咨询与建议

限定检索结果

文献类型

  • 951 篇 会议
  • 604 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 1,557 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 952 篇 工学
    • 625 篇 计算机科学与技术...
    • 553 篇 软件工程
    • 185 篇 信息与通信工程
    • 182 篇 控制科学与工程
    • 155 篇 生物工程
    • 141 篇 生物医学工程(可授...
    • 129 篇 光学工程
    • 107 篇 机械工程
    • 97 篇 电气工程
    • 89 篇 电子科学与技术(可...
    • 68 篇 化学工程与技术
    • 56 篇 仪器科学与技术
    • 35 篇 交通运输工程
    • 34 篇 建筑学
    • 31 篇 材料科学与工程(可...
    • 31 篇 土木工程
    • 27 篇 动力工程及工程热...
    • 25 篇 力学(可授工学、理...
  • 554 篇 理学
    • 241 篇 数学
    • 206 篇 物理学
    • 167 篇 生物学
    • 81 篇 统计学(可授理学、...
    • 69 篇 化学
    • 46 篇 系统科学
  • 217 篇 管理学
    • 113 篇 图书情报与档案管...
    • 107 篇 管理科学与工程(可...
    • 21 篇 工商管理
  • 113 篇 医学
    • 103 篇 临床医学
    • 72 篇 基础医学(可授医学...
    • 57 篇 药学(可授医学、理...
  • 20 篇 法学
  • 11 篇 经济学
  • 11 篇 农学
  • 8 篇 教育学
  • 3 篇 文学
  • 2 篇 军事学

主题

  • 93 篇 feature extracti...
  • 63 篇 training
  • 49 篇 semantics
  • 41 篇 task analysis
  • 33 篇 accuracy
  • 32 篇 deep learning
  • 32 篇 electroencephalo...
  • 32 篇 computational mo...
  • 26 篇 object detection
  • 26 篇 visualization
  • 25 篇 semantic segment...
  • 24 篇 cameras
  • 24 篇 robustness
  • 23 篇 neural networks
  • 23 篇 predictive model...
  • 22 篇 conferences
  • 22 篇 generative adver...
  • 21 篇 support vector m...
  • 20 篇 machine learning
  • 20 篇 data models

机构

  • 240 篇 key laboratory o...
  • 194 篇 school of comput...
  • 81 篇 shenzhen college...
  • 79 篇 school of data a...
  • 76 篇 university of ch...
  • 73 篇 college of intel...
  • 69 篇 cas key laborato...
  • 64 篇 peng cheng labor...
  • 59 篇 guangdong provin...
  • 52 篇 tianjin key labo...
  • 44 篇 cas key laborato...
  • 41 篇 tianjin key labo...
  • 34 篇 guangdong-hong k...
  • 32 篇 tianjin key labo...
  • 31 篇 cas key laborato...
  • 31 篇 guangdong provin...
  • 29 篇 shenzhen institu...
  • 27 篇 key laboratory o...
  • 27 篇 anhui province k...
  • 27 篇 the chinese univ...

作者

  • 121 篇 zheng wei-shi
  • 80 篇 guanglin li
  • 58 篇 wu xinyu
  • 44 篇 wei-shi zheng
  • 42 篇 li guanglin
  • 39 篇 yunong zhang
  • 36 篇 xinyu wu
  • 35 篇 xie xiaohua
  • 28 篇 lai jianhuang
  • 28 篇 shixiong chen
  • 27 篇 fuji ren
  • 25 篇 lai jian-huang
  • 24 篇 mei yu
  • 24 篇 peng fang
  • 22 篇 oluwarotimi will...
  • 22 篇 lu bao-liang
  • 22 篇 ren fuji
  • 22 篇 wang xin
  • 21 篇 dang jianwu
  • 20 篇 wang longbiao

语言

  • 1,477 篇 英文
  • 71 篇 其他
  • 10 篇 中文
检索条件"机构=The Key Laboratory of Machine Intelligence and Advanced Computing"
1557 条 记 录,以下是311-320 订阅
排序:
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual Communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论
Bone Layer Perception in Milling Process Based on Video Sequence Images during Robot-assisted Laminectomy
Bone Layer Perception in Milling Process Based on Video Sequ...
收藏 引用
2022 IEEE International Conference on Robotics and Biomimetics, ROBIO 2022
作者: Li, Haiyang Li, Meng Qi, Xiaozhi Yang, Yuanyuan Hu, Ying Shenyang Aerospace University China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Harbin Institute of Technology China CAS Key Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China Guangdong-Hong Kong-Macao Joint Laboratory of Human-Machine Intelligence-Synergy Systems Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China
To optimize the operation ability of the autonomous robot under the background of complex surgery, this paper extracted the state features of milling video sequence images to realize bone layer perception and improve ... 详细信息
来源: 评论
CP-UNet: Contour-based Probabilistic Model for Medical Ultrasound Images Segmentation
arXiv
收藏 引用
arXiv 2024年
作者: Yu, Ruiguo Zhang, Yiyang Tian, Yuan Liu, Zhiqiang Li, Xuewei Gao, Jie College of Intelligence and Computing Tianjin University Tianjin300350 China Tianjin Key Laboratory of Cognitive Computing and Application Tianjin300350 China Tianjin Key Laboratory of Advanced Networking Tianjin300350 China School of Future Technology Tianjin University Tianjin300350 China
Deep learning-based segmentation methods are widely utilized for detecting lesions in ultrasound images. Throughout the imaging procedure, the attenuation and scattering of ultrasound waves cause contour blurring and ... 详细信息
来源: 评论
Releasing Inequality Phenomena in L∞-Adversarial Training via Input Gradient Distillation
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Junxi Dong, Junhao Xie, Xiaohua School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou510006 China
Since adversarial examples appeared and showed the catastrophic degradation they brought to DNN, many adversarial defense methods have been devised, among which adversarial training is considered the most effective. H... 详细信息
来源: 评论
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model for C/C++ Code
VulD-CodeBERT: CodeBERT-Based Vulnerability Detection Model ...
收藏 引用
International Conference on Communications, Information System and Computer Engineering (CISCE)
作者: Zhe Xiong Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Recently, deep learning techniques have received widespread attention in code vulnerability and vulnerability detection. However, there are some problems with current vulnerability detection techniques, firstly, becau... 详细信息
来源: 评论
APRF: Anti-Aliasing Projection Representation Field for Inverse Problem in Imaging
arXiv
收藏 引用
arXiv 2023年
作者: Chen, Zixuan Yang, Lingxiao Lai, Jianhuang Xie, Xiaohua The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510006 China The Guangdong Province Key Laboratory of Information Security Technology Guangzhou510006 China The Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou510006 China
Sparse-view Computed Tomography (SVCT) reconstruction is an ill-posed inverse problem in imaging that aims to acquire high-quality CT images based on sparsely-sampled measurements. Recent works use Implicit Neural Rep... 详细信息
来源: 评论
DFPC-SLAM:A Dynamic Feature Point Constraints-Based SLAM Using Stereo Vision for Dynamic Environment
收藏 引用
Guidance, Navigation and Control 2023年 第1期3卷 46-60页
作者: Bo Zeng Chengqun Song Cheng Jun Yuhang Kang CAS Key Laboratory of Human-Machine Intelligence-Synergy System Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen 518055 P.R.China University of Chinese Academy of Sciences Beijing P.R.China The Chinese University of Hong Kong Hong Kong P.R.China
Visual SLAM methods usually presuppose that the scene is static, so the SLAM algorithm formobile robots in dynamic scenes often results in a signicant decrease in accuracy due to thein°uence of dynamic objects. I... 详细信息
来源: 评论
Variation of sEMG with Muscle Fatigue for Lower Limb Stroke Patient During Walking
Variation of sEMG with Muscle Fatigue for Lower Limb Stroke ...
收藏 引用
2024 IEEE International Conference on Robotics and Biomimetics, ROBIO 2024
作者: Shang, Wenze Huang, Ruisen Liao, Wei-Hsin Wu, Xinyu Gao, Fei Southern University of Science and Technology Shenzhen518005 China Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Guangdong-Hong Kong-Macao Joint Laboratory of Human-Machine Intelligence-Synergy Systems Guangdong Provincial Key Laboratory of Robotics and Intelligent System Shenzhen518055 China The Chinese University of Hong Kong Department of Mechanical and Automation Engineering Hong Kong999077 Hong Kong
SEMG signal is widely used and explored in control strategies of powered assistive human-robot interaction systems due to its non-invasive nature and ability to estimate motion intention well. However, prolonged use o... 详细信息
来源: 评论
Non-Markovian effect enhanced quantum noises in a coherent Ising machine
收藏 引用
Optics Express 2025年 第11期33卷 22208-22221页
作者: Chen-Rui Fan Bo Lu Yi-Xuan Yao Qing Ai Chuan Wang School of Artificial Intelligence Beijing Normal University Beijing 100875 China Laboratory for Advanced Computing and Intelligence Engineering Zhengzhou 450001 China lubo@*** School of Physics and Astronomy Applied Optics Beijing Area Major Laboratory Beijing 100875 China Key Laboratory of Multiscale Spin Physics Ministry of Education Beijing Normal University Beijing 100875 China wangchuan@***
Combinatorial optimization problems (COPs) constitute a fundamental class of computational challenges with extensive applications across scientific and industrial domains. The emergence of the coherent Ising machine (... 详细信息
来源: 评论
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testing and Genetic Algorithm
SPAFuzz: Web Security Fuzz Testing Tool Based on Fuzz Testin...
收藏 引用
Consumer Electronics and Computer Engineering (ICCECE), 2021 IEEE International Conference on
作者: Jiang Lin Weiyu Dong School of Computer Science and Artificial Intelligence Zhengzhou University Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Information Engineering University Zhengzhou China
Fuzzing is one of the most effective methods currently available for detecting web vulnerabilities. However, traditional fuzzing suffers from issues such as low coverage and limited diversity in test cases. To address...
来源: 评论