咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 91 篇 会议

馆藏范围

  • 253 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 8 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 16 篇 school of cyber ...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 hai jin
  • 6 篇 zhou ziqi

语言

  • 232 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
253 条 记 录,以下是191-200 订阅
排序:
A Double Auction for Charging Scheduling among Vehicles Using DAG-Blockchains
arXiv
收藏 引用
arXiv 2020年
作者: Guo, Jianxiong Ding, Xingjian Wu, Weili Du, Ding-Zhu Advanced Institute of Natural Sciences Beijing Normal University Zhuhai519087 China Guangdong Key Lab of AI and Multi-Modal Data Processing BNU-HKBU United International College Zhuhai519087 China Faculty of Information Technology Beijing University of Technology Beijing100124 China Department of Computer Science Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas RichardsonTX75080 United States
Electric Vehicles (EVs) are becoming more and more popular in our daily life, which replaces traditional fuel vehicles to reduce carbon emissions and protect the environment. EVs need to be charged, but the number of ... 详细信息
来源: 评论
Fully distributed certificateless threshold signature without random oracles
收藏 引用
中国科学(信息科学) 2018年 第9期61卷 253-255页
作者: Wenjie YANG Weiqi LUO Xizhao LUO Jian WENG Anjia YANG College of Cyber Security/College of Information Science and Technology Jinan University Guangzhou 510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou 511443 China Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou 511443 China College of Cyber Security/College of Information Science and Technology Jinan University Guangzhou 510632 China School of Computer and Technology Soochow University Suzhou 215006 China
A certificateless (t,n) threshold signature (CLTS) scheme allows at least t members to cooperatively sign a message on behalf of an n-member group,which is a good way to share the responsibility and *** researchers ha...
来源: 评论
Fully distributed certificateless threshold signature without random oracles
收藏 引用
science China(information sciences) 2018年 第9期61卷 259-269页
作者: Wenjie YANG Weiqi LUO Xizhao LUO Jian WENG Anjia YANG College of Cyber Security/College of Information Science and Technology Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving School of Computer and Technology Soochow University
A certificateless(t,n)threshold signature(CLTS)scheme allows at least t members to cooperatively sign a message on behalf of an n-member group,which is a good way to share the responsibility and *** researchers have f... 详细信息
来源: 评论
Constrained Multi-scale Dense Connections for Accurate Biomedical Image Segmentation
Constrained Multi-scale Dense Connections for Accurate Biome...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Jiawei Zhang Yanchun Zhang Shanfeng Zhu Xiaowei Xu Shanghai key Laboratory of Data Science School of Computer Science Fudan University Shanghai China Cyberspace Institute of Advanced Technology Guangzhou University Guangzhou China College of Engineering and Science Victoria University Melbourne Australia ISTBI and Shanghai Institute of Artificial Intelligence Algorithms Fudan University Shanghai China Nanjing University Institute of Artificial Intelligence Biomedicine Nanjing China Shanghai Key Lab of Intelligent Information Processing Fudan University Shanghai China Guangdong Provincial People’s Hospital Guangdong Cardiovascular Institute Guangzhou China
Biomedical image segmentation plays a critical role in clinical diagnosis and medical intervention. Recently, a variety of deep neural networks have boosted the biomedical image segmentation performance with a large m... 详细信息
来源: 评论
iSplit LBI: Individualized partial ranking with ties via split LBI
arXiv
收藏 引用
arXiv 2019年
作者: Xu, Qianqian Sun, Xinwei Yang, Zhiyong Cao, Xiaochun Huang, Qingming Yao, Yuan Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS Microsoft Research Asia State Key Laboratory of Information Security Institute of Information Engineering CAS School of Cyber Security University of Chinese Academy of Sciences School of Computer Science and Tech. University of Chinese Academy of Sciences Key Laboratory of Big Data Mining and Knowledge Management CAS Peng Cheng Laboratory Department of Mathematics Hong Kong University of Science and Technology Hong Kong
Due to the inherent uncertainty of data, the problem of predicting partial ranking from pairwise comparison data with ties has attracted increasing interest in recent years. However, in real-world scenarios, different... 详细信息
来源: 评论
Erratum to "Multi-View Face Synthesis via Progressive Face Flow"
收藏 引用
IEEE transactions on image processing : a publication of the IEEE Signal Processing Society 2021年 30卷 6700页
作者: Yangyang Xu Xuemiao Xu Jianbo Jiao Keke Li Cheng Xu Shengfeng He School of Computer Science and Engineering South China University of Technology Guangzhou China State Key Laboratory of Subtropical Building Science the Key Laboratory of Big Data and Intelligent Robot Ministry of Education and the Guangdong Provincial Key Lab of Computational Intelligence and Cyberspace Information South China University of Technology Guangzhou China University of Oxford Oxford U.K.
In the above article [1], unfortunately, Fig. 5 was not displayed correctly with many empty images. The correct version is supplemented here.
来源: 评论
Unsupervised Person Re-Identification by Camera-Aware Similarity Consistency Learning
Unsupervised Person Re-Identification by Camera-Aware Simila...
收藏 引用
International Conference on computer Vision (ICCV)
作者: Ancong Wu Wei-Shi Zheng Jian-Huang Lai School of Electronics and Information Technology Sun Yat-sen University China School of Data and Computer Science Sun Yat-sen University China Peng Cheng Laboratory China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security China
For matching pedestrians across disjoint camera views in surveillance, person re-identification (Re-ID) has made great progress in supervised learning. However, it is infeasible to lab.l data in a number of new scenes... 详细信息
来源: 评论
Evaluation of Age of information for LDPC Coded Transmission over AWGN Channels
Evaluation of Age of Information for LDPC Coded Transmission...
收藏 引用
IEEE Vehicular technology Conference
作者: Mangang Xie Qianfan Wang Jie Gong Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
Age of information (AoI) is an important metric in real-time status update communication system to assess the freshness of information. Different from previous works, this paper focuses on the average AoI over additiv... 详细信息
来源: 评论
A Provable Secure Server Friendly Two-Party SM2 Singing Protocol for Blockchain IoT
A Provable Secure Server Friendly Two-Party SM2 Singing Prot...
收藏 引用
IEEE Globecom Workshops
作者: Haibo Tian Yinxue Su Zhenquan Liang Guangdong Province Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University Guangzhou Guangdong P. R. China School of Data and Computer Science Sun Yat-Sen University Guangzhou Guangdong P. R. China Shenzhen Digital Certificate Authority Center Co. Ltd Guangzhou Shenzhen P. R. China
The blockchain transaction protocol of IETF shows us an emerging paradigm of blockchain based Internet of Things (BIoT). In this paradigm, a constraint node sends transactions including their device data. Different fr... 详细信息
来源: 评论
Deep Learning-Based Decoding of Block Markov Superposition Transmission
Deep Learning-Based Decoding of Block Markov Superposition T...
收藏 引用
International Conference on Wireless Communications and Signal Processing (WCSP)
作者: Sheng Bi Qianfan Wang Zengzhe Chen Jiachen Sun Xiao Ma School of Data and Computer Science Sun Yat-sen University Guangzhou China School of Electronics and Communication Engineering Sun Yat-sen University Guangzhou China School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In this paper, we present deep learning-based decoding of block Markov superposition transmission (BMST). For the basic code, a deep neural network (DNN) is trained, providing with good decoding performance. The compl... 详细信息
来源: 评论