咨询与建议

限定检索结果

文献类型

  • 14 篇 会议
  • 12 篇 期刊文献

馆藏范围

  • 26 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 21 篇 工学
    • 13 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 7 篇 信息与通信工程
    • 3 篇 电气工程
    • 3 篇 电子科学与技术(可...
    • 3 篇 控制科学与工程
    • 3 篇 生物工程
    • 2 篇 机械工程
    • 2 篇 建筑学
    • 2 篇 城乡规划学
    • 2 篇 安全科学与工程
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 7 篇 法学
    • 6 篇 社会学
    • 1 篇 公安学
  • 6 篇 理学
    • 3 篇 生物学
    • 1 篇 数学
    • 1 篇 物理学
    • 1 篇 地理学
    • 1 篇 地球物理学
    • 1 篇 地质学
  • 6 篇 管理学
    • 4 篇 管理科学与工程(可...
    • 2 篇 公共管理
    • 1 篇 图书情报与档案管...

主题

  • 4 篇 deep learning
  • 2 篇 face recognition
  • 2 篇 computer crime
  • 2 篇 servers
  • 2 篇 crime
  • 2 篇 databases
  • 2 篇 sentiment analys...
  • 2 篇 digital forensic...
  • 1 篇 knowledge based ...
  • 1 篇 data privacy
  • 1 篇 cross-domain lea...
  • 1 篇 strips
  • 1 篇 safety
  • 1 篇 generative adver...
  • 1 篇 encoding (symbol...
  • 1 篇 personal semanti...
  • 1 篇 automation
  • 1 篇 biological neura...
  • 1 篇 fingerprint reco...
  • 1 篇 transformer bloc...

机构

  • 8 篇 key laboratory o...
  • 3 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 advanced cryptog...
  • 2 篇 zhejiang police ...
  • 2 篇 southeast univer...
  • 2 篇 school of comput...
  • 2 篇 college of infor...
  • 2 篇 wenzhou public s...
  • 2 篇 faculty of artif...
  • 2 篇 big-data and net...
  • 2 篇 guizhou universi...
  • 2 篇 henan polytechni...
  • 1 篇 center for spati...
  • 1 篇 guangdong key la...
  • 1 篇 state key labora...
  • 1 篇 department of fo...
  • 1 篇 key laboratory o...
  • 1 篇 department of ci...
  • 1 篇 college of mathe...

作者

  • 4 篇 liu qiang
  • 4 篇 chen guangxuan
  • 3 篇 zhang lei
  • 3 篇 guangxuan chen
  • 3 篇 chen cui
  • 3 篇 qiang liu
  • 2 篇 tan weijie
  • 2 篇 li yao
  • 2 篇 jing zhang
  • 2 篇 ye fangyi
  • 2 篇 qin panke
  • 2 篇 yao li
  • 2 篇 weijie ding
  • 2 篇 qi qinhui
  • 2 篇 mahmoud emam
  • 2 篇 li chunguo
  • 2 篇 jianfeng lu
  • 1 篇 yuyang cai
  • 1 篇 ding weijie
  • 1 篇 jianfeng zhou

语言

  • 26 篇 英文
检索条件"机构=Key Laboratory of Public Security Information Application Based on Big-data Architecture"
26 条 记 录,以下是21-30 订阅
排序:
A Compressed Deep Convolutional Neural Networks for Face Recognition
A Compressed Deep Convolutional Neural Networks for Face Rec...
收藏 引用
IEEE International Conference on Cloud Computing and big data Analysis (ICCCBDA)
作者: Li Yao Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Zhejiang Police College Hangzhou China
Recent years, deep convolutional neural network has led to significant improvements in face recognition and becomes one of the most popular techniques in computer vision community. However, deep CNN model requires vas... 详细信息
来源: 评论
IntML-KNN: A Few-Shot Radio Frequency Fingerprint Identification Scheme for Lora Devices
收藏 引用
IEEE Signal Processing Letters 2025年 32卷 2259-2263页
作者: Cao, Xin Tan, Weijie Gao, Qiangqiang Hu, Zhilong Li, Chunguo Guizhou University College of Computer Science and Technology Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptograph Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
Deep learning (DL) is widely used in radio frequency fingerprint identification (RFFI). However, in few-shot case, traditional DL-based RFFI need to construct auxiliary dataset to realize radio frequency fingerprint i... 详细信息
来源: 评论
G3SR: Global Graph Guided Session-based Recommendation
arXiv
收藏 引用
arXiv 2022年
作者: Deng, Zhi-Hong Wang, Chang-Dong Huang, Ling Lai, Jian-Huang Yu, Philip S. School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China College of Mathematics and Informatics South China Agricultural University Guangzhou China Guangdong Provincial Key Laboratory of Public Finance and Taxation with Big Data Application China University of Illinois at Chicago ChicagoIL United States
Session-based recommendation tries to make use of anonymous session data to deliver high-quality recommendation under the condition that user-profiles and the complete historical behavioral data of a target user are u... 详细信息
来源: 评论
Research on Digital Forensics Framework for Malicious Behavior in Cloud  4
Research on Digital Forensics Framework for Malicious Behavi...
收藏 引用
4th IEEE Advanced information Technology, Electronic and Automation Control Conference, IAEAC 2019
作者: Chen, Guangxuan Wu, Di Chen, Guangxiao Qin, Panke Zhang, Lei Liu, Qiang Zhejiang Police College Key Laboratory of Public Security Information Application Based on Big Data Architecture MPS Hangzhou China People's Procuratorate of Hangzhou Hangzhou China Wenzhou Public Security Bureau Wenzhou China Universidad Carlos III de Madrid Madrid Spain Henan Polytechnic University Jiaozuo China National Defence University Joint Services Academy Beijing China
The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework o... 详细信息
来源: 评论
Research on KDT-DBSCAN-based Personal Semantic Location Acquisition
Research on KDT-DBSCAN-based Personal Semantic Location Acqu...
收藏 引用
第32届中国控制与决策会议
作者: Rong Nie Zixuan Yao Dong Wei Kaizhang Hou Jishuai Lin Beijing Engineering Research Center of Security Alarm and Security Check School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing Municipal Science and Technology Commission Haidian Branch of Beijing Public Security Bureau
With the development of science and technology in recent years,the planning and construction of smart cities have entered a new *** them,smart city safety management is the foundation that supports the stable developm... 详细信息
来源: 评论
Research on Digital Forensics Framework for Malicious Behavior in Cloud
Research on Digital Forensics Framework for Malicious Behavi...
收藏 引用
IEEE Advanced information Technology, Electronic and Automation Control Conference (IAEAC)
作者: Guangxuan Chen Di Wu Guangxiao Chen Panke Qin Lei Zhang Qiang Liu Key Laboratory of Public Security Information Application Based on Big Data Architecture MPS Zhejiang Police College Hangzhou China The People’s Procuratorate of Hangzhou Hangzhou China Wenzhou Public Security Bureau Wenzhou China Henan Polytechnic University Jiaozuo China Joint Services Academy National Defence University Beijing China
The difficult of detecting, response, tracing the malicious behavior in cloud has brought great challenges to the law enforcement in combating cybercrimes. This paper presents a malicious behavior oriented framework o... 详细信息
来源: 评论