咨询与建议

限定检索结果

文献类型

  • 129 篇 会议
  • 51 篇 期刊文献

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 117 篇 工学
    • 94 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 8 篇 机械工程
    • 8 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 轻工技术与工程
  • 68 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 4 篇 化学
  • 37 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学

主题

  • 14 篇 laboratories
  • 13 篇 computer science
  • 11 篇 wireless sensor ...
  • 9 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 computer network...
  • 6 篇 monitoring
  • 6 篇 sociology
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 benchmark testin...
  • 4 篇 databases
  • 4 篇 vehicles
  • 4 篇 cluster analysis

机构

  • 24 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 13 篇 anhui provincial...
  • 9 篇 school of commun...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 5 篇 school of commun...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 school of comput...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 anhui province k...
  • 4 篇 anhui key labora...
  • 4 篇 state key lab fo...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 18 篇 xufa wang
  • 12 篇 yin zhaoxia
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 4 篇 lyu wanli
  • 4 篇 li zhifang
  • 4 篇 cao xianbin
  • 4 篇 lihua yue
  • 4 篇 jinglong li
  • 4 篇 hong qiao

语言

  • 171 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computation and Communication"
180 条 记 录,以下是11-20 订阅
排序:
A Real-Time Multi-Stage Architecture for Pose Estimation of Zebrafish Head with Convolutional Neural Networks
收藏 引用
Journal of Computer Science & Technology 2021年 第2期36卷 434-444页
作者: Zhang-Jin Huang Xiang-Xiang He Fang-Jun Wang Qing Shen School of Computer Science and Technology University of Science and Technology of ChinaHefei 230027China School of Data Science University of Science and Technology of ChinaHefei 230027China Anhui Province Key Laboratory of Software in Computing and Communication Hefei 230027China
In order to conduct optical neurophysiology experiments on a freely swimming zebrafish,it is essential to quantify the zebrafish head to determine exact lighting *** efficiently quantify a zebrafish head's behavio... 详细信息
来源: 评论
Imperceptible Adversarial Attack on S Channel of HSV Colorspace
Imperceptible Adversarial Attack on S Channel of HSV Colorsp...
收藏 引用
International Joint Conference on Neural Networks (IJCNN)
作者: Tong Zhu Zhaoxia Yin Wanli Lyu Jiefei Zhang Bin Luo Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai China School of Communication and Electronic Engineering East China Normal University Shanghai China
Deep neural network models are vulnerable to subtle but adversarial perturbations that alter the model. Adversarial perturbations are typically computed for RGB images and, therefore, are evenly distributed among RGB ...
来源: 评论
Scaling Up Single Image Dehazing Algorithm by Cross-Data Vision Alignment for Richer Representation Learning and Beyond
收藏 引用
IEEE Transactions on Instrumentation and Measurement 2025年 74卷
作者: Shi, Yukai Weng, Zhipeng Lin, Yupei Shi, Cidan Guo, Xingyuan Yang, Xiaojun Lin, Liang Guangdong University of Technology School of Information Engineering Guangzhou510006 China Anhui University Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Hefei230601 China Southern Power Grid Ltd. Guangzhou510000 China Ministry of Education of China Key Laboratory of Photonic Technology for Integrated Sensing and Communication Guangdong Guangzhou510006 China Sun Yat-sen University School of Computer Science Guangzhou510006 China
In recent years, deep neural network tasks have increasingly relied on high-quality image inputs. With the development of high-resolution representation learning, the task of image dehazing has received significant at... 详细信息
来源: 评论
Identification of Microservices through Processed Dynamic Traces and Static Calls
Identification of Microservices through Processed Dynamic Tr...
收藏 引用
Computer Science and Management Technology (ICCSMT), International Conference on
作者: Sijie Wu Cheng Zhang Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University School of Computer Science and Technology Anhui University State Key Lab for Novel Software Technology Nanjing University Hefei China
As the complexity of software systems continues to increase, traditional monolithic software architectures will become difficult to scale and maintain. Microservices as an emerging software architecture it advocates d...
来源: 评论
FTG: Score-based black-box watermarking by fragile trigger generation for deep model integrity verification
收藏 引用
Journal of Information and Intelligence 2024年 第1期2卷 28-41页
作者: Heng Yin Zhaoxia Yin Zhenzhe Gao Hang Su Xinpeng Zhang Bin Luo Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui UniversityHefei 230000China Shanghai key Laboratory of Multidimensional Information Processing East China Normal UniversityShanghai 200241China School of Communication and Electronic Engineering East China Normal UniversityShanghai 200241China Department of Computer Science and Technology Tsinghua UniversityBeijing 100000China School of Computer Science and Technology Fudan UniversityShanghai 200241China
Deep neural networks(DNNs)are widely used in real-world applications,thanks to their exceptional performance in image ***,their vulnerability to attacks,such as Trojan and data poison,can compromise the integrity and ... 详细信息
来源: 评论
Reversible Data Hiding Based on Automatic Contrast Enhancement Using Histogram Expansion
SSRN
收藏 引用
SSRN 2022年
作者: Lyu, WanLi Yue, YaJie Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui Medical University 230601 China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui Medical University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
This paper proposes a novel ACERDH method using histogram expansion. Considering the local properties of the histogram, when an appropriate range rather than a global location is selected, the contrast of the whole im... 详细信息
来源: 评论
Adversarial Example Defense via Perturbation Grading Strategy
arXiv
收藏 引用
arXiv 2022年
作者: Zhu, Shaowei Lyu, Wanli Li, Bin Yin, Zhaoxia Luo, Bin Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Hefei China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen China School of Communication & Electronic Engineering East China Normal University Shanghai China
Deep Neural Networks have been widely used in many fields. However, studies have shown that DNNs are easily attacked by adversarial examples, which have tiny perturbations and greatly mislead the correct judgment of D... 详细信息
来源: 评论
Robust image steganography against lossy JPEG compression based on embedding domain selection and adaptive error correction
arXiv
收藏 引用
arXiv 2023年
作者: Duan, Xiaolong Li, Bin Yin, Zhaoxia Zhang, Xinpeng Luo, Bin Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University Hefei230601 China Guangdong Key Laboratory of Intelligent Information Processing Shenzhen Key Laboratory of Media Security Shenzhen University Shenzhen518060 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China School of Computer Science Fudan University Shanghai200433 China
Transmitting images for communication on social networks has become routine, which is helpful for covert communication. The traditional steganography algorithm is unable to successfully convey secret information since... 详细信息
来源: 评论
High Capacity Reversible Data Hiding for Encrypted 3D Mesh Models Based on Topology
arXiv
收藏 引用
arXiv 2022年
作者: Tang, Yun Cheng, Lulu Lyv, Wanli Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
Reversible data hiding in encrypted domain(RDH-ED) can not only protect the privacy of 3D mesh models and embed additional data, but also recover original models and extract additional data losslessly. However, due to... 详细信息
来源: 评论
High-Capacity Reversible Data Hiding in Encrypted 3d Mesh Models Based on Multi-Msb Prediction
SSRN
收藏 引用
SSRN 2022年
作者: Lyu, Wan-Li Cheng, Lulu Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
The interaction of massive data in the network world poses a enormous threat to data security. Reversible data hiding in encrypted domain (RDH-ED) technology ensures the security of data storage. With the advancement ... 详细信息
来源: 评论