咨询与建议

限定检索结果

文献类型

  • 27 篇 期刊文献
  • 6 篇 会议
  • 1 册 图书

馆藏范围

  • 34 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 30 篇 工学
    • 18 篇 计算机科学与技术...
    • 14 篇 电气工程
    • 8 篇 软件工程
    • 3 篇 电子科学与技术(可...
    • 2 篇 光学工程
    • 2 篇 仪器科学与技术
    • 2 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 网络空间安全
  • 7 篇 理学
    • 6 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
  • 2 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 34 篇 bit-level
  • 12 篇 image encryption
  • 3 篇 security
  • 3 篇 cryptography
  • 2 篇 median filter
  • 2 篇 color image encr...
  • 2 篇 digital arithmet...
  • 2 篇 refinement
  • 2 篇 pipelined machin...
  • 2 篇 bidirectional di...
  • 2 篇 acl2
  • 2 篇 automated reason...
  • 2 篇 coupled map latt...
  • 2 篇 verification
  • 2 篇 coarse-grained
  • 2 篇 hardware
  • 2 篇 mutual informati...
  • 2 篇 digital arithmet...
  • 1 篇 vector operation
  • 1 篇 hcdc(k)

机构

  • 7 篇 dalian maritime ...
  • 2 篇 georgia inst tec...
  • 2 篇 georgia inst tec...
  • 2 篇 taiyuan univ tec...
  • 2 篇 guangxi normal u...
  • 2 篇 beijing inst tec...
  • 2 篇 xidian univ stat...
  • 2 篇 dalian univ tech...
  • 1 篇 emilio aguinaldo...
  • 1 篇 nantong text voc...
  • 1 篇 singapore univ t...
  • 1 篇 northeastern uni...
  • 1 篇 rhein westfal th...
  • 1 篇 qilu univ techno...
  • 1 篇 harbin inst tech...
  • 1 篇 china acad space...
  • 1 篇 al hussein bin t...
  • 1 篇 [a] school of el...
  • 1 篇 city univ hong k...
  • 1 篇 department of so...

作者

  • 3 篇 wang xingyuan
  • 3 篇 wang xing-yuan
  • 3 篇 zhang hao
  • 2 篇 srinivasan sudar...
  • 2 篇 chen pei-yin
  • 2 篇 sun yu-jie
  • 2 篇 manolios panagio...
  • 1 篇 liu pengbo
  • 1 篇 huang tao
  • 1 篇 hsu chih-kun
  • 1 篇 yang yuan
  • 1 篇 zhang sutao
  • 1 篇 li zhen-yu
  • 1 篇 zhang ying-qian
  • 1 篇 du bing zhang ju...
  • 1 篇 gemmeke tobias
  • 1 篇 cengfei chen
  • 1 篇 shang wj
  • 1 篇 hao zhang
  • 1 篇 zhu hegui

语言

  • 29 篇 英文
  • 5 篇 其他
检索条件"主题词=Bit-Level"
34 条 记 录,以下是1-10 订阅
排序:
FineBID: Fine-Grained Protocol Reverse Engineering for bit-level Field IDentification
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2025年 第3期22卷 2670-2686页
作者: Huang, Tao Gao, Yansong Zheng, Yifeng Wang, Zhanfeng Hu, Chao Fu, Anmin Nanjing Univ Sci & Technol Sch Comp Sci & Engn Nanjing 210094 Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian 710071 Peoples R China Univ Western Australia Crawley WA 6009 Australia Harbin Inst Technol Sch Comp Sci & Technol Shenzhen 518055 Guangdong Peoples R China Lexbell Co Ltd Nanjing 210014 Peoples R China Army Engn Univ PLA Coll Command & Control Engn Nanjing 210007 Peoples R China
Protocol Reverse Engineering (PRE) serves as the foundation for numerous security analysis techniques, such as vulnerability mining and intrusion detection, etc. The PRE analysis precision can directly affect the accu... 详细信息
来源: 评论
A new spatiotemporal chaos model and its application in bit-level image encryption
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2024年 第4期83卷 10481-10502页
作者: Wang, Xingyuan Zhao, Maochang Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Guangxi Normal Univ Guangxi Key Lab Multisource Informat Min & Secur Guilin 541004 Peoples R China
With the development of network technology, multimedia security has attracted extensive attention. Although chaotic system is widely used in this field because of its own characteristics, designing a more secure and e... 详细信息
来源: 评论
bit-level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression
收藏 引用
SENSORS 2022年 第3期22卷 981-981页
作者: Bi, Zixiang Xu, Guoai Xu, Guosheng Wang, Chenyu Zhang, Sutao Beijing Univ Posts & Telecommun Sch Cyberspace Secur Beijing 100876 Peoples R China
Modern intelligent and networked vehicles are increasingly equipped with electronic control units (ECUs) with increased computing power. These electronic devices form an in-vehicle network via the Controller Area Netw... 详细信息
来源: 评论
bit-level color image encryption algorithm based on coarse-grained logistic map and fractional chaos
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第8期80卷 12155-12173页
作者: Sun, Yu-jie Zhang, Hao Wang, Xing-yuan Wang, Ming-xu BeiJing Inst Technol Sch Comp Sci & Technol Beijing 100081 Peoples R China Taiyuan Univ Technol Coll Informat & Comp Taiyuan 030024 Peoples R China Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China Dalian Univ Technol Fac Elect Informat & Elect Engn Dalian 116024 Peoples R China
A novel color image encryption algorithm based on coarse-grained fractional chaotic system signals is proposed in this paper. First, color images are divided into three channels, which are encrypted based on the corre... 详细信息
来源: 评论
bit-level image encryption algorithm based on BP neural network and gray code
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第8期80卷 11655-11670页
作者: Wang, Xingyuan Lin, Shujuan Li, Yong Dalian Maritime Univ Sch Informat Sci & Technol Dalian 116026 Peoples R China
In recent years, people have put forward various image encryption algorithms based on pixel level. In fact, bit level encryption has better effect than pixel level encryption. Therefore, this paper proposes a new bit-... 详细信息
来源: 评论
Modifying bit-level Data Compression Scheme based on Adaptive Hamming Code Data Compression Algorithm  2
Modifying Bit-Level Data Compression Scheme based on Adaptiv...
收藏 引用
International Conference on Multimedia Analysis and Pattern Recognition (MAPR)
作者: Mendoza, Harwin C. Sison, Ariel M. Medina, Ruji P. Technol Inst Philippines Quezon City Philippines Emilio Aguinaldo Coll Manila Philippines
This paper is directed towards the development of an improved HCDC(k) to minimize the possibility of inflation. An improved adaptive hamming code data compression has been developed by reducing the number of bits used... 详细信息
来源: 评论
On bit-level Decoding of Nonbinary LDPC Codes
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2018年 第9期66卷 3736-3748页
作者: Zhang, Mu Cai, Kui Huang, Qin Yuan, Shuai Singapore Univ Technol & Design Sci & Math Cluster Singapore 117608 Singapore Beihang Univ Sch Elect & Informat Engn Beijing 100191 Peoples R China China Acad Space Technol Qian Xuesen Lab Space Technol Beijing 100094 Peoples R China
This paper addresses binary message-passing (MP) decoding for nonbinary low-density parity-check (NB-LDPC) codes based on the binary image of Galois field symbols. The parity-check matrix of NB-LDPC codes in binary fo... 详细信息
来源: 评论
Analysis of trigonometric chaotic sequence by proposing an index-based bit level scrambling image encryption
收藏 引用
MODERN PHYSICS LETTERS B 2021年 第24期35卷
作者: Yu, Wanbo Wang, Hao Dalian Univ Sch Informat Engn 10 Xuefu Ave Dalian 116622 Liaoning Peoples R China
Chaotic map is applied to numerous research fields, such as encryption of data and information. In this paper, a novel bit-level scrambling encryption based on three-dimensional trigonometric chaotic sequence is propo... 详细信息
来源: 评论
A Novel bit-level Image Encryption Algorithm Based on Coarse-grained Chaotic Signals
A Novel Bit-level Image Encryption Algorithm Based on Coarse...
收藏 引用
International Conference on Image, Vision and Computing (ICIVC)
作者: Yujie Sun Pengfei Yan Hao Zhang Yong Zhang Department of Software North Automatic Control Technology Institute Taiyuan Shanxi China College of Information and Computer Taiyuan University of Technology Taiyuan Shanxi China
In this paper, a novel image encryption algorithm based on coarse-grained chaotic signals in which scrambling and diffusion are both covered. First, the chaotic signals are handled with unfixed coarse-grained key inst... 详细信息
来源: 评论
A feedback chaotic image encryption scheme based on both bit-level and pixel-level
收藏 引用
JOURNAL OF VIBRATION AND CONTROL 2016年 第5期22卷 1171-1180页
作者: Ye, Guodong Huang, Xiaoling Guangdong Ocean Univ Coll Sci Zhanjiang 524088 Guangdong Peoples R China City Univ Hong Kong Dept Elect Engn Kowloon Tong Hong Kong Peoples R China
Recently, there are more and more image encryption algorithms being proposed based on chaotic systems. The classical architecture employs permutation plus diffusion. However, the traditional permutation operation can ... 详细信息
来源: 评论