咨询与建议

限定检索结果

文献类型

  • 101 篇 会议
  • 40 篇 期刊文献

馆藏范围

  • 141 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 98 篇 工学
    • 75 篇 计算机科学与技术...
    • 58 篇 软件工程
    • 23 篇 信息与通信工程
    • 17 篇 控制科学与工程
    • 9 篇 电气工程
    • 7 篇 机械工程
    • 7 篇 光学工程
    • 6 篇 电子科学与技术(可...
    • 6 篇 生物工程
    • 4 篇 航空宇航科学与技...
    • 3 篇 动力工程及工程热...
    • 2 篇 材料科学与工程(可...
    • 2 篇 化学工程与技术
    • 2 篇 交通运输工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物医学工程(可授...
    • 2 篇 网络空间安全
  • 51 篇 理学
    • 38 篇 数学
    • 14 篇 统计学(可授理学、...
    • 10 篇 物理学
    • 8 篇 系统科学
    • 7 篇 生物学
    • 2 篇 化学
  • 29 篇 管理学
    • 19 篇 管理科学与工程(可...
    • 12 篇 图书情报与档案管...
    • 8 篇 工商管理
  • 4 篇 经济学
    • 4 篇 应用经济学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 2 篇 医学
    • 2 篇 临床医学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 农学

主题

  • 10 篇 computer science
  • 9 篇 wireless sensor ...
  • 8 篇 laboratories
  • 8 篇 computer network...
  • 5 篇 optimization
  • 4 篇 statistics
  • 4 篇 cognitive radio
  • 4 篇 monitoring
  • 4 篇 switches
  • 4 篇 databases
  • 4 篇 cluster analysis
  • 4 篇 energy efficienc...
  • 4 篇 heuristic algori...
  • 3 篇 maintenance engi...
  • 3 篇 resource managem...
  • 3 篇 energy consumpti...
  • 3 篇 data mining
  • 3 篇 computational mo...
  • 3 篇 benchmark testin...
  • 3 篇 software testing

机构

  • 21 篇 school of comput...
  • 19 篇 anhui province k...
  • 16 篇 department of co...
  • 8 篇 anhui province k...
  • 7 篇 anhui province k...
  • 7 篇 anhui province k...
  • 6 篇 key laboratory o...
  • 5 篇 department of co...
  • 4 篇 department of co...
  • 4 篇 anhui province k...
  • 4 篇 key lab of compu...
  • 3 篇 key lab of compu...
  • 3 篇 anhui province k...
  • 3 篇 department of co...
  • 3 篇 saic motor ai la...
  • 3 篇 anhui province k...
  • 3 篇 zhongguancun lab...
  • 3 篇 institute of adv...
  • 3 篇 key lab of compu...
  • 3 篇 jianghuai automo...

作者

  • 11 篇 wang shangfei
  • 11 篇 xufa wang
  • 9 篇 shangfei wang
  • 9 篇 luo wenjian
  • 8 篇 shao chenxi
  • 8 篇 wenjian luo
  • 7 篇 gu naijie
  • 6 篇 chenxi shao
  • 6 篇 ping zhu
  • 6 篇 naijie gu
  • 5 篇 xianbin cao
  • 5 篇 qiang ji
  • 4 篇 dong lanfang
  • 4 篇 jinglong li
  • 4 篇 baohua zhao
  • 4 篇 zhen gao
  • 4 篇 fanping zeng
  • 4 篇 zhao dongdong
  • 3 篇 shan he
  • 3 篇 ren kaixin

语言

  • 132 篇 英文
  • 7 篇 中文
  • 2 篇 其他
检索条件"机构=Anhui Province Key Lab of Software in Computer and Communication"
141 条 记 录,以下是11-20 订阅
排序:
Understanding the Robustness of 3D Object Detection with Bird'View Representations in Autonomous Driving
Understanding the Robustness of 3D Object Detection with Bir...
收藏 引用
Conference on computer Vision and Pattern Recognition (CVPR)
作者: Zijian Zhu Yichi Zhang Hai Chen Yinpeng Dong Shu Zhao Wenbo Ding Jiachen Zhong Shibao Zheng Institute of Image Communication and Network Engineering Shanghai Jiao Tong University Dept. of Comp. Sci. and Tech. THBI Lab Institute for AI Tsinghua University BNRist Center Zhongguancun Laboratory Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education Information Materials and Intelligent Sensing Laboratory of Anhui Province School of Computer Science and Technology Anhui University SAIC Motor AI Lab
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird's-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with ...
来源: 评论
Understanding the Robustness of 3D Object Detection with Bird’s-Eye-View Representations in Autonomous Driving
arXiv
收藏 引用
arXiv 2023年
作者: Zhu, Zijian Zhang, Yichi Chen, Hai Dong, Yinpeng Zhao, Shu Ding, Wenbo Zhong, Jiachen Zheng, Shibao Institute of Image Communication and Network Engineering Shanghai Jiao Tong University China Dept. of Comp. Sci. and Tech. Institute for AI THBI Lab BNRist Center Tsinghua University China Key Laboratory of Intelligent Computing and Signal Processing Ministry of Education School of Computer Science and Technology Anhui University Information Materials and Intelligent Sensing Laboratory of Anhui Province China SAIC Motor AI Lab China Zhongguancun Laboratory China
3D object detection is an essential perception task in autonomous driving to understand the environments. The Bird’s-Eye-View (BEV) representations have significantly improved the performance of 3D detectors with cam... 详细信息
来源: 评论
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
PN-HASH: An Immune-Inspired Scheme for Data Integrity Check
收藏 引用
International Workshop on Advanced Computational Intelligence (IWACI)
作者: Junteng Wang Wenjian Luo Yamin Hu Hao Jiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei China
Cryptographic hash functions play significant roles in information security applications, including data integrity. Facing hash collision attacks, several prevalent cryptographic hash functions have been proved not sa... 详细信息
来源: 评论
Joint Space-Time Sparsity Based Jamming Detection for Mission-Critical mMTC Networks
arXiv
收藏 引用
arXiv 2023年
作者: Wang, Shao-Di Wang, Hui-Ming Li, Zhetao Leung, Victor C.M. The School of Information and Communication Engineering Xi'an Jiaotong University Shaanxi Xi'An710049 China The Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an Jiaotong University Shaanxi Xi'An710049 China The Key Laboratory of Hunnan Province for Internet of Things and Information Security Hunan International Scientific and Technological Cooperation Base of Intelligent Network School of Computer Science Xiangtan University Xiangtan411105 China The College of Computer Science and Software Engineering Shenzhen University Shenzhen518060 China The Department of Electrical and Computer Engineering The University of British Columbia VancouverBCV6T 1Z4 Canada
For mission-critical massive machine-type communications (mMTC) applications, the messages are required to be delivered in real-time. However, due to the weak security protection capabilities of the low-cost and low-c... 详细信息
来源: 评论
Multi-modal Multi-kernel Graph Learning for Autism Prediction and Biomarker Discovery
arXiv
收藏 引用
arXiv 2023年
作者: Liu, Jin Mao, Junbin Lin, Hanhe Kuang, Hulin Pan, Shirui Wu, Xusheng Xie, Shan Liu, Fei Pan, Yi Hunan Provincial Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha410083 China Xinjiang Engineering Research Center of Big Data and Intelligent Software School of software Xinjiang University Wulumuqi830000 China Hunan Province Key Lab on Bioinformatics School of Computer Science and Engineering Central South University Changsha410083 China Faculty of Computer Science and Control Engineering Shenzhen University of Advanced Technology Shenzhen Institute of Advanced Technology Chinese Academy of Sciences Shenzhen518055 China School of Science and Engineering University of Dundee DundeeDD1 4HN United Kingdom School of Information and Communication Technology Griffith University Gold CoastQLD4215 Australia Shenzhen Health Development Research and Data Management Center Shenzhen518109 China
Graph learning-based multi-modal integration and classification is one of the most challenging tasks for disease prediction. To effectively offset the negative impact among modalities in the process of multi-modal int... 详细信息
来源: 评论
Active RIS-aided EH-NOMA Networks: A Deep Reinforcement Learning Approach
arXiv
收藏 引用
arXiv 2023年
作者: Shi, Zhaoyuan Lu, Huabing Xie, Xianzhong Yang, Helin Huang, Chongwen Cai, Jun Ding, Zhiguo The Key Laboratory of Intelligent Perception and Computing of Anhui Province Anqing Normal University Anqing China The Key Laboratory of Intelligent Control and Optimization for Industrial Equipment Ministry of Education Dalian University of Technology Dalian116024 China Chongqing Key Lab of Computer networks and Communication Technology Chongqing University of Posts and Telecommunications Chongqing China The Department of Information and Communication Engineering School of Informatics Xiamen University Xiamen361005 China The College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Department of Electrical and Computer Engineering Concordia University MontrealQCH3G 1M8 Canada The Department of Electrical Engineering Princeton University PrincetonNJ08544 United States The School of Electrical and Electronic Engineering The University of Manchester Manchester United Kingdom
An active reconfigurable intelligent surface (RIS)-aided multi-user downlink communication system is investigated, where non-orthogonal multiple access (NOMA) is employed to improve spectral efficiency, and the active... 详细信息
来源: 评论
Many-Modal Optimization by Difficulty-Based Cooperative Co-evolution
Many-Modal Optimization by Difficulty-Based Cooperative Co-e...
收藏 引用
IEEE Symposium Series on Computational Intelligence (SSCI)
作者: Wenjian Luo Yingying Qiao Xin Lin Peilan Xu Mike Preuss Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui China
Evolutionary multimodal optimization has received considerable attention in the past decade. Most existing evolutionary multimodal optimization algorithms are designed to solve problems with relatively few global opti... 详细信息
来源: 评论
Random directional attack for fooling deep neural networks
arXiv
收藏 引用
arXiv 2019年
作者: Luo, Wenjian Wu, Chenwang Zhou, Nan Ni, Li Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China Hefei Anhui230027 China
Deep neural networks (DNNs) have been widely used in many fields such as images processing, speech recognition;however, they are vulnerable to adversarial examples, and this is a security issue worthy of attention. Be... 详细信息
来源: 评论
Community-based 3-SAT formulas with a predefined solution
arXiv
收藏 引用
arXiv 2019年
作者: Hu, Yamin Luo, Wenjian Wang, Junteng Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China China
It is crucial to generate crafted SAT formulas with predefined solutions for the testing and development of SAT solvers since many SAT formulas from real-world applications have solutions. Although some generating alg... 详细信息
来源: 评论
Multi-question negative surveys  3rd
Multi-question negative surveys
收藏 引用
3rd International Conference on Data Mining and Big Data, DMBD 2018 held in conjunction with the 9th International Conference on Swarm Intelligence, ICSI 2018
作者: Jiang, Hao Luo, Wenjiang Anhui Province Key Laboratory of Software Engineering in Computing and Communication School of Computer Science and Technology University of Science and Technology of China HefeiAnhui230027 China
The negative survey is an emerging method of collecting sensitive information. It could obtain the distribution of sensitive information while preserving the personal privacy. When collecting sensitive information, se... 详细信息
来源: 评论