咨询与建议

限定检索结果

文献类型

  • 307 篇 期刊文献
  • 247 篇 会议

馆藏范围

  • 554 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 380 篇 工学
    • 296 篇 计算机科学与技术...
    • 264 篇 软件工程
    • 68 篇 信息与通信工程
    • 50 篇 生物工程
    • 45 篇 光学工程
    • 44 篇 控制科学与工程
    • 39 篇 电气工程
    • 33 篇 生物医学工程(可授...
    • 27 篇 机械工程
    • 27 篇 电子科学与技术(可...
    • 25 篇 化学工程与技术
    • 14 篇 土木工程
    • 13 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 材料科学与工程(可...
    • 9 篇 网络空间安全
  • 208 篇 理学
    • 95 篇 数学
    • 68 篇 物理学
    • 57 篇 生物学
    • 36 篇 统计学(可授理学、...
    • 27 篇 化学
    • 15 篇 系统科学
  • 103 篇 管理学
    • 53 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 15 篇 工商管理
  • 28 篇 医学
    • 25 篇 临床医学
    • 23 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 8 篇 法学
  • 7 篇 经济学
  • 5 篇 农学
  • 4 篇 教育学

主题

  • 21 篇 semantics
  • 18 篇 training
  • 16 篇 deep learning
  • 16 篇 feature extracti...
  • 14 篇 neural networks
  • 12 篇 contrastive lear...
  • 10 篇 computational mo...
  • 10 篇 computer vision
  • 9 篇 conferences
  • 9 篇 object detection
  • 9 篇 semantic segment...
  • 9 篇 task analysis
  • 8 篇 benchmark testin...
  • 8 篇 machine learning
  • 8 篇 forecasting
  • 7 篇 data models
  • 6 篇 deep neural netw...
  • 6 篇 transformers
  • 6 篇 signal processin...
  • 6 篇 speech processin...

机构

  • 191 篇 school of comput...
  • 156 篇 key laboratory o...
  • 54 篇 guangdong provin...
  • 40 篇 peng cheng labor...
  • 34 篇 laboratory for a...
  • 20 篇 college of intel...
  • 19 篇 key laboratory o...
  • 17 篇 the school of co...
  • 16 篇 guangdong key la...
  • 14 篇 sun yat-sen univ...
  • 13 篇 tianjin key labo...
  • 12 篇 pazhou lab
  • 12 篇 guangdong key la...
  • 11 篇 japan advanced i...
  • 11 篇 tianjin key labo...
  • 11 篇 ministry of educ...
  • 10 篇 institute of art...
  • 10 篇 tianjin key labo...
  • 9 篇 school of comput...
  • 9 篇 guangdong key la...

作者

  • 85 篇 zheng wei-shi
  • 31 篇 xie xiaohua
  • 29 篇 wei-shi zheng
  • 24 篇 lai jianhuang
  • 20 篇 lai jian-huang
  • 19 篇 wang ruixuan
  • 17 篇 wang chang-dong
  • 16 篇 yang lingxiao
  • 13 篇 wu xiao-ming
  • 12 篇 lin kun-yu
  • 12 篇 yunong zhang
  • 12 篇 wu ancong
  • 11 篇 lu wei
  • 10 篇 yan junkai
  • 9 篇 meng jingke
  • 9 篇 jianhuang lai
  • 9 篇 wei yi-lin
  • 9 篇 qu dan
  • 9 篇 hu jian-fang
  • 8 篇 dang jianwu

语言

  • 509 篇 英文
  • 45 篇 其他
  • 3 篇 中文
检索条件"机构=The Laboratory for Advanced Computing and Intelligence Engineering"
554 条 记 录,以下是11-20 订阅
排序:
Prompt Customization for Continual Learning
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial intelligence 2025年 第5期6卷 1373-1385页
作者: Dai, Yong Hong, Xiaopeng Wang, Yabin Ma, Zhiheng Jiang, Dongmei Wang, Yaowei Shenzhen Polytechnic University School of Artificial Intelligence Shenzhen518055 China Peng Cheng Laboratory Shenzhen518055 China Harbin Institute of Technology Faculty of Computing Harbin150001 China Xi’an Jiaotong University School of Electronic and Information Engineering Xiaan710049 China Shenzhen University of Advanced Technology Shenzhen518071 China Chinese Academy of Sciences Shenzhen Institutes of Advanced Technology Shenzhen518071 China Harbin Institute of Technology School of Computing Shenzhen518055 China
Contemporary continual learning approaches typically select prompts from a pool, which function as supplementary inputs to a pretrained model. However, this strategy is hindered by the inherent noise of its selection ... 详细信息
来源: 评论
Simple One-step Multi-view Clustering with Fast Similarity and Cluster Structure Learning
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 1850-1854页
作者: Xia, Xianxian Huang, Dong Yang, Chen-Min He, Chaobo Wang, Chang-Dong South China Agricultural University College of Mathematics and Informatics Guangzhou China South China Normal University School of Computer Science Guangzhou China Sun Yat-sen University School of Computer Science and Engineering Guangzhou China Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing China
Multi-view clustering (MVC) is essential for integrating heterogeneous data from multiple sources. However, many existing approaches are hindered by high computational complexity and the separate optimization of simil... 详细信息
来源: 评论
iGrasp: An Interactive 2D-3D Framework for 6-DoF Grasp Detection  27th
iGrasp: An Interactive 2D-3D Framework for 6-DoF Grasp Detec...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Jiang, Jian-Jian Wu, Xiao-Ming Chen, Zibo Wei, Yi-Lin Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
For 6-DoF grasp detection, we aim at introducing a new interactive 2D-3D framework which filters out irrelevant information and makes both modalities collaborate effectively to generate robust grasps and accelerate in... 详细信息
来源: 评论
Depth-Enhanced Alignment for Label-Free 3D Semantic Segmentation  27th
Depth-Enhanced Alignment for Label-Free 3D Semantic Segment...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Xie, Shangjin Feng, Jiawei Chen, Zibo Liu, Zhixuan Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Labeling every point in a scene is a laborious journey for 3D understanding. To achieve annotation-free training, existing works introduce Contrastive Language-Image Pre-training (CLIP) to transfer the pre-trained cap... 详细信息
来源: 评论
Privacy-Preserving Face Recognition with Adaptive Generative Perturbations  27th
Privacy-Preserving Face Recognition with Adaptive Generative...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhang, Delong Peng, Yixing Wu, Ancong Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
For online face recognition services, the potential leakage of facial features and reconstruction techniques gives malicious attackers the opportunity to reconstruct face images, raising public concern about priv... 详细信息
来源: 评论
Towards Completeness: A Generalizable Action Proposal Generator for Zero-Shot Temporal Action Localization  27th
Towards Completeness: A Generalizable Action Proposal Genera...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Du, Jia-Run Lin, Kun-Yu Meng, Jingke Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
To address the zero-shot temporal action localization (ZSTAL) task, existing works develop models that are generalizable to detect and classify actions from unseen categories. They typically develop a category-ag... 详细信息
来源: 评论
Byzantine-robust distributed support vector machine
收藏 引用
Science China Mathematics 2025年 第3期68卷 707-728页
作者: Xiaozhou Wang Weidong Liu Xiaojun Mao School of Statistics East China Normal UniversityShanghai 200062China Key Laboratory of Advanced Theory and Application in Statistics and Data Science(Ministry of Education) East China Normal UniversityShanghai 200062China School of Mathematical Sciences Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Artificial Intelligence(Ministry of Education) Shanghai Jiao Tong UniversityShanghai 200240China Key Laboratory of Scientific and Engineering Computing(Ministry of Education) Shanghai Jiao Tong UniversityShanghai 200240China
The development of information technology brings diversification of data sources and large-scale data sets and calls for the exploration of distributed learning algorithms. In distributed systems, some local machines ... 详细信息
来源: 评论
Perception-Enhanced Generative Transformer for Key Information Extraction from Documents  27th
Perception-Enhanced Generative Transformer for Key Informat...
收藏 引用
27th International Conference on Pattern Recognition, ICPR 2024
作者: Zhao, Runbo Ou Yang, Jun Jie Gao, Chen Qin, Xugong Zeng, Gangyan Hu, Xiaoxu Zhang, Peng School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China Viterbi School of Engineering University of Southern California Los Angeles United States National Computer Network Response Technical Team/Coordination Center Technology Beijing China Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Key information extraction (KIE) from scanned documents has attracted significant attention due to practical real-world applications. Despite impressive results achieved by incorporating multimodal information within ... 详细信息
来源: 评论
Rumor detection for emergency events via few-shot ensembled prompt learning
收藏 引用
Journal of Intelligent Information Systems 2025年 1-32页
作者: Su, Chen Zhou, Junkang Jiang, Zhentao Zhu, Shuwei Li, Chao Fang, Wei Lu, Heng-Yang School of Artificial Intelligence and Computer Science Jiangnan University Wuxi214122 China China Ship Scientific Research Center Wuxi214082 China The Laboratory for Advanced Computing and Intelligence Engineering Wuxi China
Rumors on social media can cause panic during emergency events. Unlike conventional rumor detection, it is more challenging to detect rumors about emergency events that have not happened in history, due to the shortag... 详细信息
来源: 评论
Code is not natural language: unlock the power of semantics-oriented graph representation for binary code similarity detection  24
Code is not natural language: unlock the power of semantics-...
收藏 引用
Proceedings of the 33rd USENIX Conference on Security Symposium
作者: Haojie He Xingwei Lin Ziang Weng Ruijie Zhao Shuitao Gan Libo Chen Yuede Ji Jiashui Wang Zhi Xue School of Electronic Information and Electrical Engineering Shanghai Jiao Tong University Ant Group Laboratory for Advanced Computing and Intelligence Engineering University of North Texas
Binary code similarity detection (BCSD) has garnered significant attention in recent years due to its crucial role in various binary code-related tasks, such as vulnerability search and software plagiarism detection. ...
来源: 评论