospace Technology Guilin541004 China
The detection methods of yellow dragon disease spread via wood lice transmission networks like social networks are very important for diverse citrus trees and farmers. Although current methods have some detection accu... 详细信息
来源: 评论
Retinal Vessels Segmentation Based on Multi-scale Hybrid Convolutional Network  4th
Retinal Vessels Segmentation Based on Multi-scale Hybrid Con...
收藏 引用
4th International Conference on Smart Vehicular technology, Transportation, Communication and Applications, VTCA 2021
作者: Li, Rui Li, Zuoyong Cao, Xinrong Teng, Shenghua College of Electronic and Information Engineering Shandong University of Science and Technology Qingdao266590 China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou350121 China Fuzhou Digital Healthcare Industry Technology Innovation Center Minjiang University Fuzhou350121 China
Retinal fundus image can reveal the information on the early symptoms of diabetes, hypertension, hyperlipidemia and other diseases. Accurate segmentation of retinal vessels can assist the detection and diagnosis of th... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion
arXiv
收藏 引用
arXiv 2024年
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ... 详细信息
来源: 评论
Few-Shot Object Detection Based on Generalized Features
Few-Shot Object Detection Based on Generalized Features
收藏 引用
Artificial Intelligence and Intelligent information processing (AIIIP), International Conference on
作者: Qiuqin Chen Xiao Ke Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fuzhou China Key Laboratory of Spatial Data Mining & Information Sharing Ministry of Education Fuzhou Fuzhou China
Few-shot object detection aims to rapidly detect novel classes of objects using a minimal number of annotated instances. Compared to methods such as meta-learning, few-shot object detection based on transfer learning ...
来源: 评论
Research on Emotional Analysis of Tibetan Short Text Based on Fusion Sentiment Lexicon  1
收藏 引用
1st International Artificial Intelligence Conference, IAIC 2023
作者: Ji, Wan Ma Dao Rang, An Jian Cai Cuo, Jan Yang Jia, Gong Bao Cuo, De Ji Gong, Zan La Qin, Yang School of Computer Science Qinghai University for Minzu Xining810007 China State Key Laboratory of Intelligent Information Processing and Application of Tibetan Language Jointly Constructed By the Ministry of Provincial Affairs and the Ministry of Education of China Xining China Qinghai Key Laboratory of Tibetan Information Processing and Machine Translation Item No. 2021-Z-001 Xining China
Short-text sentiment analysis plays an integral role in predicting sentiment polarity. The current Tibetan short-text sentiment analysis model applies deep neural networks to learn some local grammatical structure inf... 详细信息
来源: 评论