咨询与建议

限定检索结果

文献类型

  • 310 篇 期刊文献
  • 264 篇 会议

馆藏范围

  • 574 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 394 篇 工学
    • 311 篇 计算机科学与技术...
    • 270 篇 软件工程
    • 73 篇 信息与通信工程
    • 54 篇 控制科学与工程
    • 51 篇 生物工程
    • 43 篇 光学工程
    • 40 篇 电气工程
    • 34 篇 生物医学工程(可授...
    • 30 篇 电子科学与技术(可...
    • 28 篇 机械工程
    • 23 篇 化学工程与技术
    • 15 篇 土木工程
    • 14 篇 建筑学
    • 13 篇 交通运输工程
    • 12 篇 安全科学与工程
    • 9 篇 力学(可授工学、理...
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
  • 209 篇 理学
    • 98 篇 数学
    • 68 篇 物理学
    • 59 篇 生物学
    • 37 篇 统计学(可授理学、...
    • 25 篇 化学
    • 15 篇 系统科学
  • 105 篇 管理学
    • 56 篇 管理科学与工程(可...
    • 47 篇 图书情报与档案管...
    • 16 篇 工商管理
  • 27 篇 医学
    • 24 篇 临床医学
    • 22 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 7 篇 经济学
  • 7 篇 法学
  • 5 篇 农学
  • 4 篇 教育学

主题

  • 21 篇 semantics
  • 19 篇 training
  • 16 篇 deep learning
  • 16 篇 feature extracti...
  • 13 篇 neural networks
  • 12 篇 contrastive lear...
  • 12 篇 computational mo...
  • 10 篇 computer vision
  • 9 篇 conferences
  • 9 篇 object detection
  • 9 篇 semantic segment...
  • 9 篇 task analysis
  • 8 篇 deep neural netw...
  • 8 篇 benchmark testin...
  • 8 篇 machine learning
  • 8 篇 forecasting
  • 8 篇 data models
  • 7 篇 transformers
  • 7 篇 accuracy
  • 6 篇 three-dimensiona...

机构

  • 198 篇 school of comput...
  • 161 篇 key laboratory o...
  • 56 篇 guangdong provin...
  • 42 篇 peng cheng labor...
  • 41 篇 laboratory for a...
  • 19 篇 key laboratory o...
  • 19 篇 college of intel...
  • 17 篇 guangdong key la...
  • 16 篇 the school of co...
  • 14 篇 sun yat-sen univ...
  • 12 篇 pazhou lab
  • 12 篇 guangdong key la...
  • 12 篇 tianjin key labo...
  • 11 篇 japan advanced i...
  • 11 篇 tianjin key labo...
  • 11 篇 ministry of educ...
  • 10 篇 institute of art...
  • 10 篇 guangdong key la...
  • 9 篇 school of comput...
  • 9 篇 department of el...

作者

  • 87 篇 zheng wei-shi
  • 32 篇 wei-shi zheng
  • 32 篇 xie xiaohua
  • 24 篇 lai jianhuang
  • 20 篇 lai jian-huang
  • 19 篇 wang ruixuan
  • 16 篇 wang chang-dong
  • 16 篇 yang lingxiao
  • 13 篇 wu xiao-ming
  • 13 篇 yunong zhang
  • 13 篇 wu ancong
  • 12 篇 lin kun-yu
  • 11 篇 hu jian-fang
  • 11 篇 lu wei
  • 10 篇 yan junkai
  • 9 篇 meng jingke
  • 9 篇 jianhuang lai
  • 9 篇 wei yi-lin
  • 9 篇 xiaohua xie
  • 8 篇 dang jianwu

语言

  • 505 篇 英文
  • 69 篇 其他
  • 3 篇 中文
检索条件"机构=The Laboratory for Advanced Computing and Intelligence Engineering"
574 条 记 录,以下是251-260 订阅
排序:
Estimator Meets Equilibrium Perspective: A Rectified Straight Through Estimator for Binary Neural Networks Training
Estimator Meets Equilibrium Perspective: A Rectified Straigh...
收藏 引用
International Conference on Computer Vision (ICCV)
作者: Xiao-Ming Wu Dian Zheng Zuhao Liu Wei-Shi Zheng School of Computer Science and Engineering Sun Yat-sen University China Pengcheng Lab China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Binarization of neural networks is a dominant paradigm in neural networks compression. The pioneering work BinaryConnect uses Straight Through Estimator (STE) to mimic the gradients of the sign function, but it also c...
来源: 评论
End-to-End Quantum Vision Transformer: Towards Practical Quantum Speedup in Large-Scale Models
arXiv
收藏 引用
arXiv 2024年
作者: Xue, Cheng Chen, Zhao-Yun Zhuang, Xi-Ning Wang, Yun-Jie Sun, Tai-Ping Wang, Jun-Chao Liu, Huan-Yu Wu, Yu-Chun Wang, Zi-Lei Guo, Guo-Ping Institute of Artificial Intelligence Hefei Comprehensive National Science Center Anhui Hefei230088 China CAS Key Laboratory of Quantum Information University of Science and Technology of China Anhui Hefei230026 China CAS Center For Excellence in Quantum Information and Quantum Physics University of Science and Technology of China Anhui Hefei230026 China Origin Quantum Computing Company Limited Anhui Hefei230088 China Institute of Advanced Technology University of Science and Technology of China Anhui Hefei230031 China Laboratory for Advanced Computing and Intelligence Engineering Zhengzhou450001 China National Engineering Laboratory for Brain-inspired Intelligence Technology and Application University of Science and Technology of China Hefei230027 China
The field of quantum deep learning presents significant opportunities for advancing computational capabilities, yet it faces a major obstacle in the form of the "information loss problem" due to the inherent... 详细信息
来源: 评论
View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
View-decoupled Transformer for Person Re-identification unde...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Quan Zhang Lei Wang Vishal M. Patel Xiaohua Xie Jianhuang Lai School of Computer Science and Engineering Sun Yat-Sen University China Department of Electrical and Computer Engineering Johns Hopkins University USA Pazhou Lab (HuangPu) Guangdong China Guangdong Province Key Laboratory of Information Security Technology Guangdong China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Existing person re-identification methods have achieved remarkable advances in appearance-based identity association across homogeneous cameras, such as ground-ground matching. However, as a more practical scenario, a... 详细信息
来源: 评论
CoMT: A Novel Benchmark for Chain of Multi-modal Thought on Large Vision-Language Models
arXiv
收藏 引用
arXiv 2024年
作者: Cheng, Zihui Chen, Qiguang Zhang, Jin Fei, Hao Feng, Xiaocheng Che, Wanxiang Li, Min Qin, Libo School of Computer Science and Engineering Central South University China Key Laboratory of Data Intelligence and Advanced Computing in Provincial Universities Soochow University China Research Center for SCIR Harbin Institute of Technology Harbin China National University of Singapore Singapore
Large Vision-Language Models (LVLMs) have recently demonstrated amazing success in multi-modal tasks, including advancements in Multi-modal Chain-of-Thought (MCoT) reasoning. Despite these successes, current benchmark... 详细信息
来源: 评论
Plug-and-Hide: Provable and Adjustable Diffusion Generative Steganography
arXiv
收藏 引用
arXiv 2024年
作者: Zhu, Jiahao Chen, Zixuan Yang, Lingxiao Xie, Xiaohua Zhou, Yi The School of Computer Science and Engineering Sun Yat-Sen University China The Guangdong Province Key Laboratory of Information Security Technology China The Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangzhou510006 China The Zhongshan School of Medicine Sun Yat-Sen University China
Generative Steganography (GS) is a novel technique that utilizes generative models to conceal messages without relying on cover images. Contemporary GS algorithms leverage the powerful generative capabilities of Diffu... 详细信息
来源: 评论
The Enemy of My Enemy is My Friend: Exploring Inverse Adversaries for Improving Adversarial Training
The Enemy of My Enemy is My Friend: Exploring Inverse Advers...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Junhao Dong Seyed-Mohsen Moosavi-Dezfooli Jianhuang Lai Xiaohua Xie School of Computer Science and Engineering Sun Yat-Sen University China Imperial College London UK Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Although current deep learning techniques have yielded superior performance on various computer vision tasks, yet they are still vulnerable to adversarial examples. Adversarial training and its variants have been show...
来源: 评论
Frozen-DETR: Enhancing DETR with Image Understanding from Frozen Foundation Models
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518055 China Tongyi Lab Alibaba Group China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China Guangdong Guangzhou510555 China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin... 详细信息
来源: 评论
Temporal Information Reconstruction and Non-Aligned Residual in Spiking Neural Networks for Speech Classification
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Qi Wang, Huamin Shen, Hangchi Duan, Shukai Wen, Shiping Huang, Tingwen College of Artificial Intelligence Southwest University Chongqing400715 China Chongqing Key Laboratory of Brain Inspired Computing and Intelligent Chips Chongqing400715 China College of Information Engineering University of Technology Sydney Australian Institute of Artificial Intelligence Sydney2007 Australia Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen518055 China
Recently, it can be noticed that most models based on spiking neural networks (SNNs) only use a same level temporal resolution to deal with speech classification problems, which makes these models cannot learn the inf... 详细信息
来源: 评论
Towards Securing ASCON Implementation by Inner Product Masking
Towards Securing ASCON Implementation by Inner Product Maski...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Yuming Liu Wei Cheng Jihao Fan Yongbin Zhou School of Cyber Science and Engineering Nanjing University of Science and Technology Nanjing China LTCI Télécom Paris IP Paris and Secure-IC S.A.S Paris France Laboratory for Advanced Computing and Intelligence Engineering Wuxi China Institute of Information Engineering Chinese Academy of Sciences Beijing China
Ascon algorithm has been selected by NIST for standardization of the lightweight cryptography, that will be used in embedded systems, IoT devices, and other resource-constrained devices. As a lightweight cryptographic... 详细信息
来源: 评论
Improving Visual Quality of Image Synthesis by A Token-based Generator with Transformers  35
Improving Visual Quality of Image Synthesis by A Token-based...
收藏 引用
35th Conference on Neural Information Processing Systems, NeurIPS 2021
作者: Zeng, Yanhong Yang, Huan Wang, Jianbo Fu, Jianlong School of Computer Science and Engineering Sun Yat-sen University China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Microsoft Research Asia China University of Tokyo Japan
We present a new perspective of achieving image synthesis by viewing this task as a visual token generation problem. Different from existing paradigms that directly synthesize a full image from a single input (e.g., a... 详细信息
来源: 评论