咨询与建议

限定检索结果

文献类型

  • 20 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 24 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 18 篇 工学
    • 14 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 3 篇 信息与通信工程
    • 2 篇 光学工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 控制科学与工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 6 篇 理学
    • 5 篇 数学
    • 2 篇 物理学
    • 2 篇 统计学(可授理学、...
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 文学
    • 1 篇 新闻传播学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 2 篇 genetic algorith...
  • 1 篇 rbm
  • 1 篇 parallel algorit...
  • 1 篇 intrusion detect...
  • 1 篇 prior knowledge
  • 1 篇 dendrites
  • 1 篇 three dimensiona...
  • 1 篇 efs method
  • 1 篇 simulation
  • 1 篇 hidden markov mo...
  • 1 篇 throughput
  • 1 篇 model checking
  • 1 篇 boundary treatme...
  • 1 篇 electronic mail
  • 1 篇 test case genera...
  • 1 篇 software backdoo...
  • 1 篇 wireless communi...
  • 1 篇 missing data
  • 1 篇 set theory
  • 1 篇 eye tracking

机构

  • 4 篇 department of co...
  • 4 篇 key lab of compu...
  • 3 篇 anhui province k...
  • 2 篇 institute of eng...
  • 2 篇 anhui province k...
  • 2 篇 anhui province k...
  • 2 篇 key lab. of comp...
  • 1 篇 department of bi...
  • 1 篇 departments of n...
  • 1 篇 department of ne...
  • 1 篇 unic cnrs gif su...
  • 1 篇 computational ne...
  • 1 篇 nathan kline ins...
  • 1 篇 state key labora...
  • 1 篇 department of me...
  • 1 篇 computational ne...
  • 1 篇 department of pe...
  • 1 篇 max planck insti...
  • 1 篇 department of ps...
  • 1 篇 national vision ...

作者

  • 5 篇 wang shangfei
  • 4 篇 dong lanfang
  • 3 篇 shangfei wang
  • 3 篇 zeng fanping
  • 2 篇 zhu hua
  • 2 篇 shen peijia
  • 2 篇 song bo
  • 2 篇 yuan yuan
  • 2 篇 lu detang
  • 2 篇 zhen gao
  • 2 篇 fanping zeng
  • 1 篇 xu xin
  • 1 篇 zhang tao
  • 1 篇 wang xufa
  • 1 篇 wu yuan
  • 1 篇 guanmiao zhu
  • 1 篇 jun wang
  • 1 篇 yang zhou-wang
  • 1 篇 chaoqiang deng
  • 1 篇 wang ru chuan

语言

  • 23 篇 英文
  • 1 篇 中文
检索条件"机构=Anhui Province Key Lab. of Software in Computer and Communication"
24 条 记 录,以下是11-20 订阅
排序:
software Backdoor Analysis Based on Sensitive Flow Tracking and Concolic Execution
收藏 引用
Wuhan University Journal of Natural Sciences 2016年 第5期21卷 421-427页
作者: XU Xin WANG Jiajie CHENG Shaoyin ZHANG Tao JIANG Fan School of Computer Science and Technology University of Science and Technology of China Hefei 230027 Anhui China China Information Technology Security Evaluation Center Beijing 100085 China Anhui Province Key Lab of Software in Computing and Communication Hefei 230026 Anhui China
In order to effectively detect and analyze the backdoors this paper introduces a method named Backdoor Analysis based on Sensitive flow tracking and Concolic Execution(BASEC).BASEC uses sensitive flow tracking to ef... 详细信息
来源: 评论
Three dimensional stratum modeling and a fast algorithm for arbitrary cutting based on half-edge structure
Three dimensional stratum modeling and a fast algorithm for ...
收藏 引用
2009 International Conference on Computational Intelligence and software Engineering, CiSE 2009
作者: Xi, Liu Dong, Lanfang Lu, Detang Hefei China Anhui Province Key Lab of Software in Computing and Communication School of Computer Science and Technology USTC Hefei China Institute of Engineering and Science Software USTC Hefei China
The three dimensional stratum modeling provides important basis of analysis and policy-making in areas such as Geophysics, Petroleum, Minerals, Urban construction and so on. In this paper, we firstly propose a general... 详细信息
来源: 评论
Unpaired Multimodal Facial Expression Recognition  15th
Unpaired Multimodal Facial Expression Recognition
收藏 引用
15th Asian Conference on computer Vision, ACCV 2020
作者: Xia, Bin Wang, Shangfei Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China Anhui Robot Technology Standard Innovation Base Hefei China
Current works on multimodal facial expression recognition typically require paired visible and thermal facial images. Although visible cameras are readily availab.e in our daily life, thermal cameras are expensive and... 详细信息
来源: 评论
Test Case Generation Based on Program Invariant and Adaptive Random Algorithm
Test Case Generation Based on Program Invariant and Adaptive...
收藏 引用
Advances in Information Technology and Education
作者: Yuan Yuan Zeng Fanping Zhu Guanmiao Deng Chaoqiang Xiong Neng Department of Computer University of Science and Technology of China Anhui Province Key Lab of Software in Computing and Communication
Testing is a critical activity to find software errors. And choosing an effective test suite is the key problem in software testing area. Program invariant, as an attribute of program, can record the implementation st... 详细信息
来源: 评论
PASS: An adaptive multi-copy routing scheme for intermittently connected mobile Ad Hoc networks
收藏 引用
Journal of Convergence Information Technology 2012年 第14期7卷 315-323页
作者: Xu, Jia Wang, Ru Chuan Sun, Li Juan College of Computer Nanjing University of Posts and Telecommunications Nanjing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China Key Lab of Broadband Wireless Communication and Sensor Network Technology Nanjing University of Posts and Telecommunications Ministry of Education Jiangsu Province Nanjing China Key Laboratory for Computer Network and Information Integration Southeast University Ministry of Education Nanjing China State Key Lab. for Novel Software Technology Nanjing University Nanjing China
Intermittently Connected Mobile Ad Hoc Networks (ICMANs) are mobile networks in which complete source-to-destination paths do not exist most of the time. This paper proposed a Predictable Adaptive Seed Spray routing (... 详细信息
来源: 评论
A new boundary treatment method for SPH and application in fluid simulation
A new boundary treatment method for SPH and application in f...
收藏 引用
Third International Conference on Information and Computing(第三届信息与计算科学国际会议 ICIC 2010)
作者: Bo Song Lanfang Dong School of computer science and technology USTC HefeiChina Anhui Province Key Lab of Software in Computing and Communication
Appropriate dealing with boundary conditions is very important for SPH. Current boundary treatment methods like boundary force method, ghost particle method and virtual boundary layer method, when dealing with com... 详细信息
来源: 评论
Network Security Evaluation Algorithm Based on Access Level Vectors
Network Security Evaluation Algorithm Based on Access Level ...
收藏 引用
The 9th International Conference for Young computer Scientists(第九届国际青年计算机大会)
作者: Kai Li Naijie Gu Kun Bi Hongzhu Ji Department of Computer Science and Technology University of Science and Technology of China Hefei China 230027 Anhui Province Key Lab. of Computing and Communication Software Hefei China 230027
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres... 详细信息
来源: 评论
Personalized video emotion tagging through a topic model
Personalized video emotion tagging through a topic model
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Shan Wu Shangfei Wang Zhen Gao Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China
The inherent dependencies among video content, personal characteristics, and perceptual emotion are crucial for personalized video emotion tagging, but have not been thoroughly exploited. To address this, we propose a... 详细信息
来源: 评论
A New Anomaly Detection Method Based on Rough Set Reduction and HMM
A New Anomaly Detection Method Based on Rough Set Reduction ...
收藏 引用
International Conference on computer and Information Science (ACIS)
作者: Fanping Zeng Kaitao Yin Minghui Chen Xufa Wang Department of Computer University of Science and Technology Hefei Anhui China Anhui Province Key Lab of Software in Computer and Communication Hefei Anhui PR China Department of computer University of Science and Technology of China Hefei Anhui PR China
Over the past few years, anomaly detection has been an increasing concern with the rapid growth of the network security. Hidden Markov model (HMM) has been applied in various methods in intrusion detection and proved ... 详细信息
来源: 评论
Emotion recognition through integrating EEG and peripheral signals
Emotion recognition through integrating EEG and peripheral s...
收藏 引用
IEEE International Conference on Acoustics, Speech and Signal Processing
作者: Yangyang Shu Shangfei Wang Key Lab of Computing and Communication Software of Anhui Province School of Computer Science and Technology University of Science and Technology of China Hefei China 230027
The inherent dependencies among multiple physiological signals are crucial for multimodal emotion recognition, but have not been thoroughly exploited yet. This paper propose to use restricted Boltzmann machine (RBM) t... 详细信息
来源: 评论