咨询与建议

限定检索结果

文献类型

  • 234 篇 期刊文献
  • 208 篇 会议
  • 10 册 图书
  • 2 篇 学位论文

馆藏范围

  • 454 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 368 篇 工学
    • 205 篇 计算机科学与技术...
    • 153 篇 电气工程
    • 77 篇 信息与通信工程
    • 42 篇 机械工程
    • 40 篇 软件工程
    • 38 篇 电子科学与技术(可...
    • 25 篇 控制科学与工程
    • 14 篇 仪器科学与技术
    • 9 篇 光学工程
    • 7 篇 航空宇航科学与技...
    • 5 篇 网络空间安全
    • 3 篇 化学工程与技术
    • 3 篇 生物医学工程(可授...
    • 2 篇 材料科学与工程(可...
  • 156 篇 理学
    • 93 篇 数学
    • 34 篇 物理学
    • 17 篇 生物学
    • 7 篇 统计学(可授理学、...
    • 4 篇 系统科学
    • 3 篇 化学
    • 2 篇 地球物理学
  • 32 篇 管理学
    • 31 篇 管理科学与工程(可...
  • 13 篇 医学
    • 7 篇 基础医学(可授医学...
    • 5 篇 临床医学
    • 3 篇 特种医学
  • 8 篇 教育学
    • 7 篇 教育学
    • 2 篇 心理学(可授教育学...
  • 6 篇 法学
    • 3 篇 法学
    • 3 篇 社会学
  • 5 篇 农学
  • 3 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学

主题

  • 454 篇 binary code
  • 57 篇 binary codes
  • 37 篇 codes
  • 36 篇 hashing
  • 22 篇 binary
  • 19 篇 image retrieval
  • 16 篇 hamming distance
  • 15 篇 decoding
  • 14 篇 gray code
  • 13 篇 neural network
  • 10 篇 linear code
  • 10 篇 semantics
  • 10 篇 machine learning
  • 10 篇 nearest neighbor...
  • 9 篇 optimization
  • 9 篇 linear codes
  • 9 篇 images
  • 8 篇 quantization
  • 8 篇 cryptography
  • 8 篇 upper bound

机构

  • 7 篇 princeton univ d...
  • 5 篇 southwest jiaoto...
  • 4 篇 univ east anglia...
  • 4 篇 univ elect sci &...
  • 3 篇 moscow tech univ...
  • 3 篇 shizuoka univ de...
  • 3 篇 tohoku univ grad...
  • 3 篇 tel aviv univ de...
  • 2 篇 inst. of inf. sc...
  • 2 篇 tsinghua univ ts...
  • 2 篇 georgia inst tec...
  • 2 篇 princeton univ d...
  • 2 篇 swiss fed inst t...
  • 2 篇 univ manitoba de...
  • 2 篇 chinese acad sci...
  • 2 篇 tech univ cluj n...
  • 2 篇 jilin univ sch c...
  • 2 篇 beihang univ sta...
  • 2 篇 chitkara univ in...
  • 2 篇 department of ma...

作者

  • 7 篇 hecht michael h.
  • 6 篇 coxson gregory e...
  • 6 篇 liu li
  • 5 篇 harada masaaki
  • 5 篇 shao ling
  • 5 篇 shen fumin
  • 4 篇 takase hiroshi
  • 4 篇 shinriki masanor...
  • 3 篇 adzhemov a. s.
  • 3 篇 ostergard prj
  • 3 篇 shen heng tao
  • 3 篇 tian qi
  • 3 篇 hecht mh
  • 3 篇 araya makoto
  • 3 篇 ahn seok-ki
  • 3 篇 saito ken
  • 3 篇 ma rui
  • 3 篇 chae sung ho
  • 2 篇 zhou jie
  • 2 篇 vostrukhin aleks...

语言

  • 427 篇 英文
  • 22 篇 其他
  • 5 篇 中文
检索条件"主题词=binary code"
454 条 记 录,以下是31-40 订阅
排序:
Learning binary code Features for UAV Target Tracking  3
Learning Binary Code Features for UAV Target Tracking
收藏 引用
2017 3rd IEEE International Conference on Control Science and Systems Engineering (ICCSSE)
作者: Qiao Xiao Qinyu Zhang Xi Wu Xiao Han Ronghua Li Harbin Institute of Technology Shenzhen
During target tracking, in order to obtain a higher tracking accuracy, the region we would like to track should have a good feature expression. Furthermore, we need to extract multilevel and complex features to deal w... 详细信息
来源: 评论
Neural Representation Learning Based binary code Authorship Attribution  1
收藏 引用
11th International Conference on Digital Forensics and Cyber Crime
作者: Wang, Zhongmin Feng, Zhen Tian, Zhenzhou Xian Univ Posts & Telecommun Xian Peoples R China
Authorship attribution on binary code is of great value in applications such as malware analysis, software forensics, and code theft detection. Inspired by the recent great successes of neural network and representati... 详细信息
来源: 评论
Scalable Image Search with Reliable binary code
Scalable Image Search with Reliable Binary Code
收藏 引用
ACM Conference on Multimedia (MM)
作者: Ren, Guangxin Cai, Junjie Li, Shipeng Yu, Nenghai Tian, Qi Univ Sci & Technol China Hefei Anhui Peoples R China Univ Texas San Antonio San Antonio TX USA Microsoft Res Asia Beijing Peoples R China
In many existing image retrieval algorithms, Bag-of-Words (BoW) model has been widely adopted for image representation. To achieve accurate indexing and efficient retrieval, local features such as the SIFT descriptor ... 详细信息
来源: 评论
CBSDI: Cross-Architecture binary code Similarity Detection based on Index Table  22
CBSDI: Cross-Architecture Binary Code Similarity Detection b...
收藏 引用
22nd IEEE International Conference on Software Quality, Reliability and Security (QRS)
作者: Deng, Longmin Zhao, Dongdong Zhou, Junwei Xia, Zhe Xiang, Jianwen Wuhan Univ Technol Sch Comp Sci & Artif Intelligence Hubei Key Lab Transportat Internet Things Wuhan Hubei Peoples R China Wuhan Univ Technol Chongqing Res Inst Chongqing Peoples R China
binary code similarity detection for cross-platform is widely used in plagiarism detection, malware detection and vulnerability search, aiming to detect whether two binary functions over different platforms are simila... 详细信息
来源: 评论
LoongChecker: Practical summary-based semi-simulation to detect vulnerability in binary code
LoongChecker: Practical summary-based semi-simulation to det...
收藏 引用
Int Joint Conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
作者: Cheng, Shaoyin Yang, Jun Wang, Jiajie Wang, Jinding Jiang, Fan Univ Sci & Technol China Informat Technol Secur Evaluat Ctr Hefei 230027 Anhui Peoples R China China Informat Technol Secur Evaluat Ctr Beijing 100085 Peoples R China
The automatic detection of security vulnerabilities in binary code is challenging and lacks efficient tools. This paper presents a novel semi-simulation approach to statically detect potential vulnerabilities in binar... 详细信息
来源: 评论
BHMVD: binary code-based Hybrid Neural Network for Multiclass Vulnerability Detection  20
BHMVD: Binary Code-based Hybrid Neural Network for Multiclas...
收藏 引用
20th IEEE Int Symposium on Parallel and Distributed Processing with Applicat / 15th IEEE Int Conf on Social Comp and Networking / 12th IEEE Int Conf on Big Data and Cloud Comp / 12th IEEE Int Conf on Sustainable Comp and Commun
作者: Cui, Ningning Chen, Liwei Du, Gewangzi Wu, Tongshuai Zhu, Chenguang Shi, Gang Chinese Acad Sci Inst Informat Engn Beijing Peoples R China Univ Chinese Acad Sci Sch Cyber Secur Beijing Peoples R China
Precise binary code vulnerability detection is a significant research topic in software security. Currently, the majority of software is released in binary form, and the corresponding vulnerability detection approache... 详细信息
来源: 评论
Combined Approach to Solving Problems in binary code Analysis
Combined Approach to Solving Problems in Binary Code Analysi...
收藏 引用
9th International Conference on Computer Science and Information Technologies (CSIT)
作者: Getman, Alexander Padaryan, Vartan Solovyev, Mikhail Russian Acad Sci Inst Syst Programming Moscow 117901 Russia
This paper proposes a decomposition of generic software security problems, mapping them to smaller problems of static and dynamic binary code analysis.
来源: 评论
A New String Distance For Computing binary code Similarities  10
A New String Distance For Computing Binary Code Similarities
收藏 引用
IEEE 10th International Conference on Intelligent Computer Communication and Processing (ICCP)
作者: Oprisa, Ciprian Cabau, George Pal, Gheorghe Sebestyen Bitdefender Bucharest Romania Tech Univ Cluj Napoca Cluj Napoca Romania
A binary program can be represented as a string of operation codes by disassembling it and removing the instruction operands. Using this representation, the problem of detecting if two programs are similar can be redu... 详细信息
来源: 评论
Neural Network-based Graph Embedding for Cross-Platform binary code Similarity Detection  17
Neural Network-based Graph Embedding for Cross-Platform Bina...
收藏 引用
24th ACM-SIGSAC Conference on Computer and Communications Security (ACM CCS)
作者: Xu, Xiaojun Liu, Chang Feng, Qian Yin, Heng Song, Le Song, Dawn Shanghai Jiao Tong Univ Shanghai Peoples R China Univ Calif Berkeley Berkeley CA 94720 USA Samsung Res Amer Mountain View CA USA Univ Calif Riverside Riverside CA 92521 USA Georgia Inst Technol Atlanta GA 30332 USA
The problem of cross-platform binary code similarity detection aims at detecting whether two binary functions coming from different platforms are similar or not. It has many security applications, including plagiarism... 详细信息
来源: 评论
A Novel binary code Based Projector-Camera System Registration Method
A Novel Binary Code Based Projector-Camera System Registrati...
收藏 引用
International Conference on Computer Engineering and Technology
作者: Duan, Jiang Tumblin, Jack Southwestern Univ Finance & Econ Chengdu Peoples R China Northwestern Univ Evanston IL 60208 USA
Precisely relating pixels in the projector image to pixels in camera image plays a significant role in many projector-camera systems. In this paper, we present a novel method of finding the correspondence in a simple ... 详细信息
来源: 评论