咨询与建议

限定检索结果

文献类型

  • 161 篇 期刊文献
  • 87 篇 会议

馆藏范围

  • 248 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 192 篇 工学
    • 148 篇 计算机科学与技术...
    • 128 篇 软件工程
    • 62 篇 信息与通信工程
    • 23 篇 电气工程
    • 23 篇 生物工程
    • 19 篇 电子科学与技术(可...
    • 15 篇 控制科学与工程
    • 13 篇 光学工程
    • 11 篇 机械工程
    • 10 篇 生物医学工程(可授...
    • 10 篇 网络空间安全
    • 7 篇 化学工程与技术
    • 5 篇 仪器科学与技术
    • 5 篇 土木工程
    • 5 篇 安全科学与工程
    • 4 篇 动力工程及工程热...
  • 81 篇 理学
    • 44 篇 数学
    • 26 篇 生物学
    • 16 篇 物理学
    • 14 篇 统计学(可授理学、...
    • 9 篇 化学
    • 5 篇 系统科学
  • 53 篇 管理学
    • 31 篇 图书情报与档案管...
    • 24 篇 管理科学与工程(可...
    • 8 篇 工商管理
  • 12 篇 法学
    • 7 篇 社会学
    • 5 篇 法学
  • 9 篇 医学
    • 7 篇 基础医学(可授医学...
    • 7 篇 临床医学
  • 5 篇 经济学
    • 5 篇 应用经济学
  • 3 篇 农学
  • 1 篇 军事学

主题

  • 11 篇 semantics
  • 8 篇 convolution
  • 7 篇 deep neural netw...
  • 7 篇 decoding
  • 7 篇 training
  • 6 篇 object detection
  • 6 篇 feature extracti...
  • 6 篇 federated learni...
  • 5 篇 cameras
  • 5 篇 optimization
  • 5 篇 machine learning
  • 5 篇 steganography
  • 4 篇 image enhancemen...
  • 4 篇 contrastive lear...
  • 4 篇 encoding
  • 4 篇 deep reinforceme...
  • 3 篇 gamma-gamma chan...
  • 3 篇 deep learning
  • 3 篇 task analysis
  • 3 篇 clustering algor...

机构

  • 39 篇 school of data a...
  • 23 篇 key laboratory o...
  • 22 篇 guangdong key la...
  • 21 篇 school of comput...
  • 17 篇 peng cheng labor...
  • 17 篇 guangdong provin...
  • 15 篇 school of comput...
  • 15 篇 school of electr...
  • 15 篇 school of cyber ...
  • 14 篇 hubei key labora...
  • 14 篇 national enginee...
  • 14 篇 hubei engineerin...
  • 14 篇 guangdong key la...
  • 13 篇 services computi...
  • 13 篇 school of inform...
  • 12 篇 cluster and grid...
  • 9 篇 pazhou lab
  • 9 篇 school of data a...
  • 9 篇 school of softwa...
  • 8 篇 college of infor...

作者

  • 17 篇 zheng wei-shi
  • 12 篇 jin hai
  • 10 篇 hu shengshan
  • 10 篇 zhang leo yu
  • 10 篇 xie xiaohua
  • 9 篇 xiao ma
  • 8 篇 kang xiangui
  • 8 篇 wang chang-dong
  • 8 篇 ma xiao
  • 7 篇 wan wei
  • 7 篇 lai jian-huang
  • 7 篇 luo weiqi
  • 7 篇 cao xiaochun
  • 7 篇 xu qianqian
  • 6 篇 fu shenghao
  • 6 篇 huang jiwu
  • 6 篇 huang qingming
  • 6 篇 yang qize
  • 6 篇 zhou ziqi
  • 6 篇 yang jian

语言

  • 227 篇 英文
  • 20 篇 其他
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 中文
检索条件"机构=School of Data and Computer Science and Guangdong Key Lab. of Information Security and Technology"
248 条 记 录,以下是81-90 订阅
排序:
Design of Intelligent Robot Platform based on Multi-sensor Fusion
Design of Intelligent Robot Platform based on Multi-sensor F...
收藏 引用
2020 International Conference on 5G Mobile Communication and information science, MCIS-5G 2020
作者: Dajin, Ya Xiaochun, Lei Yue, Li Junyan, Chen Rongcun, Huang Lin, Lan School of Computer and Information Security Guilin University of Electronic Technology Guilin541004 China Guangxi Colleges and Universities Key Lab. of Intelligent Processing of Computer Images and Graphics Guilin541004 China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic Technology Guilin541004 China
The mobile robot adapts to the more complicated indoor and outdoor environments, and can expand its scope of application. In order to reduce the influence of the cumulative error caused by navigation in complex enviro... 详细信息
来源: 评论
Motion-appearance interactive encoding for object segmentation in unconstrained videos
arXiv
收藏 引用
arXiv 2017年
作者: Guo, Chunchao Lai, Jianhuang Xie, Xiaohua School of Data and Computer Science Sun Yat-sen University Guangdong Key Laboratory of Information Security Technology Guangzhou510006 China
We present a novel method of integrating motion and appearance cues for foreground object segmentation in unconstrained videos. Unlike conventional methods encoding motion and appearance patterns individually, our met... 详细信息
来源: 评论
Twisted-pair superposition transmission
arXiv
收藏 引用
arXiv 2021年
作者: Cai, Suihua Ma, Xiao School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
We propose in this paper a new coding scheme called twisted-pair superposition transmission (TPST). The encoding is to "mix together" a pair of basic codes by superposition, while the decoding can be impleme... 详细信息
来源: 评论
Systematic convolutional low density generator matrix code
arXiv
收藏 引用
arXiv 2020年
作者: Cai, Suihua Lin, Wenchao Yao, Xinyuanmeng Wei, Baodian Ma, Xiao School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
In this paper, we propose a systematic low density generator matrix (LDGM) code ensemble, which is defined by the Bernoulli process. We prove that, under maximum likelihood (ML) decoding, the proposed ensemble can ach... 详细信息
来源: 评论
The Power of Bamboo: On the Post-Compromise security for Searchable Symmetric Encryption  30
The Power of Bamboo: On the Post-Compromise Security for Sea...
收藏 引用
30th Annual Network and Distributed System security Symposium, NDSS 2023
作者: Chen, Tianyang Xu, Peng Picek, Stjepan Luo, Bo Susilo, Willy Jin, Hai Liang, Kaitai National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security Hubei Engineering Research Center on Big Data Security School of Cyber Science and Engineering China Cluster and Grid Computing Lab School of Computer Science and Technology China Huazhong University of Science and Technology Wuhan430074 China Digital Security Group Radboud University Nijmegen Netherlands Department of EECS Institute of Information Sciences The University of Kansas LawrenceKS United States Institute of Cybersecurity and Cryptology School of Computing and Information Technology University of Wollongong WollongongNSW2522 Australia Faculty of Electrical Engineering Mathematics and Computer Science Delft University of Technology Delft2628 CD Netherlands
Dynamic searchable symmetric encryption (DSSE) enables users to delegate the keyword search over dynamically updated encrypted databases to an honest-but-curious server without losing keyword privacy. This paper studi...
来源: 评论
Statistical learning aided list decoding of semi-random block oriented convolutional codes
arXiv
收藏 引用
arXiv 2019年
作者: Lin, Wenchao Ma, Xiao Cai, Suihua Wei, Baodian School of Data and Computer Science Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China School of Electronics and Information Technology Guangdong Key Laboratory of Information Security Technology Sun Yat-sen University Guangzhou510006 China
In this paper, we propose a statistical learning aided list decoding algorithm, which integrates a serial list Viterbi algorithm (SLVA) with a soft check instead of the conventional cyclic redundancy check (CRC), for ... 详细信息
来源: 评论
Frozen-DETR: Enhancing DETR with Image Understanding from Frozen Foundation Models  38
Frozen-DETR: Enhancing DETR with Image Understanding from Fr...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Fu, Shenghao Yan, Junkai Yang, Qize Wei, Xihan Xie, Xiaohua Zheng, Wei-Shi School of Computer Science and Engineering Sun Yat-sen University China Peng Cheng Laboratory Shenzhen518055 China Tongyi Lab Alibaba Group China Key Laboratory of Machine Intelligence and Advanced Computing Ministry of Education China Guangdong Province Key Laboratory of Information Security Technology China Guangdong Guangzhou510555 China
Recent vision foundation models can extract universal representations and show impressive abilities in various tasks. However, their application on object detection is largely overlooked, especially without fine-tunin...
来源: 评论
Suppress Content Shift: Better Diffusion Features via Off-the-Shelf Generation Techniques  38
Suppress Content Shift: Better Diffusion Features via Off-th...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Yang, Zhiyong Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Computer Science and Tech. University of Chinese Academy of Sciences China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are powerful generative models, and this capability can also be applied to discrimination. The inner activations of a pre-trained diffusion model can serve as features for discriminative tasks, namely...
来源: 评论
Not All Diffusion Model Activations Have Been Evaluated as Discriminative Features  38
Not All Diffusion Model Activations Have Been Evaluated as D...
收藏 引用
38th Conference on Neural information Processing Systems, NeurIPS 2024
作者: Meng, Benyuan Xu, Qianqian Wang, Zitai Cao, Xiaochun Huang, Qingming Institute of Information Engineering CAS China School of Cyber Security University of Chinese Academy of Sciences China Key Lab. of Intelligent Information Processing Institute of Computing Technology CAS China Peng Cheng Laboratory China School of Cyber Science and Tech. Shenzhen Campus of Sun Yat-sen University China School of Computer Science and Tech. University of Chinese Academy of Sciences China Key Laboratory of Big Data Mining and Knowledge Management CAS China
Diffusion models are initially designed for image generation. Recent research shows that the internal signals within their backbones, named activations, can also serve as dense features for various discriminative task...
来源: 评论
A Novel Meta-Hierarchical Active Inference Reinforcement Learning Approach for QoS-Driven Resource Allocation in Dynamic Clouds
A Novel Meta-Hierarchical Active Inference Reinforcement Lea...
收藏 引用
2024 IEEE Global Communications Conference, GLOBECOM 2024
作者: Xian, Peijie He, Ying Yu, F. Richard Du, Jianbo Shenzhen Univ. College of Computer Science and Software Engineering Shenzhen China Xi'an Univ. of Posts & Telecomm. Shaanxi Key Lab. of Information Comm. Network and Security Shaanxi Xi'an China Carleton Univ. School of Information Technology OttawaON Canada
The cloud computing environment is highly dynamic due to a variety of external factors such as seasonal changes, market trends, and social events. In this case, tenant behavior patterns exhibit significant variability... 详细信息
来源: 评论