咨询与建议

限定检索结果

文献类型

  • 136 篇 会议
  • 24 篇 期刊文献

馆藏范围

  • 160 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 106 篇 工学
    • 69 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 31 篇 信息与通信工程
    • 27 篇 光学工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 11 篇 航空宇航科学与技...
    • 9 篇 仪器科学与技术
    • 8 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 动力工程及工程热...
    • 4 篇 船舶与海洋工程
    • 4 篇 安全科学与工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
  • 73 篇 理学
    • 47 篇 数学
    • 23 篇 物理学
    • 11 篇 生物学
    • 11 篇 统计学(可授理学、...
    • 8 篇 地球物理学
    • 3 篇 化学
  • 20 篇 管理学
    • 12 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学

主题

  • 11 篇 image segmentati...
  • 9 篇 feature extracti...
  • 8 篇 training
  • 6 篇 target tracking
  • 6 篇 privacy
  • 4 篇 support vector m...
  • 4 篇 motion planning
  • 4 篇 image edge detec...
  • 4 篇 computational mo...
  • 4 篇 algorithm design...
  • 4 篇 accuracy
  • 3 篇 image enhancemen...
  • 3 篇 knowledge based ...
  • 3 篇 object detection
  • 3 篇 ultrasonic imagi...
  • 3 篇 pattern matching
  • 3 篇 pattern recognit...
  • 3 篇 visualization
  • 3 篇 semantics
  • 3 篇 remote sensing

机构

  • 9 篇 school of cyber ...
  • 9 篇 beijing key lab....
  • 9 篇 state key labora...
  • 9 篇 guangxi collabor...
  • 7 篇 state key lab. o...
  • 6 篇 shanghai key lab...
  • 5 篇 state key lab. f...
  • 5 篇 national key lab...
  • 4 篇 key lab. of inte...
  • 4 篇 state key labora...
  • 4 篇 national key lab...
  • 4 篇 institute for pa...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 3 篇 key state lab. o...
  • 3 篇 school of comput...
  • 3 篇 college of life ...
  • 3 篇 state key lab. f...
  • 3 篇 state key lab. f...
  • 3 篇 key lab. of inte...

作者

  • 12 篇 ding mingyue
  • 12 篇 jinwen tian
  • 11 篇 cai chao
  • 10 篇 cao zhiguo
  • 8 篇 tian jinwen
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 7 篇 wang yuehuan
  • 5 篇 chen chen
  • 5 篇 zhang tianxu
  • 5 篇 yuehuan wang
  • 5 篇 zhou chengping
  • 4 篇 jie ma
  • 4 篇 tan yihua
  • 4 篇 xin yang
  • 4 篇 jiaoying jin
  • 4 篇 tian jin-wen
  • 4 篇 ma jie
  • 4 篇 mingyue ding
  • 3 篇 weidong zhou

语言

  • 155 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=State Key Lab. for Multi-Spectral Information Processing Technology"
160 条 记 录,以下是1-10 订阅
Masking Cascaded Self-attentions for Few-Shot Font-Generation Transformer  17th
Masking Cascaded Self-attentions for Few-Shot Font-Generati...
收藏 引用
17th Asian Conference on Computer Vision, ACCV 2024
作者: Ma, Jing Xiang, Xiang He, Yan National Key Lab of Multi-Spectral Information Intelligent Processing Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
Few-shot Font Generation (FFG) is a practical technology widely used in designing artistic characters, handwriting imitation, and identification, etc., which aims to generate realistic font images with a few reference... 详细信息
来源: 评论
Learning Visual-Semantic Hierarchical Attribute Space for Interpretable Open-Set Recognition
Learning Visual-Semantic Hierarchical Attribute Space for In...
收藏 引用
2025 IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2025
作者: Xu, Zhuo Xiang, Xiang School of Artificial Intelligence and Automation Huazhong University of Science and Technology National Key Lab of Multi-Spectral Information Intelligent Processing Technology Wuhan China Peng Cheng Lab China
In the field of open-set recognition, conventional models often focus on addressing challenges within a single hierarchical category, and these methods frequently lack inter-pretability. In this paper, we propose a no... 详细信息
来源: 评论
Infrared small target detection based on coarse-To-fine feature extraction network  12
Infrared small target detection based on coarse-To-fine feat...
收藏 引用
SPIE 12th International Symposium on multispectral Image processing and Pattern Recognition, MIPPR 2023
作者: Han, Peng Zuo, Zhengrong National Key Lab of Science and Technology on Multi-spectral Information Processing Huazhong University of Science and Technology Wuhan China School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
Infrared small target detection (IRSTD) is a technique that has been developed to detect small and faint targets in cluttered backgrounds. It shows extensive use in medical diagnosis and aircraft navigation. However, ... 详细信息
来源: 评论
Learning Visual-Semantic Hierarchical Attribute Space for Interpretable Open-Set Recognition
Learning Visual-Semantic Hierarchical Attribute Space for In...
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Zhuo Xu Xiang Xiang National Key Lab of Multi-Spectral Information Intelligent Processing Technology School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China
In the field of open-set recognition, conventional models often focus on addressing challenges within a single hierarchical category, and these methods frequently lack inter-pretability. In this paper, we propose a no... 详细信息
来源: 评论
Linear and Nonlinear Detections for Noncoherent Spatial-multiplexing Based MIMO-MASK  22
Linear and Nonlinear Detections for Noncoherent Spatial-mult...
收藏 引用
22nd IEEE International Conference on Communication technology, ICCT 2022
作者: Li, Longhui Yang, Chao Hu, Zewei Deng, Xiaofang Zheng, Lin University of Electronic Technology Key Lab. of Cognitive Radio and Information Processing Ministry of Education Guilin541004 China State Key Lab. of Integrated Services Networks Xi'an710071 China
multiple-input-multiple-output (MIMO) based on energy detection has the advantages of being insensitive to Doppler shift and low complexity. However, the square-law processing causes the nonlinear mutual interference ... 详细信息
来源: 评论
Distributed Passive Sensor Trajectory Association and Fusion
Distributed Passive Sensor Trajectory Association and Fusion
收藏 引用
International Conference on Autonomous Unmanned Systems, ICAUS 2021
作者: Chang, Ruowang Wang, Bolan Xu, Shengli Cheng, Haoyu Wang, Yuehuan Huazhong University of Science and Technology Wuhan China National Key Lab of Science and Technology on Multi-spectral Information Processing Wuhan China Shanghai Electro-Mechanical Engineering Institute Shanghai201109 China Northwestern Polytechnical University Xi’an710072 China
The two key steps in the space-based optical passive tracking system are track association and fusion. The traditional distributed fusion methods are based on three-dimensional trajectory and are not suitable for the ... 详细信息
来源: 评论
Evolution of Cooperation in Snowdrift Game with multi-Memory Mechanism  42
Evolution of Cooperation in Snowdrift Game with Multi-Memory...
收藏 引用
42nd Chinese Control Conference, CCC 2023
作者: Liu, Yaojun Liu, Xingwen Tashi, Nyima College of Electrical Engineering Southwest Minzu University Lab. of Complex Systems & Intelligent Control Key Lab. of Electronic Information of State Ethnic Affairs Commission Sichuan Chengdu610225 China Engineering Research Center for Tibetan Information Processing School of Information Science and Technology Tibet University Lhasa850000 China
Cooperative behavior has been of great concern in evolutionary game researches because of its important role in social life and natural evolution. Since memory can greatly influence the emergence of cooperative behavi... 详细信息
来源: 评论
Skeleton-Aware Network for Aircraft Landmark Detection  11th
Skeleton-Aware Network for Aircraft Landmark Detection
收藏 引用
11th International Conference on Image and Graphics, ICIG 2021
作者: Ye, Yuntong Chang, Yi Li, Yi Yan, Luxin National Key Laboratory of Science and Technology on Multi-spectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China AI Center Pengcheng Lab Shenzhen China
The landmark detection has been widely investigated for the human pose with rapid progress in recent years. In this work, we aim at dealing with a new problem: aircraft landmark detection in the wild. We have a key ob... 详细信息
来源: 评论
Efficient Single-Image Depth Estimation on Mobile Devices, Mobile AI & AIM 2022 Challenge: Report  17th
Efficient Single-Image Depth Estimation on Mobile Devices, ...
收藏 引用
17th European Conference on Computer Vision, ECCV 2022
作者: Ignatov, Andrey Malivenko, Grigory Timofte, Radu Treszczotko, Lukasz Chang, Xin Ksiazek, Piotr Lopuszynski, Michal Pioro, Maciej Rudnicki, Rafal Smyl, Maciej Ma, Yujie Li, Zhenyu Chen, Zehui Xu, Jialei Liu, Xianming Jiang, Junjun Shi, XueChao Xu, Difan Li, Yanan Wang, Xiaotao Lei, Lei Zhang, Ziyu Wang, Yicheng Huang, Zilong Luo, Guozhong Yu, Gang Fu, Bin Li, Jiaqi Wang, Yiran Huang, Zihao Cao, Zhiguo Conde, Marcos V. Sapozhnikov, Denis Lee, Byeong Hyun Park, Dongwon Hong, Seongmin Lee, Joonhee Lee, Seunggyu Chun, Se Young Computer Vision Lab ETH Zürich Zürich Switzerland AI Witchlabs Zollikerberg Switzerland University of Wuerzburg Wuerzburg Germany TCL Research Europe Warsaw Poland Harbin Institute of Technology Harbin China Xiaomi Inc. Beijing China Tencent GY-Lab Shenzhen China National Key Laboratory of Science and Technology on Multi-Spectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan China Department of Electrical and Computer Engineering Seoul National University Seoul Korea Republic of
Various depth estimation models are now widely used on many mobile and IoT devices for image segmentation, bokeh effect rendering, object tracking and many other mobile tasks. Thus, it is very crucial to have efficien... 详细信息
来源: 评论
Few-shot Encrypted Malicious Traffic Classification via Hierarchical Semantics and Adaptive Prototype Learning
Few-shot Encrypted Malicious Traffic Classification via Hier...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Yuan Zhao Chunhe Xia Tianbo Wang Mengyao Liu Yang Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China
While encrypted traffic improves security, it is also used by attackers to hide the transmission content to evade detection. Currently, traffic side-channel features combined with Deep Learning (DL) are widely used fo... 详细信息
来源: 评论