咨询与建议

限定检索结果

文献类型

  • 129 篇 会议
  • 52 篇 期刊文献

馆藏范围

  • 181 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 118 篇 工学
    • 95 篇 计算机科学与技术...
    • 65 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 9 篇 电气工程
    • 8 篇 机械工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 轻工技术与工程
  • 68 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 4 篇 化学
  • 37 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学

主题

  • 14 篇 laboratories
  • 13 篇 computer science
  • 11 篇 wireless sensor ...
  • 9 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 computer network...
  • 6 篇 monitoring
  • 6 篇 sociology
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 benchmark testin...
  • 4 篇 databases
  • 4 篇 vehicles
  • 4 篇 cluster analysis

机构

  • 24 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 13 篇 anhui provincial...
  • 9 篇 school of commun...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 5 篇 school of commun...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 school of comput...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 anhui province k...
  • 4 篇 anhui key labora...
  • 4 篇 state key lab fo...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 18 篇 xufa wang
  • 12 篇 yin zhaoxia
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 4 篇 lyu wanli
  • 4 篇 li zhifang
  • 4 篇 cao xianbin
  • 4 篇 lihua yue
  • 4 篇 jinglong li
  • 4 篇 hong qiao

语言

  • 172 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computation and Communication"
181 条 记 录,以下是101-110 订阅
排序:
Random directional attack for fooling deep neural networks
arXiv
收藏 引用
arXiv 2019年
作者: Luo, Wenjian Wu, Chenwang Zhou, Nan Ni, Li Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China
Deep neural networks (DNNs) have been widely used in many fields such as images processing, speech recognition;however, they are vulnerable to adversarial examples, and this is a security issue worthy of attention. Be... 详细信息
来源: 评论
Test Case Generation Based on Invariant Extraction
Test Case Generation Based on Invariant Extraction
收藏 引用
International Conference on Wireless communications, Networking and Mobile Computing (WiCom)
作者: Fanping Zeng Qing Cao Liangliang Mao Zhide Chen Department of Computer Anhui Province Key Laboratory of Software in Computer and Communication University of Science and Technology Hefei Anhui China Department of Computer University of Science and Technology Hefei Anhui China
software testing is an effective way to find software errors. Generating a good test suite is the key. A program invariant is a property that is true at a particular program point or points. The property could reflect... 详细信息
来源: 评论
Research on Buffer Overflow Test Based on Invariant
Research on Buffer Overflow Test Based on Invariant
收藏 引用
International Conference on Computer and Information Technology (CIT)
作者: Fanping Zeng Minghui Chen Kaitao Yin Xufa Wang Department of Computer Anhui Province Key Laboratory of Software in Computer and Communication University of Science and Technology Hefei Anhui China Department of Computer University of Science and Technology Hefei Anhui China
Buffer overflow (BOF) is one of the major vulnerabilities that lead to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying reasons of buffer overflow vary widely. Th... 详细信息
来源: 评论
Community-based 3-SAT formulas with a predefined solution
arXiv
收藏 引用
arXiv 2019年
作者: Hu, Yamin Luo, Wenjian Wang, Junteng Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China China
It is crucial to generate crafted SAT formulas with predefined solutions for the testing and development of SAT solvers since many SAT formulas from real-world applications have solutions. Although some generating alg... 详细信息
来源: 评论
A simplification method of polymorphic boolean functions
arXiv
收藏 引用
arXiv 2017年
作者: Luo, Wenjian Li, Zhifang Anhui Key Laboratory of Software in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei230027 China
Polymorphic circuits are a special kind of circuits which possess multiple build-in functions, and these functions are activated by environment parameters, like temperature, light and VDD. The behavior of a polymorphi... 详细信息
来源: 评论
Coverage-preserving Data Gathering in Wireless Sensor Networks
Coverage-preserving Data Gathering in Wireless Sensor Networ...
收藏 引用
ACIS International Conference on software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD)
作者: Hongli Xu Liusheng Huang Jumin Wu Yang Wang Depart. of Computer Science and Technology Anhui Province key Laboratory of Software in Computing and Communication University of Science and Technology Hefei China
The power is the most significant resource in wireless sensor nodes, so energy conservation is the most important factor in designing the protocol for sensor networks. In this paper, we study the problem of energy-eff... 详细信息
来源: 评论
Imperceptible Adversarial Attack on S Channel of HSV Colorspace
Imperceptible Adversarial Attack on S Channel of HSV Colorsp...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Tong Zhu Zhaoxia Yin Wanli Lyu Jiefei Zhang Bin Luo Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai China School of Communication and Electronic Engineering East China Normal University Shanghai China
Deep neural network models are vulnerable to subtle but adversarial perturbations that alter the model. Adversarial perturbations are typically computed for RGB images and, therefore, are evenly distributed among RGB ...
来源: 评论
An Energy-Aware Coverage Based Node Scheduling Scheme for Wireless Sensor Networks
An Energy-Aware Coverage Based Node Scheduling Scheme for Wi...
收藏 引用
The 9th International Conference for Young Computer Scientists(第九届国际青年计算机大会)
作者: Jinxia Liu Naijie Gu Songsong He Dept. of Computer Science and Technology University of Science and Technology of China Hefei Anhui 230027 China Anhui Province Key Laboratory of Computing and Communication Software Hefei Anhui 230027 China
A fundamental issue in wireless sensor network is to extend network lifetime while maintaining network coverage and connectivity. Protection for sensors themselves is another important concern. An Energyaware Coverage... 详细信息
来源: 评论
A Hormone-based Clustering Algorithm in Wireless Sensor Networks
A Hormone-based Clustering Algorithm in Wireless Sensor Netw...
收藏 引用
2010 2nd International Conference on Computer Engineering and Technology(2010年第二届计算机工程与技术国际会议 ICCET 2010)
作者: Dayuan Dong Haifeng You Yipeng Zhang Xufa Wang Key Laboratory of Software in Computing and Communication Anhui Province School of Computer Science and Technology University of Science and Technology of China HefeiChina
Clustering problem is one of the hottest issues in wireless sensor networks (WSNs). The strategy for selection of cluster head has not been sufficiently investigated. In this paper,we propose a hormone-based clusterin... 详细信息
来源: 评论
Adversarial Example Defense via Perturbation Grading Strategy
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Shaowei Lyu, Wanli Li, Bin Yin, Zhaoxia Luo, Bin Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Hefei China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China School of Communication & Electronic Engineering East China Normal University Shanghai China
Deep Neural Networks have been widely used in many fields. However, studies have shown that DNNs are easily attacked by adversarial examples, which have tiny perturbations and greatly mislead the correct judgment of D... 详细信息
来源: 评论