咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 6 篇 federated learni...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是91-100 订阅
排序:
Notice of Removal: A secure watermarking technique without loss of robustness
Notice of Removal: A secure watermarking technique without l...
收藏 引用
IEEE International Conference on Image Processing
作者: Jian Cao Haodong Li Weiqi Luo Jiwu Huang Shenzhen Graduate School Harbin Institute of Technology Shenzhen China School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology Sun Yat-Sen University Guangzhou China College of Information Engineering and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Removed.
来源: 评论
Notice of Removal: An improved spread transform dither modulation for robust and secure watermarking
Notice of Removal: An improved spread transform dither modul...
收藏 引用
IEEE International Conference on Image Processing
作者: Jian Cao Haodong Li Weiqi Luo Jiwu Huang Shenzhen Graduate School Harbin Institute of Technology Shenzhen China School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology Sun Yat-Sen University Guangzhou China College of Information Engineering and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Removed.
来源: 评论
Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence
Community Detection in Complicated Network Based on the Mult...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Juan-Hui Li Pei-Zhen Li Chang-Dong Wang Jian-Huang Lai Guangdong Key Laboratory of Information Security Technology Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China
This paper addresses the community detection problem in multi-view weighted signed network. Although some methods have been developed to detect communities in multi-view network, they are mostly designed for the unwei... 详细信息
来源: 评论
Adversarial Neural Machine Translation
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Lijun Xia, Yingce Zhao, Li Tian, Fei Qin, Tao Lai, Jianhuang Liu, Tie-Yan School of Data and Computer Science Sun Yat-sen University University of Science and Technology of China Microsoft Research Asia Guangdong Key Laboratory of Information Security Technology
In this paper, we study a new learning paradigm for Neural Machine Translation \(NMT\). Instead of maximizing the likelihood of the human translation as in previous works, we minimize the distinction between human tra... 详细信息
来源: 评论
PEDESTRIAN DETECTION VIA A LEG-DRIVEN PHYSIOLOGY FRAMEWORK
PEDESTRIAN DETECTION VIA A LEG-DRIVEN PHYSIOLOGY FRAMEWORK
收藏 引用
IEEE International Conference on Image Processing
作者: Gongbo Liang Qi Li Xiangui Kang Western Kentucky University Department of Computer Science Ogden College of Science & Engineering Guangdong Key Lab of Information Security Sun Yat-Sen University School of Data and Computer Science
In this paper, we propose a leg-driven physiology framework for pedestrian detection. The framework is introduced to reduce the search space of candidate regions of pedestrians. Given a set of vertical line segments, ... 详细信息
来源: 评论
A cloud-based taxi trace mining framework for smart city
A cloud-based taxi trace mining framework for smart city
收藏 引用
作者: Liu, Jin Yu, Xiao Xu, Zheng Choo, Kim-Kwang Raymond Hong, Liang Cui, Xiaohui State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China Third Research Institute of Ministry of Public Security Shanghai China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States School of Information Technology and Mathematical Science University of South Australia AdelaideSA Australia School of Information Management Wuhan University Wuhan China International School of Software Wuhan University Wuhan China
As a well-known field of big data applications, smart city takes advantage of massive data analysis to achieve efficient management and sustainable development in the current worldwide urbanization process. An importa... 详细信息
来源: 评论
Free ride on LDPC coded transmission
arXiv
收藏 引用
arXiv 2019年
作者: Cai, Suihua Zhao, Shancheng Ma, Xiao School of Electronics and Information Technology Sun Yat-sen University Guangzhou510006 China College of Information Science and Technology Jinan University Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China School of Data and Computer Science and the Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510275 China
In this paper, we formulate a new problem to cope with the transmission of extra bits over an existing coded transmission link (referred to as coded payload link) without any cost of extra transmission energy or extra... 详细信息
来源: 评论
Multiple-Operation Image Anti-Forensics with WGAN-GP Framework
Multiple-Operation Image Anti-Forensics with WGAN-GP Framewo...
收藏 引用
Asia-Pacific Signal and information Processing Association Annual Summit and Conference (APSIPA)
作者: Jianyuan Wu Zheng Wang Hui Zeng Xiangui Kang Guangdong Key Lab of Information Security School of Data and Computer science Sun Yat-sen University China School of Computer Science & Tech. Southwest University of Science and Tech. Mianyang China
A challenging task in the field of multimedia security involves concealing or eliminating the traces left by a chain of multiple manipulating operations, i.e., multiple-operation anti-forensics in short. However, the ... 详细信息
来源: 评论
An improved exact sampling algorithm for the standard normal distribution
arXiv
收藏 引用
arXiv 2020年
作者: Du, Yusong Fan, Baoying Wei, Baodian School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
In 2016, Karney proposed an exact sampling algorithm for the standard normal distribution. In this paper, we study the computational complexity of this algorithm under the random deviate model. Specifically, Karney’s... 详细信息
来源: 评论
Improved xception with dual attention mechanism and feature fusion for face forgery detection
arXiv
收藏 引用
arXiv 2021年
作者: Lin, Hao Luo, Weiqi Wei, Kangkang Liu, Minglin Guangdong Key Lab. of Information Security Technology Sun Yat-Sen University Guangzhou China School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China
With the rapid development of deep learning technology, more and more face forgeries by deepfake are widely spread on social media, causing serious social concern. Face forgery detection has become a research hotspot ... 详细信息
来源: 评论