咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 13 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 7 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 建筑学
    • 2 篇 城乡规划学
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 7 篇 法学
    • 6 篇 社会学
    • 1 篇 公安学
  • 7 篇 理学
    • 3 篇 生物学
    • 2 篇 数学
    • 1 篇 物理学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 6 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...

主题

  • 4 篇 deep learning
  • 2 篇 face recognition
  • 2 篇 computer crime
  • 2 篇 servers
  • 2 篇 crime
  • 2 篇 databases
  • 2 篇 sentiment analys...
  • 2 篇 digital forensic...
  • 1 篇 knowledge based ...
  • 1 篇 data privacy
  • 1 篇 cross-domain lea...
  • 1 篇 strips
  • 1 篇 safety
  • 1 篇 generative adver...
  • 1 篇 encoding (symbol...
  • 1 篇 personal semanti...
  • 1 篇 automation
  • 1 篇 biological neura...
  • 1 篇 fingerprint reco...
  • 1 篇 transformer bloc...

机构

  • 8 篇 key laboratory o...
  • 3 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 advanced cryptog...
  • 2 篇 zhejiang police ...
  • 2 篇 southeast univer...
  • 2 篇 school of comput...
  • 2 篇 college of infor...
  • 2 篇 wenzhou public s...
  • 2 篇 faculty of artif...
  • 2 篇 big-data and net...
  • 2 篇 guizhou universi...
  • 2 篇 henan polytechni...
  • 1 篇 center for spati...
  • 1 篇 guangdong key la...
  • 1 篇 state key labora...
  • 1 篇 department of fo...
  • 1 篇 key laboratory o...
  • 1 篇 department of ci...
  • 1 篇 college of mathe...

作者

  • 4 篇 liu qiang
  • 4 篇 chen guangxuan
  • 3 篇 zhang lei
  • 3 篇 guangxuan chen
  • 3 篇 chen cui
  • 3 篇 qiang liu
  • 2 篇 tan weijie
  • 2 篇 li yao
  • 2 篇 jing zhang
  • 2 篇 ye fangyi
  • 2 篇 qin panke
  • 2 篇 yao li
  • 2 篇 weijie ding
  • 2 篇 qi qinhui
  • 2 篇 mahmoud emam
  • 2 篇 li chunguo
  • 2 篇 jianfeng lu
  • 1 篇 yuyang cai
  • 1 篇 ding weijie
  • 1 篇 jianfeng zhou

语言

  • 26 篇 英文
检索条件"机构=Key Laboratory of Public Security Information Application Based on Big-Data Architecture"
26 条 记 录,以下是11-20 订阅
排序:
A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection
收藏 引用
Computers, Materials & Continua 2022年 第10期73卷 719-733页
作者: Jie Chen Chengsheng Yuan Chen Cui Zhihua Xia Xingming Sun Thangarajah Akilan School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310053China Jiangsu Yuchi Blockchain Research Institute Nanjing210044China Department of Software Engineering Lakehead UniversityThunder BayON P7B 5E1Canada
Fingerprint identification systems have been widely deployed in many occasions of our daily ***,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit *** address cha... 详细信息
来源: 评论
A Sketch-based Generation Model for Diverse Ceramic Tile Images Using Generative Adversarial Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 2865-2882页
作者: Jianfeng Lu Xinyi Liu Mengtao Shi Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
Ceramic tiles are one of the most indispensable materials for interior *** ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural *** this paper,we propose a... 详细信息
来源: 评论
A Compressed Deep Convolutional Neural Networks for Face Recognition  5
A Compressed Deep Convolutional Neural Networks for Face Rec...
收藏 引用
5th IEEE International Conference on Cloud Computing and big data Analytics, ICCCBDA 2020
作者: Yao, Li Key Lab. of Pub. Secty. Info. Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Recent years, deep convolutional neural network has led to significant improvements in face recognition and becomes one of the most popular techniques in computer vision community. However, deep CNN model requires vas... 详细信息
来源: 评论
Intelligence Analysis of Crime of Helping Cybercrime Delinquency based on Knowledge Ggraph
Intelligence Analysis of Crime of Helping Cybercrime Delinqu...
收藏 引用
IEEE Advanced information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Qinhui Qi Guangxuan Chen Fangyi Ye Zihao Lin Qiang Liu Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
This paper studies the crime of helping cybercrime delinquency (CHCD) from two aspects: theoretical literature research and case empirical research. First of all, clarify the basic concept, development trend and case ... 详细信息
来源: 评论
A Research on application Server-Oriented Digital Forensics in New Types of Network Crime
A Research on Application Server-Oriented Digital Forensics ...
收藏 引用
IEEE Advanced information Management,Communicates,Electronic and Automation Control Conference (IMCEC)
作者: Bozheng Liao Guangxuan Chen Jiajian Wu Yingying Xu Qiang Liu Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
In the process of application server investigation and evidence collection of new types of network crime, this paper summarizes the analysis of common server clusters, virtual private network servers and IP-based voic... 详细信息
来源: 评论
A Knowledge Enhanced Pre-Training Model for Chinese Weibo Sentiment Analysis
A Knowledge Enhanced Pre-Training Model for Chinese Weibo Se...
收藏 引用
IEEE International Conference on Cloud Computing and big data Analysis (ICCCBDA)
作者: Li Yao Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Sentiment analysis aims to automatically identify and extract subjective information such as tendencies, stances, evaluations, and opinions from text. Current state-of-the-art Natural Language Processing (NLP) methods... 详细信息
来源: 评论
A Compressed Deep Convolutional Neural Networks for Face Recognition
A Compressed Deep Convolutional Neural Networks for Face Rec...
收藏 引用
IEEE International Conference on Cloud Computing and big data Analysis (ICCCBDA)
作者: Li Yao Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Recent years, deep convolutional neural network has led to significant improvements in face recognition and becomes one of the most popular techniques in computer vision community. However, deep CNN model requires vas... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang 550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang 550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu 610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing 100015 China Southeast University School of Information Science and Engineering Nanjing 210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
Long Text Classification based on BERT  5
Long Text Classification Based on BERT
收藏 引用
5th IEEE information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2021
作者: Weijie, DIng Yunyi, Li Jing, Zhang Xuchen, Shen Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China Zhejiang Police College Department of Investigation Hangzhou310053 China Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Science and Technology Management Section Hangzhou311203 China
Existing text classification algorithms generally have limitations in terms of text length and yield poor classification results for long texts. To address this problem, we propose a BERT-based long text classificatio... 详细信息
来源: 评论
Research on Digital Forensics Framework for Malicious Behavior in Cloud  4
Research on Digital Forensics Framework for Malicious Behavi...
收藏 引用
4th IEEE Advanced information Technology, Electronic and Automation Control Conference, IAEAC 2019
作者: Chen, Guangxuan Wu, Di Chen, Guangxiao Qin, Panke Zhang, Lei Liu, Qiang Zhejiang Police College Key Laboratory of Public Security Information Application Based on Big Data Architecture MPS Hangzhou China People's Procuratorate of Hangzhou Hangzhou China Wenzhou Public Security Bureau Wenzhou China Universidad Carlos III de Madrid Madrid Spain Henan Polytechnic University Jiaozuo China National Defence University Joint Services Academy Beijing China
The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework o... 详细信息
来源: 评论