咨询与建议

限定检索结果

文献类型

  • 791 篇 期刊文献
  • 730 篇 会议

馆藏范围

  • 1,521 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 993 篇 工学
    • 747 篇 计算机科学与技术...
    • 616 篇 软件工程
    • 185 篇 信息与通信工程
    • 133 篇 控制科学与工程
    • 116 篇 生物工程
    • 90 篇 电气工程
    • 67 篇 机械工程
    • 66 篇 电子科学与技术(可...
    • 64 篇 光学工程
    • 63 篇 生物医学工程(可授...
    • 62 篇 化学工程与技术
    • 39 篇 动力工程及工程热...
    • 31 篇 仪器科学与技术
    • 30 篇 材料科学与工程(可...
    • 25 篇 土木工程
    • 24 篇 建筑学
    • 23 篇 网络空间安全
    • 22 篇 交通运输工程
  • 665 篇 理学
    • 435 篇 数学
    • 157 篇 物理学
    • 134 篇 生物学
    • 118 篇 统计学(可授理学、...
    • 68 篇 化学
    • 51 篇 系统科学
  • 272 篇 管理学
    • 142 篇 管理科学与工程(可...
    • 140 篇 图书情报与档案管...
    • 56 篇 工商管理
  • 42 篇 医学
    • 34 篇 临床医学
    • 26 篇 基础医学(可授医学...
  • 39 篇 法学
    • 30 篇 社会学
  • 18 篇 农学
  • 15 篇 经济学
  • 12 篇 教育学
  • 7 篇 艺术学
  • 4 篇 哲学
  • 2 篇 文学
  • 2 篇 军事学

主题

  • 66 篇 feature extracti...
  • 53 篇 semantics
  • 38 篇 training
  • 27 篇 deep learning
  • 26 篇 optimization
  • 25 篇 image segmentati...
  • 24 篇 face recognition
  • 24 篇 contrastive lear...
  • 22 篇 visualization
  • 20 篇 data mining
  • 20 篇 predictive model...
  • 20 篇 machine learning
  • 19 篇 computer science
  • 19 篇 accuracy
  • 18 篇 object detection
  • 18 篇 computer vision
  • 17 篇 robustness
  • 16 篇 reinforcement le...
  • 15 篇 support vector m...
  • 15 篇 convolution

机构

  • 171 篇 key laboratory o...
  • 90 篇 university of ch...
  • 65 篇 college of compu...
  • 57 篇 college of mathe...
  • 44 篇 school of comput...
  • 42 篇 peng cheng labor...
  • 35 篇 fujian provincia...
  • 33 篇 fujian key labor...
  • 33 篇 national enginee...
  • 32 篇 school of cyber ...
  • 32 篇 school of comput...
  • 29 篇 hunan provincial...
  • 28 篇 key laboratory o...
  • 24 篇 school of comput...
  • 23 篇 key laboratory o...
  • 22 篇 fujian key labor...
  • 21 篇 the key laborato...
  • 21 篇 guangdong provin...
  • 20 篇 engineering rese...
  • 20 篇 key laboratory o...

作者

  • 64 篇 huang qingming
  • 47 篇 xu qianqian
  • 34 篇 yang zhiyong
  • 29 篇 guo wenzhong
  • 28 篇 jiang kai
  • 28 篇 cao xiaochun
  • 26 篇 shi zhongzhi
  • 25 篇 shen linlin
  • 25 篇 xilin chen
  • 24 篇 ding shifei
  • 21 篇 shiguang shan
  • 20 篇 zou juan
  • 20 篇 qingming huang
  • 19 篇 zhang xingyi
  • 19 篇 zhang juan
  • 18 篇 guo kun
  • 17 篇 shan shiguang
  • 17 篇 zu-guo yu
  • 17 篇 zhongzhi shi
  • 16 篇 chen xilin

语言

  • 1,364 篇 英文
  • 133 篇 其他
  • 33 篇 中文
检索条件"机构=Science Computing Intelligent Information Processing"
1521 条 记 录,以下是631-640 订阅
排序:
Using Rough Sets to Improve the High-dimensional Data Anomaly Detection Method Based on Extended Isolation Forest
Using Rough Sets to Improve the High-dimensional Data Anomal...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Hanlin Liu Jiantao Zhou Hua Li College of Computer Science Inner Mongolia University Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Key Laboratory of Social Computing and Data Processing National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Engineering Research Center of Ecological Big Data Hohhot China
Anomaly detection refers to the identification of data objects that deviate from the general data distribution. One of the important challenges in anomaly detection is handling high-dimensional data, especially when i...
来源: 评论
Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network
Dual attention mechanism object tracking algorithm based on ...
收藏 引用
2021 International Conference on Networking and Network Applications, NaNA 2021
作者: Ma, Sugang Zhang, Zixian Zhang, Lei Chen, Yanping Yang, Xiaobao Pu, Lei Hou, Zhiqiang Xi'an University of Posts and Telecommunications School of Computer Science and Technology Shaanxi Xi'an710121 China Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi'an Key Laboratory of Big Data and Intelligent Computing Xi'an University of Posts and Telecommunications Shaanxi Xi'an710121 China School of Information and Navigation Air Force Engineering University Shaanxi Xi'an710077 China School of Information Engineering Chang'an University Shaanxi Xi'an710064 China
In an effort to the problem of insufficient tracking performance of the Fully-convolutional Siamese network (SiamFC) in complex scenarios, a dual attention mechanism object tracking algorithm based on the Fully-convol... 详细信息
来源: 评论
Variable Rate Syndrome-Trellis Codes for Steganography on Bursty Channels  19th
Variable Rate Syndrome-Trellis Codes for Steganography on Bu...
收藏 引用
19th International Workshop on Digital Forensics and Watermarking, IWDW 2020
作者: Feng, Bingwen Liu, Zhiquan Wei, Kaimin Lu, Wei Lin, Yuchun College of Information Science and Technology Jinan University Guangzhou510632 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China Guangdong Key Laboratory of Intelligent Information Processing and Shenzhen Key Laboratory of Media Security Shenzhen518060 China School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Guangzhou Institute of Science and Technology Guangzhou510006 China
This paper presents a type of variable rate syndrome-trellis codes (VR-STC) for bursty channels. It can embed message bits with two different embedding rates. In the embedding, a cover vector is sliced into segments, ... 详细信息
来源: 评论
Large Generative Model-assisted Talking-face Semantic Communication System
arXiv
收藏 引用
arXiv 2024年
作者: Jiang, Feibo Tu, Siwei Dong, Li Pan, Cunhua Wang, Jiangzhou You, Xiaohu Hunan Provincial Key Laboratory of Intelligent Computing and Language Information Processing Hunan Normal University Changsha China School of Information Science and Engineering Hunan Normal University Changsha China Changsha Social Laboratoryof Artificial Intelligence Hunan University of Technology and Business Changsha China The National Mobile Communications Research Laboratory Southeast University Nanjing210096 China The National Mobile Communications Research Laboratory Southeast University Nanjing China The Purple Mountain Laboratories Nanjing China
The rapid development of generative Artificial Intelligence (AI) continually unveils the potential of Semantic Communication (SemCom). However, current talking-face SemCom systems still encounter challenges such as lo... 详细信息
来源: 评论
CARZero: Cross-Attention Alignment for Radiology Zero-Shot Classification
CARZero: Cross-Attention Alignment for Radiology Zero-Shot C...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Haoran Lai Qingsong Yao Zihang Jiang Rongsheng Wang Zhiyang He Xiaodong Tao S. Kevin Zhou School of Biomedical Engineering Division of Life Sciences and Medicine University of Science and Technology of China Hefei Anhui P.R.China Suzhou Institute for Advanced Research University of Science and Technology of China Suzhou Jiangsu P.R.China Key Lab of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Institute of Computing Technology CAS Beijing China Medical Business Department iFlytek Co.Ltd Hefei China
The advancement of Zero-Shot Learning in the medi-cal domain has been driven forward by using pretrained models on large-scale image-text pairs, focusing on image-text alignment. However, existing methods primarily re... 详细信息
来源: 评论
Cross-Modality Perturbation Synergy Attack for Person Re-identification
arXiv
收藏 引用
arXiv 2024年
作者: Gong, Yunpeng Zhong, Zhun Qu, Yansong Luo, Zhiming Ji, Rongrong Jiang, Min School of Informatics Xiamen University China School of Computer Science and Information Engineering Hefei University of Technology China Department of Artificial Intelligence Key Laboratory of Multimedia Trusted Perception and Efficient Computing Ministry of Education of China School of Informatics Key Laboratory of Digital Protection and Intelligent Processing of Intangible CulturalHeritage of Fujian and Taiwan Ministry of Culture and Tourism Xiamen University Fujian Xiamen361005 China
In recent years, there has been significant research focusing on addressing security concerns in single-modal person re-identification (ReID) systems that are based on RGB images. However, the safety of cross-modality... 详细信息
来源: 评论
Fine-grained pseudo-code generation method via code feature extraction and transformer
arXiv
收藏 引用
arXiv 2021年
作者: Yang, Guang Zhou, Yanlin Chen, Xiang Yu, Chi School of Information Science and Technology Nantong University China Ministry of Industry and Information Technology China The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University China
Pseudo-code written by natural language is helpful for novice developers’ program comprehension. However, writing such pseudo-code is time-consuming and laborious. Motivated by the research advancements of sequence-t... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arXiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
M2TR: Multi-modal Multi-scale Transformers for Deepfake Detection
arXiv
收藏 引用
arXiv 2021年
作者: Wang, Junke Wu, Zuxuan Ouyang, Wenhao Han, Xintong Chen, Jingjing Lim, Ser-Nam Jiang, Yu-Gang Shanghai Key Lab of Intelligent Information Processing School of Computer Science Fudan University China Shanghai Collaborative Innovation Center on Intelligent Visual Computing China Huya Inc Meta AI
The widespread dissemination of Deepfakes demands effective approaches that can detect perceptually convincing forged images. In this paper, we aim to capture the subtle manipulation artifacts at different scales usin... 详细信息
来源: 评论
ULA Fitting for MIMO Radar
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Shi, Wanlu Liu, Xiaoguang Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China School of Microelectronics Southern University of Science and Technology Shenzhen China Key Laboratory of Intelligent Computing Signal Processing Ministry of Education Anhui University Anhui Hefei China
Uniform linear array (ULA) fitting (UF) principle is a newly proposed sparse array (SA) design scheme that aims to design SAs using cascaded ULAs, based on which a number of SAs with desired capacity are devised. In t... 详细信息
来源: 评论