咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 6 篇 federated learni...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是51-60 订阅
排序:
Halftone Image Steganography with Distortion Measurement Based on Structural Similarity  18th
Halftone Image Steganography with Distortion Measurement Bas...
收藏 引用
18th International Workshop on Digital Forensics and Watermarking, IWDW 2019
作者: Liu, Wanteng Yin, Xiaolin Lu, Wei Zhang, Junhong School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing Sun Yat-sen University Guangzhou510006 China
For halftone image data hiding, it is difficult to achieve good visual quality and statistical security when high embedding capacity is demanded. In this paper, a secure steganographic scheme for halftone image is pro... 详细信息
来源: 评论
EFFICIENT ONLINE lab.L CONSISTENT HASHING FOR LARGE-SCALE CROSS-MODAL RETRIEVAL
EFFICIENT ONLINE LABEL CONSISTENT HASHING FOR LARGE-SCALE CR...
收藏 引用
2021 IEEE International Conference on Multimedia and Expo, ICME 2021
作者: Yi, Jinhan Liu, Xin Cheung, Yiu-Ming Xu, Xing Fan, Wentao He, Yi Department of Computer Science and Technology Huaqiao University Xiamen361021 China Xiamen Key Lab. of Computer Vision and Pattern Recognition Fujian Key Lab. of Big Data Intelligence and Security China Department of Computer Science Hong Kong Baptist University Kowloon Hong Kong School of Computer Science and Engineering University of Electronic Science and Technology of China China Provincial Key Laboratory for Computer Information Processing Technology Soochow University China
Existing cross-modal hashing still faces three challenges: (1) Most batch-based methods are unsuitable for processing large-scale and streaming data. (2) Current online methods often suffer from insufficient semantic ... 详细信息
来源: 评论
Hybrid malware detection approach with feedback-directed machine learning
收藏 引用
science China(information sciences) 2020年 第3期63卷 240-242页
作者: Zhetao LI Wenlin LI Fuyuan LIN Yi SUN Min YANG Yuan ZHANG Zhibo WANG Hunan Provincial Key Lab of Internet of Things and Information Security Xiangtan University The College of Information Engineering Xiangtan University Institute of Computing Technology Chinese Academy of Sciences University of Chinese Academy of Sciences School of Computer Science Fudan University Shanghai Institute of Intelligent Electronics & Systems Shanghai Institute for Advanced Communication and Data Science School of Cyber Science and Engineering Wuhan University
Dear editor,In recent years, the number of mobile malware has increased at an alarming rate. According to a report from G data [1], there are approximately 9000 new Android malware instances each *** malicious applica... 详细信息
来源: 评论
An identity-based anonymous signcryption for vehicular ad hoc networks  2nd
An identity-based anonymous signcryption for vehicular ad ho...
收藏 引用
2nd International Cognitive Cities Conference, IC3 2019
作者: Lu, Yong Yang, Huijie School of Management Science and Engineering Nanjing University of Information Science and Technology Nanjing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guiyang China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China
The vehicular ad hoc networks (VANETs) can share information of vehicles’ location, speed and route within a certain range by interconnecting vehicles, roadside units (RSU) and the cloud. As people’s daily traffic t... 详细信息
来源: 评论
IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE FUSION FOR FACE FORGERY DETECTION  4
IMPROVED XCEPTION WITH DUAL ATTENTION MECHANISM AND FEATURE ...
收藏 引用
4th International Conference on data Intelligence and security, ICDIS 2022
作者: Lin, Hao Luo, Weiqi Wei, Kangkang Liu, Minglin Sun Yat-sen University Guangdong Key Lab of Information Security Technology Guangzhou China School of Computer Science and Engineering Sun Yat-sen University Guangzhou China
Face forgery detection has become a research hotspot in recent years, and many related methods have been proposed until now. For those images with low quality and/or diverse sources, the detection performances of exis... 详细信息
来源: 评论
Mixed Attention Densely Residual Network for Single Image Super-Resolution
收藏 引用
computer Systems science & Engineering 2021年 第10期39卷 133-146页
作者: Jingjun Zhou Jing Liu Jingbing Li Mengxing Huang Jieren Cheng Yen-Wei Chen Yingying Xu Saqib Ali Nawaz School of Information and Communication Engineering Hainan UniversityHaikou570228China State Key Laboratory of Marine Resource Utilization in the South China Sea Hainan UniversityHaikou570228China Research Center for Healthcare Data Science Zhejiang LabHangzhou311121China School of Computer Science and Cyberspace Security Hainan UniversityHaikou570228China Graduate School of Information Science and Engineering Ritsumeikan University5258577Japan College of Computer Science and Technology Zhejiang UniversityHangzhou311100China
Recent applications of convolutional neural networks(CNNs)in single image super-resolution(SISR)have achieved unprecedented ***,existing CNN-based SISR network structure design consider mostly only channel or spatial ... 详细信息
来源: 评论
An approach of constructing neutral modeling command set of synchronized collab.rative design upon heterogeneous CAD systems
An approach of constructing neutral modeling command set of ...
收藏 引用
International Conference on Management and Service science, MASS 2009
作者: Zhang, Xiaoyong Dou, Wanfeng School of Computer Science and Technology Jiangsu Research Center of Information Security and Confidential Engineering Nanjing Normal University 210097 China School of Computer Science and Technology Key Lab. of Virtual Geographic Environment Nanjing Normal University 210097 China
The synchronized collab.rative design within heterogeneous CAD systems becomes a significant challenge because of the great difference between the modeling operations and underground data structures of different syste... 详细信息
来源: 评论
Hierarchical certificateless signatures
Hierarchical certificateless signatures
收藏 引用
International Workshop on Wireless Network Algorithm and Theory
作者: Zhang, Lei Wu, Qianhong Domingo-Ferrer, Josep Qin, Bo UNESCO in Data Privacy Department of Computer Engineering and Mathematics Universitat Rovira i Virgili Catalonia Spain Wuhan University School of Computer Key Lab. of Aerospace Information Security and Trusted Computing China Xi'an University of Technology School of Science Department of Maths China
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In... 详细信息
来源: 评论
Autoencoder-Based Latent Block-Diagonal Representation for Subspace Clustering
收藏 引用
IEEE Transactions on Cybernetics 2022年 第6期52卷 5408-5418页
作者: Xu, Yesong Chen, Shuo Li, Jun Han, Zongyan Yang, Jian Nanjing University of Science and Technology PCA Laboratory Key Lab. of Intelligent Percept. and Syst. for High-Dimensional Information of Ministry of Education Nanjing210094 China Nanjing University of Science and Technology Jiangsu Key Laboratory of Image and Video Understanding for Social Security School of Computer Science and Engineering Nanjing210094 China RIKEN Center for Advanced Intelligence Project Tokyo103-0027 Japan Nanjing University of Science and Technology School of Computer Science and Engineering Nanjing210094 China
Block-diagonal representation (BDR) is an effective subspace clustering method. The existing BDR methods usually obtain a self-expression coefficient matrix from the original features by a shallow linear model. Howeve... 详细信息
来源: 评论
Abnormality Detection in Chest X-Ray Images Using Uncertainty Prediction Autoencoders  23rd
Abnormality Detection in Chest X-Ray Images Using Uncertaint...
收藏 引用
23rd International Conference on Medical Image Computing and computer-Assisted Intervention, MICCAI 2020
作者: Mao, Yifan Xue, Fei-Fei Wang, Ruixuan Zhang, Jianguo Zheng, Wei-Shi Liu, Hongmei School of Data and Computer Science Sun Yat-sen University Guangzhou China Key Laboratory of Machine Intelligence and Advanced Computing MOE Guangzhou China Department of Computer Science and Engineering Southern University of Science and Technology Shenzhen China Pazhou Lab Guangzhou China Guangdong Province Key Laboratory of Information Security Technology Guangzhou China
Chest radiography is widely used in annual medical screening to check whether lungs are healthy or not. Therefore it would be desirable to develop an intelligent system to help clinicians automatically detect potentia... 详细信息
来源: 评论