咨询与建议

限定检索结果

文献类型

  • 3,603 篇 会议
  • 2,557 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 6,161 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 4,107 篇 工学
    • 2,825 篇 计算机科学与技术...
    • 2,317 篇 软件工程
    • 1,060 篇 信息与通信工程
    • 530 篇 电气工程
    • 473 篇 电子科学与技术(可...
    • 473 篇 生物工程
    • 441 篇 控制科学与工程
    • 390 篇 光学工程
    • 297 篇 生物医学工程(可授...
    • 291 篇 机械工程
    • 261 篇 化学工程与技术
    • 212 篇 仪器科学与技术
    • 152 篇 网络空间安全
    • 138 篇 材料科学与工程(可...
    • 135 篇 动力工程及工程热...
    • 112 篇 建筑学
    • 111 篇 交通运输工程
  • 2,238 篇 理学
    • 1,200 篇 数学
    • 676 篇 物理学
    • 532 篇 生物学
    • 361 篇 统计学(可授理学、...
    • 283 篇 化学
    • 165 篇 系统科学
  • 1,075 篇 管理学
    • 572 篇 图书情报与档案管...
    • 548 篇 管理科学与工程(可...
    • 195 篇 工商管理
  • 250 篇 医学
    • 215 篇 临床医学
    • 185 篇 基础医学(可授医学...
    • 119 篇 药学(可授医学、理...
  • 152 篇 法学
    • 120 篇 社会学
  • 89 篇 教育学
  • 79 篇 农学
  • 51 篇 经济学
  • 21 篇 军事学
  • 18 篇 文学
  • 11 篇 艺术学
  • 5 篇 哲学

主题

  • 277 篇 feature extracti...
  • 237 篇 semantics
  • 174 篇 training
  • 155 篇 accuracy
  • 137 篇 computational mo...
  • 111 篇 deep learning
  • 106 篇 convolution
  • 92 篇 data mining
  • 87 篇 federated learni...
  • 85 篇 image segmentati...
  • 85 篇 robustness
  • 84 篇 data models
  • 83 篇 object detection
  • 78 篇 visualization
  • 76 篇 optimization
  • 74 篇 contrastive lear...
  • 68 篇 convolutional ne...
  • 65 篇 neural networks
  • 64 篇 predictive model...
  • 63 篇 transformers

机构

  • 228 篇 key laboratory o...
  • 210 篇 shandong provinc...
  • 189 篇 hubei province k...
  • 146 篇 key laboratory o...
  • 145 篇 school of comput...
  • 144 篇 school of inform...
  • 115 篇 college of compu...
  • 104 篇 provincial key l...
  • 101 篇 fujian provincia...
  • 88 篇 shandong provinc...
  • 76 篇 national key lab...
  • 76 篇 university of ch...
  • 72 篇 peng cheng labor...
  • 71 篇 shandong provinc...
  • 64 篇 school of comput...
  • 63 篇 hubei province k...
  • 61 篇 shanghai key lab...
  • 61 篇 shanghai key lab...
  • 60 篇 shandong provinc...
  • 53 篇 school of comput...

作者

  • 65 篇 li zuoyong
  • 62 篇 huang qingming
  • 53 篇 zhaohui li
  • 50 篇 li zhaohui
  • 44 篇 li chenglong
  • 44 篇 zhang fuquan
  • 35 篇 tang jin
  • 34 篇 li wei
  • 33 篇 yang zhiyong
  • 33 篇 shen linlin
  • 32 篇 fan li
  • 31 篇 wang wei
  • 30 篇 guo di
  • 30 篇 boxin shi
  • 29 篇 zuoyong li
  • 28 篇 xiaoming wu
  • 28 篇 feng rui
  • 27 篇 li fan
  • 26 篇 wang xiao
  • 26 篇 liu yang

语言

  • 5,050 篇 英文
  • 975 篇 其他
  • 164 篇 中文
  • 1 篇 德文
  • 1 篇 法文
检索条件"机构=Provincial Key Laboratory of Computer Information Processing Technology"
6161 条 记 录,以下是1241-1250 订阅
排序:
Uncertainty-Guided Test-Time Training for Face Forgery Detection  7th
Uncertainty-Guided Test-Time Training for Face Forgery Dete...
收藏 引用
7th Asian Conference on Pattern Recognition, ACPR 2023
作者: Huang, Shenyuan Huang, Huaibo Wang, Zi Xu, Nan Zheng, Aihua He, Ran School of Computer Science and Technology Anhui University Hefei China Information Materials and Intelligent Sensing Laboratory of Anhui Province Hefei China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Hefei China School of Artificial Intelligence Anhui University Hefei China NLPR CRIPAC CASIA Beijing China
Face forgery detection is becoming increasingly important in computer vision as facial manipulation technologies cause serious concerns. Recent works have resorted to the frequency domain to develop face forgery detec... 详细信息
来源: 评论
SIEDOB: Semantic Image Editing by Disentangling Object and Background
SIEDOB: Semantic Image Editing by Disentangling Object and B...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Wuyang Luo Su Yang Xinjian Zhang Weishan Zhang Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University School of Computer Science and Technology China University of Petroleum
Semantic image editing provides users with a flexible tool to modify a given image guided by a corresponding segmentation map. In this task, the features of the foreground objects and the backgrounds are quite differe...
来源: 评论
H-Plane Radiation Pattern Decoupled Patch Antennas with Zero Edge-to-Edge Spacing Using Three-Pair Vias
H-Plane Radiation Pattern Decoupled Patch Antennas with Zero...
收藏 引用
2022 IEEE Region 10 International Conference, TENCON 2022
作者: Tong, Changwu Yang, Nan Leung, Kwok Wa Wu, Zehai Lu, Kai School of Electronics and Information Technology School of Microelectronics Sun Yat-Sen University Guangzhou China Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems China State Key Laboratory of Terahertz and Millimeter Waves Department of Electronic Engineering City University of Hong Kong Hong Kong Guangdong Broadradio Communication Technology Co. Ltd China
An H-plane radiation pattern decoupled patch antennas with zero edge-to-edge spacing is presented in this paper. When the two patches are placed together, a higher-order TM11 mode can be excited, and the mutual coupli... 详细信息
来源: 评论
MFGB: Molecular Properties Prediction leveraging Self-supervised Morgan Fingerprint Representation Learning
MFGB: Molecular Properties Prediction leveraging Self-superv...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Shuyan Fang Yu Liu Song Liu School of Computer Science and Technology Wuhan University of Science and Technology Wuhan China Hubei Provincial Key Laboratory of Intelligent Information Processing and Real-Time Industrial System Wuhan University of Science and Technology Wuhan China Hubei Provincial Key Laboratory of Occupational Hazard Identification and Control Hubei Province Wuhan University of Science and Technology Wuhan China
Simple molecular graphs or molecular line notations are insufficient for molecular representation learning models that automatically learn molecule representations to acquire deep semantic features about chemistry. Th...
来源: 评论
Learning to Learn Transferable Generative Attack for Person Re-Identification
收藏 引用
IEEE Transactions on Image processing 2025年 PP卷 PP页
作者: Bian, Yuan Liu, Min Wang, Xueping Ma, Yunfeng Wang, Yaonan Hunan University National Engineering Research Center of Robot Visual Perception and Control Technology College of Electrical and Information Engineering Hunan Changsha China Hunan Normal University Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing College of Information Science and Engineering Hunan Changsha China
Deep learning-based person re-identification (reid) models are widely employed in surveillance systems and inevitably inherit the vulnerability of deep networks to adversarial attacks. Existing attacks merely consider... 详细信息
来源: 评论
Improving Global Precipitation in Numerical Weather Prediction Systems based on Deep Learning Techniques
Improving Global Precipitation in Numerical Weather Predicti...
收藏 引用
IEEE International Conference on High Performance Computing and Communications (HPCC)
作者: Haixiang Zhao Guojing Zhang Ming Du Xiaoying Wang Department of Computer Technology and Applications Qinghai University Xining China Geospatial Information Technology and Application Qinghai Provincial Key Laboratory Xining China
Accurate weather forecasts are crucial for many aspects of people's lives. Traditional short-term precipitation forecasting methods mainly rely on numerical weather predictions based on meteorological dynamics mod...
来源: 评论
Incomplete multi-view clustering via local and global co-regularization
收藏 引用
Science China(information Sciences) 2022年 第5期65卷 96-111页
作者: Jiye LIANG Xiaolin LIU Liang BAI Fuyuan CAO Dianhui WANG Key Laboratory of Computational Intelligence and Chinese Information Processing of Ministry of Education School of Computer and Information Technology Shanxi University Artificial Intelligence Research Institute China University of Mining and Technology Department of Computer Science and Computer Engineering La Trobe University
The incompleteness of multi-view data is a phenomenon associated with real-world data mining applications, which brings a huge challenge for multi-view clustering. Although various types of clustering methods, which t... 详细信息
来源: 评论
Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation Forest  26
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
26th International Conference on computer Supported Cooperative Work in Design, CSCWD 2023
作者: Liu, Hanlin Zhou, Jiantao Li, Hua Inner Mongolia University College of Computer Science Hohhot China Natl. Loc. Jt. Eng. Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i... 详细信息
来源: 评论
Efficient survivable mapping algorithm for logical topology in IP-over-WDM optical networks against node failure
收藏 引用
Journal of Supercomputing 2023年 第5期79卷 5037-5063页
作者: Cheng, Dun-Wei Chang, Jo-Yi Lin, Chen-Yen Lin, Limei Huang, Yanze Thulasiraman, Krishnaiyan Hsieh, Sun-Yuan Department of Computer Science and Information Engineering National Yunlin University of Science and Technology 123 University Road Yunlin64002 Taiwan Department of Computer Science and Information Engineering National Cheng Kung University No. 1 University Road Tainan701 Taiwan College of Mathematics and Informatics and the Key Laboratory of Network Security and Cryptology Fujian Normal University Fujian Fuzhou350117 China Fujian Provincial Key Laboratory of Big Data Mining and Applications School of Mathematics and Physics Fujian University of Technology Fujian Fuzhou350118 China Department of Computer Science University of Oklahoma 660 Parrington Oval NormanOK73019 United States Department of Computer Science and Information Engineering National Chi Nan University No. 1 Daxue Rd Nantou County Puli Township54561 Taiwan
The survivable mapping problem in an IP-over-WDM network with a logical graph and physical graph is the problem of finding a mapping of a logical network in a physical layer so that any failure in physical topology do... 详细信息
来源: 评论
A Genuine-Equilibrium Monte Carlo Sampling-Based Effective Algorithm for Fully-Connected Ising Models
A Genuine-Equilibrium Monte Carlo Sampling-Based Effective A...
收藏 引用
IEEE International Conference on Integrated Circuits, Technologies and Applications (ICTA)
作者: Xiangrui Wang Dong Jiang Yang Zhang Hongyuan Kang Enyi Yao School of Microelectronics South China University of Technology Guangzhou China Guangdong Provincial Key Laboratory of Optoelectronic Information Processing Chips and Systems Guangzhou China
Ising machines have emerged as a potential technique for hardware acceleration in solving combinatorial optimization problems. However, an effective and hardware-implementation-friendly algorithm is still required to ...
来源: 评论