咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 137 篇 期刊文献

馆藏范围

  • 451 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 209 篇 计算机科学与技术...
    • 156 篇 软件工程
    • 103 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 38 篇 电气工程
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 159 篇 理学
    • 103 篇 数学
    • 45 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 vectors
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 42 篇 college of infor...
  • 37 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 37 篇 li yingsong
  • 25 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 429 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of Software in Computing and Communication"
451 条 记 录,以下是131-140 订阅
排序:
Hidden Follower Detection via Refined Gaze and Walking State Estimation
Hidden Follower Detection via Refined Gaze and Walking State...
收藏 引用
IEEE International Conference on Multimedia and Expo (ICME)
作者: Yaxi Chen Ruimin Hu Danni Xu Zheng Wang Linbo Luo Dengshi Li National Engineering Research Center for Multimedia Software School of Computer Science Wuhan University Wuhan China Hubei Key Laboratory of Multimedia and Network Communication Engineering Wuhan University Wuhan China School of Computing the National University of Singapore Singapore School of Cyber Engineering Xidian University Xi’an China School of Artificial Intelligence Jianghan University Wuhan China
Hidden following is following behavior with special intentions, and detecting hidden following behavior can prevent many criminal activities in advance. The previous method uses gaze and spacing behaviors to distingui...
来源: 评论
Analysis on adaptability and training methods of Photonic Reservoir computing in compensating nonlinear effects  19
Analysis on adaptability and training methods of Photonic Re...
收藏 引用
19th International Conference on Optical communications and Networks, ICOCN 2021
作者: Zhu, Hailong Deng, Li Zhan, Peng Chen, Hao Liu, Le Tang, Xianfeng Zhang, Xiaoguang State Key Laboratory of Information Photonics and Optical Communications Beijing University of Posts and Telecommunications Beijing100876 China State Grid Information and Telecommunication Branch Beijing100032 China Information and Communication Branch of Hubei Electric Power Company Hubei430000 China Anhui Jiyuan Software Co. Ltd SGITG Hefei230088 China
Photonic reservoir computing (RC) is proved to be an effective method to recover optical communication signal. In this paper, the adaptability and effectiveness of RC to recover signals at different transmission dista... 详细信息
来源: 评论
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Junteng Wang Wenjian Luo Yamin Hu Hao Jiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa... 详细信息
来源: 评论
Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges
arXiv
收藏 引用
arXiv 2023年
作者: Xu, Xiaolong Zhou, Xuanhong Bilal, Muhammad Zeadally, Sherali Crowcroft, Jon Qi, Lianyong Xue, Shengjun Nanjing University of Information Science and Technology Nanjing China School of Software Nanjing University of Information Science and Technology Nanjing China School of Computing and Communications Lancaster University Lancaster United Kingdom College of Communication and Information University of Kentucky Lexington United States Department of Computer Science and Technology University of Cambridge Cambridge United Kingdom State Key Laboratory for Novel Software Technology Nanjing University China School of Computer Science and Technology Silicon Lake College Suzhou China
In recent years, the maturation of emerging technologies such as Virtual Reality, Digital Twin,s and Blockchain has accelerated the realization of the metaverse. As a virtual world independent of the real world, the m... 详细信息
来源: 评论
Ekblom Promoting Adaptive Algorithm for System Identification
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Huang, Xinqi Li, Yingsong Han, Xiao Tu, Huawei College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei China College of Computer Science and Technology Harbin Engineering University Harbin150001 China Department of Computer Science and Information Technology La Trobe University MelbourneVIC3086 Australia
We propose an Ekblom promoting adaptive algorithm (EPAA) which uses Ekblom norm to construct a data reusing scheme to achieve better performance under impulsive noise (IN) environments. By exerting Ekblom-norm constra... 详细信息
来源: 评论
Reversible Data Hiding With Secret Encrypted Image Sharing and Adaptive Coding
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Fang, Guangtian Wang, Feng Zhao, Chenbin Qin, Chuan Chang, Ching-Chun Chang, Chin-Chen Fujian University of Technology College of Computer Science and Mathematics Fuzhou350118 China Fujian University of Technology College of Computer Science and Mathematics Key Laboratory of Big Data Mining and Applications Fuzhou350118 China Monash University Faculty of IT Department of Software Systems and Cybersecurity VIC3800 Australia Ministry of Education School of Cyber Science and Engineering Key Laboratory of Aerospace Information Security and Trusted Computing Wuhan430072 China University of Shanghai for Science and Technology School of Optical-Electrical and Computer Engineering Shanghai200093 China Feng Chia University Information and Communication Security Research Center Taichuang 40724 Taiwan Feng Chia University Department of Information Engineering and Computer Science Taichung40724 Taiwan
To ensure the security of image information and facilitate efficient management in the cloud, the utilization of reversible data hiding in encrypted images (RDHEI) has emerged as pivotal. However, most existing RDHEI ... 详细信息
来源: 评论
Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain
收藏 引用
Computers, Materials & Continua 2021年 第1期66卷 499-515页
作者: Lejun Zhang Minghui Peng Weizheng Wang Yansen Su Shuna Cui Seokhoon Kim College of Information Engineering Yangzhou UniversityYangzhou225127China School Math&Computer Science Quanzhou Normal UniversityQuanzhou362000China Division of Computer Science University of AizuAizu–Wakamatsu9658580Japan Key Laboratory of Intelligent Computing and Signal Processing of Ministry of Education School of Computer Science and TechnologyAnhui UniversityHefei230601China Medical College of Yangzhou University Yangzhou225001China Department of Gynecology and Obstetrics Affiliated Hospital of Yangzhou UniversityYangzhouChina Department of Computer Software Engineering Soonchunhyang UniversityAsanKorea
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical *** traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic... 详细信息
来源: 评论
Securely Fine-tuning Pre-trained Encoders Against Adversarial Examples
arXiv
收藏 引用
arXiv 2024年
作者: Zhou, Ziqi Li, Minghui Liu, Wei Hu, Shengshan Zhang, Yechao Wan, Wei Xue, Lulu Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab. China Cluster and Grid Computing Lab. China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
With the evolution of self-supervised learning, the pre-training paradigm has emerged as a predominant solution within the deep learning landscape. Model providers furnish pre-trained encoders designed to function as ... 详细信息
来源: 评论
Cooperative communications in 5G point-to-multipoint systems for Smart Grid communications  7
Cooperative communications in 5G point-to-multipoint systems...
收藏 引用
7th International Conference on Information Science and Control Engineering, ICISCE 2020
作者: Yu, Hao Jin, Xin Li, Zhenwei Dong, Yawen Yang, Yang Liu, Zhengyuan Yin, Menjun State Grid Anhui Power Co. LTD. Information and Communication Branch State Grid Information Telecommunication Group Anhui Jiyuan Software Co. Ltd China Beijing University of Posts and Telecommunications The State Key Laboratory of Networking and Switching Technology China
With the development of wireless communication network, 5G H-CRAN network has gradually become the focus of research. The increasing demands for mobile data multimedia services and high bandwidth multimedia services r... 详细信息
来源: 评论
Hierarchical Reverse Games for the Resource Ecosystem in Cloud-Edge computing
收藏 引用
IEEE Transactions on Consumer Electronics 2024年
作者: Pei, Manlin Wang, Chenyu Wang, Xia Zheng, Zhigao Huang, Jianhui Wang, Shengling Guo, Yufei School of Computer and Information Technology Beijing Jiaotong University Beijing China Department of Computer Science Georgia State University United States Beijing University of Technology School of Statistics and Data Science Faculty of Science Beijing China Institute of Artificial Intelligence School of Computer Science National Engineering Research Center for Multimedia Software Hubei Key Laboratory of Multimedia and Network Communication Engineering Hubei Luojia Laboratory Wuhan University Wuhan China Chinese Academy of Sciences Institute of Computing Technology Beijing China Beijing Normal University School of Artificial Intelligence Beijing China George Washington University Department of Statistics United States
Edge computing has emerged as a killer technology for a hyper-connected world due to its distributed architecture and customer-proximity property. Combined edge nodes with the cloud data center, a cloud-edge computing... 详细信息
来源: 评论