Garfield 发表于 2025-3-21 18:09:43
书目名称Artificial Intelligence影响因子(影响力)<br> http://figure.impactfactor.cn/if/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence影响因子(影响力)学科排名<br> http://figure.impactfactor.cn/ifr/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence网络公开度<br> http://figure.impactfactor.cn/at/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence网络公开度学科排名<br> http://figure.impactfactor.cn/atr/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence被引频次<br> http://figure.impactfactor.cn/tc/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence被引频次学科排名<br> http://figure.impactfactor.cn/tcr/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence年度引用<br> http://figure.impactfactor.cn/ii/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence年度引用学科排名<br> http://figure.impactfactor.cn/iir/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence读者反馈<br> http://figure.impactfactor.cn/5y/?ISSN=BK0162061<br><br> <br><br>书目名称Artificial Intelligence读者反馈学科排名<br> http://figure.impactfactor.cn/5yr/?ISSN=BK0162061<br><br> <br><br>intention 发表于 2025-3-21 21:49:52
Blind Adversarial Training: Towards Comprehensively Robust Models Against Blind Adversarial Attacksning. Most existing AT approaches can be grouped into restricted and unrestricted approaches. Restricted AT requires a prescribed uniform budget for AEs during training, with the obtained results showing high sensitivity to the budget. In contrast, unrestricted AT uses unconstrained AEs, and these o咽下 发表于 2025-3-22 02:58:54
TOAC: Try-On Aligning Conformer for Image-Based Virtual Try-On Alignmentof portraits. Image-based virtual try-on generally consists of two steps: Image-based Virtual Try-on Alignment and Image-based Virtual Try-on Generation. In this paper, we focus on Image-based Virtual Try-on Alignment (IVTA), which plays a pivotal role in virtual try-on and aligns the target garment专心 发表于 2025-3-22 07:24:04
GIST: Transforming Overwhelming Information into Structured Knowledge with Large Language Models language models to analyze and organize the information, generating structured results, including summaries, key points, and questions and answers. The system also utilizes a multimodal information processing approach to enhance comprehension of the content. As the user’s knowledge base grows, GISTGROG 发表于 2025-3-22 10:36:05
AIGCIQA2023: A Large-Scale Image Quality Assessment Database for AI Generated Images: From the Perspniques, AI-based image generation has been applied to various fields. However, AI Generated Images (AIGIs) may have some unique distortions compared to natural images, thus many generated images are not qualified for real-world applications. Consequently, it is important and significant to study sub共同给与 发表于 2025-3-22 16:14:00
TST: Time-Sparse Transducer for Automatic Speech Recognitiones a great memory footprint and computing time when processing a long decoding sequence. To solve this problem, we propose a model named time-sparse transducer, which introduces a time-sparse mechanism into transducer. In this mechanism, we obtain the intermediate representations by reducing the timjabber 发表于 2025-3-22 17:14:17
Enhancing Daily Life Through an Interactive Desktop Robotics Systemlarge language models and performing a variety of desktop-related tasks. The robot’s capabilities include organizing cluttered objects on tables, such as dining tables or office desks, placing them into storage cabinets, as well as retrieving specific items from drawers upon request. This paper provForeknowledge 发表于 2025-3-22 21:36:21
http://reply.papertrans.cn/17/1621/162061/162061_8.png闪光你我 发表于 2025-3-23 01:58:21
A Weakly Supervised Learning Method for Recognizing Childhood Tic Disordersy. In this work, we focus on weakly supervised learning methods for recognizing childhood tic disorders. In situations with limited data availability, we design a relative probability metric based on the characteristics of the data and a multi-phase learning algorithm is proposed based on relative p裁决 发表于 2025-3-23 07:23:50
Detecting Software Vulnerabilities Based on Hierarchical Graph Attention Networkcation or regression models from the source code to detect vulnerabilities, which require lots of high-quality labeled vulnerabilities. However, high-quality labeled vulnerabilities are not easy to be obtained in practical applications. To alleviate this problem, we present an effective and unsuperv