{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:09:38Z","timestamp":1750219778059,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T00:00:00Z","timestamp":1666310400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,21]]},"DOI":"10.1145\/3573428.3573490","type":"proceedings-article","created":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T10:43:09Z","timestamp":1678876989000},"page":"361-366","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A denoising method based on CNN through multi-layer separation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7708-9707","authenticated-orcid":false,"given":"Jianyu","family":"Huang","sequence":"first","affiliation":[{"name":"College of Computer Engineering, Jimei University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5989-3849","authenticated-orcid":false,"given":"Nanting","family":"Cai","sequence":"additional","affiliation":[{"name":"College of Computer Engineering, Jimei University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1345-7408","authenticated-orcid":false,"given":"Jian","family":"Mao","sequence":"additional","affiliation":[{"name":"College of Computer Engineering, Jimei University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0734-5725","authenticated-orcid":false,"given":"Jialin","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Engineering, Jimei University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8497-8537","authenticated-orcid":false,"given":"Xiaochun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Taiyuan Institute Of Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(85)90046-X"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of Information Security Summit","volume":"1","author":"Kuhn M.G.","year":"2006","unstructured":"M.G.Kuhn, \u201cEavesdropping attacks on computer displays\u201d,Proceedings of Information Security Summit, vol.1, no.10.2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004358"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11545262_20"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEMC.2013.2252353"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISEMC.2010.5711258"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASSP.1982.1163951"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.752610"},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"259","article-title":"Wavelet de-noising method with threshold selection rules based on SNR evaluations","volume":"54","author":"J. S.ZHONG, J.SONG","year":"2014","unstructured":"J. S.ZHONG, J.SONG, C.YOU, \u201cWavelet de-noising method with threshold selection rules based on SNR evaluations,\u201d Journal of Tsinghua University(Science and Technology), 54(2), pp. 259-263, 2014.","journal-title":"Journal of Tsinghua University(Science and Technology)"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/83.336245"},{"key":"e_1_3_2_1_12_1","first-page":"2519","article-title":"Analyzing convolutional neural networks for speech activity detection in mismatched acoustic conditions","author":"Thomas S.","year":"2014","unstructured":"S.Thomas, S.Ganapathy, G.Saon, \u00a0, \"Analyzing convolutional neural networks for speech activity detection in mismatched acoustic conditions.\" IEEE International Conference on Acoustics IEEE, pp. 2519-2523, 2014.","journal-title":"IEEE International Conference on Acoustics IEEE"},{"key":"e_1_3_2_1_13_1","first-page":"618","volume-title":"Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization,\" 2017 IEEE International Conference on Computer Vision (ICCV)","author":"Selvaraju R. R.","year":"2017","unstructured":"R. R. Selvaraju, M. Cogswell, A. Das, R. Vedantam, D. Parikh and D. Batra, \"Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization,\" 2017 IEEE International Conference on Computer Vision (ICCV), pp. 618-626, 2017."}],"event":{"name":"EITCE 2022: 2022 6th International Conference on Electronic Information Technology and Computer Engineering","acronym":"EITCE 2022","location":"Xiamen China"},"container-title":["Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573490","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573428.3573490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:38Z","timestamp":1750178258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573428.3573490"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,21]]},"references-count":13,"alternative-id":["10.1145\/3573428.3573490","10.1145\/3573428"],"URL":"https:\/\/doi.org\/10.1145\/3573428.3573490","relation":{},"subject":[],"published":{"date-parts":[[2022,10,21]]},"assertion":[{"value":"2023-03-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}