咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 91 篇 会议

馆藏范围

  • 253 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 8 篇 training
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 18 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 16 篇 school of cyber ...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 14 篇 school of inform...
  • 13 篇 services computi...
  • 12 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 hai jin
  • 6 篇 zhou ziqi

语言

  • 232 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
253 条 记 录,以下是221-230 订阅
排序:
Motion-appearance interactive encoding for object segmentation in unconstrained videos
arXiv
收藏 引用
arXiv 2017年
作者: Guo, Chunchao Lai, Jianhuang Xie, Xiaohua School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
We present a novel method of integrating motion and appearance cues for foreground object segmentation in unconstrained videos. Unlike conventional methods encoding motion and appearance patterns individually, our met... 详细信息
来源: 评论
Adversarial Neural Machine Translation
arXiv
收藏 引用
arXiv 2017年
作者: Wu, Lijun Xia, Yingce Zhao, Li Tian, Fei Qin, Tao Lai, Jianhuang Liu, Tie-Yan School of Data and Computer Science Sun Yat-sen University University of Science and Technology of China Microsoft Research Asia Guangdong Key Laboratory of Information Security Technology
In this paper, we study a new learning paradigm for Neural Machine Translation \(NMT\). Instead of maximizing the likelihood of the human translation as in previous works, we minimize the distinction between human tra... 详细信息
来源: 评论
A cloud-based taxi trace mining framework for smart city
A cloud-based taxi trace mining framework for smart city
收藏 引用
作者: Liu, Jin Yu, Xiao Xu, Zheng Choo, Kim-Kwang Raymond Hong, Liang Cui, Xiaohui State Key Lab. of Software Engineering Computer School Wuhan University Wuhan China Third Research Institute of Ministry of Public Security Shanghai China Department of Information Systems and Cyber Security University of Texas at San Antonio San AntonioTX United States School of Information Technology and Mathematical Science University of South Australia AdelaideSA Australia School of Information Management Wuhan University Wuhan China International School of Software Wuhan University Wuhan China
As a well-known field of big data applications, smart city takes advantage of massive data analysis to achieve efficient management and sustainable development in the current worldwide urbanization process. An importa... 详细信息
来源: 评论
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks
Deep User Modeling for Content-based Event Recommendation in...
收藏 引用
IEEE Annual Joint Conference: INFOCOM, IEEE computer and Communications Societies
作者: Zhibo Wang Yongquan Zhang Honglong Chen Zhetao Li Feng Xia Jiangsu Key Lab. of Big Data Security & Intelligent Processing NJUPT P. R. China School of Cyber Science and Engineering Wuhan University P. R. China College of Information and Control Engineering China University of Petroleum P. R. China College of Information Engineering Xiangtan University P. R. China School of Software Dalian University of Technology P. R. China
Event-based social networks (EBSNs) are the newly emerging social platforms for users to publish events online and attract others to attend events offline. The content information of events plays an important role in ... 详细信息
来源: 评论
Advancing image understanding in poor visibility environments: A collective benchmark study
arXiv
收藏 引用
arXiv 2019年
作者: Yang, Wenhan Yuan, Ye Ren, Wenqi Liu, Jiaying Scheirer, Walter J. Wang, Zhangyang Zhang, Taiheng Zhong, Qiaoyong Xie, Di Pu, Shiliang Zheng, Yuqiang Qu, Yanyun Xie, Yuhong Chen, Liang Li, Zhonghao Hong, Chen Jiang, Hao Yang, Siyuan Liu, Yan Qu, Xiaochao Wan, Pengfei Zheng, Shuai Zhong, Minhui Su, Taiyi He, Lingzhi Guo, Yandong Zhao, Yao Zhu, Zhenfeng Liang, Jinxiu Wang, Jingwen Chen, Tianyi Quan, Yuhui Xu, Yong Liu, Bo Liu, Xin Sun, Qi Lin, Tingyu Li, Xiaochuan Lu, Feng Gu, Lin Zhou, Shengdi Cao, Cong Zhang, Shifeng Chi, Cheng Zhuang, Chubin Lei, Zhen Li, Stan Z. Wang, Shizheng Liu, Ruizhe Yi, Dong Zuo, Zheming Chi, Jianning Wang, Huan Wang, Kai Liu, Yixiu Gao, Xingyu Chen, Zhenyu Guo, Chang Li, Yongzhou Zhong, Huicai Huang, Jing Guo, Heng Yang, Jianfei Liao, Wenjuan Yang, Jiangang Zhou, Liguo Feng, Mingyue Qin, Likun Wangxuan Institute of Computer Technology Peking University Beijing100080 China Department of Computer Science and Engineering Texas A&M University TX77843 United States State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Department of Computer Science and Engineering University of Notre Dame Notre DameIN46556 United States Department of Mechanical Engineering Zhejiang University Hangzhou310027 China Hikvision Research Institute Hangzhou310051 China Mtlab Meitu Inc. Beijing100080 China Insitute of Information Science Beijing Jiaotong University Beijing100044 China Department of Computer Science and Technology Tongji University Shanghai201804 China XPENGMOTORS Beijing China School of Computer Science and Engineering at South China University of Technology Guangzhou510006 China Tencent AI Lab Shenzhen518000 China Institute of Automation Chinese Academy of Sciences Beijing100190 China Northeastern University Shenyang110819 China Nanyang Technological University Singapore639798 Big Data Center State Grid Corporation of China Beijing China Winsense Inc. Beijing100080 China University of Chinese Academy of Sciences Beijing100049 China Department of Informatics Technical University of Munich Garching85748 Germany Institute of Microelectronics Chinese Academy of Sciences Beijing100190 China China Electric Power Research Institute Beijing100031 China Westlake University Hangzhou310024 China Department of Computer Science Durham University Durham United Kingdom Australian National University ActonACT0200 Australia Sunway-AI Co. Ltd Zhuhai China Chinese Academy of Sciences R&D Center for Internet of Things Wuxi214200 China
Existing enhancement methods are empirically expected to help the high-level end computer vision task: however, that is observed to not always be the case in practice. We focus on object or face detection in poor visi... 详细信息
来源: 评论
Digital image splicing detection based on Markov features in QDCT and QWT domain
arXiv
收藏 引用
arXiv 2017年
作者: Wang, Ruxin Lu, Wei Xiang, Shijun Zhao, Xianfeng Wang, Jinwei School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China College of Information Science and Technology Jinan University Guangzhou510632 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing100093 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China
Image splicing detection is of fundamental importance in digital forensics and therefore has attracted increasing attention recently. In this paper, a color image splicing detection approach is proposed based on Marko... 详细信息
来源: 评论
Image Processing Operations Identification via Convolutional Neural Network
arXiv
收藏 引用
arXiv 2017年
作者: Chen, Bolin Li, Haodong Luo, Weiqi School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China College of Information Engineering Shenzhen University Shenzhen518052 China
—In recent years, image forensics has attracted more and more attention, and many forensic methods have been proposed for identifying image processing operations. Up to now, most existing methods are based on hand cr... 详细信息
来源: 评论
Block Markov superposition transmission with pulse position modulation over free-space optical links
收藏 引用
Journal of Communications and information Networks 2017年 第4期2卷 142-150页
作者: Jinshun Zhu Shancheng Zhao Xiao Ma School of Electronics and Information Technology Sun Yat-sen UniversityGuangzhou 510006China College of Information Science and Technology Jinan UniversityGuangzhou 510632China School of Data and Computer Science Sun Yat-sen UniversityGuangzhou 510006China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen UniversityGuangzhou 510006China
In FSO(Free-Space Optical)communications,performance of the communication systems is severely degraded by atmospheric ***(Pulse Position Modulation)is widely used in FSO communication systems owing to its high power *... 详细信息
来源: 评论
Anti-forensics of camera identification and the triangle test by improved fingerprint-copy attack
arXiv
收藏 引用
arXiv 2017年
作者: Li, Haodong Luo, Weiqi Rao, Quanquan Huang, Jiwu School of Electronics and Information Technology Sun Yatsen University Guangzhou China School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yatsen University Guangzhou China College of Information Engineering Shenzhen University Shenzhen China
The fingerprint-copy attack aims to confuse camera identification based on sensor pattern noise. However, the triangle test shows that the forged images undergone fingerprint-copy attack would share a non-PRNU (Photo-... 详细信息
来源: 评论
A SVM-based EEG signal analysis: An auxiliary therapy for tinnitus  1
收藏 引用
8th International Conference on Brain Inspired Cognitive Systems, BICS 2016
作者: Li, Pei-Zhen Li, Juan-Hui Wang, Chang-Dong School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Tinnitus is a kind of auditory disease characterized by an ongoing conscious perception of a sound in the absence of any external sound source. It is a common symptom for which no effective treatment exists. Though ma... 详细信息
来源: 评论