咨询与建议

限定检索结果

文献类型

  • 232 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 1 篇 学位论文

馆藏范围

  • 451 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 365 篇 工学
    • 203 篇 计算机科学与技术...
    • 151 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 39 篇 软件工程
    • 37 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 5 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 31 篇 管理学
    • 30 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 451 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 14 篇 decoding
  • 13 篇 gray code
  • 13 篇 neural network
  • 11 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 426 篇 英文
  • 20 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
451 条 记 录,以下是11-20 订阅
排序:
BUGGRAPH: Differentiating Source-binary code Similarity with Graph Triplet-Loss Network  21
BUGGRAPH: Differentiating Source-Binary Code Similarity with...
收藏 引用
16th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS)
作者: Ji, Yuede Cui, Lei Huang, H. Howie George Washington Univ Graph Comp Lab Washington DC 20052 USA
binary code similarity detection, which answers whether two pieces of binary code are similar, has been used in a number of applications, such as vulnerability detection and automatic patching. Existing approaches fac... 详细信息
来源: 评论
VESTIGE: Identifying binary code Provenance for Vulnerability Detection  19th
VESTIGE: Identifying Binary Code Provenance for Vulnerabilit...
收藏 引用
19th International Conference on Applied Cryptography and Network Security (ACNS)
作者: Ji, Yuede Cui, Lei Huang, H. Howie George Washington Univ Graph Comp Lab Washington DC 20037 USA
Identifying the compilation provenance of a binary code helps to pinpoint the specific compilation tools and configurations that were used to produce the executable. Unfortunately, existing techniques are not able to ... 详细信息
来源: 评论
Numerical Analysis of All-Optical binary to Gray code Converter Using Silicon Microring Resonator
收藏 引用
OPTICAL MEMORY AND NEURAL NETWORKS 2024年 第2期33卷 193-204页
作者: Hossain, Manjur Mondal, Kalimuddin Saveetha Univ Saveetha Inst Med & Tech Sci Saveetha Sch Engn Chennai 602105 India
Present manuscript designs and analyzes numerically all-optical binary-to-gray code (BTGC) converter utilizing silicon microring resonator. A waveguide-based silicon microring resonator has been employed to achieve op... 详细信息
来源: 评论
Neural Representation Learning Based binary code Authorship Attribution  1
收藏 引用
11th International Conference on Digital Forensics and Cyber Crime
作者: Wang, Zhongmin Feng, Zhen Tian, Zhenzhou Xian Univ Posts & Telecommun Xian Peoples R China
Authorship attribution on binary code is of great value in applications such as malware analysis, software forensics, and code theft detection. Inspired by the recent great successes of neural network and representati... 详细信息
来源: 评论
All-optical graphene-based plasmonic binary to gray code converter
收藏 引用
OPTICAL AND QUANTUM ELECTRONICS 2022年 第3期54卷 142-142页
作者: Abbasi, Mahmoud Sadeghi, Mojtaba Adelpour, Zahra Islamic Azad Univ Dept Elect Engn Shiraz Branch Shiraz Iran
In this paper, a binary to gray code converter based on graphene-plasmonic waveguides using the interference effect is proposed. The plasmonic waveguides are made of graphene nano-ribbons located on the dielectric lay... 详细信息
来源: 评论
Functionality Recognition on binary code with Neural Representation Learning  21
Functionality Recognition on Binary Code with Neural Represe...
收藏 引用
Proceedings of the 2021 4th International Conference on Artificial Intelligence and Pattern Recognition
作者: Zhenzhou Tian Jinrui Li Peng Xue Jie Tian Hengchao Mao Yaqian Huang Xi'an University of Posts and Telecommunications School of Computer Science and Technology China
The functionality recognition of binary code has important application value in malware analysis, software forensics, binary code similarity analysis and other applications. Most of the existing methods are based on s... 详细信息
来源: 评论
BinDeep: A deep learning approach to binary code similarity detection
收藏 引用
EXPERT SYSTEMS WITH APPLICATIONS 2021年 168卷 114348-114348页
作者: Tian, Donghai Jia, Xiaoqi Ma, Rui Liu, Shuke Liu, Wenjing Hu, Changzhen Beijing Inst Technol Beijing Key Lab Software Secur Engn Tech Beijing 100081 Peoples R China North Univ China Shanxi Mil & Civilian Integrat Software Engn Tech Taiyuan 030051 Peoples R China Chinese Acad Sci Inst Informat Engn Key Lab Network Assessment Technol Beijing 100093 Peoples R China
binary code similarity detection (BCSD) plays an important role in malware analysis and vulnerability discovery. Existing methods mainly rely on the expert's knowledge for the BCSD, which may not be reliable in so... 详细信息
来源: 评论
Deep Learning Triplet Ordinal Relation Preserving binary code for Remote Sensing Image Retrieval Task
收藏 引用
REMOTE SENSING 2021年 第23期13卷 4786-4786页
作者: Wang, Zhen Wu, Nannan Yang, Xiaohan Yan, Bingqi Liu, Pingping Shandong Univ Technol Sch Comp Sci & Technol Zibo 255000 Peoples R China Jilin Univ Key Lab Symbol Computat & Knowledge Engn Minist Educ Changchun 130012 Peoples R China Jilin Univ Sch Comp Sci & Technol Changchun 130012 Peoples R China
As satellite observation technology rapidly develops, the number of remote sensing (RS) images dramatically increases, and this leads RS image retrieval tasks to be more challenging in terms of speed and accuracy. Rec... 详细信息
来源: 评论
Cross-Language binary-Source code Matching with Intermediate Representations  29
Cross-Language Binary-Source Code Matching with Intermediate...
收藏 引用
29th IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER)
作者: Gui, Yi Wan, Yao Zhang, Hongyu Huang, Huifang Sui, Yulei Xu, Guandong Shao, Zhiyuan Jin, Hai Huazhong Univ Sci & Technol Natl Engn Res Ctr Big Data Technol & Syst Sch Comp Sci & TechnolCluster & Grid Comp Lab Serv Comp Technol & Syst Lab Wuhan Peoples R China Univ Newcastle Newcastle NSW Australia Huazhong Univ Sci & Technol Sch Math & Stat Wuhan Peoples R China Univ Technol Sydney Sch Comp Sci Sydney NSW Australia
binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment. Currently, several approaches ha... 详细信息
来源: 评论
A new algorithm of links labelling for the isomorphism detection of various kinematic chains using binary code
收藏 引用
MECHANISM AND MACHINE THEORY 2019年 131卷 1-32页
作者: Rai, Rajneesh Kumar Punjabi, Sunil Ujjain Engn Coll Dept Mech Engn Ujjain 456010 Madhya Pradesh India
Isomorphism of kinematic chains (KCs) has always been a critical issue for the researchers dealing with structural synthesis. Consequently, many researchers of repute presented various methods during the last eight de... 详细信息
来源: 评论