咨询与建议

限定检索结果

文献类型

  • 373 篇 会议
  • 341 篇 期刊文献

馆藏范围

  • 714 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 486 篇 工学
    • 377 篇 计算机科学与技术...
    • 298 篇 软件工程
    • 118 篇 信息与通信工程
    • 92 篇 控制科学与工程
    • 77 篇 电气工程
    • 67 篇 生物工程
    • 44 篇 光学工程
    • 42 篇 生物医学工程(可授...
    • 29 篇 电子科学与技术(可...
    • 27 篇 机械工程
    • 20 篇 仪器科学与技术
    • 18 篇 化学工程与技术
    • 18 篇 网络空间安全
    • 12 篇 动力工程及工程热...
    • 12 篇 交通运输工程
    • 12 篇 安全科学与工程
  • 244 篇 理学
    • 143 篇 数学
    • 70 篇 生物学
    • 50 篇 物理学
    • 45 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 19 篇 化学
  • 159 篇 管理学
    • 90 篇 管理科学与工程(可...
    • 77 篇 图书情报与档案管...
    • 32 篇 工商管理
  • 38 篇 医学
    • 31 篇 临床医学
    • 29 篇 基础医学(可授医学...
    • 18 篇 药学(可授医学、理...
  • 22 篇 法学
    • 17 篇 社会学
  • 13 篇 经济学
    • 13 篇 应用经济学
  • 6 篇 农学
  • 4 篇 教育学
  • 3 篇 艺术学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 31 篇 feature extracti...
  • 28 篇 deep learning
  • 27 篇 training
  • 25 篇 predictive model...
  • 23 篇 semantics
  • 20 篇 data models
  • 18 篇 contrastive lear...
  • 18 篇 computational mo...
  • 17 篇 graph neural net...
  • 14 篇 convolution
  • 13 篇 accuracy
  • 11 篇 reinforcement le...
  • 11 篇 signal processin...
  • 11 篇 speech processin...
  • 11 篇 machine learning
  • 10 篇 convergence
  • 10 篇 analytical model...
  • 10 篇 forecasting
  • 9 篇 object detection
  • 9 篇 anomaly detectio...

机构

  • 40 篇 national enginee...
  • 37 篇 key laboratory o...
  • 35 篇 chongqing key la...
  • 24 篇 zhejiang key lab...
  • 24 篇 school of comput...
  • 23 篇 zhejiang univers...
  • 23 篇 college of compu...
  • 22 篇 guangdong provin...
  • 21 篇 engineering rese...
  • 20 篇 xi'an key labora...
  • 18 篇 shaanxi key labo...
  • 17 篇 fujian key labor...
  • 17 篇 university of ch...
  • 17 篇 chongqing key la...
  • 15 篇 school of comput...
  • 15 篇 school of cyber ...
  • 14 篇 college of compu...
  • 14 篇 shenzhen institu...
  • 13 篇 key laboratory o...
  • 13 篇 school of comput...

作者

  • 30 篇 wang guoyin
  • 23 篇 huang qingming
  • 23 篇 shen linlin
  • 21 篇 xu qianqian
  • 19 篇 chen huajun
  • 16 篇 yang zhiyong
  • 16 篇 miao qiguang
  • 15 篇 xia shuyin
  • 13 篇 wang lihui
  • 12 篇 shang mingsheng
  • 12 篇 wang jinbao
  • 12 篇 zhang ningyu
  • 11 篇 xin luo
  • 11 篇 chen yanping
  • 11 篇 wang zhongmin
  • 11 篇 cao xiaochun
  • 10 篇 liu jun
  • 10 篇 li tianrui
  • 10 篇 mingsheng shang
  • 10 篇 gao can

语言

  • 594 篇 英文
  • 110 篇 其他
  • 24 篇 中文
检索条件"机构=The Xi’an Key Laboratory of Big Data and Intelligent Computing"
714 条 记 录,以下是491-500 订阅
排序:
Decomposed Neural Architecture Search for image denoising
收藏 引用
Applied Soft computing 2022年 124卷
作者: Li, Di Bai, Yunpeng Bai, Zongwen Li, Ying Shang, Changjing Shen, Qiang School of Computer Science National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Shaanxi Provincial Key Laboratory of Speech & Image Information Processing Northwestern Polytechnical University Xi'an710129 China Department of Computer Science Faculty of Business and Physical Sciences Aberystwyth University AberystwythSY233DB United Kingdom Shaanxi Key Laboratory of Intelligent Processing for Big Energy Data School of Physics and Electronic Information Yan'an University Yan'an716000 China
In practical applications of deep learning, as the demand for the modeling capability increases, the network size may need to be massively enlarged in response. This may form a significant challenge in practice, espec... 详细信息
来源: 评论
A data Augmentation Method for Disease Diagnosis Based on Single Cell Omics data  2nd
A Data Augmentation Method for Disease Diagnosis Based on Si...
收藏 引用
2nd International Conference on Applied Intelligence, ICAI 2024
作者: Zhuang, Han Zhang, Qinhu Ningbo Institute of Digital Twin Eastern Institute of Technology No. 568 Tongxin Road Zhuangshi Street Zhejiang Ningbo315201 China Big Data and Intelligent Computing Research Center Guangxi Academy of Science Nanning530007 China Institute for Regenerative Medicine Medical Innovation Center and State Key Laboratory of Cardiology Shanghai East Hospital School of Medicine Tongji University Shanghai200123 China
Single cell omics data has enabled bioinformatics methods to identify cell type, infer gene regulatory network and beyond. Besides these great advances, there is active research about how to predict patients’ diagnos... 详细信息
来源: 评论
A Two-Stage Graph Computation Model with Communication Equilibrium  15th
A Two-Stage Graph Computation Model with Communication Equil...
收藏 引用
15th CCF Conference on Computer Supported Cooperative Work and Social computing, Chinese CSCW 2020
作者: Dong, Yanmei Chen, Rongwang Guo, Kun College of Mathematics and Computer Science Fuzhou University Fuzhou350108 China Fujian Provincial Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou China Key Laboratory of Spatial Data Mining and Information Sharing Ministry of Education Fuzhou350108 China College of Mathematics and Computer Science Wuyi University Wuyishan Fujian354300 China Digital Fujian Tourism Big Data Institute Wuyishan Fujian354300 China
Distributed graph computing aims at performing in-depth analysis on large networks in a parallel manner. Iterative communication computation is an important model to perform graph analysis. Moreover, high-efficiency i... 详细信息
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques
arXiv
收藏 引用
arxiv 2024年
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China School of Cyber Science and Tech. Sun Yat-sen University Shenzhen Campus China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Agentic Knowledgeable Self-awareness
arXiv
收藏 引用
arxiv 2025年
作者: Qiao, Shuofei Qiu, Zhisong Ren, Baochang Wang, xiaobin Ru, xiangyuan Zhang, Ningyu Chen, xiang Jiang, Yong xie, Pengjun Huang, Fei Chen, Huajun Zhejiang University China Alibaba Group China Nanjing University of Aeronautics and Astronautics China Zhejiang Key Laboratory of Big Data Intelligent Computing China
Large Language Models (LLMs) have achieved considerable performance across various agentic planning tasks. However, traditional agent planning approaches adopt a "flood irrigation" methodology that indiscrim... 详细信息
来源: 评论
CodeEnhance: A Codebook-Driven Approach for Low-Light Image Enhancement
arXiv
收藏 引用
arxiv 2024年
作者: Wu, Xu Hou, xianXu Lai, Zhihui Zhou, Jie Zhang, Ya-Nan Pedrycz, Witold Shen, Linlin The Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518060 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Shenzhen518060 China School of AI and Advanced Computing Xi’an Jiaotong-Liverpool University China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University SZU Branch Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518060 China The Department of Electrical & Computer Engineering University of Alberta University of Alberta Canada
Low-light image enhancement (LLIE) aims to improve low-illumination images. However, existing methods face two challenges: (1) uncertainty in restoration from diverse brightness degradations;(2) loss of texture and co... 详细信息
来源: 评论
ADA-GAD: Anomaly-Denoised Autoencoders for Graph Anomaly Detection
arXiv
收藏 引用
arxiv 2023年
作者: He, Junwei Xu, Qianqian Jiang, Yangbangyan Wang, Zitai Huang, Qingming Key Laboratory of Intelligent Information Processing Institute of Computing Technology CAS Beijing China School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China Institute of Information Engineering CAS Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China Key Laboratory of Big Data Mining and Knowledge Management Chinese Academy of Sciences Beijing China
Graph anomaly detection is crucial for identifying nodes that deviate from regular behavior within graphs, benefiting various domains such as fraud detection and social network. Although existing reconstruction-based ... 详细信息
来源: 评论
Physical Information Neural Networks for Solving High-index Differential-algebraic Equation Systems Based on Radau Methods
arXiv
收藏 引用
arxiv 2023年
作者: Chen, Jiasheng Tang, Juan Yan, Ming Lai, Shuai Liang, Kun Lu, Jianguang Yang, Wenqiang Institute of Computing Science and Technology Guangzhou University Guangzhou China School of Computer Science and Cyber Engineering Guangzhou University Guangzhou China Singapore Singapore State Key Laboratory of Public Big Data Guizhou University Guiyang China Chongqing Institute of Green and Intelligent Technology Chinese Academy of Sciences Chongqing China
As is well known, differential algebraic equations (DAEs), which are able to describe dynamic changes and underlying constraints, have been widely applied in engineering fields such as fluid dynamics, multi-body dynam... 详细信息
来源: 评论
Distilled Transformers with Locally Enhanced Global Representations for Face Forgery Detection
arXiv
收藏 引用
arxiv 2024年
作者: Zhang, Yaning Li, Qiufu Yu, Zitong Shen, Linlin Computer Vision Institute College of Computer Science and Software Engineering Shenzhen University Guangdong Shenzhen518060 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Guangdong Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Shenzhen518129 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen University Guangdong Shenzhen518060 China School of Computing and Information Technology Great Bay University Guangdong Dongguan523000 China
Face forgery detection (FFD) is devoted to detecting the authenticity of face images. Although current CNN-based works achieve outstanding performance in FFD, they are susceptible to capturing local forgery patterns g... 详细信息
来源: 评论
Towards Unified Token Learning for Vision-Language Tracking
arXiv
收藏 引用
arxiv 2023年
作者: Zheng, Yaozong Zhong, Bineng Liang, Qihua Li, Guorong Ji, Rongrong Li, xianxian The Key Laboratory of Education Blockchain and Intelligent Technology Ministry of Education Guangxi Normal University Guilin541004 China The Guangxi Key Laboratory of Multi-Source Information Mining and Security Guangxi Normal University Guilin541004 China The School of Computer Science and Technology Key Laboratory of Big Data Mining and Knowledge Management University of Chinese Academy of Sciences Beijing100049 China Media Analytics and Computing Lab Department of Artificial Intelligence School of Informatics Xiamen University 361005 China
In this paper, we present a simple, flexible and effective vision-language (VL) tracking pipeline, termed MMTrack, which casts VL tracking as a token generation task. Traditional paradigms address VL tracking task ind... 详细信息
来源: 评论