咨询与建议

限定检索结果

文献类型

  • 129 篇 会议
  • 51 篇 期刊文献

馆藏范围

  • 180 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 117 篇 工学
    • 94 篇 计算机科学与技术...
    • 64 篇 软件工程
    • 33 篇 信息与通信工程
    • 22 篇 控制科学与工程
    • 8 篇 机械工程
    • 8 篇 电气工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 航空宇航科学与技...
    • 6 篇 生物工程
    • 5 篇 光学工程
    • 4 篇 网络空间安全
    • 3 篇 动力工程及工程热...
    • 3 篇 化学工程与技术
    • 2 篇 力学(可授工学、理...
    • 2 篇 材料科学与工程(可...
    • 2 篇 建筑学
    • 2 篇 土木工程
    • 2 篇 轻工技术与工程
  • 68 篇 理学
    • 48 篇 数学
    • 16 篇 统计学(可授理学、...
    • 12 篇 物理学
    • 12 篇 系统科学
    • 11 篇 生物学
    • 4 篇 化学
  • 37 篇 管理学
    • 24 篇 管理科学与工程(可...
    • 14 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 6 篇 医学
    • 5 篇 基础医学(可授医学...
    • 5 篇 临床医学
  • 3 篇 经济学
    • 3 篇 应用经济学
  • 1 篇 法学

主题

  • 14 篇 laboratories
  • 13 篇 computer science
  • 11 篇 wireless sensor ...
  • 9 篇 clustering algor...
  • 8 篇 evolutionary com...
  • 8 篇 heuristic algori...
  • 7 篇 statistics
  • 7 篇 optimization
  • 7 篇 computer network...
  • 6 篇 monitoring
  • 6 篇 sociology
  • 4 篇 maintenance engi...
  • 4 篇 vehicle detectio...
  • 4 篇 vectors
  • 4 篇 cognitive radio
  • 4 篇 switches
  • 4 篇 benchmark testin...
  • 4 篇 databases
  • 4 篇 vehicles
  • 4 篇 cluster analysis

机构

  • 24 篇 school of comput...
  • 24 篇 anhui province k...
  • 17 篇 anhui province k...
  • 15 篇 department of co...
  • 13 篇 anhui provincial...
  • 9 篇 school of commun...
  • 8 篇 anhui province k...
  • 8 篇 anhui province k...
  • 7 篇 university of sc...
  • 6 篇 key laboratory o...
  • 5 篇 school of commun...
  • 5 篇 department of co...
  • 5 篇 institute of aut...
  • 4 篇 school of comput...
  • 4 篇 anhui key labora...
  • 4 篇 institute of adv...
  • 4 篇 anhui province k...
  • 4 篇 anhui province k...
  • 4 篇 anhui key labora...
  • 4 篇 state key lab fo...

作者

  • 23 篇 wenjian luo
  • 18 篇 luo wenjian
  • 18 篇 xufa wang
  • 12 篇 yin zhaoxia
  • 9 篇 naijie gu
  • 8 篇 wang xufa
  • 8 篇 shao chenxi
  • 8 篇 gu naijie
  • 7 篇 xianbin cao
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 tao zhu
  • 5 篇 wanli dong
  • 5 篇 haifeng you
  • 4 篇 lyu wanli
  • 4 篇 li zhifang
  • 4 篇 cao xianbin
  • 4 篇 lihua yue
  • 4 篇 jinglong li
  • 4 篇 hong qiao

语言

  • 171 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computation and Communication"
180 条 记 录,以下是21-30 订阅
排序:
NEURAL NETWORK FRAGILE WATERMARKING WITH NO MODEL PERFORMANCE DEGRADATION
arXiv
收藏 引用
arXiv 2022年
作者: Yin, Zhaoxia Yin, Heng Zhang, Xinpeng School of Communication and Electronic Engineering East China Normal University Shanghai China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University China School of Computer Science and Technology Fudan University Shanghai China
Deep neural networks are vulnerable to malicious fine-tuning attacks such as data poisoning and backdoor attacks. Therefore, in recent research, it is proposed how to detect malicious fine-tuning of neural network mod... 详细信息
来源: 评论
Boosting performance of virtualized desktop infrastructure with physical GPU and SPICE
收藏 引用
Science China(Information Sciences) 2020年 第7期63卷 236-238页
作者: Shupan LI Limin XIAO Chungang SHI Liequan CHE Changyou ZHANG Yuanzhang LI State Key Laboratory of Software Development Environment Beihang University School of Computer Science and Engineering Beihang University Beijing Jinghang Computation and Communication Research Institute Institute of Software Chinese Academy of Sciences School of Computer Science and Technology Beijing Institute of Technology
Dear editor,The virtual desktop infrastructure (VDI) is widely used by enterprises, as it can be easily deployed,has a reduced management cost, improves resource utilization, and can be accessed at any location by the... 详细信息
来源: 评论
Decision-Based Iterative Fragile Watermarking for Model Integrity Verification
SSRN
收藏 引用
SSRN 2023年
作者: Yin, Zhaoxia Yin, Heng Su, Hang Zhang, Xinpeng Gao, Zhenzhe Shanghai Key Laboratory of Multidimensional Information Processing East China Normal University Shanghai Shanghai200241 China Anhui Provincial Key Laboratory of Multimodal Cognitive Computation Anhui University Anhui Hefei230000 China Department of Computer Science and Technology Tsinghua University Beijing Beijing100000 China School of Computer Science and Technology Fudan University Shanghai Shanghai200241 China School of Communication and Electronic Engineering East China Normal University Shanghai Shanghai200241 China
Foundation models are commonly hosted on cloud servers to cater to the high demand for their services. However, this exposes them to security risks, as attackers can manipulate these models by introducing backdoor pat... 详细信息
来源: 评论
Talking Head Generation for Media Interaction System with Feature Disentanglement
Talking Head Generation for Media Interaction System with Fe...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Lei Zhang Qingyang Chen Zhilei Liu College of Intelligence and Computing School of New Media and Communication Tianjin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun P.R. China State Key Laboratory for Novel Software Technology Nanjing University P.R. China School of New Media and Communication Tianjin University Tianjin China College of Intelligence and Computing Tianjin University Tianjin China
The task of talking head generation for the media interaction system is to take images and audio clips of the target face as input, and generate a realistic video of the target synchronized with the audio. Most of the... 详细信息
来源: 评论
Physical Layer Encryption Scheme Based on Population Evolution Iteration and Nonlinear Companding in CO-OFDM System  12
Physical Layer Encryption Scheme Based on Population Evoluti...
收藏 引用
12th IEEE International Conference on Electronics Information and Emergency communication, ICEIEC 2022
作者: Xu, Zeyu Huang, Hongbing Wang, Hongyan He, Chen Zhang, MingXi Yang, Changqing Chen, Julong Xu, Mengjie Zhan, Peng Tang, Xianfeng Beijing University of Posts and Telecommunications State Key Laboratory of Information Photonics and Optical Communications Beijing100876 China State Grid Zhejiang Electric Power Corporation Information & Telecommunication Branch Zhejiang310000 China Anhui Jiyuan Software Co. Ltd Sgitg Hefei230088 China Information and Communication Branch of Hubei Electric Power Company Hubei430000 China
A physical layer encryption scheme based on population evolution iteration (PEI) and nonlinear companding is proposed to improve the security and reduce peak-to-average power ratio of the coherent optical orthogonal f... 详细信息
来源: 评论
Improved accuracy of PMD measurement based on spectral periodic interference  20
Improved accuracy of PMD measurement based on spectral perio...
收藏 引用
20th International Conference on Optical communications and Networks, ICOCN 2022
作者: Gao, Chuanwei Huang, Hongbing Zhang, Yi Li, Yinyi Wang, Hongyan Zhan, Peng An, Ning Tang, Xianfeng Beijing University of Posts and Telecommunications State Key Laboratory of Information Photonics and Optical Communications Beijing China State Grid Zhejiang Electric Power Corporation Information and Telecommunication Branch Zhejiang China Anhui Jiyuan Software Co. Ltd HeFei China Information and Communication Branch of Hubei Electric Power Company HuBei China Northeast Branch of State Grid Corporation of China ShenYang China
In this paper, we propose a calculation method which can improve the measurement accuracy of polarization mode dispersion (PMD) in optical fiber composite overhead ground wire (OPGW) by fixed analyzer method. The prop... 详细信息
来源: 评论
A CPK-Based Identity Authentication Scheme for IoT
收藏 引用
Computer Systems Science & Engineering 2022年 第3期40卷 1217-1231页
作者: Mingming Zhang Jiaming Mao Yuanyuan Ma Liangjie Xu Chuanjun Wang Ran Zhao Zhihao Li Lu Chen Wenbing Zhao State Grid Jiangsu Electric Power Co. Ltd.Information&Telecommunication BranchNanjing210008China State Grid Key Laboratory of Information&Network Security Institute of Information and CommunicationGlobal Energy Interconnection Research InstituteNanjing210003China Anhui Jiyuan Software Co.Ltd SGITGHefei230088China Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province Research and Development Center of Post Industry Technology of the State Posts Bureau(Internet of Things Technology)Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of EducationNanjing University of Posts and TelecommunicationsNanjing210003China Department of Electrical Engineering and Computer Science Cleveland State UniversityCleveland44115USA
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ... 详细信息
来源: 评论
An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based Encryption  7th
An Authentication Mechanism for IoT Devices Based on Tra...
收藏 引用
7th International Conference on Artificial Intelligence and Security, ICAIS 2021
作者: Xia, Fei Mao, Jiaming Shao, Zhipeng Xu, Liangjie Zhao, Ran Yang, Yunzhi State Grid Jiangsu Electric Power Co Ltd. Information and Telecommunication Branch Nanjing210024 China Institute of Information and Communication State Grid Key Laboratory of Information and Network Security Global Energy Interconnection Research Institute Nanjing Jiangsu210003 China Anhui Jiyuan Software Co. Ltd SGITG Hefei Anhui230088 China
To solve low computing efficiency and high computational energy consumption in the traditional Public-key Infrastructure cryptosystem in the authentication of IoT devices, an authentication scheme for IoT devices base... 详细信息
来源: 评论
High Capacity Reversible Data Hiding in Encrypted 3D Mesh Models Based on Multi-MSB Prediction
arXiv
收藏 引用
arXiv 2021年
作者: Lyu, Wan-Li Cheng, Lulu Yin, Zhaoxia Anhui Province Key Laboratory of Multimodal Cognitive Computation School of Computer Science and Technology Anhui University 230601 China School of Communication & Electronic Engineering East China Normal University Shanghai200241 China
The interaction of massive data in the network world poses an enormous threat to data security. Reversible data hiding in encrypted domain (RDH-ED) technology ensures the security of data storage. Extensive works of R... 详细信息
来源: 评论
Meta-path-based outlier detection in heterogeneous information network
收藏 引用
Frontiers of Computer Science 2020年 第2期14卷 388-403页
作者: Lu LIU Shang WANG Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Changchun 130012China College of Software Jilin UniversityChangchun 130012China College of Computer Science and Technology Jilin UniversityChangchun 130012China College of Communication Engineering Jilin UniversityChangchun 130012China Department of Computer Science New Jersey Institute of TechnologyUniversity HeightsNewark NJ 07102USA
Mining outliers in heterogeneous networks is crucial to many applications,but challenges *** this paper,we focus on identifying meta-path-based outliers in heterogeneous information network(HIN),and calculate the simi... 详细信息
来源: 评论