咨询与建议

限定检索结果

文献类型

  • 163 篇 期刊文献
  • 96 篇 会议

馆藏范围

  • 259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 198 篇 工学
    • 152 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 62 篇 信息与通信工程
    • 25 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 84 篇 理学
    • 46 篇 数学
    • 26 篇 生物学
    • 17 篇 物理学
    • 16 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 deep neural netw...
  • 8 篇 convolution
  • 8 篇 training
  • 7 篇 decoding
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 deep learning
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 guangdong key la...
  • 23 篇 key laboratory o...
  • 21 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 18 篇 guangdong provin...
  • 17 篇 school of cyber ...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of electr...
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 14 篇 guangdong key la...
  • 13 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 13 篇 jin hai
  • 11 篇 hu shengshan
  • 11 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 kang xiangui
  • 9 篇 wang chang-dong
  • 9 篇 xiao ma
  • 8 篇 wan wei
  • 8 篇 lai jian-huang
  • 8 篇 ma xiao
  • 7 篇 luo weiqi
  • 7 篇 zhou ziqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 hai jin

语言

  • 232 篇 英文
  • 26 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
259 条 记 录,以下是111-120 订阅
排序:
Example-based web page recoloring method
收藏 引用
Frontiers of computer science 2020年 第5期14卷 229-231页
作者: Yonghao Long Zhihao Zang Xiangping Chen Fan Zhou Xiaonan Luo School of Data and Computer Science National Engineering Research Center of Digital LifeSun Yat-sen UniversityGuangzhou510006China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion The School of Communication and DesignSun Yat-sen UniversityGuangzhou510006China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
1 Introduction The user interface(UI)is very important for a software product,and a well-designed UI will attract users and make a good *** has been shown that color plays an important role in invoking emotional react... 详细信息
来源: 评论
Joint Transmit Precoding and Rate Allocation for Rate-Splitting Multiple Access Based Wireless Backhaul HetNets
Joint Transmit Precoding and Rate Allocation for Rate-Splitt...
收藏 引用
IEEE International Conference on Communications (ICC)
作者: Guangyuan Zheng Miaowen Wen Yingyang Chen Yik-Chung Wu H. Vincent Poor School of Electronic and Information Engineering South China University of Technology Guangzhou China College of Information Science and Technology Jinan University Guangzhou China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Guangzhou China Department of Electrical and Electronic Engineering The University of Hong Kong Hong Kong Department of Electrical and Computer Engineering Princeton University Princeton NJ USA
In this paper, we investigate the application of rate-splitting multiple access (RSMA) in a two-tier wireless backhaul heterogeneous network (HetNet), where a macro base station (MBS) simultaneously transmits wireless...
来源: 评论
Privacy-aware OrLa based access control model in the cloud  32
Privacy-aware OrLa based access control model in the cloud
收藏 引用
32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
作者: Shao, Pengfei Jin, Shuyuan School of Data and Computer Science Sun Yat-sen University Guangzhou China GuangDong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In recent years, cloud computing has been widely adopted by an increasing number of enterprises and individuals because of its attractive features, such as its large scale, low costs, and pay-per-use. Nevertheless, tr... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collab.rative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
Halftone Image Steganography with Distortion Measurement Based on Structural Similarity  18th
Halftone Image Steganography with Distortion Measurement Bas...
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Liu, Wanteng Yin, Xiaolin Lu, Wei Zhang, Junhong School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China
For halftone image data hiding, it is difficult to achieve good visual quality and statistical security when high embedding capacity is demanded. In this paper, a secure steganographic scheme for halftone image is pro... 详细信息
来源: 评论
Improved xception with dual attention mechanism and feature fusion for face forgery detection
arXiv
收藏 引用
arXiv 2021年
作者: Lin, Hao Luo, Weiqi Wei, Kangkang Liu, Minglin Guangdong Key Lab. of Information Security Technology Sun Yat-Sen University Guangzhou China School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China
With the rapid development of deep learning technology, more and more face forgeries by deepfake are widely spread on social media, causing serious social concern. Face forgery detection has become a research hotspot ... 详细信息
来源: 评论
Perceptive self-supervised learning network for noisy image watermark removal
arXiv
收藏 引用
arXiv 2024年
作者: Tian, Chunwei Zheng, Menghua Li, Bo Zhang, Yanning Zhang, Shichao Zhang, David School of Software Northwestern Polytechnical University Xi’an710129 China National Engineering Laboratory for Integrated Aero-Space-Ground-Ocean Big Data Application Technology Xi’an710129 China School of Electronics and Information Northwestern Polytechnical University Xi’an710129 China School of Computer Science Northwestern Polytechnical University National Engineering Laboratory for Integrated AeroSpace-Ground-Ocean Big Data Application Technology Xi’an710129 China Guangxi Key Lab of Multisource Information Mining & Security College of Computer Science & Engineering Guangxi Normal University Guilin541004 China Shenzhen518172 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen518172 China
Popular methods usually use a degradation model in a supervised way to learn a watermark removal model. However, it is true that reference images are difficult to obtain in the real world, as well as collected images ... 详细信息
来源: 评论
Syntax-enhanced pre-trained model  59
Syntax-enhanced pre-trained model
收藏 引用
Joint Conference of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, ACL-IJCNLP 2021
作者: Xu, Zenan Guo, Daya Tang, Duyu Su, Qinliang Shou, Linjun Gong, Ming Zhong, Wanjun Quan, Xiaojun Jiang, Daxin Duan, Nan School of Computer Science and Engineering Sun Yat-Sen University Guangzhou China Microsoft Research Asia Beijing China Microsoft Search Technology Center Asia Beijing China Guangdong Key Laboratory of Big Data Analysis and Processing Guangzhou China Key Lab. of Machine Intelligence and Advanced Computing Ministry of Education China
We study the problem of leveraging the syntactic structure of text to enhance pre-trained models such as BERT and RoBERTa. Existing methods utilize syntax of text either in the pre-training stage or in the fine-tuning... 详细信息
来源: 评论
DRL-M4MR: An Intelligent Multicast Routing Approach Based on DQN Deep Reinforcement Learning in SDN
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Chenwei Ye, Miao Xue, Xingsi Lv, Jianhui Jiang, Qiuxiang Wang, Yong School of Information and Communication Guilin University of Electronic Technology Guilin541004 China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin University of Electronic Technology Guilin541004 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China Peng Cheng Lab. Guangdong Shenzhen518038 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China
Traditional multicast routing methods have some problems in constructing a multicast tree, such as limited access to network state information, poor adaptability to dynamic and complex changes in the network, and infl... 详细信息
来源: 评论
Blockchain-Based Homomorphic Transaction Framework for Enhanced Consumer security and Business Scalab.lity
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Guo, Tao Shang, Fengjun Dai, Xiangguang Liu, Qilie Chongqing University of Posts and Telecommunications School of Computer Science and Technology Chongqing400065 China Key Laboratory of Big Data Intelligent Computing Chongqing400065 China Chongqing Three Gorges University Key Lab. of Intelligent Info. Proc. and Contr. of Chongqing Munic. Institutions of Higher Education Chongqing Engineering Research Center of Internet of Things and Intelligent Control Technology School of Three Gorges Artificial Intelligence Chongqing400044 China Chongqing University of Posts and Telecommunications School of Communications and Information Engineering Chongqing400065 China
Energy trading in distributed microgrids represents an effective means of enhancing the utilization of renewable energy. However, the aggregation of large-scale consumption data may encounter business scalab.lity issu... 详细信息
来源: 评论