咨询与建议

限定检索结果

文献类型

  • 2,259 篇 会议
  • 1,450 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,714 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,327 篇 工学
    • 1,485 篇 计算机科学与技术...
    • 1,221 篇 软件工程
    • 588 篇 信息与通信工程
    • 378 篇 电子科学与技术(可...
    • 310 篇 电气工程
    • 280 篇 控制科学与工程
    • 189 篇 生物工程
    • 178 篇 机械工程
    • 173 篇 光学工程
    • 126 篇 生物医学工程(可授...
    • 121 篇 化学工程与技术
    • 113 篇 仪器科学与技术
    • 83 篇 动力工程及工程热...
    • 69 篇 材料科学与工程(可...
    • 55 篇 网络空间安全
    • 51 篇 建筑学
    • 45 篇 土木工程
  • 1,411 篇 理学
    • 905 篇 数学
    • 411 篇 物理学
    • 226 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 131 篇 化学
    • 123 篇 系统科学
  • 562 篇 管理学
    • 297 篇 管理科学与工程(可...
    • 282 篇 图书情报与档案管...
    • 99 篇 工商管理
  • 93 篇 医学
    • 77 篇 临床医学
    • 64 篇 基础医学(可授医学...
    • 43 篇 药学(可授医学、理...
  • 59 篇 法学
    • 46 篇 社会学
  • 48 篇 农学
  • 33 篇 经济学
  • 23 篇 教育学
  • 11 篇 军事学
  • 9 篇 哲学
  • 8 篇 文学
  • 8 篇 艺术学

主题

  • 142 篇 feature extracti...
  • 104 篇 semantics
  • 88 篇 training
  • 78 篇 laboratories
  • 68 篇 information proc...
  • 66 篇 computational mo...
  • 64 篇 image segmentati...
  • 56 篇 optimization
  • 54 篇 data mining
  • 53 篇 computers
  • 50 篇 face recognition
  • 49 篇 signal processin...
  • 49 篇 accuracy
  • 48 篇 visualization
  • 48 篇 robustness
  • 47 篇 signal processin...
  • 43 篇 deep learning
  • 42 篇 support vector m...
  • 42 篇 machine learning
  • 42 篇 humans

机构

  • 432 篇 key laboratory o...
  • 222 篇 university of ch...
  • 207 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 67 篇 school of comput...
  • 65 篇 peng cheng labor...
  • 63 篇 key laboratory o...
  • 63 篇 college of compu...
  • 54 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 college of mathe...
  • 48 篇 key laboratory o...
  • 47 篇 the key laborato...
  • 46 篇 key laboratory o...
  • 46 篇 hunan provincial...
  • 44 篇 school of comput...
  • 44 篇 graduate univers...
  • 42 篇 college of infor...
  • 40 篇 fujian provincia...

作者

  • 90 篇 zhongzhi shi
  • 84 篇 huang zhixiang
  • 81 篇 shi zhongzhi
  • 74 篇 li yingsong
  • 73 篇 shiguang shan
  • 72 篇 xilin chen
  • 70 篇 zhixiang huang
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 58 篇 yingsong li
  • 56 篇 xianliang wu
  • 54 篇 shi minjia
  • 43 篇 wu xianliang
  • 43 篇 xu qianqian
  • 39 篇 wu xian-liang
  • 39 篇 feng yang
  • 36 篇 luo bin
  • 34 篇 bin luo
  • 33 篇 he qing
  • 32 篇 wen gao

语言

  • 3,286 篇 英文
  • 343 篇 其他
  • 102 篇 中文
检索条件"机构=The Key Laboratory of Intelligent Computing and Signal Processing"
3714 条 记 录,以下是1101-1110 订阅
排序:
Decoupling Learning and Remembering: a Bilevel Memory Framework with Knowledge Projection for Task-Incremental Learning
Decoupling Learning and Remembering: a Bilevel Memory Framew...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Wenju Sun Qingyong Li Jing Zhang Wen Wang Yangli-Ao Geng Beijing Key Lab of Traffic Data Analysis and Mining Beijing Jiaotong University Frontiers Science Center for Smart High-speed Railway System Beijing Jiaotong University The Key Laboratory of Cognitive Computing and Intelligent Information Processing of Fujian Education Institutions Wuyi University
The dilemma between plasticity and stability arises as a common challenge for incremental learning. In contrast, the human memory system is able to remedy this dilemma owing to its multilevel memory structure, which m...
来源: 评论
An Uncovered Neurons Information-Based Fuzzing Method for DNN
An Uncovered Neurons Information-Based Fuzzing Method for DN...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Kecheng Tang Jian-Tao Zhou Xu Guo College of Computer Science Inner Mongolia University Hohhot China National & Local Joint Engineering Research Center of Intelligent Information Processing Technology for Mongolian Hohhot China Engineering Research Center of Ecological Big Data Ministry of Education Hohhot China Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Hohhot China Inner Mongolia Key Laboratory of Social Computing and Data Processing Hohhot China Inner Mongolia Key Laboratory of Discipline Inspection and Supervision Big Data Hohhot China Inner Mongolia Engineering Laboratory for Big Data Analysis Technology Hohhot China
Fuzzing is increasingly being utilized as a method to test the reliability of Deep Learning (DL) systems. In order to detect more errors in DL systems, exploring the internal logic of more DNNs has become the main obj... 详细信息
来源: 评论
ULA Fitting for MIMO Radar
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Shi, Wanlu Liu, Xiaoguang Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China School of Microelectronics Southern University of Science and Technology Shenzhen China Key Laboratory of Intelligent Computing Signal Processing Ministry of Education Anhui University Anhui Hefei China
Uniform linear array (ULA) fitting (UF) principle is a newly proposed sparse array (SA) design scheme that aims to design SAs using cascaded ULAs, based on which a number of SAs with desired capacity are devised. In t... 详细信息
来源: 评论
A Noise Extraction Method for Cryo-EM Single-Particle Denoising
收藏 引用
Journal on Big Data 2022年 第1期4卷 61-76页
作者: Huanrong Tang Sihan Wang Jianquan Ouyang Tianming Liu Key Laboratory of Intelligent Computing Information Processing Ministry of EducationSchool of Computer Science and School of Cyberspace ScienceXiangtan UniversityXiangtan411100China Department of Computer Science The University of GeorgiaGeorgia30301USA
Cryo-Electron Microscopy(cryo-EM)has become a powerful method to study the structure and function of biological ***,in clustering tasks based on the projection angle of particles in cryoEM,the noise considerably affe... 详细信息
来源: 评论
Look Inside for More: Internal Spatial Modality Perception for 3D Anomaly Detection  39
Look Inside for More: Internal Spatial Modality Perception f...
收藏 引用
39th Annual AAAI Conference on Artificial Intelligence, AAAI 2025
作者: Liang, Hanzhe Xie, Guoyang Hou, Chengbin Wang, Bingshu Gao, Can Wang, Jinbao College of Computer Science and Software Engineering Shenzhen University Shenzhen China Shenzhen Audencia Financial Technology Institute Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Intelligent Manufacturing CATL Ningde China School of Computing and Artificial Intelligence Fuyao University of Science and Technology Fuzhou China School of Software Northwestern Polytechnical University Xi’an China Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen China
3D anomaly detection has recently become a significant focus in computer vision. Several advanced methods have achieved satisfying anomaly detection performance. However, they typically concentrate on the external str... 详细信息
来源: 评论
Improving Neural Radiance Fields with Depth-aware Optimization for Novel View Synthesis
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Shu Li, Junyao Zhang, Yang Zou, Beiji The School of Computer Science School of Cyberspace Security Xiangtan University Xiangtan China Key Laboratory of Intelligent Computing & Information Processing Ministry of Education Xiangtan China School of Computer Science and engineering Central South University Changsha China
With dense inputs, Neural Radiance Fields (NeRF) is able to render photo-realistic novel views under static conditions. Although the synthesis quality is excellent, existing NeRF-based methods fail to obtain moderate ... 详细信息
来源: 评论
Staggered Grid Scheme for the FFT-Based Methods
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 1066-1072页
作者: XIE Jiaye KONG Weibin PANG Lili SONG Weiju HUANG Zhixiang WU Xianliang Industrial Center Nanjing Institute of Technology State Key Laboratory of Millimeter Waves College of Information Engineering Yancheng Institute of Technology Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University
A staggered grid scheme is proposed to reduce both the total memory requirement and the CPU time of generating the corrected near matrix in the FFTbased methods. Two sets of Cartesian grids are used to project the sou... 详细信息
来源: 评论
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature Transferable Attack
SFTA: Spiking Neural Networks Vulnerable to Spiking Feature ...
收藏 引用
IEEE International Symposium on Parallel and Distributed processing with Applications and IEEE International Conference on Ubiquitous computing and Communications (ISPA/IUCC)
作者: Xuanwei Lin Chen Dong Ximeng Liu College of Computer and Data Science Fuzhou University Fujian Key Laboratory of Network Computing and Intelligent Information Processing (Fuzhou University) Key Lab of Information Security of Network Systems (Fuzhou University)
Many recent works have shown that spiking neural networks (SNNs) are vulnerable to well-crafted adversarial attacks in the white-box setting, which may lead to misclassification of the trained model. However, the info... 详细信息
来源: 评论
Vision-Based Fruit Recognition Via Multi-Scale Attention Cnn
SSRN
收藏 引用
SSRN 2022年
作者: Min, Weiqing Wang, Zhiling Yang, Jiahao Liu, Chunlin Jiang, Shuqiang The Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China University of Chinese Academy of Sciences Beijing100049 China
Fruit quality assessment, grading and sorting are of vital importance to fruit processing, and all these involve fruit recognition. Vision-based fruit recognition can recognize fruit automatically and further support ... 详细信息
来源: 评论
Question generation based on chat-response conversion
Question generation based on chat-response conversion
收藏 引用
作者: Zhong, Sheng-Hua Peng, Jianfeng Liu, Peiqi College of Computer Science and Software Engineering Shenzhen University Shenzhen China The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen China
Today, thanks to the major breakthrough of sequences to sequences model in the field of natural language, most of the dialogue generation tasks are focused on generating more effective responses. However, the response... 详细信息
来源: 评论