咨询与建议

限定检索结果

文献类型

  • 314 篇 会议
  • 137 篇 期刊文献

馆藏范围

  • 451 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 304 篇 工学
    • 209 篇 计算机科学与技术...
    • 156 篇 软件工程
    • 103 篇 信息与通信工程
    • 41 篇 控制科学与工程
    • 39 篇 电子科学与技术(可...
    • 38 篇 电气工程
    • 23 篇 机械工程
    • 20 篇 光学工程
    • 15 篇 仪器科学与技术
    • 15 篇 动力工程及工程热...
    • 14 篇 网络空间安全
    • 13 篇 建筑学
    • 12 篇 化学工程与技术
    • 11 篇 生物工程
    • 10 篇 交通运输工程
    • 8 篇 力学(可授工学、理...
    • 8 篇 航空宇航科学与技...
    • 7 篇 土木工程
  • 159 篇 理学
    • 103 篇 数学
    • 45 篇 物理学
    • 32 篇 统计学(可授理学、...
    • 20 篇 系统科学
    • 17 篇 化学
    • 16 篇 生物学
  • 74 篇 管理学
    • 49 篇 管理科学与工程(可...
    • 30 篇 图书情报与档案管...
    • 14 篇 工商管理
  • 11 篇 医学
    • 8 篇 临床医学
    • 7 篇 基础医学(可授医学...
  • 6 篇 法学
    • 6 篇 社会学
  • 4 篇 经济学
  • 2 篇 文学
  • 1 篇 教育学
  • 1 篇 军事学

主题

  • 22 篇 laboratories
  • 13 篇 computer science
  • 13 篇 wireless sensor ...
  • 12 篇 face recognition
  • 12 篇 algorithm design...
  • 12 篇 feature extracti...
  • 11 篇 bandwidth
  • 10 篇 optimization
  • 10 篇 computer network...
  • 10 篇 heuristic algori...
  • 9 篇 multimedia compu...
  • 9 篇 clustering algor...
  • 9 篇 training
  • 8 篇 statistics
  • 8 篇 computational mo...
  • 8 篇 evolutionary com...
  • 7 篇 vectors
  • 7 篇 databases
  • 6 篇 simulation
  • 6 篇 couplings

机构

  • 42 篇 college of infor...
  • 37 篇 key laboratory o...
  • 28 篇 school of comput...
  • 24 篇 anhui province k...
  • 20 篇 anhui university...
  • 17 篇 anhui province k...
  • 17 篇 department of co...
  • 12 篇 microsoft resear...
  • 11 篇 hubei key labora...
  • 10 篇 national enginee...
  • 10 篇 hubei engineerin...
  • 10 篇 school of softwa...
  • 10 篇 school of inform...
  • 10 篇 university of sc...
  • 10 篇 school of cyber ...
  • 9 篇 harbin engineeri...
  • 9 篇 school of comput...
  • 9 篇 services computi...
  • 9 篇 the key laborato...
  • 8 篇 school of comput...

作者

  • 37 篇 li yingsong
  • 25 篇 yingsong li
  • 23 篇 wenjian luo
  • 19 篇 xufa wang
  • 18 篇 luo wenjian
  • 13 篇 shangfei wang
  • 11 篇 huang zhixiang
  • 10 篇 naijie gu
  • 9 篇 junwei qi
  • 8 篇 wang xufa
  • 8 篇 xianbin cao
  • 8 篇 hu shengshan
  • 8 篇 shao chenxi
  • 8 篇 zhang leo yu
  • 8 篇 gu naijie
  • 8 篇 li minghui
  • 7 篇 zhang lei
  • 7 篇 chenxi shao
  • 7 篇 li liping
  • 7 篇 baohua zhao

语言

  • 429 篇 英文
  • 13 篇 中文
  • 10 篇 其他
检索条件"机构=Anhui Key Laboratory of software in Computing Communication"
451 条 记 录,以下是71-80 订阅
排序:
DarkSAM: Fooling Segment Anything Model to Segment Nothing  38
DarkSAM: Fooling Segment Anything Model to Segment Nothing
收藏 引用
38th Conference on Neural Information Processing Systems, NeurIPS 2024
作者: Zhou, Ziqi Song, Yufei Li, Minghui Hu, Shengshan Wang, Xianlong Zhang, Leo Yu Yao, Dezhong Jin, Hai National Engineering Research Center for Big Data Technology and System China Services Computing Technology and System Lab China Cluster and Grid Computing Lab China Hubei Engineering Research Center on Big Data Security China Hubei Key Laboratory of Distributed System Security China School of Computer Science and Technology Huazhong University of Science and Technology China School of Cyber Science and Engineering Huazhong University of Science and Technology China School of Software Engineering Huazhong University of Science and Technology China School of Information and Communication Technology Griffith University Australia
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
来源: 评论
Practical privacy-preserving mixing protocol for Bitcoin
Practical privacy-preserving mixing protocol for Bitcoin
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Qianqian Chang Lin Xu Lei Zhang Shanghai Key Laboratory of Trustworthy Computing East China Normal University China Science and Technology on Communication Security Laboratory Chengdu China Ministry of Education Engineering Research Center of Software/Hardware Co-Design Technology and Application China
The privacy of Cryptocurrencies are of great concern in various fields. Researches has shown that pseudonyms, which are used in Bitcoin, only provide weak privacy. The privacy of users may be put at risk under deanony...
来源: 评论
Compact Broadband Rectifier With Wide Input Power Range Based on Adaptive Input Power Distribution
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Liu, Xin Li, Yingsong Zhang, Dawei College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei China
This paper presents a novel compact rectifier array with both broadband and wide input power range characteristics. The rectifier array consists of two rectifier units operating at low-power and high-power levels, res... 详细信息
来源: 评论
Improved Uniform Linear Array Fitting Scheme with Increased Lower Bound on Uniform Degrees of Freedom for DOA Estimation
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Shi, Wanlu Li, Yingsong The College of Information and Communication Engineering Harbin Engineering University Harbin150001 China The Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei China
Recently, uniform linear array (ULA) fitting (UF) principle is proposed for sparse array (SA) design using pseudo-polynomial equations. Typically, it is verified that the designed SAs via UF enjoy a lower bound on uni... 详细信息
来源: 评论
Nonnegative Maximum Correntropy Adaptive Algorithm and Its Statistical Analysis
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Sun, Zeyang Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei China
Dynamic system modeling methods have become a hot topic for stationary and nonstationary signal processing. Nonnegativity is a desired constraint that usually exerts on to be estimated parameters, and its generation u... 详细信息
来源: 评论
Transient Convergence Analysis of Least Lncosh Algorithm
TechRxiv
收藏 引用
TechRxiv 2022年
作者: Sun, Zeyang Li, Yingsong College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Anhui University Anhui Hefei China
Lncosh function has been used for constructing a cost function for devising an adaptive filter algorithm to provide a desired performance under non-Gaussian noise, naming as least Lncosh algorithm (LLA). However, its ... 详细信息
来源: 评论
Extended Coprime Arrays with Sum-Difference Coarray for DOA Estimation  5
Extended Coprime Arrays with Sum-Difference Coarray for DOA ...
收藏 引用
5th IEEE International Conference on Electronic Information and communication Technology, ICEICT 2022
作者: Xin, Wei Xu, Lin Gao, Jincheng Li, Yingsong Huang, Zhixiang College of Information and Communication Engineering Harbin Engineering University Harbin150001 China Wuhan Second Ship Design and Research Institute Wuhan China Zhaojin Mining Industry Co. Ltd. Zhaoyuan China Anhui University Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education China
A modified coprime array (CA) with a name of extended CA (ECA) is presented and constructed to reduce over-lapping sensors between sum and difference coarray using conventional CA (CCA) to get a sum-difference coarray... 详细信息
来源: 评论
Design and Implementation of Links Generation for Inter Domain Routing System  12
Design and Implementation of Links Generation for Inter Doma...
收藏 引用
12th International Conference on Information Science and Technology, ICIST 2022
作者: Wang, Yu Qiao, Zhi Yin, Junru Zhang, Mingliang College of Software Henan University of Engineering Zhengzhou China College of Information and Electrical Engineering China Agriculture University Beijing China College of Computer and Communication Engineering Zhengzhou University of Light Industry Zhengzhou China State Key Laboratory of Mathematical Engineering and Advanced Computing Network Research Department Zhengzhou China
Due to the inherent flaws of BGP protocol, the security of inter domain routing system has been regularly threatened. Since it is difficult to achieve collaborative defense against existing resources and strategies of... 详细信息
来源: 评论
Cost-Optimized Microservice Deployment for IoT Application in Cloud-Edge Collaborative Environment
Cost-Optimized Microservice Deployment for IoT Application i...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Xiaoyuan Zhang Bing Tang Qing Yang Wei Xu Feiyan Guo School of Computer Science and Engineering Hunan University of Science and Technology and Hunan Key Laboratory for Service Computing and Novel Software Technology Xiangtan China School of Information and Communication Engineering Guangzhou Maritime University Guangzhou China
With the popularity of cloud native and DevOps, container technology is widely used and combined with microservices. The deployment of container-based microservices in distributed cloud-edge infrastructure requires su...
来源: 评论
Talking Head Generation for Media Interaction System with Feature Disentanglement
Talking Head Generation for Media Interaction System with Fe...
收藏 引用
International Conference on Parallel and Distributed Systems (ICPADS)
作者: Lei Zhang Qingyang Chen Zhilei Liu College of Intelligence and Computing School of New Media and Communication Tianjin University Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun P.R. China State Key Laboratory for Novel Software Technology Nanjing University P.R. China School of New Media and Communication Tianjin University Tianjin China College of Intelligence and Computing Tianjin University Tianjin China
The task of talking head generation for the media interaction system is to take images and audio clips of the target face as input, and generate a realistic video of the target synchronized with the audio. Most of the... 详细信息
来源: 评论