咨询与建议

限定检索结果

文献类型

  • 162 篇 期刊文献
  • 96 篇 会议

馆藏范围

  • 258 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 194 篇 工学
    • 152 篇 计算机科学与技术...
    • 130 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 18 篇 控制科学与工程
    • 11 篇 机械工程
    • 11 篇 光学工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 82 篇 理学
    • 45 篇 数学
    • 25 篇 生物学
    • 17 篇 物理学
    • 15 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 8 篇 医学
    • 7 篇 临床医学
    • 6 篇 基础医学(可授医学...
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 deep neural netw...
  • 8 篇 convolution
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 deep learning
  • 4 篇 contrastive lear...
  • 4 篇 machine learning
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 24 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 22 篇 school of comput...
  • 18 篇 guangdong provin...
  • 17 篇 peng cheng labor...
  • 17 篇 school of cyber ...
  • 16 篇 school of comput...
  • 15 篇 hubei key labora...
  • 15 篇 national enginee...
  • 15 篇 hubei engineerin...
  • 15 篇 school of electr...
  • 15 篇 school of inform...
  • 14 篇 services computi...
  • 14 篇 guangdong key la...
  • 13 篇 cluster and grid...
  • 10 篇 school of softwa...
  • 9 篇 key lab. of inte...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...

作者

  • 17 篇 zheng wei-shi
  • 13 篇 jin hai
  • 11 篇 hu shengshan
  • 11 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 kang xiangui
  • 9 篇 xiao ma
  • 8 篇 wan wei
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 zhou ziqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 xiaohua xie
  • 6 篇 huang qingming
  • 6 篇 yang qize

语言

  • 219 篇 英文
  • 38 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
258 条 记 录,以下是241-250 订阅
Community Detection in Complicated Network Based on the Multi-view Weighted Signed Permanence
Community Detection in Complicated Network Based on the Mult...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Juan-Hui Li Pei-Zhen Li Chang-Dong Wang Jian-Huang Lai Guangdong Key Laboratory of Information Security Technology Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China
This paper addresses the community detection problem in multi-view weighted signed network. Although some methods have been developed to detect communities in multi-view network, they are mostly designed for the unwei... 详细信息
来源: 评论
PEDESTRIAN DETECTION VIA A LEG-DRIVEN PHYSIOLOGY FRAMEWORK
PEDESTRIAN DETECTION VIA A LEG-DRIVEN PHYSIOLOGY FRAMEWORK
收藏 引用
IEEE International Conference on Image Processing
作者: Gongbo Liang Qi Li Xiangui Kang Western Kentucky University Department of Computer Science Ogden College of Science & Engineering Guangdong Key Lab of Information Security Sun Yat-Sen University School of Data and Computer Science
In this paper, we propose a leg-driven physiology framework for pedestrian detection. The framework is introduced to reduce the search space of candidate regions of pedestrians. Given a set of vertical line segments, ... 详细信息
来源: 评论
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinking and Border Detection
CSBD: A Nonlinear Clustering Method Based on Cluster Shrinki...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Chao Chen Kun-Yu Lin Chang-Dong Wang Dong Huang Guangdong Key Laboratory of Information Security Technology Guangzhou China School of Data and Computer Science Sun Yat-sen University Guangzhou China College of Mathematics and Informatics South China Agricultural University Guangzhou China
Nonlinear clustering has attracted an increasing amount of attention recently. In this paper, we propose a new nonlinear clustering method based on Cluster Shrinking and Border Detection (CSBD). Unlike most existing c... 详细信息
来源: 评论
An efficient parallel topic-sensitive expert finding algorithm using spark
An efficient parallel topic-sensitive expert finding algorit...
收藏 引用
IEEE International Conference on Big data
作者: Yao-Ming Yang Chang-Dong Wang Jian-Huang Lai Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing China Guangdong Key Laboratory of Information Security Technology China School of Data and Computer Science Sun Yat-sen University Guangzhou P. R. China
Expert finding is an important technique to obtain the user authority ranking in community question answering (CQA) websites. ZhihuRank is a topic-sensitive expert finding algorithm, which is based on both LDA and Pag... 详细信息
来源: 评论
Detecting infeasible traces in process models
Detecting infeasible traces in process models
收藏 引用
14th International Conference on Enterprise information Systems, ICEIS 2012
作者: Wang, Zhaoxia Wen, Lijie Zhu, Xiaochen Liu, Yingbo Wang, Jianmin School of Software Tsinghua University Beijing 100084 China Department of Computer Science and Technology Tsinghua University Beijing 100084 China Key Lab. for Information System Security Ministry of Education Beijing 100084 China National Laboratory for Information Science and Technology Beijing 100084 China Logistical Engineering University Chongqing 400016 China
Workflow testing is an important method of workflow analysis in design time. A challenging problem with trace-oriented test data generation in particular and trace-based workflow analysis in general is the existence o... 详细信息
来源: 评论
Multicast algorithms based on minimum delay tree
收藏 引用
Journal of Computational information Systems 2012年 第10期8卷 4039-4046页
作者: Zheng, Xinwei Jiang, Wenchao Wang, Xiaoyun Yuan, Zhibin Information Science School of Guangdong University of Business Studies Guangzhou 510023 China Computer School of Guangdong University of Technology Guangzhou 510006 China The Key Lab. of E-Business Market Application on Technology of Guangdong Province Guangzhou 510023 China
In constructing an efficient multicast tree of application-level multicast, not only the delay of link should be considered, but also the process delay of many end systems in sending and transmitting data can not be i... 详细信息
来源: 评论
Practical privacy for value-added applications in vehicular ad hoc networks  5th
收藏 引用
5th International Conference on Internet and Distributed Computing Systems, IDCS 2012
作者: Zhang, Lei Wu, Qianhong Qin, Bo Domingo-Ferrer, Josep Shanghai Key Laboratory of Trustworthy Computing Software Engineering Institute East China Normal University Shanghai China UNESCO Chair in Data Privacy Dept. of Comp. Eng. and Maths Universitat Rovira i Virgili TarragonaCatalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing Ministry of Education Wuhan University School of Computer China Department of Maths School of Science Xi’an University of Technology China
Advances in mobile networking and information processing technologies have triggered vehicular ad hoc networks (VANETs) for traffic safety and value-added applications. Most efforts have been made to address the secur... 详细信息
来源: 评论
Multi-user private keyword search for cloud computing
Multi-user private keyword search for cloud computing
收藏 引用
2011 3rd IEEE International Conference on Cloud Computing technology and science, CloudCom 2011
作者: Yang, Yanjiang Lu, Haibing Weng, Jian Institute for Infocomm Research Singapore Singapore Dept. of Operations Management and Information Systems Leavey School of Business Santa Clara University United States Department of Computer Science Emergency Technology Research Center of Risk Evaluation and Prewarning on Public Network Security Jinan University Guangzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences China State Key Lab. of Networking and Switching Technology Beijing University of Posts and Telecommunications China
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Calibration based universal JPEG steganalysis
收藏 引用
science in China(Series F) 2009年 第2期52卷 260-268页
作者: HUANG FangJun1,2 & HUANG JiWu1,2 1 school of information science and technology,Sun Yat-Sen University,Guangzhou 510275,China 2 guangdong key lab. of information security technology,Sun Yat-Sen University,Guangzhou 510275,China School of Information Science and Technology Sun Yat-Sen University Guangzhou China Guangdong Key Lab. of Information Security Technology Sun Yat-Sen University Guangzhou China
For steganalysis of JPEG images, features derived in the embedding domain appear to achieve a preferable performance. However, with the existing JPEG steganography, the minor changes due to the hidden secret data are ... 详细信息
来源: 评论