咨询与建议

限定检索结果

文献类型

  • 221 篇 会议
  • 151 篇 期刊文献
  • 2 册 图书

馆藏范围

  • 374 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 260 篇 工学
    • 182 篇 计算机科学与技术...
    • 148 篇 软件工程
    • 55 篇 信息与通信工程
    • 34 篇 光学工程
    • 30 篇 机械工程
    • 28 篇 控制科学与工程
    • 27 篇 生物工程
    • 23 篇 生物医学工程(可授...
    • 18 篇 电气工程
    • 14 篇 仪器科学与技术
    • 14 篇 电子科学与技术(可...
    • 12 篇 化学工程与技术
    • 9 篇 建筑学
    • 7 篇 材料科学与工程(可...
    • 7 篇 土木工程
    • 7 篇 网络空间安全
    • 6 篇 动力工程及工程热...
    • 6 篇 安全科学与工程
  • 139 篇 理学
    • 85 篇 数学
    • 33 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 31 篇 生物学
    • 11 篇 系统科学
    • 10 篇 化学
  • 91 篇 管理学
    • 48 篇 管理科学与工程(可...
    • 48 篇 图书情报与档案管...
    • 9 篇 工商管理
  • 15 篇 医学
    • 14 篇 临床医学
    • 12 篇 基础医学(可授医学...
  • 7 篇 法学
    • 6 篇 社会学
  • 5 篇 教育学
  • 4 篇 经济学
  • 2 篇 农学
  • 2 篇 艺术学

主题

  • 13 篇 computer vision
  • 12 篇 feature extracti...
  • 10 篇 neural networks
  • 10 篇 laboratories
  • 9 篇 training
  • 8 篇 educational tech...
  • 8 篇 image reconstruc...
  • 8 篇 ubiquitous compu...
  • 7 篇 image enhancemen...
  • 7 篇 convolutional ne...
  • 6 篇 computational mo...
  • 6 篇 genetic algorith...
  • 6 篇 web services
  • 6 篇 ontology
  • 5 篇 image segmentati...
  • 5 篇 face recognition
  • 5 篇 network security
  • 4 篇 conferences
  • 4 篇 semantic segment...
  • 4 篇 delays

机构

  • 92 篇 tianjin key labo...
  • 90 篇 key laboratory o...
  • 36 篇 key laboratory o...
  • 32 篇 key laboratory o...
  • 28 篇 national enginee...
  • 19 篇 tianjin key labo...
  • 16 篇 tianjin key lab ...
  • 14 篇 school of comput...
  • 13 篇 tianjin key lab....
  • 13 篇 key laboratory o...
  • 12 篇 guangxi key labo...
  • 12 篇 computer vision ...
  • 12 篇 shenzhen institu...
  • 11 篇 guangxi colleges...
  • 11 篇 computer vision ...
  • 11 篇 guangdong key la...
  • 9 篇 tianjin key lab ...
  • 8 篇 guangdong provin...
  • 7 篇 college of compu...
  • 7 篇 school of comput...

作者

  • 26 篇 shen linlin
  • 25 篇 zhang hua
  • 21 篇 wang chundong
  • 14 篇 xiao yingyuan
  • 13 篇 xu guangping
  • 12 篇 zhang degan
  • 12 篇 zhang de-gan
  • 12 篇 xue yanbing
  • 12 篇 linlin shen
  • 11 篇 wen xianbin
  • 11 篇 wang huaibin
  • 9 篇 wang xiaoye
  • 9 篇 yu zitong
  • 9 篇 xie weicheng
  • 8 篇 guangping xu
  • 7 篇 li wenjie
  • 7 篇 timofte radu
  • 7 篇 song siyang
  • 7 篇 de-gan zhang
  • 6 篇 xianbin wen

语言

  • 353 篇 英文
  • 11 篇 其他
  • 10 篇 中文
检索条件"机构=Vision and Software Technology Laboratory"
374 条 记 录,以下是1-10 订阅
排序:
Adversarial image detection based on the maximum channel of saliency maps
收藏 引用
Optoelectronics Letters 2022年 第5期18卷 307-312页
作者: FU Haoran WANG Chundong LIN Hao HAO Qingbo Key Laboratory of Computer Vision and System Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China
Studies have shown that deep neural networks(DNNs) are vulnerable to adversarial examples(AEs) that induce incorrect behaviors. To defend these AEs, various detection techniques have been developed. However, most of t... 详细信息
来源: 评论
Unsupervised image-to-image translation by semantics consistency and self-attention
收藏 引用
Optoelectronics Letters 2022年 第3期18卷 175-180页
作者: ZHANG Zhibin XUE Wanli FU Guokai The Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China
Unsupervised image-to-image translation is a challenging task for computer vision. The goal of image translation is to learn a mapping between two domains, without corresponding image pairs. Many previous works only f... 详细信息
来源: 评论
Phishing detection on Ethereum via transaction subgraphs embedding
IET Blockchain
收藏 引用
IET Blockchain 2023年 第4期3卷 194-203页
作者: Lv, Haifeng Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China Guangxi Key Laboratory of Cryptography and Information Security School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology WuZhou University Wuzhou China
With the rapid development of blockchain technology in the financial sector, the security of blockchain is being put to the test due to an increase in phishing fraud. Therefore, it is essential to study more effective... 详细信息
来源: 评论
Light field imaging based on a parallel SVM method for recognizing 2D fake pedestrians
收藏 引用
Optoelectronics Letters 2022年 第1期18卷 48-53页
作者: JIA Chen ZHANG Yao SHI Fan ZHAO Meng Key Laboratory of Computer Vision and System of Ministry of Education Tianjin Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjin University of TechnologyTianjin 300384China The MOE Key Laboratory of Weak-Light Nonlinear Photonics Nankai UniversityTianjin 300457China
It is novel to apply three-dimensional(3D)light field imaging technology to recognize two-dimensional(2D)fake *** this paper,we propose a parallel support vector machine(SVM)method based on 3D light field imaging(ligh... 详细信息
来源: 评论
Pose-guided feature region-based fusion network for occluded person re-identification
Pose-guided feature region-based fusion network for occluded...
收藏 引用
作者: Xie, Gengsheng Wen, Xianbin Yuan, Liming Wang, Jianchen Guo, Changlun Jia, Yansong Li, Minghao School of Computer Science and Engineering Tianjin University of Technology Tianjin300384 China Key Laboratory of Computer Vision and System Ministry of Education Tianjin300384 China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin300384 China
Learning distinguishing features from training datasets while filtering features of occlusions is critical to person retrieval scenarios. Most of the current person re-identification (Re-ID) methods based on classific... 详细信息
来源: 评论
Discrete Geometric Coded Data Layout for Large-scale Object Storage Systems  21
Discrete Geometric Coded Data Layout for Large-scale Object ...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Tian, Yi Xu, Guangping Yang, Hongzhang Ni, Yue Cao, JiaXin Yang, Lei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Novel Software Technology Tianjin Key Laboratory of Intelligence Computing Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China Information Technology Co. Ltd. China
Regenerating codes are new network codes proposed to reduce the data required for fault repair, which can improve the recovery efficiency of faulty nodes in data storage systems. However, unlike Reed-Solomon code, whi... 详细信息
来源: 评论
A Mixed Intrusion Detection System utilizing K-means and Extreme Gradient Boosting  2
A Mixed Intrusion Detection System utilizing K-means and Ext...
收藏 引用
2022 2nd International Conference on Communication technology and Information technology, ICCTIT 2022
作者: Lv, Haifeng Ji, Xiaoyu Ding, Yong Guangxi Key Laboratory of Machine Vision and Intelligent Control WuZhou University Wuzhou China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin China Guangxi Colleges and Universities Key Laboratory of Industry Software Technology Wuzhou University Wuzhou China
The intrusion detection system (IDS) plays an important part because it offers an efficient way to prevent and mitigate cyber attacks. Numerous deep learning methods for intrusion anomaly detection have been developed... 详细信息
来源: 评论
MetaVSR: A Novel Approach to Video Super-Resolution for Arbitrary Magnification  30th
MetaVSR: A Novel Approach to Video Super-Resolution for Ar...
收藏 引用
30th International Conference on MultiMedia Modeling, MMM 2024
作者: Hong, Zixuan Cao, Weipeng Xu, Zhiwu Chen, Zhenru Tao, Xi Ming, Zhong Cao, Chuqing Zheng, Liang College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China Shenzhen518107 China Anhui Province Key Laboratory of Machine Vision Inspection Yangtze River Delta HIT Robot Technology Research Institute Wuhu241000 China
Video super-resolution is a pivotal task that involves the recovery of high-resolution video frames from their low-resolution counterparts, possessing a multitude of applications in real-world scenarios. Within the do... 详细信息
来源: 评论
Ant: An Efficient Lossless Compression Algorithm for IoT Time Series Data  21
Ant: An Efficient Lossless Compression Algorithm for IoT Tim...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud Computing, 16th IEEE International Conference on Social Computing and Networking and 13th International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Li, Junhui Xu, Guangping Yang, Hongzhang Wu, Yulei Tianjin University of Technology School of Computer Science and Engineering Tianjin China Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology Tianjin China Key Laboratory of Computer Vision and System Ministry of Education China University of Bristol Faculty of Science and Engineering Bristol United Kingdom
In various applications in Internet of Things like industrial monitoring, large amounts of floating-point time series data are generated at an unprecedented rate. Efficient compression algorithms can effectively reduc... 详细信息
来源: 评论
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent Diffusion  38
HairDiffusion: Vivid Multi-Colored Hair Editing via Latent D...
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zeng, Yu Zhang, Yang Liu, Jiachen Shen, Linlin Deng, Kaijun He, Weizhao Wang, Jinbao Computer Vision Institute School of Computer Science & Software Engineering Shenzhen University China Shenzhen Institute of Artificial Intelligence and Robotics for Society China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University China Guangdong Provincial Key Laboratory of Intelligent Information Processing China
Hair editing is a critical image synthesis task that aims to edit hair color and hairstyle using text descriptions or reference images, while preserving irrelevant attributes (e.g., identity, background, cloth). Many ...
来源: 评论