咨询与建议

限定检索结果

文献类型

  • 136 篇 会议
  • 26 篇 期刊文献

馆藏范围

  • 162 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 108 篇 工学
    • 69 篇 计算机科学与技术...
    • 61 篇 软件工程
    • 32 篇 信息与通信工程
    • 27 篇 光学工程
    • 16 篇 电子科学与技术(可...
    • 12 篇 控制科学与工程
    • 12 篇 生物工程
    • 11 篇 航空宇航科学与技...
    • 10 篇 电气工程
    • 9 篇 仪器科学与技术
    • 7 篇 机械工程
    • 7 篇 生物医学工程(可授...
    • 5 篇 交通运输工程
    • 4 篇 动力工程及工程热...
    • 4 篇 船舶与海洋工程
    • 4 篇 安全科学与工程
    • 3 篇 建筑学
    • 3 篇 化学工程与技术
  • 74 篇 理学
    • 48 篇 数学
    • 23 篇 物理学
    • 11 篇 生物学
    • 11 篇 统计学(可授理学、...
    • 8 篇 地球物理学
    • 3 篇 化学
  • 20 篇 管理学
    • 12 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
    • 4 篇 工商管理
  • 6 篇 法学
    • 6 篇 社会学
  • 3 篇 医学
    • 3 篇 临床医学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 1 篇 军事学

主题

  • 11 篇 image segmentati...
  • 9 篇 feature extracti...
  • 9 篇 training
  • 6 篇 target tracking
  • 6 篇 privacy
  • 5 篇 computational mo...
  • 4 篇 support vector m...
  • 4 篇 motion planning
  • 4 篇 image edge detec...
  • 4 篇 visualization
  • 4 篇 algorithm design...
  • 4 篇 accuracy
  • 3 篇 image enhancemen...
  • 3 篇 knowledge based ...
  • 3 篇 object detection
  • 3 篇 ultrasonic imagi...
  • 3 篇 pattern matching
  • 3 篇 convolution
  • 3 篇 pattern recognit...
  • 3 篇 semantics

机构

  • 9 篇 school of cyber ...
  • 9 篇 beijing key lab....
  • 9 篇 state key labora...
  • 9 篇 guangxi collabor...
  • 7 篇 state key lab. o...
  • 6 篇 shanghai key lab...
  • 5 篇 state key lab. f...
  • 5 篇 national key lab...
  • 4 篇 key lab. of inte...
  • 4 篇 state key labora...
  • 4 篇 national key lab...
  • 4 篇 institute for pa...
  • 3 篇 school of comput...
  • 3 篇 state key labora...
  • 3 篇 key state lab. o...
  • 3 篇 school of comput...
  • 3 篇 college of life ...
  • 3 篇 state key lab. f...
  • 3 篇 state key lab. f...
  • 3 篇 key lab. of inte...

作者

  • 12 篇 ding mingyue
  • 12 篇 jinwen tian
  • 11 篇 cai chao
  • 10 篇 cao zhiguo
  • 8 篇 tian jinwen
  • 8 篇 chunhe xia
  • 8 篇 tianbo wang
  • 7 篇 wang yuehuan
  • 5 篇 chen chen
  • 5 篇 zhang tianxu
  • 5 篇 yuehuan wang
  • 5 篇 zhou chengping
  • 4 篇 jie ma
  • 4 篇 tan yihua
  • 4 篇 xin yang
  • 4 篇 jiaoying jin
  • 4 篇 tian jin-wen
  • 4 篇 ma jie
  • 4 篇 mingyue ding
  • 3 篇 weidong zhou

语言

  • 157 篇 英文
  • 3 篇 其他
  • 2 篇 中文
检索条件"机构=State Key Lab. for Multi-spectral Information Processing Technology"
162 条 记 录,以下是141-150 订阅
排序:
IoU-uniform R-CNN: breaking through the limitations of rpn
arXiv
收藏 引用
arXiv 2019年
作者: Zhu, Li Xie, Zihao Liu, Liman Tao, Bo Tao, Wenbing National Key Laboratory of Science and Technology on Multi-spectral Information Processing School of Artifcial Intelligence and Automation Huazhong University of Science and Technology Shenzhen Huazhong University of Science and Technology Research Institute Shenzhen518057 China State Key Laboratory of Digital Manufacturing Equipment and Technology School of Mechanical Science and Engineering Huazhong University of Science and Technology WuhanHubei430074 China School of Biomedical Engineering South-Central University for Nationalities Wuhan430074 China
Region Proposal Network (RPN) is the cornerstone of two-stage object detectors, it generates a sparse set of object proposals and alleviates the extrem foreground-background class imbalance problem during training. Ho... 详细信息
来源: 评论
Towards real-time eyeblink detection in the wild: Dataset, theory and practices
arXiv
收藏 引用
arXiv 2019年
作者: Hu, Guilei Xiao, Yang Cao, Zhiguo Meng, Lubin Fang, Zhiwen Zhou, Joey Tianyi Yuan, Junsong National Key Laboratory of Science and Technology on Multi-Spectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology China Guangdong Provincial Key Laboratory of Medical Image Processing School of Biomedical Engineering Southern Medical University China School of Energy and Mechanicalelectronic Engineering Hunan University of Humanities Science and Technology China Institute of High Performance Computing A∗STAR Singapore Computer Science and Engineering Department of University at Buffalo State University of New York United States
Effective and real-time eyeblink detection is of widerange applications, such as deception detection, drive fatigue detection, face anti-spoofing. Despite previous efforts, most of existing focus on addressing the eye... 详细信息
来源: 评论
The minority matters: a diversity-promoting collab.rative metric learning algorithm  22
The minority matters: a diversity-promoting collaborative me...
收藏 引用
Proceedings of the 36th International Conference on Neural information processing Systems
作者: Shilong Bao Qianqian Xu Zhiyong Yang Yuan He Xiaochun Cao Qingming Huang State Key Laboratory of Information Security Institute of Information Engineering CAS and School of Cyber Security University of Chinese Academy of Sciences Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS School of Computer Science and Tech. University of Chinese Academy of Sciences Alibaba Group School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS and School of Computer Science and Tech. University of Chinese Academy of Sciences and Key Laboratory of Big Data Mining and Knowledge Management CAS and Peng Cheng Laboratory
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin...
来源: 评论
HF-Mid: A Hybrid Framework of Network Intrusion Detection for multi-type and Imbalanced Data
HF-Mid: A Hybrid Framework of Network Intrusion Detection fo...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Weidong Zhou Tianbo Wang Guotao Huang Xiaopeng Liang Chunhe Xia Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China College of Computer Science and Information Technology Guangxi Normal University Guilin China
The data-driven deep learning methods have brought significant progress and potential to intrusion detection. However, there are two thorny problems caused by the characteristics of intrusion data: "multi-type fe... 详细信息
来源: 评论
HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm
arXiv
收藏 引用
arXiv 2023年
作者: Li, Yang Xia, Chunhe Li, Chunyan Zhao, Yuan Chen, Chen Wang, Tianbo School of Computer Science and Engineering Beihang University Beijing China Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China
The consensus algorithm is crucial in blockchain for ensuring the validity and security of transactions across the decentralized network. However, achieving consensus among nodes and packaging blocks in blockchain net... 详细信息
来源: 评论
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive information Leakage in Federated Learning-based Android Malware Classifier
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensiti...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
作者: Changnan Jiang Chunhe Xia Chen Chen Huacheng Li Tianbo Wang Xiaojian Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China College of Computer Science and Information Technology Guangxi Normal University Guilin China
In the traditional centralized Android malware classification framework, privacy concerns arise as it requires collecting users’ app samples containing sensitive information directly. To address this problem, new cla... 详细信息
来源: 评论
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protection Method for Federated Android Malware Classifier
FedDADP: A Privacy-Risk-Adaptive Differential Privacy Protec...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Changnan Jiang Chunhe Xia Mengyao Liu Rui Fang Pengfei Li Huacheng Li Tianbo Wang Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing China
The federated Android malware classifier has attracted much attention owing to its advantages of privacy protection and multi-party joint modeling. However, the research indicates that the gradient transmitted within ... 详细信息
来源: 评论
Corrigendum to “Low-light image enhancement with knowledge distillation” [Neurocomputing 518 (2023) 332–343]
收藏 引用
Neurocomputing 2023年 523卷 144-144页
作者: Ziwen Li Yuehuan Wang Jinpu Zhang National Key Lab of Science and Technology on Multi-spectral Information Processing School of Artificial Intelligence and Automation Huazhong University of Science and Technology Wuhan 430074 China
来源: 评论
FedDRC: A Robust Federated Learning-based Android Malware Classifier under Heterogeneous Distribution
FedDRC: A Robust Federated Learning-based Android Malware Cl...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Changnan Jiang Chunhe Xia Mengyao Liu Chen Chen Huacheng Li Tianbo Wang Pengfei Li Beijing Key Lab. of Network Technology Beihang University Beijing China Guangxi Collaborative Innovation Center of Multi-Source Information Integration and Intelligent Processing Guangxi Normal University Guilin China School of Cyber Science and Technology Beihang University Beijing China Shanghai Key Laboratory of Computer Software Evaluating and Testing Shanghai China SNationa Innovation Center of Intelligent and Connected Vehicles Beijing China
In the traditional centralized Android malware classification framework, privacy concerns exist due to collected users’ apps containing sensitive information. A new classification framework based on Federated Learnin... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论