咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是1-10 订阅
排序:
UniASM: binary code similarity detection without fine-tuning
收藏 引用
NEUROCOMPUTING 2025年 630卷
作者: Gu, Yeming Shu, Hui Kang, Fei Hu, Fan Minist Educ Key Lab Cyberspace Secur Zhengzhou Peoples R China
binary code similarity detection (BCSD) is widely used in various binary analysis tasks such as vulnerability search, malware detection, clone detection, and patch analysis. Recent studies have shown that the learning... 详细信息
来源: 评论
binary code Representation With Well-Balanced Instruction Normalization
收藏 引用
IEEE ACCESS 2023年 11卷 29183-29198页
作者: Koo, Hyungjoon Park, Soyeon Choi, Daejin Kim, Taesoo Sungkyunkwan Univ Dept Comp Sci & Engn Suwon 16419 South Korea Georgia Inst Technol Sch Comp Sci Atlanta GA 30332 USA Incheon Natl Univ Dept Comp Sci & Engn Incheon 22012 South Korea
The recovery of contextual meanings on a machine code is required by a wide range of binary analysis applications, such as bug discovery, malware analysis, and code clone detection. To accomplish this, advancements on... 详细信息
来源: 评论
binary code Optimized for Partial Encryption
收藏 引用
IEEE TRANSACTIONS ON COMMUNICATIONS 2020年 第11期68卷 7201-7217页
作者: Kafi, Mehrshad Dumitrescu, Sorina McMaster Univ Dept Elect & Comp Engn Hamilton ON L8S 4K1 Canada
A common technique for the partial encryption of compressed images and videos encrypts only the sign bits of some syntax elements such as the quantized transform coefficients or the motion vector differences. The sign... 详细信息
来源: 评论
Runtime Vectorization Transformations of binary code
收藏 引用
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING 2017年 第6期45卷 1536-1565页
作者: Hallou, Nabil Rohou, Erven Clauss, Philippe INRIA Rennes France Univ Strasbourg ICube Lab INRIA Strasbourg France
In many cases, applications are not optimized for the hardware on which they run. Several reasons contribute to this unsatisfying situation, such as legacy code, commercial code distributed in binary form, or deployme... 详细信息
来源: 评论
Securing binary code
收藏 引用
IEEE SECURITY & PRIVACY 2017年 第6期15卷 77-81页
作者: Hawkins, William Hiser, Jason D. Anh Nguyen-Tuong Co, Michele Davidson, Jack W. Univ Virginia Charlottesville VA 22903 USA Univ Virginia Comp Sci Charlottesville VA 22903 USA
The Zipr tool reverse-engineers binary code and applies specific and generic code transformations, with the goal of securing binary code.
来源: 评论
Reversible binary to Grey and Grey to binary code Converter using QCA
收藏 引用
IETE JOURNAL OF RESEARCH 2015年 第3期61卷 223-229页
作者: Das, Jadav Chandra De, Debashis West Bengal Univ Technol Dept Comp Sci & Engn Kolkata 700064 India
Quantum dot-cellular automata (QCA) is an emerging nanotechnological archetype and has widespread applications in designing nanoscale reversible circuit for nanocomputing. The low power consumption, faster operating s... 详细信息
来源: 评论
Design of (4,8) binary code with MDS and Zigzag-Decodable Property
收藏 引用
WIRELESS PERSONAL COMMUNICATIONS 2016年 第1期89卷 1-13页
作者: Dai, Mingjun Lu, Zexin Shen, Dan Wang, Hui Chen, Bin Lin, Xiaohui Zhang, Shengli Zhang, Li Liu, Hongwei Shenzhen Univ Shenzhen Key Lab Adv Commun & Informat Proc Coll Informat Engn Shenzhen Peoples R China Shenzhen Univ Shenzhen Key Lab Media Secur Coll Informat Engn Shenzhen Peoples R China Xidian Univ State Key Lab Integrated Serv Networks Xian Peoples R China
Dedicated to network code structured distributed storage system, a novel (4, 8) storage code is designed. The code possesses the following properties: operation within binary field , maximum distance separable propert... 详细信息
来源: 评论
Transforming binary code for low-power embedded processors
收藏 引用
IEEE MICRO 2004年 第3期24卷 21-33页
作者: Petrov, P Orailoglu, A Univ Calif San Diego Dept Comp Sci & Engn La Jolla CA 92093 USA
TWO PROGRAM code TRANSFORMATION METHODOLOGIES REDUCE THE POWER CONSUMPTION OF INSTRUCTION COMMUNICATION BUSES IN EMBEDDED PROCESSORS. AIMED AT DEEP-SUBMICRON PROCESS TECHNOLOGIES, THESE TECHNIQUES OFFER AN EFFICIENT S... 详细信息
来源: 评论
Every binary code can be realized by convex sets
收藏 引用
ADVANCES IN APPLIED MATHEMATICS 2018年 99卷 83-93页
作者: Franke, Megan Muthiah, Samuel Univ Calif Santa Barbara Dept Math Santa Barbara CA 93106 USA Westmont Coll Dept Math & Comp Sci Santa Barbara CA 93108 USA
Much work has been done to identify which binary codes can be represented by collections of open convex or closed convex sets. While not all binary codes can be realized by such sets, here we prove that every binary c... 详细信息
来源: 评论
On the Representation of Results of binary code Reverse Engineering
收藏 引用
PROGRAMMING AND COMPUTER SOFTWARE 2018年 第3期44卷 200-206页
作者: Padaryan, V. A. Ledovskikh, I. N. Russian Acad Sci Inst Syst Programming Moscow 109004 Russia
A representation of algorithms extracted from binary code by reverse engineering is discussed. Both intermediate representations designed for automatic analysis and final representations passed to the end user are con... 详细信息
来源: 评论