咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 13 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 7 篇 信息与通信工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 电气工程
    • 2 篇 建筑学
    • 2 篇 城乡规划学
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 7 篇 法学
    • 6 篇 社会学
    • 1 篇 公安学
  • 6 篇 理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 6 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...

主题

  • 4 篇 deep learning
  • 2 篇 face recognition
  • 2 篇 computer crime
  • 2 篇 servers
  • 2 篇 crime
  • 2 篇 databases
  • 2 篇 sentiment analys...
  • 2 篇 digital forensic...
  • 1 篇 knowledge based ...
  • 1 篇 data privacy
  • 1 篇 cross-domain lea...
  • 1 篇 strips
  • 1 篇 safety
  • 1 篇 generative adver...
  • 1 篇 encoding (symbol...
  • 1 篇 personal semanti...
  • 1 篇 automation
  • 1 篇 biological neura...
  • 1 篇 fingerprint reco...
  • 1 篇 transformer bloc...

机构

  • 8 篇 key laboratory o...
  • 3 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 advanced cryptog...
  • 2 篇 zhejiang police ...
  • 2 篇 southeast univer...
  • 2 篇 school of comput...
  • 2 篇 college of infor...
  • 2 篇 wenzhou public s...
  • 2 篇 faculty of artif...
  • 2 篇 big-data and net...
  • 2 篇 guizhou universi...
  • 2 篇 henan polytechni...
  • 1 篇 center for spati...
  • 1 篇 guangdong key la...
  • 1 篇 state key labora...
  • 1 篇 department of fo...
  • 1 篇 key laboratory o...
  • 1 篇 department of ci...
  • 1 篇 college of mathe...

作者

  • 4 篇 liu qiang
  • 4 篇 chen guangxuan
  • 3 篇 zhang lei
  • 3 篇 guangxuan chen
  • 3 篇 chen cui
  • 3 篇 qiang liu
  • 2 篇 tan weijie
  • 2 篇 li yao
  • 2 篇 jing zhang
  • 2 篇 ye fangyi
  • 2 篇 qin panke
  • 2 篇 yao li
  • 2 篇 weijie ding
  • 2 篇 qi qinhui
  • 2 篇 mahmoud emam
  • 2 篇 li chunguo
  • 2 篇 jianfeng lu
  • 1 篇 yuyang cai
  • 1 篇 ding weijie
  • 1 篇 jianfeng zhou

语言

  • 26 篇 英文
检索条件"机构=Key Laboratory of Public Security Information Application Based on Big-Data Architecture"
26 条 记 录,以下是1-10 订阅
排序:
A Knowledge Enhanced Pre-Training Model for Chinese Weibo Sentiment Analysis  9
A Knowledge Enhanced Pre-Training Model for Chinese Weibo Se...
收藏 引用
9th International Conference on Cloud Computing and big data Analytics, ICCCBDA 2024
作者: Yao, Li Zhejiang Police College Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou China
Sentiment analysis aims to automatically identify and extract subjective information such as tendencies, stances, evaluations, and opinions from text. Current state-of-the-art Natural Language Processing (NLP) methods... 详细信息
来源: 评论
An alert-situation text data augmentation method based on MLM
收藏 引用
High Technology Letters 2024年 第4期30卷 389-396页
作者: DING Weijie MAO Tingyun CHEN Lili ZHOU Mingwei YUAN Ying HU Wentao Department of Computer and Information Security Zhejiang Police CollegeHangzhou 310053P.R.China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityHangzhou 310053P.R.China Zhejiang Dahua Technology Co. LtdHangzhou 310053P.R.China
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obta... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
Image inpainting via Smooth Tucker decomposition and Low-rank Hankel constraint
收藏 引用
International Journal of Computers and applications 2023年 第6期45卷 421-432页
作者: Cai, Jing Jiang, Jiawei Wang, Yibing Zheng, Jianwei Xu, Honghui Department of Forensic Science Zhejiang Police College Hangzhou China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Hangzhou China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Image inpainting, aiming at exactly recovering missing pixels from partially observed entries, is typically an ill-posed problem. As a powerful constraint, low-rank priors have been widely applied in image inpainting ... 详细信息
来源: 评论
Source Camera Identification Algorithm based on Multi-Scale Feature Fusion
收藏 引用
Computers, Materials & Continua 2024年 第8期80卷 3047-3065页
作者: Jianfeng Lu Caijin Li Xiangye Huang Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Shangyu Institute of Science and Engineering Hangzhou Dianzi UniversityShaoxing312300China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become inc... 详细信息
来源: 评论
Intelligence Analysis of Crime of Helping Cybercrime Delinquency based on Knowledge Ggraph  5
Intelligence Analysis of Crime of Helping Cybercrime Delinqu...
收藏 引用
5th IEEE Advanced information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Qi, Qinhui Chen, Guangxuan Ye, Fangyi Lin, Zihao Liu, Qiang Zhejiang Police College Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
This paper studies the crime of helping cybercrime delinquency (CHCD) from two aspects: theoretical literature research and case empirical research. First of all, clarify the basic concept, development trend and case ... 详细信息
来源: 评论
A Research on application Server-Oriented Digital Forensics in New Types of Network Crime  5
A Research on Application Server-Oriented Digital Forensics ...
收藏 引用
5th IEEE Advanced information Management, Communicates, Electronic and Automation Control Conference, IMCEC 2022
作者: Liao, Bozheng Chen, Guangxuan Wu, Jiajian Xu, Yingying Liu, Qiang Zhejiang Police College Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
In the process of application server investigation and evidence collection of new types of network crime, this paper summarizes the analysis of common server clusters, virtual private network servers and IP-based voic... 详细信息
来源: 评论
A Knowledge Enhanced Pre-Training Model for Chinese Weibo Sentiment Analysis
A Knowledge Enhanced Pre-Training Model for Chinese Weibo Se...
收藏 引用
IEEE International Conference on Cloud Computing and big data Analysis (ICCCBDA)
作者: Li Yao Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Sentiment analysis aims to automatically identify and extract subjective information such as tendencies, stances, evaluations, and opinions from text. Current state-of-the-art Natural Language Processing (NLP) methods... 详细信息
来源: 评论
A Sketch-based Generation Model for Diverse Ceramic Tile Images Using Generative Adversarial Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 2865-2882页
作者: Jianfeng Lu Xinyi Liu Mengtao Shi Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
Ceramic tiles are one of the most indispensable materials for interior *** ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural *** this paper,we propose a... 详细信息
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论