咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是191-200 订阅
排序:
Deep generative network for image inpainting with gradient semantics and spatial-smooth attention
收藏 引用
Journal of Visual Communication and Image Representation 2024年 98卷
作者: Sheng, Ziqi Xu, Wenbo Lin, Cong Lu, Wei Ye, Long School of Computer Science and Engineering Guangdong Province Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China Applied Laboratory of Dig Data and Education Statistics School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China State Key Laboratory of Media Convergence and Communication Communication University of China Beijing100024 China
As a powerful forgery operation in the image content security area, image inpainting based on deep generative networks can yield visually appealing outputs but often produces ambiguous artifacts, especially in boundar... 详细信息
来源: 评论
Ultra-scalab.e spectral clustering and ensemble clustering
arXiv
收藏 引用
arXiv 2019年
作者: Huang, Dong Wang, Chang-Dong Wu, Jian-Sheng Lai, Jian-Huang Kwoh, Chee-Keong College of Mathematics and Informatics South China Agricultural University Guangzhou China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China School of Information Engineering Nanchang University Nanchang China School of Computer Science and Engineering Nanyang Technological University Singapore Singapore
This paper focuses on scalab.lity and robustness of spectral clustering for extremely large-scale datasets with limited resources. Two novel algorithms are proposed, namely, ultra-scalab.e spectral clustering (U-SPEC)... 详细信息
来源: 评论
Semantics-Guided Contrastive Network for Zero-Shot Object Detection
arXiv
收藏 引用
arXiv 2021年
作者: Yan, Caixia Chang, Xiaojun Luo, Minnan Liu, Huan Zhang, Xiaoqin Zheng, Qinghua The Ministry of Education Key Lab of Intelligent Networks and Network Security National Engineering Lab for Big Data Analytics School of Electronic and Information Engineering Xi'an Jiaotong University Shaanxi710049 China The ReLER Lab AAAI Faculty of Engineering and Information Technology University of Technology Sydney Australia The College of Computer Science and Artificial Intelligence Wenzhou University China
Zero-shot object detection (ZSD), the task that extends conventional detection models to detecting objects from unseen categories, has emerged as a new challenge in computer vision. Most existing approaches tackle the... 详细信息
来源: 评论
NTIRE 2023 Challenge on Light Field Image Super-Resolution: dataset, Methods and Results
NTIRE 2023 Challenge on Light Field Image Super-Resolution: ...
收藏 引用
2023 IEEE/CVF Conference on computer Vision and Pattern Recognition Workshops, CVPRW 2023
作者: Wang, Yingqian Wang, Longguang Liang, Zhengyu Yang, Jungang Timofte, Radu Guo, Yulan Jin, Kai Wei, Zeqiang Yang, Angulia Guo, Sha Gao, Mingzhi Zhou, Xiuzhuang Van Duong, Vinh Huu, Thuc Nguyen Yim, Jonghoon Jeon, Byeungwoo Liu, Yutong Cheng, Zhen Xiao, Zeyu Xu, Ruikang Xiong, Zhiwei Liu, Gaosheng Jin, Manchang Yue, Huanjing Yang, Jingyu Gao, Chen Zhang, Shuo Chang, Song Lin, Youfang Chao, Wentao Wang, Xuechun Wang, Guanghui Duan, Fuqing Xia, Wang Wang, Yan Xia, Peiqi Wang, Shunzhou Lu, Yao Cong, Ruixuan Sheng, Hao Yang, Da Chen, Rongshan Wang, Sizhe Cui, Zhenglong Chen, Yilei Lu, Yongjie Cai, Dongjun An, Ping Salem, Ahmed Ibrahem, Hatem Yagoub, Bilel Kang, Hyun-Soo Zeng, Zekai Wu, Heng National University of Defense Technology China Aviation University of Air Force China University of Würzburg Germany Eth Zürich Switzerland Sun Yat-sen University The Shenzhen Campus of Sun Yat-sen University China Bigo Technology Pte. Ltd. Singapore Smart Medical Innovation Lab Beijing University of Posts and Telecommunications China Global Explorer Ltd. Suzhou China National Engineering Research Center of Visual Technology School of Computer Science Peking University China School of Artificial Intelligence Beijing University of Posts and Telecommunications China Department of Electrical and Computer Engineering Sungkyunkwan University Korea Republic of University of Science and Technology of China China School of Electrical and Information Engineering Tianjin University China Beijing Key Lab of Traffic Data Analysis and Mining School of Computer and Information Technology Beijing Jiaotong University China Beijing Normal University China Toronto Metropolitan University Canada Beijing Institute of Technology China Shenzhen MSU-BIT University China State Key Laboratory of Virtual Reality Technology and Systems School of Computer Science and Engineering Beihang University China Beihang Hangzhou Innovation Institute Yuhang China Faculty of Applied Sciences Macao Polytechnic University China School of Communication and Information Engineering Shanghai University China School of Information and Communication Engineering Chungbuk National University Korea Republic of Guangdong University of Technology China
In this report, we summarize the first NTIRE challenge on light field (LF) image super-resolution (SR), which aims at super-resolving LF images under the standard bicubic degradation with a magnification factor of 4. ... 详细信息
来源: 评论
GM-DF: Generalized Multi-Scenario Deepfake Detection
arXiv
收藏 引用
arXiv 2024年
作者: Lai, Yingxin Yu, Zitong Yang, Jing Li, Bin Kang, Xiangui Shen, Linlin The School of Computing and Information Technology Great Bay University Dongguan523000 China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China Shenzhen Institute of Artificial Intelligence and Robotics for Society Shenzhen University Shenzhen518060 China The Guangdong Key Laboratory of Information Security The School of Computer Science and Engineering Sun Yat-sen University Guangzhou510080 China Computer Vision Institute School of Computer Science & Software Engineering Shenzhen Institute of Artificial Intelligence and Robotics for Society Guangdong Key Laboratory of Intelligent Information Processing National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen518060 China
Existing face forgery detection usually follows the paradigm of training models in a single domain, which leads to limited generalization capacity when unseen scenarios and unknown attacks occur. In this paper, we ela... 详细信息
来源: 评论
Reading-strategy Inspired Visual Representation Learning for Text-to-Video Retrieval
arXiv
收藏 引用
arXiv 2022年
作者: Dong, Jianfeng Wang, Yabing Chen, Xianke Qu, Xiaoye Li, Xirong He, Yuan Wang, Xun The College of Computer and Information Engineering Zhejiang Gongshang University Hangzhou310035 China The State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China The School of Electronic Information and Communications Huazhong University of Science and Technology Hubei430074 China The Key Lab of Data Engineering and Knowledge Engineering Renmin University of China The AIMC Lab. School of Information Renmin University of China Beijing100872 China The Alibaba Group Beijing100102 China
This paper aims for the task of text-to-video retrieval, where given a query in the form of a natural-language sentence, it is asked to retrieve videos which are semantically relevant to the given query, from a great ... 详细信息
来源: 评论
Online Attentive Kernel-Based Temporal Difference Learning
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Guang Chen, Xingguo Yang, Shangdong Wang, Huihui Dong, Shaokang Gao, Yang The the Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing University of Posts and Telecommunications National Engineering Laboratory for Agri-Product Quality Traceability Beijing Technology and Business University China The State Key Laboratory for Novel Software Technology Nanjing University China The PCA Lab Key Lab of Intelligent Perception and Systems for High-Dimensional Information Ministry of Education Jiangsu Key Lab of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing University of Science and Technology China
With rising uncertainty in the real world, online Reinforcement Learning (RL) has been receiving increasing attention due to its fast learning capability and improving data efficiency. However, online RL often suffers... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption
arXiv
收藏 引用
arXiv 2024年
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi... 详细信息
来源: 评论
Rsh-Bu: Revocable Secret Handshakes with Backward Unlinkability from Vlr Group Signatures
SSRN
收藏 引用
SSRN 2023年
作者: Wen, Yamin Wan, Min Zhao, Junying Gong, Zheng Deng, Yuqiao School of Statistics and Mathematics Guangdong University of Finance and Economics Guangzhou510320 China Guangdong Provincial Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China Big Data and Education Statistics Application Laboratory Guangdong University of Finance and Economics Guangzhou510320 China School of Information Guangdong University of Finance and Economics Guangzhou510320 China School of Computer Science South China Normal University Guangzhou510631 China
Secret handshake scheme is a bi-directional authentication method that enables two participants from the same organization to identify both sides in private. A new generic construction of secret handshakes is proposed... 详细信息
来源: 评论
Frozen-DETR: Enhancing DETR with Image Understanding from Frozen Foundation Models
arXiv
收藏 引用
arXiv 2024年
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518055 China Tongyi Lab Alibaba Group China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China Guangdong Guangzhou510555 China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin... 详细信息
来源: 评论