咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 6 篇 federated learni...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是31-40 订阅
排序:
Layer-Wise Learning Rate Optimization for Task-Dependent Fine-Tuning of Pre-Trained Models: An Evolutionary Approach
收藏 引用
ACM Transactions on Evolutionary Learning and Optimization 2024年 第4期4卷 1-23页
作者: Bu, Chenyang Liu, Yuxin Huang, Manzong Shao, Jianxuan Ji, Shengwei Luo, Wenjian Wu, Xindong Key Laboratory of Knowledge Engineering with Big Data Ministry of Education and School of Computer Science and Information Engineering Hefei University of Technology Hefei China School of Artificial Intelligence and Big Data Hefei University Hefei China Guangdong Provincial Key Laboratory of Novel Security Intelligence Technologies School of Computer Science and Technology Harbin Institute of Technology Shenzhen China
The superior performance of large-scale pre-Trained models, such as Bidirectional Encoder Representations from Transformers (BERT) and Generative Pre-Trained Transformer (GPT), has received increasing attention in bot... 详细信息
来源: 评论
Improve the Robustness of Deep Learning Models against Adversarial Attacks in Judicial Field  8
Improve the Robustness of Deep Learning Models against Adver...
收藏 引用
8th International Conference on Digital Home, ICDH 2020
作者: Liao, Yongxian Zhuang, Wenzi Huang, Lifeng Liu, Ning Sun Yat-sen University School of Data and Computer Science China Guangdong Key Laboratory of Information Security Technology China
With the rapid development of deep neural networks (DNNs), they have been applied in various domains including crowd counting, object detection and digital forensic. Consequently, DNN-based forensic process plays an e... 详细信息
来源: 评论
New results on quantum boomerang attacks
收藏 引用
Quantum information Processing 2023年 第4期22卷 1-27页
作者: Zou, Hongkai Zou, Jian Luo, Yiyuan College of Computer and Data Science Fuzhou University Fuzhou China Key Lab of Information Security of Network Systems Fuzhou University Fuzhou China School of Information Sciences and Technology Huizhou University Huizhou China
At SAC 2021, Frixons et al. proposed quantum boomerang attacks that can effectively recover the keys of block ciphers in the quantum setting. Based on their work, we further consider how to quantize the generic boomer... 详细信息
来源: 评论
FakeScope: Large Multimodal Expert Model for Transparent AI-Generated Image Forensics
arXiv
收藏 引用
arXiv 2025年
作者: Li, Yixuan Tian, Yu Huang, Yipo Lu, Wei Wang, Shiqi Lin, Weisi Rocha, Anderson College of Computing City University of Hong Kong Hong Kong School of Computer Science and Engineering Ministry of Education Key Laboratory of Information Technology Guangdong Province Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou510006 China College of Computing and Data Science Nanyang Technological University Singapore Artificial Intelligence Lab Recod.ai University of Campinas Campinas13084-851 Brazil
The rapid and unrestrained advancement of generative artificial intelligence (AI) presents a double-edged sword: while enabling unprecedented creativity, it also facilitates the generation of highly convincing decepti... 详细信息
来源: 评论
Design a Proof of Stake Based Directed Acyclic Graph Chain  3rd
Design a Proof of Stake Based Directed Acyclic Graph Chain
收藏 引用
3rd International Conference on Frontiers in Cyber security, FCS 2020
作者: Tian, Haibo Lin, Huizhi Zhang, Fangguo Guangdong Province Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University GuangzhouGuangdong510275 China
The concept of blockchain comes from the Bitcoin system where transactions are organized in blocks. However, blocks are not necessary. Researchers have found ways to use a directed acyclic graph (DAG) to build a chain... 详细信息
来源: 评论
A Robust Blind Watermarking Scheme for Color Images Using Quaternion Fourier Transform  6th
A Robust Blind Watermarking Scheme for Color Images Using Qu...
收藏 引用
6th International Conference on Artificial Intelligence and security, ICAIS 2020
作者: Liang, Renjie Zheng, Peijia Fang, Yanmei Song, Tingting School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou510006 China
With the advancement of image devices, massive image data are being generated exponentially, which indirectly leads to more copyright issues over the images. Image watermarking is an important method for copyright pro... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of computer science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Secure outsourced numerical solution of algebraic equations  6th
Secure outsourced numerical solution of algebraic equations
收藏 引用
6th International Conference on Artificial Intelligence and security,ICAIS 2020
作者: Zeng, Ke Zheng, Peijia Liu, Hongmei School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-Sen University Guangzhou510006 China
Numerical methods are designed to provide numerical solutions of algebraic equations, because there are not analytical solutions for algebraic equations whose degrees are larger than four. In cloud computing, outsourc... 详细信息
来源: 评论
A distributed multi-exemplar affinity propagation clustering algorithm based on mapreduce  3
A distributed multi-exemplar affinity propagation clustering...
收藏 引用
3rd IEEE International Conference on Big data Computing Service and Applications, BigdataService 2017
作者: Yang, Yu-Bo Wang, Chang-Dong Lai, Jian-Huang School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Clustering algorithm is one of the fundamental techniques in data mining, which plays a crucial role in various applications, such as pattern recognition, document retrieval, and computer vision. As so far, many effec... 详细信息
来源: 评论
Resampling Factor Estimation via Dual-Stream Convolutional Neural Network
收藏 引用
computers, Materials & Continua 2021年 第1期66卷 647-657页
作者: Shangjun Luo Junwei Luo Wei Lu Yanmei Fang Jinhua Zeng Shaopei Shi Yue Zhang School of Data and Computer Science Guangdong Province Key Laboratory of Information Security TechnologyMinistry of Education Key Laboratory of Machine Intelligence and Advanced ComputingSun Yat-sen UniversityGuangzhou510006China Academy of Forensic Science Shanghai200063China College of Information Science and Technology Jinan UniversityGuangzhou510632China Department of Computer Science University of Massachusetts LowellLowellMA 01854USA
The estimation of image resampling factors is an important problem in image *** all the resampling factor estimation methods,spectrumbased methods are one of the most widely used methods and have attracted a lot of re... 详细信息
来源: 评论