咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 96 篇 会议

馆藏范围

  • 258 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 194 篇 工学
    • 152 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 11 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 82 篇 理学
    • 45 篇 数学
    • 25 篇 生物学
    • 17 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 deep neural netw...
  • 8 篇 convolution
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 deep learning
  • 4 篇 contrastive lear...
  • 4 篇 machine learning
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 24 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 22 篇 school of comput...
  • 18 篇 guangdong provin...
  • 17 篇 peng cheng labor...
  • 17 篇 school of cyber ...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of electr...
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 14 篇 guangdong key la...
  • 13 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 13 篇 jin hai
  • 11 篇 hu shengshan
  • 11 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 kang xiangui
  • 9 篇 xiao ma
  • 8 篇 wan wei
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 zhou ziqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 xiaohua xie
  • 6 篇 huang qingming
  • 6 篇 yang qize

语言

  • 219 篇 英文
  • 38 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
258 条 记 录,以下是101-110 订阅
排序:
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
收藏 引用
science China(information sciences) 2019年 第3期62卷 196-198页
作者: Yusong DU Baodian WEI Huang ZHANG School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Chongqing Key Lab of Computer Network and Communication Technology
Dear editor,Discrete Gaussian sampling, that is, sampling from a discrete Gaussian distribution DΛ,σ,cwith parameter σ> 0 and center c∈R~n over an ndimensional lattice Λ, has been considered by the cryptograph... 详细信息
来源: 评论
BroadCAM: Outcome-agnostic Class Activation Mapping for Small-scale Weakly Supervised Applications
arXiv
收藏 引用
arXiv 2023年
作者: Lin, Jiatai Han, Guoqiang Xu, Xuemiao Liang, Changhong Wong, Tien-Tsin Chen, C.L. Philip Liu, Zaiyi Han, Chu The School of Computer Science and Engineering South China University of Technology Guangdong Guangzhou510006 China Guangdong Provincial Key Laboratory of Artificial Intelligence in Medical Image Analysis and Application Guangzhou510080 China Southern Medical University Guangzhou510080 China School of Computer Science and Engineering South China University of Technology State Key Laboratory of Subtropical Building Science Ministry of Education Key Laboratory of Big Data and Intelligent Robot Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information China Department of Computer Science and Engineering The Chinese University of Hong Kong Hong Kong
Class activation mapping (CAM), a visualization technique for interpreting deep learning models, is now commonly used for weakly supervised semantic segmentation (WSSS) and object localization (WSOL). It is the weight... 详细信息
来源: 评论
Removing Interference and Recovering Content Imaginatively for Visible Watermark Removal
arXiv
收藏 引用
arXiv 2023年
作者: Leng, Yicheng Fang, Chaowei Li, Gen Fang, Yixiang Li, Guanbin School of Artificial Intelligence Xidian University Xi’an China School of Data Science The Chinese University of Hong Kong Shenzhen China Afirstsoft Shenzhen China School of Computer Science and Engineering Research Institute of Sun Yat-sen University in Shenzhen Sun Yat-sen University Guangzhou China GuangDong Province Key Laboratory of Information Security Technology China
Visible watermarks, while instrumental in protecting image copyrights, frequently distort the underlying content, complicating tasks like scene interpretation and image editing. Visible watermark removal aims to elimi... 详细信息
来源: 评论
Twisted-pair superposition transmission
arXiv
收藏 引用
arXiv 2021年
作者: Cai, Suihua Ma, Xiao School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
We propose in this paper a new coding scheme called twisted-pair superposition transmission (TPST). The encoding is to "mix together" a pair of basic codes by superposition, while the decoding can be impleme... 详细信息
来源: 评论
Adaptive Perception for Unified Visual Multi-modal Object Tracking
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2025年
作者: Hu, Xiantao Zhong, Bineng Liang, Qihua Shi, Liangtao Mo, Zhiyi Tai, Ying Yang, Jian Guangxi Normal University Guangxi Key Lab of Multi-Source Information Mining Guilin541004 China Guangxi Normal University Security Guilin541004 China Guangxi Normal University Intelligent Technology Guilin541004 China Guangxi Normal University Ministry of Education Guilin541004 China Wuzhou University School of Data Science Wuzhou543002 China Wuzhou University Software Engineering Wuzhou543002 China Nanjing University State Key Laboratory for Novel Software Technology Suzhou215163 China Nanjing University of Science and Technology School of Computer Science Nanjing210094 China Nanjing University of Science and Technology Engineering Nanjing210094 China
Recently, many multi-modal trackers prioritize RGB as the dominant modality, treating other modalities as auxiliary, and fine-tuning separately various multi-modal tasks. This imbalance in modality dependence limits t... 详细信息
来源: 评论
CRS-Diff: Controllab.e Remote Sensing Image Generation with Diffusion Model
arXiv
收藏 引用
arXiv 2024年
作者: Tang, datao Cao, Xiangyong Hou, Xingsong Jiang, Zhongyuan Liu, Junmin Meng, Deyu The School of Computer Science and Technology the Ministry of Education Key Lab for Intelligent Networks and Network Security Xi’an Jiaotong University Xi’an710049 China The School of Information and Communications Engineering Xi’an Jiaotong University Shaanxi Xi’an710049 China The School of Cyber Engineering Xidian University Shaanxi Xi’an710049 China The School of Mathematics and Statistics the Ministry of Education Key Laboratory of Intelligent Networks and Network Security Xi’an Jiaotong University Shaanxi Xi’an710049 China Guangdong Guangzhou510555 China
The emergence of generative models has revolutionized the field of remote sensing (RS) image generation. Despite generating high-quality images, existing methods are limited in relying mainly on text control condition... 详细信息
来源: 评论
Generalized Face Forgery Detection via Adaptive Learning for Pre-trained Vision Transformer
arXiv
收藏 引用
arXiv 2023年
作者: Luo, Anwei Cai, Rizhao Kong, Chenqi Ju, Yakun Kang, Xiangui Huang, Jiwu Kot, Alex C. The School of Information Technology Jiangxi University of Finance and Economics Nanchang330013 China The School of Computer Science and Engineering Sun Yat-Sen University Guangzhou510006 China Lab. School of Electrical and Electronic Engineering Nanyang Technology University Singapore The Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China The China-Singapore International Joint Research Institute Singapore
With the rapid progress of generative models, the current challenge in face forgery detection is how to effectively detect realistic manipulated faces from different unseen domains. Though previous studies show that p... 详细信息
来源: 评论
Example-based web page recoloring method
收藏 引用
Frontiers of computer science 2020年 第5期14卷 229-231页
作者: Yonghao Long Zhihao Zang Xiangping Chen Fan Zhou Xiaonan Luo School of Data and Computer Science National Engineering Research Center of Digital LifeSun Yat-sen UniversityGuangzhou510006China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion The School of Communication and DesignSun Yat-sen UniversityGuangzhou510006China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
1 Introduction The user interface(UI)is very important for a software product,and a well-designed UI will attract users and make a good *** has been shown that color plays an important role in invoking emotional react... 详细信息
来源: 评论
Joint Transmit Precoding and Rate Allocation for Rate-Splitting Multiple Access Based Wireless Backhaul HetNets
Joint Transmit Precoding and Rate Allocation for Rate-Splitt...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Guangyuan Zheng Miaowen Wen Yingyang Chen Yik-Chung Wu H. Vincent Poor School of Electronic and Information Engineering South China University of Technology Guangzhou China College of Information Science and Technology Jinan University Guangzhou China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Guangzhou China Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Department of Electrical and Computer Engineering Princeton University Princeton NJ USA
In this paper, we investigate the application of rate-splitting multiple access (RSMA) in a two-tier wireless backhaul heterogeneous network (HetNet), where a macro base station (MBS) simultaneously transmits wireless...
来源: 评论
Privacy-aware OrLa based access control model in the cloud  32
Privacy-aware OrLa based access control model in the cloud
收藏 引用
32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
作者: Shao, Pengfei Jin, Shuyuan School of Data and Computer Science Sun Yat-sen University Guangzhou China GuangDong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In recent years, cloud computing has been widely adopted by an increasing number of enterprises and individuals because of its attractive features, such as its large scale, low costs, and pay-per-use. Nevertheless, tr... 详细信息
来源: 评论