咨询与建议

限定检索结果

文献类型

  • 163 篇 期刊文献
  • 96 篇 会议

馆藏范围

  • 259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 152 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 62 篇 信息与通信工程
    • 25 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 84 篇 理学
    • 46 篇 数学
    • 26 篇 生物学
    • 17 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 deep neural netw...
  • 8 篇 convolution
  • 8 篇 training
  • 7 篇 decoding
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 deep learning
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 guangdong key la...
  • 23 篇 key laboratory o...
  • 21 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 18 篇 guangdong provin...
  • 17 篇 school of cyber ...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of electr...
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 14 篇 guangdong key la...
  • 13 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 13 篇 jin hai
  • 11 篇 hu shengshan
  • 11 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 kang xiangui
  • 9 篇 wang chang-dong
  • 9 篇 xiao ma
  • 8 篇 wan wei
  • 8 篇 lai jian-huang
  • 8 篇 ma xiao
  • 7 篇 luo weiqi
  • 7 篇 zhou ziqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 hai jin

语言

  • 232 篇 英文
  • 26 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
259 条 记 录,以下是1-10 订阅
Layer-Wise Learning Rate Optimization for Task-Dependent Fine-Tuning of Pre-Trained Models: An Evolutionary Approach
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-23页
作者: Bu, Chenyang Liu, Yuxin Huang, Manzong Shao, Jianxuan Ji, Shengwei Luo, Wenjian Wu, Xindong Key Laboratory of Knowledge Engineering with Big Data Ministry of Education and School of Computer Science and Information Engineering Hefei University of Technology Hefei China School of Artificial Intelligence and Big Data Hefei University Hefei China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
The superior performance of large-scale pre-Trained models, such as Bidirectional Encoder Representations from Transformers (BERT) and Generative Pre-Trained Transformer (GPT), has received increasing attention in bot... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Unsigned Road Incidents Detection Using Improved RESNET From Driver-View Images
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年 第5期6卷 1203-1216页
作者: Li, Changping Wang, Bingshu Zheng, Jiangbin Zhang, Yongjun Chen, C.L. Philip Northwestern Polytechnical University School of Software Xi’an710129 China Shenzhen University Guangdong Provincial Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen518060 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China South China University of Technology School of Computer Science and Engineering Guangzhou510641 China
Frequent road incidents cause significant physical harm and economic losses globally. The key to ensuring road safety lies in accurately perceiving surrounding road incidents. However, the highly dynamic nature o... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
Graph Prompt Clustering
收藏 引用
IEEE Transactions on Pattern Analysis and Machine Intelligence 2025年 第7期47卷 5794-5805页
作者: Chen, Man-Sheng Lai, Pei-Yuan Liao, De-Zhang Wang, Chang-Dong Lai, Jian-Huang Sun Yat-sen University School of Computer Science and Engineering Guangzhou510275 China Guangxi Zhuang Autonomous Region Information Center Guangxi Key Laboratory of Digital Infrastructure Nanning530219 China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou510006 China Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Beijing100816 China South China Technology Commercialization Center Guangzhou510006 China Guangdong University of Technology School of Information Engineering Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510033 China Ministry of Education Beijing100044 China
Due to the wide existence of unlab.led graph-structured data (e.g., molecular structures), the graph-level clustering has recently attracted increasing attention, whose goal is to divide the input graphs into several ... 详细信息
来源: 评论
Joint Optimization of Compression, Transmission and Computation for Cooperative Perception Aided Intelligent Vehicular Networks
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 8201-8214页
作者: Lu, Binbin Huang, Xumin Wu, Yuan Qian, Liping Zhou, Sheng Niyato, Dusit University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer and Information Science 999078 China Guangdong University of Technology School of Automation Guangzhou510006 China University of Macau State Key Lab of Internet of Things for Smart City 999078 China University of Macau State Key Laboratory of Internet of Things for Smart City Department of Computer Information Science 999078 China Zhuhai UM Science and Technology AQ2 Research Institute Zhuhai519301 China Zhejiang University of Technology Institute of Cyberspace Security Hangzhou310023 China Tsinghua University Beijing National Research Center for Information Science and Technology Department of Electronic Engineering Beijing100084 China Nanyang Technological University School of Computer Science and Engineering 639815 Singapore
Cooperative perception is a promising paradigm to tackle the perception limitations of a single intelligent vehicle (IV) to enhance the driving safety and efficiency in intelligent vehicular networks. However, the rea... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Contrastive Learning for Robust Android Malware Familial Classification
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2022年 1-14页
作者: Wu, Yueming Dou, Shihan Zou, Deqing Yang, Wei Qiang, Weizhong Jin, Hai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan China Shanghai Key Laboratory of Intelligent Information Processing School of Computer Science Fudan University Shanghai China University of Texas at Dallas Dallas USA National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Cluster and Grid Computing Lab School of Computer Science and Technology Huazhong University of Science and Technology Wuhan China
Due to its open-source nature, Android operating system has been the main target of attackers to exploit. Malware creators always perform different code obfuscations on their apps to hide malicious activities. Feature... 详细信息
来源: 评论
Frozen-DETR: Enhancing DETR with Image Understanding from Frozen Foundation Models  38
Frozen-DETR: Enhancing DETR with Image Understanding from Fr...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518055 China Tongyi Lab Alibaba Group China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China Guangdong Guangzhou510555 China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin...
来源: 评论