咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是101-110 订阅
排序:
A Group Oriented Cryptosystem for the Vector Space Access Structure
收藏 引用
Journal of Shanghai Jiaotong university(science) 2006年 第2期11卷 184-187页
作者: 许春香 马华 周军会 肖国铮 School of Computer Science and Eng. Univ. of Electronic Science and Technology of China Chengdu 610054 China Key Lab. of Computer Networks & Information Security Xidian Univ. Xi'an 710071
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr... 详细信息
来源: 评论
Syntax-enhanced pre-trained model  59
Syntax-enhanced pre-trained model
收藏 引用
Joint Conference of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL-IJCNLP 2021
作者: Xu, Zenan Guo, Daya Tang, Duyu Su, Qinliang Shou, Linjun Gong, Ming Zhong, Wanjun Quan, Xiaojun Jiang, Daxin Duan, Nan School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Microsoft Research Asia Beijing China Microsoft Search Technology Center Asia Beijing China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Key Lab. of Machine Intelligence and Advanced Computing Ministry of Education China
We study the problem of leveraging the syntactic structure of text to enhance pre-trained models such as BERT and RoBERTa. Existing methods utilize syntax of text either in the pre-training stage or in the fine-tuning... 详细信息
来源: 评论
Spatial-Temporal Person Re-identification
arXiv
收藏 引用
arXiv 2018年
作者: Wang, Guangcong Lai, Jianhuang Huang, Peigen Xie, Xiaohua School of Data and Computer Science Sun Yat-sen University China Guangdong Key Laboratory of Information Security Technology Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education
Most of current person re-identification (ReID) methods neglect a spatial-temporal constraint. Given a query image, conventional methods compute the feature distances between the query image and all the gallery images... 详细信息
来源: 评论
Group oriented cryptosystem for the vector space access structure
收藏 引用
Journal of Shanghai Jiaotong University (science) 2006年 第2期11 E卷 184-187页
作者: Xu, Chun-Xiang Ma, Hua Zhou, Jun-Hui Xiao, Guo-Zheng School of Computer Science and Eng. Univ. of Electronic Science and Technology of China Chengdu 610054 China Key Lab. of Computer Networks and Information Security Xidian Univ. Xi'an 710071 China
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
ADCrowdNet: An Attention-Injective Deformable Convolutional Network for Crowd Understanding
arXiv
收藏 引用
arXiv 2018年
作者: Liu, Ning Long, Yongchao Zou, Changqing Niu, Qun Pan, Li Wu, Hefeng School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology University of Maryland Shanghai Jiao Tong University Guangdong University of Foreign Studies WINNER Technology
We propose an attention-injective deformable convolutional network called ADCrowdNet for crowd understanding that can address the accuracy degradation problem of highly congested noisy scenes. ADCrowdNet contains two ... 详细信息
来源: 评论
Multicast algorithms based on minimum delay tree
收藏 引用
Journal of Computational information Systems 2012年 第10期8卷 4039-4046页
作者: Zheng, Xinwei Jiang, Wenchao Wang, Xiaoyun Yuan, Zhibin Information Science School of Guangdong University of Business Studies Guangzhou 510023 China Computer School of Guangdong University of Technology Guangzhou 510006 China The Key Lab. of E-Business Market Application on Technology of Guangdong Province Guangzhou 510023 China
In constructing an efficient multicast tree of application-level multicast, not only the delay of link should be considered, but also the process delay of many end systems in sending and transmitting data can not be i... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Dense-captioning events in videos: Sysu submission to Activitynet Challenge 2020
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Teng Zheng, Huicheng Yu, Mingjing School of Data and Computer Science Sun Yat-sen University Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangdong Province Key Laboratory of Information Security Technology China
This technical report presents a brief description of our submission to the dense video captioning task of ActivityNet Challenge 2020. Our approach follows a two-stage pipeline: first, we extract a set of temporal eve...
来源: 评论
Age and Energy Tradeoff for Short Packet Based Two-Hop Decode-and-Forward Relaying Networks
Age and Energy Tradeoff for Short Packet Based Two-Hop Decod...
收藏 引用
IEEE Conference on Wireless Communications and Networking
作者: Mangang Xie Jie Gong Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Real-time and energy-efficient transmissions are two critical demands for status update systems, however it is difficult to meet these requirements simultaneously. This paper focuses on the tradeoff between the averag... 详细信息
来源: 评论