咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是231-240 订阅
排序:
Notice of Removal: An improved spread transform dither modulation for robust and secure watermarking
Notice of Removal: An improved spread transform dither modul...
收藏 引用
IEEE International Conference on Image Processing
作者: Jian Cao Haodong Li Weiqi Luo Jiwu Huang Shenzhen Graduate School Harbin Institute of Technology Shenzhen China School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology Sun Yat-Sen University Guangzhou China College of Information Engineering and Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China
Removed.
来源: 评论
Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence
Community Detection in Complicated Network Based on the Mult...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Juan-Hui Li Pei-Zhen Li Chang-Dong Wang Jian-Huang Lai Guangdong Key Laboratory of Information Security Technology Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China
This paper addresses the community detection problem in multi-view weighted signed network. Although some methods have been developed to detect communities in multi-view network, they are mostly designed for the unwei... 详细信息
来源: 评论
PEDESTRIAN DETECTION VIA A LEG-DRIVEN PHYSIOLOGY FRAMEWORK
PEDESTRIAN DETECTION VIA A LEG-DRIVEN PHYSIOLOGY FRAMEWORK
收藏 引用
IEEE International Conference on Image Processing
作者: Gongbo Liang Qi Li Xiangui Kang Western Kentucky University Department of Computer Science Ogden College of Science & Engineering Guangdong Key Lab of Information Security Sun Yat-Sen University School of Data and Computer Science
In this paper, we propose a leg-driven physiology framework for pedestrian detection. The framework is introduced to reduce the search space of candidate regions of pedestrians. Given a set of vertical line segments, ... 详细信息
来源: 评论
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinki...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chao Chen Kun-Yu Lin Chang-Dong Wang Dong Huang Guangdong Key Laboratory of Information Security Technology Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China College of Mathematics and Informatics South China Agricultural University Guangzhou China
Nonlinear clustering has attracted an increasing amount of attention recently. In this paper, we propose a new nonlinear clustering method based on Cluster Shrinking and Border Detection (CSBD). Unlike most existing c... 详细信息
来源: 评论
An efficient parallel topic-sensitive expert finding algorithm using spark
An efficient parallel topic-sensitive expert finding algorit...
收藏 引用
IEEE International Conference on Big data
作者: Yao-Ming Yang Chang-Dong Wang Jian-Huang Lai Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing China Guangdong Key Laboratory of Information Security Technology China School of Data and Computer Science Sun Yat-sen University Guangzhou P. R. China
Expert finding is an important technique to obtain the user authority ranking in community question answering (CQA) websites. ZhihuRank is a topic-sensitive expert finding algorithm, which is based on both LDA and Pag... 详细信息
来源: 评论
Detecting infeasible traces in process models
Detecting infeasible traces in process models
收藏 引用
14th International Conference on Enterprise information Systems, ICEIS 2012
作者: Wang, Zhaoxia Wen, Lijie Zhu, Xiaochen Liu, Yingbo Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Lab. for Information System Security Ministry of Education Beijing 100084 China National Laboratory for Information Science and Technology Beijing 100084 China Logistical Engineering University Chongqing 400016 China
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o... 详细信息
来源: 评论
Multicast algorithms based on minimum delay tree
收藏 引用
Journal of Computational information Systems 2012年 第10期8卷 4039-4046页
作者: Zheng, Xinwei Jiang, Wenchao Wang, Xiaoyun Yuan, Zhibin Information Science School of Guangdong University of Business Studies Guangzhou 510023 China Computer School of Guangdong University of Technology Guangzhou 510006 China The Key Lab. of E-Business Market Application on Technology of Guangdong Province Guangzhou 510023 China
In constructing an efficient multicast tree of application-level multicast, not only the delay of link should be considered, but also the process delay of many end systems in sending and transmitting data can not be i... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论