咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 6 篇 federated learni...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是161-170 订阅
排序:
View-decoupled Transformer for Person Re-identification under Aerial-ground Camera Network
View-decoupled Transformer for Person Re-identification unde...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Quan Zhang Lei Wang Vishal M. Patel Xiaohua Xie Jianhuang Lai School of Computer Science and Engineering Sun Yat-Sen University China Department of Electrical and Computer Engineering Johns Hopkins University USA Pazhou Lab (HuangPu) Guangdong China Guangdong Province Key Laboratory of Information Security Technology Guangdong China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Existing person re-identification methods have achieved remarkable advances in appearance-based identity association across homogeneous cameras, such as ground-ground matching. However, as a more practical scenario, a... 详细信息
来源: 评论
Cell Graph Transformer for Nuclei Classification
arXiv
收藏 引用
arXiv 2024年
作者: Lou, Wei Li, Guanbin Wan, Xiang Li, Haofeng Shenzhen Research Institute of Big Data Shenzhen China The Chinese University of Hong Kong Shenzhen China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China GuangDong Province Key Laboratory of Information Security Technology China
Nuclei classification is a critical step in computer-aided diagnosis with histopathology images. In the past, various methods have employed graph neural networks (GNN) to analyze cell graphs that model inter-cell rela... 详细信息
来源: 评论
The Minority Matters: A Diversity-Promoting Collab.rative Metric Learning Algorithm
arXiv
收藏 引用
arXiv 2022年
作者: Bao, Shilong Xu, Qianqian Yang, Zhiyong He, Yuan Cao, Xiaochun Huang, Qingming State Key Laboratory of Information Security Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China School of Computer Science and Tech. University of Chinese Academy of Sciences China Alibaba Group China School of Cyber Science and Technology Shenzhen Campus Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China Peng Cheng Laboratory China
Collab.rative Metric Learning (CML) has recently emerged as a popular method in recommendation systems (RS), closing the gap between metric learning and Collab.rative Filtering. Following the convention of RS, existin... 详细信息
来源: 评论
A Provable Secure Server Friendly Two-Party SM2 Singing Protocol for Blockchain IoT
A Provable Secure Server Friendly Two-Party SM2 Singing Prot...
收藏 引用
IEEE Globecom Workshops
作者: Haibo Tian Yinxue Su Zhenquan Liang Guangdong Province Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University Guangzhou Guangdong P. R. China School of Data and Computer Science Sun Yat-Sen University Guangzhou Guangdong P. R. China Shenzhen Digital Certificate Authority Center Co. Ltd Guangzhou Shenzhen P. R. China
The blockchain transaction protocol of IETF shows us an emerging paradigm of blockchain based Internet of Things (BIoT). In this paradigm, a constraint node sends transactions including their device data. Different fr... 详细信息
来源: 评论
Downstream-agnostic Adversarial Examples
arXiv
收藏 引用
arXiv 2023年
作者: Zhou, Ziqi Hu, Shengshan Zhao, Ruizhi Wang, Qian Zhang, Leo Yu Hou, Junhui Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Wuhan University China School of Information and Communication Technology Griffith University Australia Department of Computer Science City University of Hong Kong Hong Kong National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Self-supervised learning usually uses a large amount of unlab.led data to pre-train an encoder which can be used as a general-purpose feature extractor, such that downstream users only need to perform fine-tuning oper... 详细信息
来源: 评论
Enhanced ensemble clustering via fast propagation of cluster-wise similarities
arXiv
收藏 引用
arXiv 2018年
作者: Huang, Dong Wang, Chang-Dong Peng, Hongxing Lai, Jianhuang Kwoh, Chee-Keong College of Mathematics and Informatics South China Agricultural University Guangzhou China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Computational Science Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Ensemble clustering has been a popular research topic in data mining and machine learning. Despite its significant progress in recent years, there are still two challenging issues in the current ensemble clustering re... 详细信息
来源: 评论
Computing integrals involved the gaussian function with a small standard deviation
arXiv
收藏 引用
arXiv 2018年
作者: Ma, Yunyun Ma, Yunyun Xu, Yuesheng Xu, Yuesheng School of Computer Science and Network Security Dongguan University of Technology Dongguan523808 China Department of Mathematics and Statistics Old Dominion University NorfolkVA23529 United States School of Data and Computer Science Guangdong Province Key Lab of Computational Science Sun Yat-sen University Guangzhou510275 China
We develop efficient numerical integration methods for computing an integral whose integrand is a product of a smooth function and the Gaussian function with a small standard deviation. Traditional numerical integrati... 详细信息
来源: 评论
Semi-Supervised Image Captioning Considering Wasserstein Graph Matching
arXiv
收藏 引用
arXiv 2024年
作者: Yang, Yang The Nanjing University of Science and Technology Nanjing210094 China PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information of Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China Ministry of Education State Key Lab. for Novel Software Technology Nanjing University China
Image captioning can automatically generate captions for the given images, and the key challenge is to learn a mapping function from visual features to natural language features. Existing approaches are mostly supervi... 详细信息
来源: 评论
ZSTAD: Zero-Shot Temporal Activity Detection
ZSTAD: Zero-Shot Temporal Activity Detection
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Lingling Zhang Xiaojun Chang Jun Liu Minnan Luo Sen Wang Zongyuan Ge Alexander Hauptmann School of Computer Science and Technology Xi'an Jiaotong University Xian China Ministry of Education Key Lab For Intelligent Networks and Network Security Xian China Faculty of Information Technology Monash University Australia National Engineering Lab for Big Data Analytics Xi'an Jiaotong University Xian China School of Information Technology and Electrical Engineering The University of Queensland Australia School of Computer Science Carnegie Mellon University USA
An integral part of video analysis and surveillance is temporal activity detection, which means to simultaneously recognize and localize activities in long untrimmed videos. Currently, the most effective methods of te... 详细信息
来源: 评论
Detector Collapse: Physical-World Backdooring Object Detection to Catastrophic Overload or Blindness in Autonomous Driving
arXiv
收藏 引用
arXiv 2024年
作者: Zhang, Hangtao Hu, Shengshan Wang, Yichen Zhang, Leo Yu Zhou, Ziqi Wang, Xianlong Zhang, Yanjun Chen, Chao School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China Cluster and Grid Computing Lab China School of Information and Communication Technology Griffith University Australia University of Technology Sydney Australia RMIT University Australia
Object detection tasks, crucial in safety-critical systems like autonomous driving, focus on pinpointing object locations. These detectors are known to be susceptible to backdoor attacks. However, existing backdoor te... 详细信息
来源: 评论