咨询与建议

限定检索结果

文献类型

  • 2,260 篇 会议
  • 1,475 篇 期刊文献
  • 5 册 图书

馆藏范围

  • 3,740 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2,366 篇 工学
    • 1,517 篇 计算机科学与技术...
    • 1,233 篇 软件工程
    • 595 篇 信息与通信工程
    • 383 篇 电子科学与技术(可...
    • 319 篇 电气工程
    • 300 篇 控制科学与工程
    • 193 篇 生物工程
    • 182 篇 机械工程
    • 171 篇 光学工程
    • 129 篇 生物医学工程(可授...
    • 122 篇 化学工程与技术
    • 115 篇 仪器科学与技术
    • 84 篇 动力工程及工程热...
    • 67 篇 材料科学与工程(可...
    • 58 篇 网络空间安全
    • 53 篇 建筑学
    • 46 篇 土木工程
  • 1,415 篇 理学
    • 902 篇 数学
    • 411 篇 物理学
    • 225 篇 生物学
    • 216 篇 统计学(可授理学、...
    • 134 篇 化学
    • 124 篇 系统科学
  • 565 篇 管理学
    • 299 篇 管理科学与工程(可...
    • 283 篇 图书情报与档案管...
    • 100 篇 工商管理
  • 97 篇 医学
    • 81 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 42 篇 药学(可授医学、理...
  • 58 篇 法学
    • 45 篇 社会学
  • 49 篇 农学
  • 33 篇 经济学
  • 21 篇 教育学
  • 11 篇 军事学
  • 10 篇 艺术学
  • 9 篇 哲学
  • 8 篇 文学

主题

  • 142 篇 feature extracti...
  • 105 篇 semantics
  • 87 篇 training
  • 78 篇 laboratories
  • 68 篇 information proc...
  • 65 篇 image segmentati...
  • 65 篇 computational mo...
  • 55 篇 optimization
  • 55 篇 data mining
  • 53 篇 computers
  • 50 篇 face recognition
  • 49 篇 signal processin...
  • 49 篇 accuracy
  • 48 篇 visualization
  • 47 篇 robustness
  • 46 篇 signal processin...
  • 44 篇 deep learning
  • 42 篇 support vector m...
  • 42 篇 humans
  • 41 篇 machine learning

机构

  • 439 篇 key laboratory o...
  • 224 篇 university of ch...
  • 210 篇 key laboratory o...
  • 102 篇 key laboratory o...
  • 83 篇 key laboratory o...
  • 65 篇 school of comput...
  • 65 篇 peng cheng labor...
  • 64 篇 college of compu...
  • 62 篇 key laboratory o...
  • 53 篇 anhui university...
  • 53 篇 college of mathe...
  • 53 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 46 篇 key laboratory o...
  • 46 篇 hunan provincial...
  • 45 篇 the key laborato...
  • 44 篇 school of comput...
  • 43 篇 graduate univers...
  • 41 篇 college of infor...
  • 39 篇 fujian provincia...

作者

  • 91 篇 zhongzhi shi
  • 86 篇 huang zhixiang
  • 85 篇 shi zhongzhi
  • 74 篇 li yingsong
  • 73 篇 shiguang shan
  • 73 篇 xilin chen
  • 69 篇 zhixiang huang
  • 62 篇 liu qun
  • 62 篇 huang qingming
  • 57 篇 yingsong li
  • 56 篇 xianliang wu
  • 51 篇 shi minjia
  • 43 篇 xu qianqian
  • 41 篇 wu xianliang
  • 39 篇 wu xian-liang
  • 39 篇 feng yang
  • 36 篇 he qing
  • 35 篇 luo bin
  • 33 篇 bin luo
  • 32 篇 wen gao

语言

  • 3,445 篇 英文
  • 200 篇 其他
  • 106 篇 中文
检索条件"机构=The Key Laboratory of Intelligent Computing and Signal Processing"
3740 条 记 录,以下是641-650 订阅
排序:
Super-Resolution of Defocus Thread Image Based on Cycle Generative Adversarial Networks  12th
Super-Resolution of Defocus Thread Image Based on Cycle Gene...
收藏 引用
12th IFIP TC 12 International Conference on intelligent Information processing, IIP 2022
作者: Jiang, Pengfei Xu, Wangqing Li, Jinping School of Information Science and Engineering University of Jinan Jinan250022 China Shandong Provincial Key Laboratory of Network Based Intelligent Computing University of Jinan Jinan250022 China Shandong College and University Key Laboratory of Information Processing and Cognitive Computing in 13th Five-Year Jinan250022 China
The dual camera calibration measurement method can realize low-cost and high-precision bolt dimension measurement by using two microscope cameras. But the height difference between the thread crest and root exceeds th... 详细信息
来源: 评论
Hierarchical Clustering Combination Method Using Intuitionistic Fuzzy Similarity in Software Module Clustering
Hierarchical Clustering Combination Method Using Intuitionis...
收藏 引用
International Conference on Networking and Network Applications (NaNA)
作者: Hong Xia Bo Wang Yongkang Zhang Yanping Chen School of Computer Science and Technology Xi'an University of Posts and Telecommunications Shaanxi Key Laboratory of Network Data Analysis and Intelligent Processing Xi 'an Key Laboratory of Big Data and Intelligent Computing Xi'an Shaanxi China
In order to solve the problem that the similarity method used in software module clustering can produce arbitrary decision, and the description matrix of dendrogram generated by base clustering in hierarchical cluster...
来源: 评论
Spectral Galerkin Approximation of Fractional Optimal Control Problems with Fractional Laplacian
收藏 引用
Advances in Applied Mathematics and Mechanics 2023年 第6期15卷 1631-1654页
作者: Jiaqi Zhang Yin Yang Zhaojie Zhou School of Mathematics and Computational Science Xiangtan UniversityHunan Key Laboratory for Computation and Simulation in Science and EngineeringKey Laboratory of Intelligent Computing and Information Processing of Ministry of EducationXiangtan 411105HunanChina School of Mathematics and Computational Science Xiangtan UniversityNational Center for Applied Mathematics in HunanHunan International Scientific and Technological Innovation Cooperation Base of Computational ScienceXiangtan 411105HunanChina School of Mathematics and Statistics Shandong Normal UniversityJinan 250014ShandongChina
In this paper spectral Galerkin approximation of optimal control problem governed by fractional elliptic equation is *** deal with the nonlocality of fractional Laplacian operator the Caffarelli-Silvestre extension is... 详细信息
来源: 评论
Performer: A High-Performance Global-Local Model-Augmented with Dual Network Interaction Mechanism
收藏 引用
IEEE Transactions on Cognitive and Developmental Systems 2024年
作者: Tan, Dayu Hao, Rui Hua, Linfeng Xu, Qi Su, Yansen Zheng, Chunhou Zhong, Weimin Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Institutes of Physical Science and Information Technology Hefei230601 China East China University of Science and Technology Key Laboratory of Smart Manufacturing in Energy Chemical Process Ministry of Education Shanghai200237 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China
In deep learning, Convolutional Neural Networks (CNNs) focus on local information through convolutional kernels, while transformers attend to global information using self-attention mechanisms. The union of these dist... 详细信息
来源: 评论
Facial StO2: A New Promising Biometric Identity
Facial StO2: A New Promising Biometric Identity
收藏 引用
2022 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2022
作者: Peng, Dairong Sun, Sirui Liu, Xinyu Zhou, Ju Chen, Tong Institute of Legal Psychology and Intelligent Computing Southwest University Chongqing400715 China Chongqing Key Laboratory of Non-linear Circuit and Intelligent Information Processing Chongqing400715 China Southwest University School of Electronic and Information Engineering Chongqing400715 China
In this paper, we introduce a new biometric identity, facial tissue oxygen saturation (StO2). StO2 is an index of blood oxygen content in tissues and is related to blood vessel distribution pattern and metabolic rate.... 详细信息
来源: 评论
A dual-band antenna designed for 5G communication based on a self-decoupled antenna
A dual-band antenna designed for 5G communication based on a...
收藏 引用
International Applied Computational Electromagnetics Society Symposium (ACES)
作者: Rongzhen Fang Xianliang Wu Zhipeng Chen Mengying Dong Yunfeng Hu Yuanyuan Li Key Laboratory of Intelligent Computing and Signal Processing Anhui University Hefei China Department of Education of Anhui Province Anhui University Hefei China
In this paper, a dual-band antenna for 5G communication based on an antenna design with self-decoupling properties is *** antenna is composed of a self-decoupled antenna unit vertically placed on an 30×80 mm 2 g... 详细信息
来源: 评论
MSCA-UNet: Multi-Scale Channel Adaptive Sensing Module for Medical Image Segmentation
MSCA-UNet: Multi-Scale Channel Adaptive Sensing Module for M...
收藏 引用
New Trends in Computational Intelligence (NTCI), International Conference on
作者: Liangjin Diao Longfeng Shen Jiacong Chen Fangzhen Ge Mengwen Li Anhui Engineering Research Center for Intelligent Computing and Application on Cognitive Behavior (ICACB) College of Computer Science and Technology Huaibei Normal University Huaibei Anhui China Institute of Artificial Intelligence Hefei Comprehensive National Science Center Hefei China Key Laboratory of Intelligent Computing & Signal Processing Ministry of Education Anhui University Hefei Anhui China
Recent advancements in CNNs for medical image segmentation have focused on the combination of CNN and Transformer architectures to capture both local and global features. However, challenges remain, such as effectivel... 详细信息
来源: 评论
Interpretable Object Recognition by Semantic Prototype Analysis
Interpretable Object Recognition by Semantic Prototype Analy...
收藏 引用
IEEE Workshop on Applications of Computer Vision (WACV)
作者: Qiyang Wan Ruiping Wang Xilin Chen Institute of Computing Technology CAS Key Laboratory of Intelligent Information Processing of Chinese Academy of Sciences (CAS) Beijing China University of Chinese Academy of Sciences Beijing China
People can usually give reasons for recognizing a particular object as a specific category, using various means such as body language (by pointing out) and natural language (by telling). This inspires us to develop a ...
来源: 评论
EDGE: Unknown-aware Multi-label Learning by Energy Distribution Gap Expansion
arXiv
收藏 引用
arXiv 2024年
作者: Sun, Yuchen Xu, Qianqian Wang, Zitai Yang, Zhiyong He, Junwei Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Multi-label Out-Of-Distribution (OOD) detection aims to discriminate the OOD samples from the multi-label In-Distribution (ID) ones. Compared with its multiclass counterpart, it is crucial to model the joint informati... 详细信息
来源: 评论
Exploring Query Efficient Data Generation towards Data-free Model Stealing in Hard Label Setting
arXiv
收藏 引用
arXiv 2024年
作者: Pei, Gaozheng Lyu, Shaojie Ma, Ke Yang, Pinci Xu, Qianqian Sun, Yingfei School of Electronic Electrical and Communication Engineering UCAS Beijing China Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China Tencent Corporate
Data-free model stealing involves replicating the functionality of a target model into a substitute model without accessing the target model’s structure, parameters, or training data. The adversary can only access th... 详细信息
来源: 评论