咨询与建议

限定检索结果

文献类型

  • 328 篇 期刊文献
  • 257 篇 会议

馆藏范围

  • 585 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 359 篇 工学
    • 253 篇 计算机科学与技术...
    • 211 篇 软件工程
    • 91 篇 信息与通信工程
    • 63 篇 电气工程
    • 51 篇 生物工程
    • 48 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 26 篇 光学工程
    • 26 篇 生物医学工程(可授...
    • 22 篇 机械工程
    • 20 篇 化学工程与技术
    • 20 篇 交通运输工程
    • 16 篇 网络空间安全
    • 15 篇 仪器科学与技术
    • 12 篇 动力工程及工程热...
    • 8 篇 材料科学与工程(可...
  • 200 篇 理学
    • 100 篇 数学
    • 59 篇 生物学
    • 45 篇 物理学
    • 35 篇 统计学(可授理学、...
    • 21 篇 化学
    • 16 篇 系统科学
  • 104 篇 管理学
    • 58 篇 管理科学与工程(可...
    • 46 篇 图书情报与档案管...
    • 21 篇 工商管理
  • 30 篇 医学
    • 21 篇 临床医学
    • 20 篇 基础医学(可授医学...
    • 12 篇 公共卫生与预防医...
    • 8 篇 药学(可授医学、理...
  • 15 篇 法学
    • 12 篇 社会学
  • 6 篇 经济学
  • 4 篇 教育学
  • 4 篇 农学

主题

  • 18 篇 training
  • 17 篇 feature extracti...
  • 16 篇 computational mo...
  • 13 篇 reinforcement le...
  • 13 篇 deep learning
  • 13 篇 semantics
  • 12 篇 machine learning
  • 11 篇 accuracy
  • 10 篇 task analysis
  • 10 篇 contrastive lear...
  • 9 篇 speech processin...
  • 9 篇 codes
  • 9 篇 data models
  • 9 篇 robustness
  • 8 篇 deep neural netw...
  • 8 篇 optimization
  • 8 篇 predictive model...
  • 8 篇 evolutionary com...
  • 7 篇 scalability
  • 7 篇 big data

机构

  • 133 篇 national enginee...
  • 77 篇 college of compu...
  • 50 篇 school of comput...
  • 45 篇 school of cyber ...
  • 31 篇 national enginee...
  • 28 篇 shenzhen univers...
  • 27 篇 hubei engineerin...
  • 26 篇 hubei key labora...
  • 25 篇 services computi...
  • 25 篇 cluster and grid...
  • 18 篇 national enginee...
  • 18 篇 shenzhen institu...
  • 18 篇 school of softwa...
  • 17 篇 peng cheng labor...
  • 16 篇 shenzhen huazhon...
  • 15 篇 department of el...
  • 15 篇 school of inform...
  • 13 篇 huazhong univers...
  • 13 篇 guangdong provin...
  • 13 篇 shenzhen researc...

作者

  • 44 篇 jin hai
  • 42 篇 hai jin
  • 40 篇 shen linlin
  • 24 篇 li jianqiang
  • 20 篇 hu shengshan
  • 19 篇 zhang rui
  • 18 篇 linlin shen
  • 15 篇 zhang leo yu
  • 15 篇 jianqiang li
  • 14 篇 deqing zou
  • 13 篇 zhou ziqi
  • 13 篇 li minghui
  • 11 篇 wang jinbao
  • 11 篇 zou deqing
  • 11 篇 mei weidong
  • 10 篇 gao can
  • 10 篇 jie chen
  • 9 篇 zhu lipeng
  • 8 篇 zhou jie
  • 8 篇 ji junkai

语言

  • 526 篇 英文
  • 52 篇 其他
  • 8 篇 中文
检索条件"机构=The National Engineering Laboratory for Big Data System Computing Technology Shenzhen University"
585 条 记 录,以下是161-170 订阅
排序:
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong Xie Jinbao Wang Weicheng Xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
Fence Theorem: Towards Dual-Objective Semantic-Structure Isolation in Preprocessing Phase for 3D Anomaly Detection
arXiv
收藏 引用
arXiv 2025年
作者: Liang, Hanzhe Zhou, Jie Chen, Xuanxin Dai, Tao Wang, Jinbao Gao, Can College of Computer Science and Software Engineering Shenzhen University China Shenzhen Audencia Financial Technology Institute Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Faculty of Education Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
3D anomaly detection (AD) is prominent but difficult due to lacking a unified theoretical foundation for preprocessing design. We establish the Fence Theorem, formalizing preprocessing as a dual-objective semantic iso... 详细信息
来源: 评论
Multi-Scale Dynamic and Hierarchical Relationship Modeling for Facial Action Units Recognition
Multi-Scale Dynamic and Hierarchical Relationship Modeling f...
收藏 引用
Conference on Computer Vision and Pattern Recognition (CVPR)
作者: Zihan Wang Siyang Song Cheng Luo Songhe Deng Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University Shenzhen Institute of Artificial Intelligence and Robotics for Society National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Universiry of Leicester Monash University
Human facial action units (AUs) are mutually related in a hierarchical manner, as not only they are associated with each other in both spatial and temporal domains but also AUs located in the same/close facial regions... 详细信息
来源: 评论
Owl: Differential-Based Side-Channel Leakage Detection for CUDA Applications
Owl: Differential-Based Side-Channel Leakage Detection for C...
收藏 引用
International Conference on Dependable systems and Networks (DSN)
作者: Yu Zhao Wenjie Xue Weijie Chen Weizhong Qiang Deqing Zou Hai Jin National Engineering Research Center for Big Data Technology and System Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Jinyinhu Laboratory Wuhan China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Over the past decade, various methods for detecting side-channel leakage have been proposed and proven to be effective against CPU side-channel attacks. These methods are valuable in assisting developers to identify a... 详细信息
来源: 评论
Spatial-Temporal Graph-Based AU Relationship Learning for Facial Action Unit Detection
Spatial-Temporal Graph-Based AU Relationship Learning for Fa...
收藏 引用
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)
作者: Zihan Wang Siyang Song Cheng Luo Yuzhi Zhou Shiling Wu Weicheng Xie Linlin Shen Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University School of Computing and Mathematical Sciences University of Leicester
This paper presents our Facial Action Units (AUs) detection submission to the fifth Affective Behavior Analysis in-the-wild Competition (ABAW). Our approach consists of three main modules: (i) a pre-trained facial rep...
来源: 评论
Constructing a Biomass-data Center Nexus for Circular Economy-Based Energy systems Integration
IEEE Open Access Journal of Power and Energy
收藏 引用
IEEE Open Access Journal of Power and Energy 2025年 12卷 270-283页
作者: Wang, Pengya Pan, Li He, Guannan Li, Gengyin Song, Jie Zhou, Ming Wang, Jianxiao State Grid Dezhou Power Supply Company Shandong Dezhou253000 China The Chinese University of Hon g Kong School of Science and Engineering Guangdong Shenzhen518000 China Peking University College of Engineering Department of Industrial Engineering and Management Beijing100871 China North China Electric Power University State Key Laboratory of Alternate Electrical Power System With Renewable Energy Sources Beijing102206 China Peking University National Engineering Laboratory for Big Data Analysis and Applications Beijing100871 China
The dual challenges of energy crises and waste management have spurred interest in a circular economy, where biomass, valued for its carbon neutrality, is crucial. Remote areas, rich in biomass, are also becoming hubs... 详细信息
来源: 评论
big-MOE: BYPASS ISOLATED GATING MOE FOR GENERALIZED MULTIMODAL FACE ANTI-SPOOFING
arXiv
收藏 引用
arXiv 2024年
作者: Ma, Yingjie Yu, Zitong Lin, Xun Xie, Weicheng Shen, Linlin Great Bay University China College of Computer Science and Software Engineering Shenzhen University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
In the domain of facial recognition security, multimodal Face Anti-Spoofing (FAS) is essential for countering presentation attacks. However, existing technologies encounter challenges due to modality biases and imbala... 详细信息
来源: 评论
Graph-Augmented Contrastive Clustering for Time Series
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, Qin Liang, Zhuoluo Ngueilbaye, Alladoumbaye Zhang, Peng Chen, Junyang Chen, Xiaojun Huang, Joshua Zhexue Big Data Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou510006 China
The recent emergence of time series contrastive clustering methods can be broadly categorized into two classes. The first class uses contrastive learning to learn universal representations for time series. Though they... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
Sal-Guide Diffusion: Saliency Maps Guide Emotional Image Generation through Adapter
Sal-Guide Diffusion: Saliency Maps Guide Emotional Image Gen...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Xiangru Lin Shenghua Zhong Yan Liu Gong Chen College of Computer Science Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen China College of Computer Science Shenzhen University Shenzhen China Department of Computer Science The Hong Kong Polytechnic University HK China
The existing text-to-image generation methods based on stable diffusion yield better results in low-semantic prompt but often neglect the generation quality of high-semantic prompt such as emotional vocabulary, result... 详细信息
来源: 评论