×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [20]
清华大学 [11]
西北高原生物研究所 [9]
自动化研究所 [8]
湖南大学 [6]
深圳先进技术研究院 [4]
更多...
内容类型
期刊论文 [71]
其他 [10]
学位论文 [8]
会议论文 [5]
会议 [1]
发表日期
2023 [2]
2021 [1]
2020 [2]
2019 [10]
2018 [3]
2017 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共95条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
LE-YOLOv5: A Lightweight and Efficient Road Damage Detection Algorithm Based on Improved YOLOv5
期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 卷号: 2023, 页码: 17
作者:
Diao, Zhuo
;
Huang, Xianfu
;
Liu, Han
;
Liu, Zhanwei
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/10/30
Polarized Image Translation From Nonpolarized Cameras for Multimodal Face Anti-Spoofing
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 卷号: 18, 页码: 5651-5664
作者:
Tian, Yu
;
Huang, Yalin
;
Zhang, Kunbo
;
Liu, Yue
;
Sun, Zhenan
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/11/16
Face recognition
Faces
Feature extraction
Imaging
Three-dimensional displays
Robustness
Costs
Face antispoofing
image translation
polarization
multimodal
Multi-Level Multi-Modal Cross-Attention Network for Fake News Detection
期刊论文
IEEE ACCESS, 2021, 卷号: 9, 页码: 132363-132373
作者:
Ying, Long
;
Yu, Hui
;
Wang, Jinguang
;
Ji, Yongze
;
Qian, Shengsheng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/11/03
Feature extraction
Semantics
Visualization
Task analysis
Bit error rate
Convolutional neural networks
Social networking (online)
Multi-level neural networks
fake news detection
multi-modal fusion
High-precision nonlocal temporal correlation identification of entangled photon pairs for quantum clock synchronization
期刊论文
REVIEW OF SCIENTIFIC INSTRUMENTS, 2020, 卷号: 91, 期号: 12, 页码: 6
作者:
Quan, Runai
;
Dong, Ruifang
;
Xiang, Xiao
;
Li, Baihong
;
Liu, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/11/29
Features Combined Binary Descriptor Based on Voted Ring-Sampling Pattern
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2020, 卷号: 30, 期号: 10, 页码: 3675-3687
作者:
Liu, Hongmin
;
Zhang, Qianqian
;
Fan, Bin
;
Wang, Zhiheng
;
Han, Junwei
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2021/01/07
Histograms
Feature extraction
Encoding
Task analysis
Fans
Computational efficiency
Memory management
Binary descriptor
combined features
gradient feature
intensity feature
ring-sampling pattern
voting strategy
SEMG Feature Extraction Based on Stockwell Transform Improves Hand Movement Recognition Accuracy
期刊论文
SENSORS, 2019, 卷号: 19, 期号: 20, 页码: 15
作者:
She, Haotian
;
Zhu, Jinying
;
Tian, Ye
;
Wang, Yanchao
;
Yokoi, Hiroshi
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/03/30
surface EMG signal
feature extraction
Stockwell transform
hand movement recognition
Photon-Counting Underwater Optical Wireless Communication for Reliable Video Transmission Using Joint Source-Channel Coding Based on Distributed Compressive Sensing
期刊论文
SENSORS, 2019, 卷号: 19, 期号: 5
作者:
Hong, Zhu
;
Yan, Qiurong
;
Li, Zihang
;
Zhan, Ting
;
Wang, Yuhao
收藏
  |  
浏览/下载:80/0
  |  
提交时间:2019/04/22
photon-counting
underwater optical wireless communication
distributed compressive video sensing
Co-occurrence matching of local binary patterns for improving visual adaption and its application to smoke recognition
期刊论文
IET COMPUTER VISION, 2019, 卷号: 13, 期号: 2(SI), 页码: 178-187
作者:
Yuan, Feiniu
;
Shi, Jinting
;
Xia, Xue
;
Huang, Qinghua
;
Li, Xuelong
收藏
  |  
浏览/下载:47/0
  |  
提交时间:2019/03/14
Bending Correction of 2D Optical Fiber Spectra Based on Normal Mapping Method
期刊论文
SPECTROSCOPY AND SPECTRAL ANALYSIS, 2019, 卷号: 39, 期号: 2, 页码: 622-627
作者:
Zhu Hai-jing
;
Qiu Bo
;
Chen Jian-jun
;
Fan Xiao-dong
;
Han Bo-chong
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2020/03/10
2D optical fiber spectra
Normal mapping method
Bending correction
Cryptanalysis and Enhancement of an Image Encryption Scheme Based on Bit-Plane Extraction and Multiple Chaotic Maps
期刊论文
IEEE Access, 2019, 卷号: Vol.7, 页码: 74070-74080
作者:
Yu Liu
;
Zheng Qin
;
Jiahui Wu
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/13
Encryption
Logistics
Random sequences
Digital images
Data mining
Image encryption
plaintext attacks
security analysis
dynamic diffusion
chaotic cryptanalysis
©版权所有 ©2017 CSpace - Powered by
CSpace