咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 91 篇 会议

馆藏范围

  • 253 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 8 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 16 篇 school of cyber ...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 hai jin
  • 6 篇 zhou ziqi

语言

  • 232 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
253 条 记 录,以下是91-100 订阅
排序:
SemiCD-VL: Visual-Language Model Guidance Makes Better Semi-supervised Change Detector
arXiv
收藏 引用
arXiv 2024年
作者: Li, Kaiyu Cao, Xiangyong Deng, Yupeng Song, Jiayi Liu, Junmin Meng, Deyu Wang, Zhi School of Software Engineering Xi’an Jiaotong University Xi’an710049 China School of Computer Science and Technology Ministry of Education Key Lab For Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China Aerospace Information Research Institute Chinese Academy of Sciences Beijing100094 China School of Mathematics and Statistics Ministry of Education Key Lab of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an China Guangdong Guangzhou China
Change Detection (CD) aims to identify pixels with semantic changes between images. However, annotating massive numbers of pixel-level images is lab.r-intensive and costly, especially for multi-temporal images, which ... 详细信息
来源: 评论
Disentangled Noisy Correspondence Learning
arXiv
收藏 引用
arXiv 2024年
作者: Dang, Zhuohang Luo, Minnan Wang, Jihong Jia, Chengyou Han, Haochen Wan, Herun Dai, Guang Chang, Xiaojun Wang, Jingdong The School of Computer Science and Technology The Ministry of Education Key Laboratory of Intelligent Networks and Network Security The Shaanxi Province Key Laboratory of Big Data Knowledge Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China SGIT AI Lab State Grid Shaanxi Electric Power Company Limited State Grid Corporation of China Shaanxi China The School of Information Science and Technology University of Science and Technology China United Arab Emirates The Baidu Inc China
Cross-modal retrieval is crucial in understanding latent correspondences across modalities. However, existing methods implicitly assume well-matched training data, which is impractical as real-world data inevitably in... 详细信息
来源: 评论
Secure linear aggregation using decentralized threshold additive homomorphic encryption for federated learning
arXiv
收藏 引用
arXiv 2021年
作者: Tian, Haibo Zhang, Fangguo Shao, Yunfeng Li, Bingshuai The GuangDong Province Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University Guangdong Guangzhou510275 China Huawei Noah's Ark Lab.
Secure linear aggregation is to linearly aggregate private inputs of different users with privacy protection. The server in a federated learning (FL) environment can fulfill any linear computation on private inputs of... 详细信息
来源: 评论
Hfcyclegan: High-Frequency information Guided Cycle-Consistent Adversarial Network for Fundus Image Enhancement
SSRN
收藏 引用
SSRN 2025年
作者: Liu, Shaopeng Wang, Kai Wu, Xiaohang Xu, Fabao Zhou, Ying Wang, Xinpeng Wang, Qinkang Cen, Haoran Guo, Jianhua Lu, Xu School of Computer Science Guangdong Polytechnic Normal University Guangzhou510665 China Zhongshan Ophthalmic Center State Key Laboratory of Ophthalmology Sun Yat-Sen University Guangdong Guangzhou China Qilu Hospital Shandong University Jinan China Shenzhen Institute of Information Technology Shenzhen China Guangdong Provincial Key Laboratory of Intellectual Property & Big Data Guangzhou510665 China Pazhou Lab Guangzhou510330 China
The development of fundus imaging techniques has greatly supported the diagnosis of ophthalmic *** advancements, poor imaging quality, such as artifacts or insufficient illumination, poses challenges for disease *** c... 详细信息
来源: 评论
Rsh-Bu: Revocable Secret Handshakes with Backward Unlinkability from Vlr Group Signatures
SSRN
收藏 引用
SSRN 2023年
作者: Wen, Yamin Wan, Min Zhao, Junying Gong, Zheng Deng, Yuqiao School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China Big Data and Education Statistics Application Laboratory Guangdong University of Finance and Economics Guangzhou510320 China School of Information Guangdong University of Finance and Economics Guangzhou510320 China School of Computer Science South China Normal University Guangzhou510631 China
Secret handshake scheme is a bi-directional authentication method that enables two participants from the same organization to identify both sides in private. A new generic construction of secret handshakes is proposed... 详细信息
来源: 评论
Reversible data Hiding Based on Partitioning the Prediction Values  18th
Reversible Data Hiding Based on Partitioning the Prediction ...
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wu, Haihang Huang, Fangjun Guangdong Provincial Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University GuangzhouGD510006 China
In this paper, we present a new reversible data hiding (RDH) method. Instead of directly dividing the neighboring pixels into blocks, we sort the pixels according to their prediction values first, and then the sorted ... 详细信息
来源: 评论
ICSGD-Momentum: SGD Momentum Based on Inter-gradient Collision
ICSGD-Momentum: SGD Momentum Based on Inter-gradient Collisi...
收藏 引用
IEEE International Conference on Industrial Informatics (INDIN)
作者: Weidong Zou Weipeng Cao Yuanqing Xia Bineng Zhong Dachuan Li School of Automation Beijing Institute of Technology Beijing China Guangdong Laboratory of Artificial Intelligence and Digital Economy (Shenzhen) Shenzhen China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin China Research Institute of Trustworthy Autonomous Systems Southern University of Science and Technology Shenzhen China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China
Deep neural networks (DNNs) are widely used in fields like computer vision and natural language processing. A key component of DNN training is the optimizer. SGD-Momentum is popular in many DNN methodologies, such as ... 详细信息
来源: 评论
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
science China(information sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
BroadCAM: Outcome-agnostic Class Activation Mapping for Small-scale Weakly Supervised Applications
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Jiatai Han, Guoqiang Xu, Xuemiao Liang, Changhong Wong, Tien-Tsin Chen, C.L. Philip Liu, Zaiyi Han, Chu The School of Computer Science and Engineering South China University of Technology Guangdong Guangzhou510006 China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangzhou510080 China Southern Medical University Guangzhou510080 China School of Computer Science and Engineering South China University of Technology State Key Laboratory of Subtropical Building Science Ministry of Education Key Laboratory of Big Data and Intelligent Robot Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Class activation mapping (CAM), a visualization technique for interpreting deep learning models, is now commonly used for weakly supervised semantic segmentation (WSSS) and object localization (WSOL). It is the weight... 详细信息
来源: 评论
Removing Interference and Recovering Content Imaginatively for Visible Watermark Removal
arXiv
收藏 引用
arXiv 2023年
作者: Leng, Yicheng Fang, Chaowei Li, Gen Fang, Yixiang Li, Guanbin School of Artificial Intelligence Xidian University Xi’an China School of Data Science The Chinese University of Hong Kong Shenzhen China Afirstsoft Shenzhen China School of Computer Science and Engineering Research Institute of Sun Yat-sen University in Shenzhen Sun Yat-sen University Guangzhou China GuangDong Province Key Laboratory of Information Security Technology China
Visible watermarks, while instrumental in protecting image copyrights, frequently distort the underlying content, complicating tasks like scene interpretation and image editing. Visible watermark removal aims to elimi... 详细信息
来源: 评论