咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 129 篇 软件工程
    • 61 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 18 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 13 篇 法学
    • 7 篇 社会学
    • 6 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 5 篇 federated learni...
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是61-70 订阅
排序:
Improving fast segmentation with teacher-student learning  29
Improving fast segmentation with teacher-student learning
收藏 引用
29th British Machine Vision Conference, BMVC 2018
作者: Xie, Jiafeng Shuai, Bing Hu, Jian-Fang Lin, Jingyang Zheng, Wei-Shi School of Data and Computer Science Sun Yat-sen University China Nanyang Technological University Singapore Guangdong Key Laboratory of Information Security Technology China Key Laboratory of Machine Intelligence and Advanced Computing MOE Hong Kong
Recently, segmentation neural networks have been significantly improved by demonstrating very promising accuracies on public benchmarks. However, these models are very heavy and generally suffer from low inference spe... 详细信息
来源: 评论
Which DGA family does a malicious domain name belong to  5
Which DGA family does a malicious domain name belong to
收藏 引用
5th IEEE International Conference on data science in Cyberspace, DSC 2020
作者: Zhang, Yunyi Wu, Yuelong Jin, Shuyuan Yat-sen University School of Data and Computer Science Sun Guangzhou China Cyberspace Security Research Center Peng Cheng Laboratory Shenzhen China GuangDong Key Laboratory of Information Security Technology Sun Yat-set University Guangzhou China
The Domain Generation Algorithm (DGA) is a technology that generates a large amount of domains in a short time, commonly applied to malware by malicious attackers to circumvent the security mechanisms, such as domain ... 详细信息
来源: 评论
A mutual authentication lightweight rfid protocol for iot devices  2nd
A mutual authentication lightweight rfid protocol for iot de...
收藏 引用
2nd International Cognitive Cities Conference, IC3 2019
作者: Lu, Yong Wang, Anxi Liu, Shuai School of Management Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou550025 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou510632 China
The IoT data security is a hot topic at a data time. Personal privacy data may be easily leaked to data collectors in an open network environment. If the collectors get enough data, they can analyze the habit and inte... 详细信息
来源: 评论
An Ensemble of CapsNet and KSVM Using Feature Fusion: Application to COVID-19 Detection  3
An Ensemble of CapsNet and KSVM Using Feature Fusion: Applic...
收藏 引用
3rd International Conference on Pattern Recognition and Machine Learning, PRML 2022
作者: Aggrey, Esther Stacy E. B. Zhen, Qin Kodjiku, Seth Larweh Aidoo, Evans Fiasam, Linda Delali Mensah, Acheampong Edward University of Electronic Science & Technology of China School of Information & Software Engineering Chengdu China University of Electronic Science & Technology of China School of Information & Software Engineering Network and Data Security Key Lab of Sichuan Province Chengdu China Zhejiang Gongshang University School of Computer & Information Engineering Hangzhou China
COVID-19 virus is a major worldwide pandemic that is growing at a fast pace throughout the world. The usual approach for diagnosing COVID-19 is the use of a real-time polymerase chain reaction (RT-PCR) based nucleic a... 详细信息
来源: 评论
Performance of Systematic Convolutional Low Density Generator Matrix Codes over Rayleigh Fading Channels with Impulsive Noise  3rd
Performance of Systematic Convolutional Low Density Generato...
收藏 引用
3rd International Conference on Space information Networks, SINC 2018
作者: Ji, Meiying Chen, Shengxiao Ma, Xiao School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China School of Electronics and Information Technology Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
We investigate the systematic convolutional low density generator matrix (SC-LDGM) codes over Rayleigh fading channels with symmetric alpha-stable (SαS) impulsive noise. The performance is analy... 详细信息
来源: 评论
Traffic Engineering in Dynamic Hybrid Segment Routing Networks
收藏 引用
computers, Materials & Continua 2021年 第7期68卷 655-670页
作者: Yingya Guo Kai Huang Cheng Hu Jiangyuan Yao Siyu Zhou College of Mathematics and Computer Science Fuzhou UniversityFuzhou350000China Fujian Key Laboratory of Network Computing and Intelligent Information Processing Fuzhou UniversityFuzhou350000China Key Laboratory of Spatial Data Mining&Information Sharing Ministry of EducationFuzhou350003China School of Information Science and Technology Guangdong University of Foreign StudiesGuangzhou510006China School of Computer Science and Cyberspace Security Hainan UniversityHaiKou570228China Tandon School of Engineering New York UniversityNew York10012USA Department of Computing Hong Kong Polytechnic UniversityHong Hom999077Hong Kong
The emergence of Segment Routing(SR)provides a novel routing paradigm that uses a routing technique called source packet *** SR architecture,the paths that the packets choose to route on are indicated at the ingress *... 详细信息
来源: 评论
Asymmetric group key agreement
Asymmetric group key agreement
收藏 引用
28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2009
作者: Qianhong, Wu Yi, Mu Susilo, Willy Bo, Qin Domingo-Ferrer, Josep Universitat Rovira i Virgili Dept. of Comp. Eng. and Maths UNESCO Department of Data Privacy Tarragona Catalonia Spain Key Lab. of Aerospace Information Security and Trusted Computing School of Computer Wuhan University China Centre for Computer and Information Security Research School of Computer Science and Software Engineering University of Wollongong Australia Dept. of Maths School of Science Xi'an University of Technology China
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m... 详细信息
来源: 评论
Block Markov superposition transmission of BCH codes with iterative hard-decision decoding
Block Markov superposition transmission of BCH codes with it...
收藏 引用
2017 IEEE International Symposium on information Theory, ISIT 2017
作者: Lin, Nina Cai, Suihua Ma, Xiao School of Electronics and Information Technology Sun Yat-sen University Guangzhou510006 China School of Data and Computer Science Sun Yat-sen University Guangzhou510006 China Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
This paper is concerned with block Markov super-position transmission of BCH (BMST-BCH) codes. Compared with other BMST codes, BMST-BCH codes can achieve a lower error floor with an encoding memory of two, which is cr... 详细信息
来源: 评论
Reinforcement Learning Aided Network Architecture Generation for JPEG Image Steganalysis  20
Reinforcement Learning Aided Network Architecture Generation...
收藏 引用
8th ACM Workshop on information Hiding and Multimedia security, IH and MMSec 2020
作者: Yang, Jianhua Lu, Beiling Xiao, Liang Kang, Xiangui Shi, Yun-Qing Guangdong Key Lab of Information Security Sun Yat-Sen University Guangzhou Guangdong China Department of Communication Engineering Xiamen University Xiamen Fujian China School of Data and Computer Science Sun Yat-Sen University Guangzhou Guangdong China Department of ECE New Jersey Institute of Technology NewarkNJ United States
The architectures of convolutional neural networks used in steganalysis have been designed heuristically. In this paper, an automatic Network Architecture Generation algorithm based on reinforcement learning for JPEG ... 详细信息
来源: 评论
Depthwise Separable Convolutional Neural Network for Image Forensics  34
Depthwise Separable Convolutional Neural Network for Image F...
收藏 引用
34th IEEE International Conference on Visual Communications and Image Processing, VCIP 2019
作者: Chen, Yifang Peng, Feng Kang, Xiangui Jane Wang, Z. Sun Yat-sen University Guangdong Key Lab of Information Security School of Data and Computer Science China ECE Dept University of British Colombia VancouverBCV6T 1Z4 Canada
General-purpose forensics on small image patches appears to be feasible and important, but in fact poses a challenge due to insufficient statistics. Furthermore, there is a need to develop a forensic approach that can... 详细信息
来源: 评论