×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术研... [9]
作者
Chen, Yuef... [2]
He, Yuan [2]
Huang, Qin... [2]
Li, Xiaoda... [2]
Blum, Volk... [1]
Cao, Xiaoc... [1]
更多...
文献类型
期刊论文 [9]
发表日期
2023 [3]
2022 [3]
2021 [1]
2020 [1]
2016 [1]
语种
英语 [9]
出处
IEEE COMPU... [1]
IEEE JOURN... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
Fundamenta... [2]
Youth Inno... [2]
Alibaba Gr... [1]
Beijing Mu... [1]
CAS Projec... [1]
CAS Projec... [1]
更多...
收录类别
SCI [9]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
限定条件
专题:中国科学院计算技术研究所期刊论文
第一作者的第一单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
Learning-Based Intrinsic Reflectional Symmetry Detection
期刊论文
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2023, 卷号: 29, 期号: 9, 页码: 3799-3808
作者:
Qiao, Yi-Ling
;
Gao, Lin
;
Liu, Shu-Zhi
;
Liu, Ligang
;
Lai, Yu-Kun
;
Chen, Xilin
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/12/04
Mesh processing
symmetry detection
deep learning
intrinsic reflectional symmetry
laplacian
eigenanalysis
Characterizing and Understanding Defense Methods for GNNs on GPUs
期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:
Wu, Meng
;
Yan, Mingyu
;
Yang, Xiaocheng
;
Li, Wenming
;
Zhang, Zhimin
;
Ye, Xiaochun
;
Fan, Dongrui
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Kernel
Purification
Estimation
Graphics processing units
Perturbation methods
Electric breakdown
Training
Graph neural networks
defense
execution semantic
execution pattern
overhead
MaxMatch: Semi-Supervised Learning With Worst-Case Consistency
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5970-5987
作者:
Jiang, Yangbangyan
;
Li, Xiaodan
;
Chen, Yuefeng
;
He, Yuan
;
Xu, Qianqian
;
Yang, Zhiyong
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Predictive models
Training
Data models
Semantics
Perturbation methods
Computational modeling
Benchmark testing
Semi-supervised learning
consistency regularization
worst-case consistency
image classification
Localized Resolution of Identity Approach to the Analytical Gradients of Random-Phase Approximation Ground-State Energy: Algorithm and Benchmarks
期刊论文
JOURNAL OF CHEMICAL THEORY AND COMPUTATION, 2022, 页码: 15
作者:
Tahir, Muhammad N.
;
Zhu, Tong
;
Shang, Honghui
;
Li, Jia
;
Blum, Volker
;
Ren, Xinguo
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2022/12/07
All-Around Real Label Supervision: Cyclic Prototype Consistency Learning for Semi-Supervised Medical Image Segmentation
期刊论文
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 卷号: 26, 期号: 7, 页码: 3174-3184
作者:
Xu, Zhe
;
Wang, Yixin
;
Lu, Donghuan
;
Yu, Lequan
;
Yan, Jiangpeng
;
Luo, Jie
;
Ma, Kai
;
Zheng, Yefeng
;
Tong, Raymond Kai-yu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/12/07
Image segmentation
Prototypes
Biomedical imaging
Perturbation methods
Reliability
Feature extraction
Training
Medical image segmentation
prototype learning
semi-supervised learning
Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective
期刊论文
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2022, 卷号: 31, 页码: 6487-6501
作者:
Zhu, Yao
;
Chen, Yuefeng
;
Li, Xiaodan
;
Chen, Kejiang
;
He, Yuan
;
Tian, Xiang
;
Zheng, Bolun
;
Chen, Yaowu
;
Huang, Qingming
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2023/07/12
Data models
Perturbation methods
Iterative methods
Training
Distributed databases
Predictive models
Neural networks
Adversarial transferability
adversarial attack
black-box attack
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Liang, Ling
;
Hu, Xing
;
Deng, Lei
;
Wu, Yujie
;
Li, Guoqi
;
Ding, Yufei
;
Li, Peng
;
Xie, Yuan
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/06/21
Spatiotemporal phenomena
Computational modeling
Perturbation methods
Biological neural networks
Backpropagation
Unsupervised learning
Training
Adversarial attack
backpropagation through time (BPTT)
neuromorphic computing
spike-compatible gradient
spiking neural networks (SNNs)
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
;
Li, Hai
;
Chen, Yiran
收藏
  |  
浏览/下载:46/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
Maximum bipartite matchings with low rank data: Locality and perturbation analysis
期刊论文
THEORETICAL COMPUTER SCIENCE, 2016, 卷号: 621, 页码: 82-91
作者:
Liu, Xingwu
;
Teng, Shang-Hua
收藏
  |  
浏览/下载:47/0
  |  
提交时间:2019/12/13
Bipartite graphs
Maximum matching
Matrix decomposition
Permutation