咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是171-180 订阅
排序:
Rotation Exploration Transformer for Aerial Person Re-identification
Rotation Exploration Transformer for Aerial Person Re-identi...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Lei Wang Quan Zhang Junyang Qiu Jianhuang Lai School of Computer Science and Engineering Sun Yat-sen University China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Pazhou Lab (HuangPu) Guangzhou China
Aerial person re-identification (AReID) focuses on accurately matching target person images within a UAV camera network. Challenges arise due to the broad field of view and arbitrary movement of UAVs, leading to foreg... 详细信息
来源: 评论
Deep Learning-Based Decoding of Block Markov Superposition Transmission
Deep Learning-Based Decoding of Block Markov Superposition T...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Sheng Bi Qianfan Wang Zengzhe Chen Jiachen Sun Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou China School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In this paper, we present deep learning-based decoding of block Markov superposition transmission (BMST). For the basic code, a deep neural network (DNN) is trained, providing with good decoding performance. The compl... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论
Joint Participation Incentive and Network Pricing Design for Federated Learning  42
Joint Participation Incentive and Network Pricing Design for...
收藏 引用
42nd IEEE International Conference on computer Communications, INFOCOM 2023
作者: Ding, Ningning Gao, Lin Huang, Jianwei Northwestern University Department of Electrical and Computer Engineering EvanstonIL60208 United States Shenzhen Research Institute of Big Data Shenzhen518172 China Harbin Institute of Technology Sch. of Electronics and Info. Eng. and the Guangdong Prov. Key Lab. of Aerosp. Commun. and Networking Technol. Shenzhen China The Chinese University of Hong Kong Shenzhen School of Science and Engineering Shenzhen Research Institute of Big Data Shenzhen518172 China
Federated learning protects users' data privacy though sharing users' local model parameters (instead of raw data) with a server. However, when massive users train a large machine learning model through federa... 详细信息
来源: 评论
ECLIPSE: Expunging Clean-lab.l Indiscriminate Poisons via Sparse Diffusion Purification
arXiv
收藏 引用
arXiv 2024年
作者: Wang, Xianlong Hu, Shengshan Zhang, Yechao Zhou, Ziqi Zhang, Leo Yu Xu, Peng Wan, Wei Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology Wuhan430074 China School of Computer Science and Technology Huazhong University of Science and Technology Wuhan430074 China School of Information and Communication Technology Griffith University SouthportQLD4215 Australia
Clean-lab.l indiscriminate poisoning attacks add invisible perturbations to correctly lab.led training images, thus dramatically reducing the generalization capability of the victim models. Recently, defense mechanism... 详细信息
来源: 评论
Deep Generative Network for Image Inpainting with Gradient Semantics and Spatial-Smooth Attention
SSRN
收藏 引用
SSRN 2023年
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510006 China
As a powerful means of tampering in image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, particularly in boundary... 详细信息
来源: 评论
Coarse-to-Fine Latent Diffusion for Pose-Guided Person Image Synthesis
Coarse-to-Fine Latent Diffusion for Pose-Guided Person Image...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Yanzuo Lu Manlin Zhang Andy J Ma Xiaohua Xie Jianhuang Lai School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Province Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Pazhou Lab (HuangPu) Guangzhou China
Diffusion model is a promising approach to image generation and has been employed for Pose-Guided Person Image Synthesis (PGPIS) with competitive performance. While existing methods simply align the person appearance ... 详细信息
来源: 评论
DRL-M4MR: An Intelligent Multicast Routing Approach Based on DQN Deep Reinforcement Learning in SDN
arXiv
收藏 引用
arXiv 2022年
作者: Zhao, Chenwei Ye, Miao Xue, Xingsi Lv, Jianhui Jiang, Qiuxiang Wang, Yong School of Information and Communication Guilin University of Electronic Technology Guilin541004 China Guangxi Key Laboratory of Wireless Wideband Communication and Signal Processing Guilin University of Electronic Technology Guilin541004 China Fujian Provincial Key Laboratory of Big Data Mining and Applications Fujian University of Technology Fujian Fuzhou350118 China Peng Cheng Lab. Guangdong Shenzhen518038 China School of Computer Science and Information Security Guilin University of Electronic Technology Guilin541004 China
Traditional multicast routing methods have some problems in constructing a multicast tree, such as limited access to network state information, poor adaptability to dynamic and complex changes in the network, and infl... 详细信息
来源: 评论
Unsupervised person re-identification by deep asymmetric metric embedding
arXiv
收藏 引用
arXiv 2019年
作者: Yu, Hong-Xing Wu, Ancong Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Guangdong Province Key Laboratory of Information Security China School of Electronics and Information Technology Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing NUDT China School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China
Person re-identification (Re-ID) aims to match identities across non-overlapping camera views. Researchers have proposed many supervised Re-ID models which require quantities of cross-view pairwise lab.lled data. This... 详细信息
来源: 评论
ZSTAD: Zero-shot temporal activity detection
arXiv
收藏 引用
arXiv 2020年
作者: Zhang, Lingling Chang, Xiaojun Liu, Jun Luo, Minnan Wang, Sen Ge, Zongyuan Hauptmann, Alexander School of Computer Science and Technology Xian Jiaotong University Xian China Ministry of Education Key Lab For Intelligent Networks and Network Security Xian China Faculty of Information Technology Monash University Australia National Engineering Lab for Big Data Analytics Xian Jiaotong University Xian China School of Information Technology and Electrical Engineering University of Queensland Australia School of Computer Science Carnegie Mellon University United States
An integral part of video analysis and surveillance is temporal activity detection, which means to simultaneously recognize and localize activities in long untrimmed videos. Currently, the most effective methods of te... 详细信息
来源: 评论