咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是221-230 订阅
排序:
Digital image splicing detection based on Markov features in QDCT and QWT domain
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Ruxin Lu, Wei Xiang, Shijun Zhao, Xianfeng Wang, Jinwei School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China College of Information Science and Technology Jinan University Guangzhou510632 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Image splicing detection is of fundamental importance in digital forensics and therefore has attracted increasing attention recently. In this paper, a color image splicing detection approach is proposed based on Marko... 详细信息
来源: 评论
Image Processing Operations Identification via Convolutional Neural Network
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Bolin Li, Haodong Luo, Weiqi School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China College of Information Engineering Shenzhen University Shenzhen518052 China
—In recent years, image forensics has attracted more and more attention, and many forensic methods have been proposed for identifying image processing operations. Up to now, most existing methods are based on hand cr... 详细信息
来源: 评论
Block Markov superposition transmission with pulse position modulation over free-space optical links
收藏 引用
Journal of Communications and information Networks 2017年 第4期2卷 142-150页
作者: Jinshun Zhu Shancheng Zhao Xiao Ma School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China College of Information Science and Technology Jinan UniversityGuangzhou 510632China School of Data and Computer Science Sun Yat-sen UniversityGuangzhou 510006China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen UniversityGuangzhou 510006China
In FSO(Free-Space Optical)communications,performance of the communication systems is severely degraded by atmospheric ***(Pulse Position Modulation)is widely used in FSO communication systems owing to its high power *... 详细信息
来源: 评论
Anti-forensics of camera identification and the triangle test by improved fingerprint-copy attack
arXiv
收藏 引用
arXiv 2017年
作者: Li, Haodong Luo, Weiqi Rao, Quanquan Huang, Jiwu School of Electronics and Information Technology Sun Yatsen University Guangzhou China School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yatsen University Guangzhou China College of Information Engineering Shenzhen University Shenzhen China
The fingerprint-copy attack aims to confuse camera identification based on sensor pattern noise. However, the triangle test shows that the forged images undergone fingerprint-copy attack would share a non-PRNU (Photo-... 详细信息
来源: 评论
A SVM-based EEG signal analysis: An auxiliary therapy for tinnitus  1
收藏 引用
8th International Conference on Brain Inspired Cognitive Systems, BICS 2016
作者: Li, Pei-Zhen Li, Juan-Hui Wang, Chang-Dong School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Tinnitus is a kind of auditory disease characterized by an ongoing conscious perception of a sound in the absence of any external sound source. It is a common symptom for which no effective treatment exists. Though ma... 详细信息
来源: 评论
JPEG steganalysis based on DenseNet
arXiv
收藏 引用
arXiv 2017年
作者: Yang, Jianhua Shi, Yun-Qing Wong, Edward K. Kang, Xiangui Guangdong Key Lab of Information Security School of Data and Computer Science Sun Yat-Sen University Guangzhou510006 China Department of ECE New Jersey Institute of Technology NewarkNJ07102 United States Department of Computer Science and Engineering New York University Tandon School of Engineering BrooklynNY11201 United States
Different from the conventional deep learning work based on an images content in computer vision, deep steganalysis is an art to detect the secret information embedded in an image via deep learning, pose challenge of ... 详细信息
来源: 评论
Robust Depth-based Person Re-identification
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Ancong Zheng, Wei-Shi Lai, Jian-Huang School of Electronics and Information Technology Sun Yat-sen University Guangzhou China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China School of Data and Computer Science Sun Yat-sen University Guangzhou China Ministry of Education China Guangdong Province Key Laboratory of Information Security China
Person re-identification (re-id) aims to match people across non-overlapping camera views. So far the RGB-based appearance is widely used in most existing works. However, when people appeared in extreme illumination o... 详细信息
来源: 评论
Toward multidiversified ensemble clustering of high-dimensional data: From subspaces to metrics and beyond
arXiv
收藏 引用
arXiv 2017年
作者: Huang, Dong Wang, Chang-Dong Lai, Jian-Huang Kwoh, Chee-Keong The College of Mathematics and Informatics South China Agricultural University Guangzhou China Pazhou Lab Guangzhou China The School of Computer Science and Engineering Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China The School of Computer Science and Engineering Nanyang Technological University Singapore Singapore
The rapid emergence of high-dimensional data in various areas has brought new challenges to current ensemble clustering research. To deal with the curse of dimensionality, recently considerable efforts in ensemble clu... 详细信息
来源: 评论
Person re-identification by camera correlation aware feature augmentation
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Ying-Cong Zhu, Xiatian Zheng, Wei-Shi Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou510275 China Collaborative Innovation Center of High Performance Computing National University of Defense Technology Changsha410073 China Department of Computer Science and Engineering Chinese University of Hong Kong School of Electronic Engineering and Computer Science Queen Mary University of London United Kingdom Key Laboratory of Machine Intelligence and Advanced Computing Sun Yatsen University Ministry of Education China Guangdong Province Key Laboratory of Information Security China
The challenge of person re-identification (re-id) is to match individual images of the same person captured by different non-overlapping camera views against significant and unknown cross-view feature distortion. Whil... 详细信息
来源: 评论
Notice of Removal: A secure watermarking technique without loss of robustness
Notice of Removal: A secure watermarking technique without l...
收藏 引用
IEEE International Conference on Image Processing
作者: Jian Cao Haodong Li Weiqi Luo Jiwu Huang Shenzhen Graduate School Harbin Institute of Technology Shenzhen China School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology Sun Yat-Sen University Guangzhou China College of Information Engineering and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Removed.
来源: 评论