咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是171-180 订阅
排序:
Binary Image Steganalysis Based on Distortion Level Co-Occurrence Matrix
收藏 引用
computers, Materials & Continua 2018年 第5期55卷 201-211页
作者: Junjia Chen Wei Lu Yuileong Yeung Yingjie Xue Xianjin Liu Cong Lin Yue Zhang School of Data and Computer Science Guangdong Key Laboratory of Information Security TechnologySun Yat-sen UniversityGuangzhou 510006China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of SciencesBeijing 100093China Center for Faculty Development and Educational Technology Guangdong University of Finance and EconomicsGuangzhou 510320China Department of Computer Science College of Engineering and Computer ScienceEastern Lake AvenueOrlandoFLUSA.
In recent years,binary image steganography has developed so rapidly that the research of binary image steganalysis becomes more important for information *** most state-of-the-art binary image steganographic schemes,t... 详细信息
来源: 评论
Revealing the processing history of pitch-shifted voice using CNNs  10
Revealing the processing history of pitch-shifted voice usin...
收藏 引用
10th IEEE International Workshop on information Forensics and security, WIFS 2018
作者: Wang, Lihua Liang, Huixin Lin, Xiaodan Kang, Xiangui Guangdong Key Lab of Information Security Technology School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China
With the emergence of varieties of audio editing software, disguised voices can be generated easily and are able to spoof the automatic speaker verification system. In this work, we focus on the spoofed voice disguise... 详细信息
来源: 评论
Statistical learning aided list decoding of semi-random block oriented convolutional codes
arXiv
收藏 引用
arXiv 2019年
作者: Lin, Wenchao Ma, Xiao Cai, Suihua Wei, Baodian School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China School of Electronics and Information Technology Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
In this paper, we propose a statistical learning aided list decoding algorithm, which integrates a serial list Viterbi algorithm (SLVA) with a soft check instead of the conventional cyclic redundancy check (CRC), for ... 详细信息
来源: 评论
Privacy-preserving medical treatment system through nondeterministic finite automata
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Yang Deng, Robert H. Liu, Ximeng Wu, Yongdong Weng, Jian Zheng, Xianghan Rong, Chunming School of Information Systems Singapore Management University Singapore College of Mathematics and Computer Science Fuzhou University Fujian China State Key Laboratory of Integrated Services Networks Xidian University Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Information Systems Singapore Management University Singapore Singapore Department of Computer Science Jinan University Guangdong China College of Mathematics and Computer Science Fuzhou University Fujian China Department of Electronic Engineering and Computer Science University of Stavanger Norway MingByte Technology Qingdao China
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the... 详细信息
来源: 评论
Free ride on LDPC coded transmission
arXiv
收藏 引用
arXiv 2019年
作者: Cai, Suihua Zhao, Shancheng Ma, Xiao School of Electronics and Information Technology Sun Yat-sen University Guangzhou510006 China College of Information Science and Technology Jinan University Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China School of Data and Computer Science and the Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510275 China
In this paper, we formulate a new problem to cope with the transmission of extra bits over an existing coded transmission link (referred to as coded payload link) without any cost of extra transmission energy or extra... 详细信息
来源: 评论
Multiple-Operation Image Anti-Forensics with WGAN-GP Framework
Multiple-Operation Image Anti-Forensics with WGAN-GP Framewo...
收藏 引用
Asia-Pacific Signal and information Processing Association Annual Summit and Conference (APSIPA)
作者: Jianyuan Wu Zheng Wang Hui Zeng Xiangui Kang Guangdong Key Lab of Information Security School of Data and Computer science Sun Yat-sen University China School of Computer Science & Tech. Southwest University of Science and Tech. Mianyang China
A challenging task in the field of multimedia security involves concealing or eliminating the traces left by a chain of multiple manipulating operations, i.e., multiple-operation anti-forensics in short. However, the ... 详细信息
来源: 评论
Syntax-enhanced Pre-trained model
arXiv
收藏 引用
arXiv 2020年
作者: Xu, Zenan Guo, Daya Tang, Duyu Su, Qinliang Shou, Linjun Gong, Ming Zhong, Wanjun Quan, Xiaojun Jiang, Daxin Duan, Nan School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Microsoft Research Asia Beijing China Microsoft Search Technology Center Asia Beijing China Guangdong Key Laboratory Big Data Analysis and Processing Guangzhou China Key Lab. of Machine Intelligence and Advanced Computing Ministry of Education China
We study the problem of leveraging the syntactic structure of text to enhance pre-trained models such as BERT and RoBERTa. Existing methods utilize syntax of text either in the pre-training stage or in the fine-tuning... 详细信息
来源: 评论
Fair electronic voting via bitcoin deposits  5th
Fair electronic voting via bitcoin deposits
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Wu, Xijuan Wei, Baodian Tian, Haibo Du, Yusong Ma, Xiao School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Chongqing Key Lab of Computer Network and Communication Technology Chongqing China
Bitcoin is the most popular decentralized digital currency now in use. Block chain is the basic technology of Bitcoin, providing a trustable ledger that can be publicly verified. Research on distributed applications b... 详细信息
来源: 评论
Depthwise Separable Convolutional Neural Network for Image Forensics
Depthwise Separable Convolutional Neural Network for Image F...
收藏 引用
IEEE Visual Communications and Image Processing Conference
作者: Yifang Chen Feng Peng Xiangui Kang Z. Jane Wang Guangdong Key Lab of Information Security School of Data and Computer Science Sun Yat-sen University China ECE Dept. University of British Colombia Vancouver Canada
General-purpose forensics on small image patches appears to be feasible and important, but in fact poses a challenge due to insufficient statistics. Furthermore, there is a need to develop a forensic approach that can...
来源: 评论
Multi-view graph learning by joint modeling of consistency and inconsistency
arXiv
收藏 引用
arXiv 2020年
作者: Liang, Youwei Huang, Dong Wang, Chang-Dong Yu, Philip S. College of Mathematics and Informatics South China Agricultural University Guangzhou China Tencent Shenzhen China College of Mathematics and Informatics South China Agricultural University Guangzhou China Pazhou Lab Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Department of Computer Science University of Illinois at Chicago ChicagoIL60607 United States
—Graph learning has emerged as a promising technique for multi-view clustering due to its ability to learn a unified and robust graph from multiple views. However, existing graph learning methods mostly focus on the ... 详细信息
来源: 评论