咨询与建议

限定检索结果

文献类型

  • 163 篇 期刊文献
  • 96 篇 会议

馆藏范围

  • 259 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 194 篇 工学
    • 152 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 11 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 83 篇 理学
    • 45 篇 数学
    • 26 篇 生物学
    • 17 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 deep neural netw...
  • 8 篇 convolution
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 deep learning
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 24 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 22 篇 school of comput...
  • 18 篇 guangdong provin...
  • 17 篇 peng cheng labor...
  • 17 篇 school of cyber ...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of electr...
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 14 篇 guangdong key la...
  • 13 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 13 篇 jin hai
  • 11 篇 hu shengshan
  • 11 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 kang xiangui
  • 9 篇 xiao ma
  • 8 篇 wan wei
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 zhou ziqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 xiaohua xie
  • 6 篇 huang qingming
  • 6 篇 yang qize

语言

  • 220 篇 英文
  • 38 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
259 条 记 录,以下是161-170 订阅
排序:
An improved exact sampling algorithm for the standard normal distribution
arXiv
收藏 引用
arXiv 2020年
作者: Du, Yusong Fan, Baoying Wei, Baodian School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
In 2016, Karney proposed an exact sampling algorithm for the standard normal distribution. In this paper, we study the computational complexity of this algorithm under the random deviate model. Specifically, Karney’s... 详细信息
来源: 评论
Imperceptible diffusion modification for facial privacy protection
收藏 引用
Neurocomputing 2025年
作者: Jia Li Junhao Dong Jianhuang Lai Xiaohua Xie School of Computer Science and Engineering Sun Yat-sen University Guangzhou China College of Computing and Data Science Nanyang Technological University Singapore Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing (Sun Yat-sen University) Ministry of Education Guangzhou China
The remarkable success of Face Recognition (FR) systems has raised significant privacy concerns, particularly the potential for unauthorized tracking of individuals on social media. To mitigate these risks, various ad...
来源: 评论
FedPHE: A Secure and Efficient Federated Learning via Packed Homomorphic Encryption
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Li, Yuqing Yan, Nan Chen, Jing Wang, Xiong Hong, Jianan He, Kun Wang, Wei Li, Bo Wuhan University Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan430072 China Wuhan University RiZhao Information Technology Institute Rizhao276800 China Huazhong University of Science and Technology National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab/Cluster and Grid Computing Lab School of Computer Science and Technology Wuhan430074 China Shanghai Jiao Tong University School of Cyber Science and Engineering Shanghai200240 China Hong Kong University of Science and Technology Department of Computer Science and Engineering Hong Kong
Cross-silo federated learning (FL) enables multiple institutions (clients) to collab.ratively build a global model without sharing private data. To prevent privacy leakage during aggregation, homomorphic encryption (H... 详细信息
来源: 评论
Dense-captioning events in videos: Sysu submission to Activitynet Challenge 2020
arXiv
收藏 引用
arXiv 2020年
作者: Wang, Teng Zheng, Huicheng Yu, Mingjing School of Data and Computer Science Sun Yat-sen University Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education Guangdong Province Key Laboratory of Information Security Technology China
This technical report presents a brief description of our submission to the dense video captioning task of ActivityNet Challenge 2020. Our approach follows a two-stage pipeline: first, we extract a set of temporal eve...
来源: 评论
Fully distributed certificateless threshold signature without random oracles
收藏 引用
science China(information sciences) 2018年 第9期61卷 259-269页
作者: Wenjie YANG Weiqi LUO Xizhao LUO Jian WENG Anjia YANG College of Cyber Security/College of Information Science and Technology Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving School of Computer and Technology Soochow University
A certificateless(t,n)threshold signature(CLTS)scheme allows at least t members to cooperatively sign a message on behalf of an n-member group,which is a good way to share the responsibility and *** researchers have f... 详细信息
来源: 评论
Block Compressed Sensing-Based Joint Source-Channel Coding for Wireless Image Transmission
Block Compressed Sensing-Based Joint Source-Channel Coding f...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Leqi Zheng Tingting Zhu Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
This paper presents a new joint source-channel coding (JSCC) scheme for wireless image transmission, which combines block compressed sensing (BCS) with systematic convolutional low density generator matrix (SC-LDGM) c... 详细信息
来源: 评论
Universal Physical Camouflage Attacks on Object Detectors
Universal Physical Camouflage Attacks on Object Detectors
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Lifeng Huang Chengying Gao Yuyin Zhou Cihang Xie Alan L. Yuille Changqing Zou Ning Liu School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Department of Computer Science The Johns Hopkins University Max Planck Institute for Informatics University of Maryland College Park
In this paper, we study physical adversarial attacks on object detectors in the wild. Previous works mostly craft instance-dependent perturbations only for rigid or planar objects. To this end, we propose to learn an ... 详细信息
来源: 评论
Dynamic NOMA-Based Computation Offloading in Vehicular Platoons
arXiv
收藏 引用
arXiv 2021年
作者: Zheng, Dongsheng Chen, Yingyang Wei, Lai Jiao, Bingli Hanzo, Lajos The Department of Electronics Peking University Beijing100871 China The College of Information Science and Technology Jinan University Guangzhou510632 China The Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Guangzhou510632 China The School of Electronics and Computer Science University of Southampton SouthamptonSO17 1BJ United Kingdom
Both the Mobile edge computing (MEC)-based and fog computing (FC)-aided Internet of Vehicles (IoV) constitute promising paradigms of meeting the demands of low-latency pervasive computing. To this end, we construct a ... 详细信息
来源: 评论
Confidence-Regulated Generative Diffusion Models for Reliable AI Agent Migration in Vehicular Metaverses
arXiv
收藏 引用
arXiv 2025年
作者: Kang, Yingkai Kang, Jiawen Wen, Jinbo Zhang, Tao Yang, Zhaohui Niyato, Dusit Zhang, Yan School of Automation Guangdong University of Technology Guangzhou510006 China College of Computer Science and Technology Nanjing University of Aeronautics and Astronautics Nanjing210016 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China College of Information Science and Electronic Engineering Zhejiang Provincial Key Lab of information processing communication and networking Zhejiang University Hangzhou310007 China College of Computing and Data Science Nanyang Technological University Singapore Department of Informatics University of Oslo the Simula Research Laboratory Norway
Vehicular metaverses are an emerging paradigm that merges intelligent transportation systems with virtual spaces, leveraging advanced digital twin and Artificial Intelligence (AI) technologies to seamlessly integrate ... 详细信息
来源: 评论
Cross-modal consensus network for weakly supervised temporal action localization
arXiv
收藏 引用
arXiv 2021年
作者: Hong, Fa-Ting Feng, Jia-Chang Xu, Dan Shan, Ying Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Peng Cheng Laboratory Shenzhen China Tencent PCG Shenzhen China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Department of Computer Science and Engineering HKUST Hong Kong Pazhou Lab Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Weakly supervised temporal action localization (WS-TAL) is a challenging task that aims to localize action instances in the given video with video-level categorical supervision. Previous works use the appearance and m... 详细信息
来源: 评论