咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是41-50 订阅
排序:
A SVM-based EEG signal analysis: An auxiliary therapy for tinnitus  1
收藏 引用
8th International Conference on Brain Inspired Cognitive Systems, BICS 2016
作者: Li, Pei-Zhen Li, Juan-Hui Wang, Chang-Dong School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China
Tinnitus is a kind of auditory disease characterized by an ongoing conscious perception of a sound in the absence of any external sound source. It is a common symptom for which no effective treatment exists. Though ma... 详细信息
来源: 评论
Fair electronic voting via bitcoin deposits  5th
Fair electronic voting via bitcoin deposits
收藏 引用
5th International Conference on Geo-Spatial Knowledge and Intelligence, GSKI 2017
作者: Wu, Xijuan Wei, Baodian Tian, Haibo Du, Yusong Ma, Xiao School of Data and Computer Science Sun Yat-sen University Guangzhou China Guangdong Key Laboratory of Information Security Technology Guangzhou China Chongqing Key Lab of Computer Network and Communication Technology Chongqing China
Bitcoin is the most popular decentralized digital currency now in use. Block chain is the basic technology of Bitcoin, providing a trustable ledger that can be publicly verified. Research on distributed applications b... 详细信息
来源: 评论
Reversible data Hiding Based on Partitioning the Prediction Values  18th
Reversible Data Hiding Based on Partitioning the Prediction ...
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Wu, Haihang Huang, Fangjun Guangdong Provincial Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-Sen University GuangzhouGD510006 China
In this paper, we present a new reversible data hiding (RDH) method. Instead of directly dividing the neighboring pixels into blocks, we sort the pixels according to their prediction values first, and then the sorted ... 详细信息
来源: 评论
Reversible data hiding in JPEG images based on multiple histograms modification  5th
Reversible data hiding in JPEG images based on multiple hist...
收藏 引用
5th International Conference on Artificial Intelligence and security, ICAIS 2019
作者: Lu, Xing Huang, Fangjun Kim, Hyoung Joong Guangdong Provincial Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-sen University GuangzhouGuangdong510006 China Graduate School of Information Security Korea University Seoul136-701 Korea Republic of
The joint photographic experts group (JPEG) is the most popular image on the internet nowadays. Therefore, reversible data hiding (RDH), which can be used to ensure the widely used JPEG images' originality and int... 详细信息
来源: 评论
Identification of Various Image Operations Using Residual-Based Features
Identification of Various Image Operations Using Residual-Ba...
收藏 引用
作者: Li, Haodong Luo, Weiqi Qiu, Xiaoqing Huang, Jiwu Guangdong Key Laboratory of Information Security Technology School of Electronics and Information Technology Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China Shenzhen Key Laboratory of Media Security College of Information Engineering Shenzhen University Shenzhen518052 China
Image forensics has attracted wide attention during the past decade. However, most existing works aim at detecting a certain operation, which means that their proposed features usually depend on the investigated image... 详细信息
来源: 评论
Example-based web page recoloring method
收藏 引用
Frontiers of computer science 2020年 第5期14卷 229-231页
作者: Yonghao Long Zhihao Zang Xiangping Chen Fan Zhou Xiaonan Luo School of Data and Computer Science National Engineering Research Center of Digital LifeSun Yat-sen UniversityGuangzhou510006China Guangdong Key Laboratory for Big Data Analysis and Simulation of Public Opinion The School of Communication and DesignSun Yat-sen UniversityGuangzhou510006China School of Computer Science and Information Security Guilin University of Electronic TechnologyGuilin541004China
1 Introduction The user interface(UI)is very important for a software product,and a well-designed UI will attract users and make a good *** has been shown that color plays an important role in invoking emotional react... 详细信息
来源: 评论
Fully distributed certificateless threshold signature without random oracles
收藏 引用
中国科学(信息科学) 2018年 第9期61卷 253-255页
作者: Wenjie YANG Weiqi LUO Xizhao LUO Jian WENG Anjia YANG College of Cyber Security/College of Information Science and Technology Jinan University Guangzhou 510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou 511443 China Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou 511443 China College of Cyber Security/College of Information Science and Technology Jinan University Guangzhou 510632 China School of Computer and Technology Soochow University Suzhou 215006 China
A certificateless (t,n) threshold signature (CLTS) scheme allows at least t members to cooperatively sign a message on behalf of an n-member group,which is a good way to share the responsibility and *** researchers ha...
来源: 评论
Fully distributed certificateless threshold signature without random oracles
收藏 引用
science China(information sciences) 2018年 第9期61卷 259-269页
作者: Wenjie YANG Weiqi LUO Xizhao LUO Jian WENG Anjia YANG College of Cyber Security/College of Information Science and Technology Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving Guangzhou Key Laboratory of Data Security and Privacy Preserving School of Computer and Technology Soochow University
A certificateless(t,n)threshold signature(CLTS)scheme allows at least t members to cooperatively sign a message on behalf of an n-member group,which is a good way to share the responsibility and *** researchers have f... 详细信息
来源: 评论
Privacy-aware OrLa based access control model in the cloud  32
Privacy-aware OrLa based access control model in the cloud
收藏 引用
32nd International Conference on Software Engineering and Knowledge Engineering, SEKE 2020
作者: Shao, Pengfei Jin, Shuyuan School of Data and Computer Science Sun Yat-sen University Guangzhou China GuangDong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou China
In recent years, cloud computing has been widely adopted by an increasing number of enterprises and individuals because of its attractive features, such as its large scale, low costs, and pay-per-use. Nevertheless, tr... 详细信息
来源: 评论
Robot and its living space:A roadmap for robot development based on the view of living space
收藏 引用
Digital Communications and Networks 2021年 第4期7卷 505-517页
作者: Xiaofeng Cai Huansheng Ning Sahraoui Dhelim Rongjuan Zhou Tao Zhang Yang Xu Yueliang Wan School of Computer and Communication Engineering University of Science and Technology Beijing Beijing 100083China Beijing Engineering Research Center for Cyberspace Data Analysis and Applications Beijing 100083China School of Foreign Studies University of Science and Technology Beijing Beijing 100083China Key Lab of Information Network Security Ministry of Public SecurityChina Run Technologies Co. LidBeijing China
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human *** the advancement of t... 详细信息
来源: 评论