咨询与建议

限定检索结果

文献类型

  • 372 篇 会议
  • 333 篇 期刊文献

馆藏范围

  • 705 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 475 篇 工学
    • 364 篇 计算机科学与技术...
    • 304 篇 软件工程
    • 112 篇 信息与通信工程
    • 82 篇 控制科学与工程
    • 71 篇 电气工程
    • 66 篇 生物工程
    • 45 篇 光学工程
    • 41 篇 生物医学工程(可授...
    • 28 篇 电子科学与技术(可...
    • 26 篇 机械工程
    • 20 篇 仪器科学与技术
    • 18 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 12 篇 安全科学与工程
    • 11 篇 交通运输工程
  • 241 篇 理学
    • 140 篇 数学
    • 70 篇 生物学
    • 50 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 18 篇 化学
  • 159 篇 管理学
    • 91 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 33 篇 工商管理
  • 36 篇 医学
    • 29 篇 临床医学
    • 28 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 22 篇 法学
    • 17 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 6 篇 农学
  • 5 篇 教育学
  • 2 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 31 篇 feature extracti...
  • 28 篇 deep learning
  • 27 篇 training
  • 25 篇 predictive model...
  • 23 篇 semantics
  • 20 篇 data models
  • 18 篇 computational mo...
  • 17 篇 contrastive lear...
  • 17 篇 graph neural net...
  • 14 篇 convolution
  • 13 篇 reinforcement le...
  • 13 篇 accuracy
  • 11 篇 signal processin...
  • 11 篇 speech processin...
  • 11 篇 machine learning
  • 10 篇 convergence
  • 10 篇 analytical model...
  • 10 篇 forecasting
  • 9 篇 object detection
  • 9 篇 anomaly detectio...

机构

  • 40 篇 national enginee...
  • 36 篇 key laboratory o...
  • 35 篇 chongqing key la...
  • 24 篇 zhejiang key lab...
  • 24 篇 school of comput...
  • 23 篇 zhejiang univers...
  • 22 篇 guangdong provin...
  • 21 篇 engineering rese...
  • 21 篇 college of compu...
  • 20 篇 xi'an key labora...
  • 18 篇 university of ch...
  • 18 篇 shaanxi key labo...
  • 17 篇 chongqing key la...
  • 15 篇 fujian key labor...
  • 15 篇 school of comput...
  • 15 篇 school of cyber ...
  • 14 篇 college of compu...
  • 14 篇 shenzhen institu...
  • 13 篇 key laboratory o...
  • 13 篇 peng cheng labor...

作者

  • 30 篇 wang guoyin
  • 23 篇 huang qingming
  • 23 篇 shen linlin
  • 21 篇 xu qianqian
  • 19 篇 chen huajun
  • 16 篇 yang zhiyong
  • 15 篇 xia shuyin
  • 15 篇 miao qiguang
  • 13 篇 wang lihui
  • 12 篇 shang mingsheng
  • 12 篇 wang jinbao
  • 12 篇 zhang ningyu
  • 11 篇 xin luo
  • 11 篇 chen yanping
  • 11 篇 wang zhongmin
  • 11 篇 cao xiaochun
  • 10 篇 liu jun
  • 10 篇 mingsheng shang
  • 10 篇 gao can
  • 10 篇 bao shilong

语言

  • 612 篇 英文
  • 85 篇 其他
  • 22 篇 中文
检索条件"机构=The Xi’an Key Laboratory of Big Data and Intelligent Computing"
705 条 记 录,以下是291-300 订阅
排序:
Is Really Correlation Information Represented Well in Self-Attention for Skeleton-based Action Recognition?
Is Really Correlation Information Represented Well in Self-A...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Wentian xin Hongkai Lin Ruyi Liu Yi Liu Qiguang Miao School of Computer Science and Technology Xidian University China Xi’an Key Laboratory of Big Data and Intelligent Vision Xidian University China Ministry of Education Key Laboratory of Collaborative Intelligence Systems Xidian University China
Transformer has shown significant advantages by various vision tasks. However, the lack of representation of correlation information about data properties makes it difficult to match the excellent results consistent w...
来源: 评论
Dfier: A Directed Vulnerability Verifier for Ethereum Smart Contracts
SSRN
收藏 引用
SSRN 2023年
作者: Wang, Zeli Dai, Weiqi Li, Ming Choo, Kim-Kwang Raymond Zou, Deqing Chongqing Key Laboratory of Computational Intelligence Key Laboratory of Big Data Intelligent Computing Key Laboratory of Cyberspace Big Data Intelligent Security Ministry of Education College of Computer Science and Technology Chongqing University of Posts and Telecommunications Chongqing40065 China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China Department of Information Systems and Cyber Security University of Texas at San Antonio San Antonio United States
Existing smart contract vulnerability identification approaches mainly focus on complete program detection. Consequently, lots of known potentially vulnerable locations need manual verification, which is energy-exhaus... 详细信息
来源: 评论
Modality-Aware Shot Relating and Comparing for Video Scene Detection
arXiv
收藏 引用
arxiv 2024年
作者: Tan, Jiawei Wang, Hongxing Dang, Kang Li, Jiaxin Ou, Zhilong Key Laboratory of Dependable Service Computing Cyber Physical Society Chongqing University Ministry of Education China School of Big Data and Software Engineering Chongqing University China Xi’an Jiaotong-Liverpool University Suzhou China
Video scene detection involves assessing whether each shot and its surroundings belong to the same scene. Achieving this requires meticulously correlating multi-modal cues, e.g. visual entity and place modalities, amo... 详细信息
来源: 评论
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-Preserving Talking Face Synthesis
DEGSTalk: Decomposed Per-Embedding Gaussian Fields for Hair-...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Kaijun Deng Dezhi Zheng Jindong xie Jinbao Wang Weicheng xie Linlin Shen Siyang Song Computer Vision Institute School of Computer Science and Software Engineering Shenzhen University National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Department of Computer Science University of Exeter
Accurately synthesizing talking face videos and capturing fine facial features for individuals with long hair presents a significant challenge. To tackle these challenges in existing methods, we propose a decomposed p... 详细信息
来源: 评论
No-Reference Stereoscopic Image Quality Assessment Based on Binocular Collaboration
SSRN
收藏 引用
SSRN 2024年
作者: Guo, Wenzhong Wang, Hanling Ke, xiao Fujian Provincial Key Laboratory of Networking Computing and Intelligent Information Processing College of Computer and Data Science Fuzhou University Fujian Fuzhou350116 China Engineering Research Center of Big Data Intelligence Ministry of Education Fuzhou University Fuzhou350116 China
Stereoscopic images usually consist of a left view, a right view, and depth information. Stereoscopic/3D image quality assessment (SIQA) is often more challenging compared to 2D-IQA due to the usual scene differences ... 详细信息
来源: 评论
ThyroidNet:A Deep Learning Network for Localization and Classification of Thyroid Nodules
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第4期139卷 361-382页
作者: Lu Chen Huaqiang Chen Zhikai Pan Sheng Xu Guangsheng Lai Shuwen Chen Shuihua Wang xiaodong Gu Yudong Zhang Ultrasonic Department Zhongda Hospital Affiliated to Southeast UniversityNanjing210009China School of Physics and Information Engineering Jiangsu Second Normal UniversityNanjing211200China School of Computing and Mathematical Sciences University of LeicesterLeicesterLE17RHUK Department of Information Systems Faculty of Computing and Information TechnologyKing Abdulaziz UniversityJeddah21589Saudi Arabia State Key Laboratory of MillimeterWaves Southeast UniversityNanjing210096China Jiangsu Province Engineering Research Center of Basic Education Big Data Application Jiangsu Second Normal UniversityNanjing211200China School of Software Engineering Quanzhou Normal UniversityQuanzhou362000China Department of Biological Sciences Xi’an Jiaotong-Liverpool UniversitySuzhou215123China
Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques ***:A novel method,ThyroidNet,is introduced and evaluated based on deep learning ... 详细信息
来源: 评论
An Unsupervised Malicious Web Request Detection based on Transformer and Contrastive Learning
收藏 引用
IEEE Transactions on Network and Service Management 2025年
作者: He, Shiming Zhang, Ying Liang, Diqing Sharma, Pradip Kumar Changsha University of Science and Technology School of Computer Science and Technology Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation Changsha410114 China University of Aberdeen Department of Computing Science AberdeenAB24 3UE United Kingdom
The World Wide Web (Web) is a crucial part of the Internet. Web attacks are becoming more and more serious and complex. Malicious Web request detection aims to rapidly and accurately identify abnormal attacks on the n... 详细信息
来源: 评论
AUCSeg: AUC-oriented Pixel-level Long-tail Semantic Segmentation
arXiv
收藏 引用
arxiv 2024年
作者: Han, Boyu Xu, Qianqian Yang, Zhiyong Bao, Shilong Wen, Peisong Jiang, Yangbangyan Huang, Qingming Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Peng Cheng Laboratory China Key Laboratory of Big Data Mining and Knowledge Management CAS China
The Area Under the ROC Curve (AUC) is a well-known metric for evaluating instance-level long-tail learning problems. In the past two decades, many AUC optimization methods have been proposed to improve model performan... 详细信息
来源: 评论
data-Driven Discovery of Partial Differential Equations Based on Temporal Relationships
SSRN
收藏 引用
SSRN 2024年
作者: Zhang, xiaoxia Mao, Hao Guan, Junsheng Liu, Yanjun Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China School of Mathematical Sciences Chongqing Normal University Chongqing401331 China
Partial differential equations (PDEs) are crucial for describing and understanding various physical phenomena. As observational datasets become increasingly rich, data-driven approaches for discovering PDEs have becom... 详细信息
来源: 评论
Morl4pdes: data-Driven Discovery of Pdes Based on Multi-Objective Optimization and Reinforcement Learning
SSRN
收藏 引用
SSRN 2023年
作者: Zhang, xiaoxia Guan, Junsheng Liu, Yanjun Wang, Guoyin Chongqing Key Laboratory of Computational Intelligence Chongqing University of Posts and Telecommunications Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing University of Posts and Telecommunications Chongqing400065 China Nankai University China
Extracting fundamental behavior patterns or governing equations from data can deepen our understanding and insights into physical systems, it will lead to the better control and application of these systems in science... 详细信息
来源: 评论