咨询与建议

限定检索结果

文献类型

  • 248 篇 会议
  • 109 篇 期刊文献

馆藏范围

  • 357 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 239 篇 工学
    • 167 篇 计算机科学与技术...
    • 121 篇 软件工程
    • 82 篇 信息与通信工程
    • 36 篇 控制科学与工程
    • 34 篇 电气工程
    • 31 篇 电子科学与技术(可...
    • 16 篇 机械工程
    • 12 篇 仪器科学与技术
    • 12 篇 建筑学
    • 12 篇 网络空间安全
    • 11 篇 动力工程及工程热...
    • 11 篇 化学工程与技术
    • 9 篇 交通运输工程
    • 9 篇 生物工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 光学工程
    • 8 篇 土木工程
    • 8 篇 航空宇航科学与技...
    • 5 篇 材料科学与工程(可...
  • 127 篇 理学
    • 80 篇 数学
    • 33 篇 物理学
    • 25 篇 统计学(可授理学、...
    • 19 篇 系统科学
    • 16 篇 化学
    • 14 篇 生物学
  • 61 篇 管理学
    • 42 篇 管理科学与工程(可...
    • 23 篇 图书情报与档案管...
    • 12 篇 工商管理
  • 9 篇 医学
    • 6 篇 基础医学(可授医学...
    • 6 篇 临床医学
  • 4 篇 经济学
  • 4 篇 法学
  • 2 篇 教育学
  • 1 篇 军事学

主题

  • 19 篇 laboratories
  • 14 篇 computer science
  • 12 篇 wireless sensor ...
  • 10 篇 heuristic algori...
  • 9 篇 optimization
  • 9 篇 algorithm design...
  • 8 篇 statistics
  • 8 篇 bandwidth
  • 8 篇 feature extracti...
  • 8 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 7 篇 computational mo...
  • 7 篇 computer network...
  • 7 篇 training
  • 6 篇 couplings
  • 6 篇 data mining
  • 6 篇 sociology
  • 5 篇 linear discrimin...
  • 5 篇 face recognition
  • 5 篇 vectors

机构

  • 42 篇 college of infor...
  • 30 篇 key laboratory o...
  • 25 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 11 篇 hubei key labora...
  • 11 篇 microsoft resear...
  • 11 篇 school of softwa...
  • 11 篇 school of inform...
  • 11 篇 school of cyber ...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...
  • 8 篇 anhui province k...

作者

  • 37 篇 li yingsong
  • 25 篇 yingsong li
  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 17 篇 xufa wang
  • 11 篇 huang zhixiang
  • 9 篇 junwei qi
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 xianbin cao
  • 7 篇 zhang lei
  • 7 篇 tao dacheng
  • 6 篇 chenxi shao
  • 6 篇 qi junwei
  • 6 篇 ping zhu

语言

  • 338 篇 英文
  • 11 篇 其他
  • 8 篇 中文
检索条件"机构=Anhui Key Laboratory of Software Engineering in Computing and Communication"
357 条 记 录,以下是121-130 订阅
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
MLFuse: Multi-Scenario Feature Joint Learning for Multi-Modality Image Fusion
收藏 引用
IEEE Transactions on Multimedia 2025年
作者: Lei, Jia Li, Jiawei Liu, Jinyuan Wang, Bin Zhou, Shihua Zhang, Qiang Wei, Xiaopeng Kasabov, Nikola K. Dalian University Key Laboratory of Advanced Design and Intelligent Computing Ministry of Education School of Software Engineering Dalian116622 China University of Science and Technology Beijing School of Computer and Communication Engineering Beijing100083 China Dalian University of Technology School of Mechanical Engineering Dalian116024 China Dalian University of Technology School of Computer Science and Technology Dalian116024 China Auckland University of Technology Knowledge Engineering and Discovery Research Institute Auckland1010 New Zealand Ulster University Intelligent Systems Research Center LondonderryBT52 1SA United Kingdom
Multi-modality image fusion (MMIF) entails synthesizing images with detailed textures and prominent objects. Existing methods tend to use general feature extraction to handle different fusion tasks. However, these met... 详细信息
来源: 评论
Ekblom Promoting Adaptive Algorithm for System Identification
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Huang, Xinqi Li, Yingsong Han, Xiao Tu, Huawei College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei China College of Computer Science and Technology Harbin Engineering University Harbin150001 China Department of Computer Science and Information Technology La Trobe University MelbourneVIC3086 Australia
We propose an Ekblom promoting adaptive algorithm (EPAA) which uses Ekblom norm to construct a data reusing scheme to achieve better performance under impulsive noise (IN) environments. By exerting Ekblom-norm constra... 详细信息
来源: 评论
DarkFed: A Data-Free Backdoor Attack in Federated Learning
arXiv
收藏 引用
arXiv 2024年
作者: Li, Minghui Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Zhang, Leo Yu Wang, Yichen School of Software Engineering Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Federated learning (FL) has been demonstrated to be susceptible to backdoor attacks. However, existing academic studies on FL backdoor attacks rely on a high proportion of real clients with main task-related data, whi... 详细信息
来源: 评论
Offsite Evaluation of Localization Systems: Criteria, Systems, and Results From IPIN 2021 and 2022 Competitions
IEEE Journal on Indoor and Seamless Positioning and Navigati...
收藏 引用
IEEE Journal on Indoor and Seamless Positioning and Navigation 2024年 2卷 92-129页
作者: Potorti, Francesco Crivello, Antonino Lee, Soyeon Vladimirov, Blagovest Park, Sangjoon Chen, Yushi Wang, Long Chen, Runze Zhao, Fang Zhuge, Yue Luo, Haiyong Perez-Navarro, Antoni Jimenez, Antonio R. Wang, Han Liang, Hengyi De Cock, Cedric Plets, David Cui, Yan Xiong, Zhi Li, Xiaodong Ding, Yiming Franco, Fernando Javier Alvarez Polo, Fernando Jesus Aranda Rodriguez, Felipe Parralejo Moreira, Adriano Pendao, Cristiano Silva, Ivo Ortiz, Miguel Zhu, Ni Li, Ziyou Renaudin, Valerie Wei, Dongyan Ji, Xinchun Zhang, Wenchao Wang, Yan Ding, Longyang Kuang, Jian Zhang, Xiaobing Dou, Zhi Yang, Chaoqun Kram, Sebastian Stahlke, Maximilian Mutschler, Christopher Coene, Sander Li, Chenglong Venus, Alexander Leitinger, Erik Tertinek, Stefan Witrisal, Klaus Wang, Yi Wang, Shaobo Jin, Beihong Zhang, Fusang Su, Chang Wang, Zhi Li, Siheng Li, Xiaodong Li, Shitao Pan, Mengguan Zheng, Wang Luo, Kai Ma, Ziyao Gao, Yanbiao Chang, Jiaxing Ren, Hailong Guo, Wenfang Torres-Sospedra, Joaquin Pisa56124 Italy Electronics and Telecommunications Research Institute Daejeon34129 Korea Republic of Beijing University of Posts and Telecommunications School of Computer Science National Pilot Software Engineering School Beijing100876 China Chinese Academy of Sciences Beijing Key Laboratory of Mobile Computing and Pervasive Device Institute of Computing Technology Beijing100190 China Universitat Oberta de Catalunya Faculty of Computer Sciences Multimedia and Telecommunication Barcelona08035 Spain Arganda del Rey28500 Spain Huawei Technologies Company Ltd. Shenzhen100015 China IMEC-WAVES/Ghent University Department of Information Technology Gent9052 Belgium Nanjing University of Aeronautics and Astronautics College of Automation Nanjing210016 China University of Extremadura Badajoz06006 Spain University of Trás-os-Montes and Alto Douro Department of Engineering School of Sciences and Technology Vila Real5000-801 Portugal Universidade Do Minho Centro Algoritmi Guimarães4800-058 Portugal Ame Department of the University Gustave Eiffel Geoloc Laboratory Bouguenais44344 France Chinese Academy of Sciences Aerospace Information Research Institute Beijing100094 China Wuhan University Gnss Research Center Wuhan430072 China AutoNavi Software Company Ltd. China Fraunhofer Institute for Integrated Circuits Iis Fraunhofer Iis Nuremberg90411 Germany Erlangen91058 Germany Graz University of Technology Christian Doppler Laboratory for Location-Aware Electronic Systems Graz8010 Austria Institute of Software Chinese Academy of Sciences Beijing100190 China Purple Mountain Laboratories Pervasive Communication Research Center Nanjing210000 China Beijing University of Posts and Telecommunications Beijing100876 China
Indoor positioning is a thriving research area, which is slowly gaining market momentum. Its applications are mostly customized, ad hoc installations;ubiquitous applications analogous to Global Navigation Satellite Sy... 详细信息
来源: 评论
Exploring the Role of Large Language Models in Cybersecurity: A Systematic Survey
arXiv
收藏 引用
arXiv 2025年
作者: Tian, Shuang Zhang, Tao Liu, Jiqiang Wang, Jiacheng Wu, Xuangou Zhu, Xiaoqiang Zhang, Ruichen Zhang, Weiting Yuan, Zhenhui Mao, Shiwen Kim, Dong In School of Software Engineering Beijing Jiaotong University Beijing100044 China School of Cyberspace Science and Technology Beijing Jiaotong University Beijing100044 China School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore School of Computer Science and Technology An hui Province Key Laboratory of Digital Twin Technology in Metallurgical Industry Anhui University of Technology Anhui243002 China College of Computing and Data Science Nanyang Technological University Singapore School of Electronic and Information Engineering Beijing Jiaotong University Beijing100044 China School of Engineering University of Warwick CoventryCV4 7AL United Kingdom Department of Electrical and Computer Engineering Auburn University AuburnAL36849-5201 United States Department of Electrical and Computer Engineering College of Information and Communication Engineering Sungkyunkwan University Suwon16419 Korea Republic of
—With the rapid development of technology and the acceleration of digitalisation, the frequency and complexity of cyber security threats are increasing. Traditional cybersecurity approaches, often based on static rul... 详细信息
来源: 评论
Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 499-515页
作者: Lejun Zhang Minghui Peng Weizheng Wang Yansen Su Shuna Cui Seokhoon Kim College of Information Engineering Yangzhou UniversityYangzhou225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou362000China Division of Computer Science University of AizuAizu–Wakamatsu9658580Japan Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei230601China Medical College of Yangzhou University Yangzhou225001China Department of Gynecology and Obstetrics Affiliated Hospital of Yangzhou UniversityYangzhouChina Department of Computer Software Engineering Soonchunhyang UniversityAsanKorea
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical *** traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic... 详细信息
来源: 评论
Why Does Little Robustness Help? A Further Step Towards Understanding Adversarial Transferability
arXiv
收藏 引用
arXiv 2023年
作者: Zhang, Yechao Hu, Shengshan Zhang, Leo Yu Shi, Junyu Li, Minghui Liu, Xiaogeng Wan, Wei Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Adversarial examples for deep neural networks (DNNs) have been shown to be transferable: examples that successfully fool one white-box surrogate model can also deceive other black-box models with different architectur... 详细信息
来源: 评论
A Four-Pronged Defense Against Byzantine Attacks in Federated Learning
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Hu, Shengshan Li, Minghui Lu, Jianrong Zhang, Longling Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia School of Computer Science and Technology Huazhong University of Science and Technology China National Engineering Research Center for Big Data Technology and System Services Computing Technology and System Lab Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab
Federated learning (FL) is a nascent distributed learning paradigm to train a shared global model without violating users' privacy. FL has been shown to be vulnerable to various Byzantine attacks, where malicious ... 详细信息
来源: 评论
MISA: UNVEILING THE VULNERABILITIES IN SPLIT FEDERATED LEARNING
arXiv
收藏 引用
arXiv 2023年
作者: Wan, Wei Ning, Yuxuan Hu, Shengshan Xue, Lulu Li, Minghui Zhang, Leo Yu Jin, Hai School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Hubei Key Laboratory of Distributed System Security China Hubei Engineering Research Center on Big Data Security China Cluster and Grid Computing Lab China
Federated learning (FL) and split learning (SL) are prevailing distributed paradigms in recent years. They both enable shared global model training while keeping data localized on users' devices. The former excels...
来源: 评论