咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 动力工程及工程热...
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 信息与通信工程
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 医学
    • 1 篇 基础医学(可授医学...
    • 1 篇 临床医学

主题

  • 1 篇 software systems
  • 1 篇 deep learning
  • 1 篇 information tech...
  • 1 篇 graphic methods
  • 1 篇 graph neural net...
  • 1 篇 semantics
  • 1 篇 codes
  • 1 篇 feature extracti...
  • 1 篇 security
  • 1 篇 heterogeneous ne...
  • 1 篇 firmware
  • 1 篇 privacy
  • 1 篇 source coding

机构

  • 2 篇 dept.zhongyuan u...
  • 2 篇 dept.key laborat...
  • 1 篇 departments of n...
  • 1 篇 unic cnrs gif su...
  • 1 篇 school of mathem...
  • 1 篇 faculty of healt...
  • 1 篇 ist austria klos...
  • 1 篇 state key labora...
  • 1 篇 department of ph...
  • 1 篇 department of me...
  • 1 篇 department of ph...
  • 1 篇 department of bi...
  • 1 篇 school of psycho...
  • 1 篇 max planck insti...
  • 1 篇 computing scienc...
  • 1 篇 dept. zhongyuan ...
  • 1 篇 center for cogni...
  • 1 篇 department of ps...
  • 1 篇 faculty of biolo...
  • 1 篇 department of bi...

作者

  • 3 篇 chongjun tang
  • 3 篇 bing xia
  • 2 篇 xia bing
  • 2 篇 shihao chu
  • 2 篇 wenbo liu
  • 2 篇 tang chongjun
  • 2 篇 yu dong
  • 1 篇 ge yunxiang
  • 1 篇 pang jianmin
  • 1 篇 xie xiang-hui
  • 1 篇 jianmin pang
  • 1 篇 liu wenbo
  • 1 篇 ruinan yang
  • 1 篇 yang ruinan
  • 1 篇 hu qi
  • 1 篇 jiabin yin
  • 1 篇 huang michael c.
  • 1 篇 yunxiang ge
  • 1 篇 dong yu
  • 1 篇 chu shihao

语言

  • 7 篇 英文
检索条件"机构=Dept.Key Laboratory of Mathematical Engineering and Advanced Computing"
7 条 记 录,以下是1-10 订阅
排序:
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks  10
BContext2Name: Naming Functions in Stripped Binaries with Mu...
收藏 引用
10th IEEE International Conference on Cyber Security and Cloud computing and 9th IEEE International Conference on Edge computing and Scalable Cloud, CSCloud-EdgeCom 2023
作者: Xia, Bing Ge, Yunxiang Yang, Ruinan Yin, Jiabin Pang, Jianmin Tang, Chongjun Dept.ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Dept.ZhongYuan University of Technology Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China Dept.ZhongYuan University of Technology Zhengzhou China Dept.Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Conducting binary function naming helps reverse engineers understand the internal workings of the code and perform malicious code analysis without accessing the source code. However, the loss of debugging information ... 详细信息
来源: 评论
A Firmware Vulnerability Detection Method Based on Feature Filtering  21
A Firmware Vulnerability Detection Method Based on Feature F...
收藏 引用
21st IEEE International Symposium on Parallel and Distributed Processing with Applications, 13th IEEE International Conference on Big Data and Cloud computing, 16th IEEE International Conference on Social computing and Networking and 13th International Conference on Sustainable computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2023
作者: Xia, Bing Tang, Chongjun Liu, Wenbo Chu, Shihao Dong, Yu ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Dept Zhengzhou China ZhongYuan University of Technology Henan Key Laboratory on Public Opinion Intelligent Analysis Dept Zhengzhou China ZhongYuan University of Technology Dept Zhengzhou China
Open source code reuse and code cross-platform deployment accelerate the spread of software vulnerabilities, and pose challenges for accurate detection of cross-platform vulnerabilities. The binary vulnerability simil... 详细信息
来源: 评论
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks
BContext2Name: Naming Functions in Stripped Binaries with Mu...
收藏 引用
IEEE International Conference on Cyber Security and Cloud computing (CSCloud)
作者: Bing Xia Yunxiang Ge Ruinan Yang Jiabin Yin Jianmin Pang Chongjun Tang Key Laboratory of Mathematical Engineering and Advanced Computing dept.ZhongYuan University of Technology Zhengzhou China Henan Key Laboratory on Public Opinion Intelligent Analysis dept.ZhongYuan University of Technology Zhengzhou China dept.ZhongYuan University of Technology Zhengzhou China dept.Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China
Conducting binary function naming helps reverse engineers understand the internal workings of the code and perform malicious code analysis without accessing the source code. However, the loss of debugging information ...
来源: 评论
Exploiting transmission lines on heterogeneous networks-on-chip to improve the adaptivity and efficiency of cache coherence  15
Exploiting transmission lines on heterogeneous networks-on-c...
收藏 引用
9th IEEE/ACM International Symposium on Networks-on-Chip, NOCS 2015
作者: Hu, Qi Liu, Peng Huang, Michael C. Xie, Xiang-Hui College of Information Science and Electronic Engineering Zhejiang University Hangzhou310027 China Dept. of Electrical and Computer Engineering University of Rochester RochesterNY14627 United States State Key Laboratory of Mathematical Engineering and Advanced Computing Wuxi214125 China
Emerging heterogeneous interconnects have shown lower latency and higher throughput, which can improve the efficiency of communication and create new opportunities for memory system designs. In this paper, transmissio... 详细信息
来源: 评论
A Firmware Vulnerability Detection Method Based on Feature Filtering
A Firmware Vulnerability Detection Method Based on Feature F...
收藏 引用
IEEE International Conference on Big Data and Cloud computing (BdCloud)
作者: Bing Xia Chongjun Tang Wenbo Liu Shihao Chu Yu Dong dept Key Laboratory of Mathematical Engineering and Advanced Computing ZhongYuan University of Technology Zhengzhou China dept Henan Key Laboratory on Public Opinion Intelligent Analysis ZhongYuan University of Technology Zhengzhou China dept ZhongYuan University of Technology Zhengzhou China
Open source code reuse and code cross-platform deployment accelerate the spread of software vulnerabilities, and pose challenges for accurate detection of cross-platform vulnerabilities. The binary vulnerability simil...
来源: 评论
A Vulnerability Detection Method for Intermediate Code Based on a Relational Dependency Graph
A Vulnerability Detection Method for Intermediate Code Based...
收藏 引用
IEEE International Conference on Trust, Security and Privacy in computing and Communications (TrustCom)
作者: Bing Xia Chongjun Tang Wenbo Liu Shihao Chu Yu Dong Dept. ZhongYuan University of Technology Key Laboratory of Mathematical Engineering and Advanced Computing Zhengzhou China Dept. ZhongYuan University of Technology Henan Key Laboratory on Public Opinion Intelligent Analysis Zhengzhou China Dept. ZhongYuan University of Technology Zhengzhou China Dept. ZhongYuan University of Technology
With the advancement of information technology, the rapid increase in software systems has led to a growing demand for research on vulnerability detection. In recent years, the fast-paced development of deep learning ... 详细信息
来源: 评论
25th Annual Computational Neuroscience Meeting CNS-2016, Seogwipo City, South Korea, July 2-7, 2016 Abstracts
收藏 引用
BMC NEUROSCIENCE 2016年 第1期17卷 1-112页
作者: [Anonymous] Computational Neurobiology Laboratory The Salk Institute for Biological Studies San Diego USA UNIC CNRS Gif sur Yvette France The European Institute for Theoretical Neuroscience (EITN) Paris France ATR Computational Neuroscience Laboratories Kyoto Japan Krembil Research Institute University Health Network Toronto Canada Department of Physiology University of Toronto Toronto Canada Department of Medicine (Neurology) University of Toronto Toronto Canada Department of Physics University of New Hampshire Durham USA Department of Neurophysiology Nencki Institute of Experimental Biology Warsaw Poland Department of Theory Wigner Research Centre for Physics of the Hungarian Academy of Sciences Budapest Hungary Department of Mathematical Sciences KAIST Daejoen Republic of Korea Department of Mathematics University of Houston Houston USA Department of Biochemistry & Cell Biology and Institute of Biosciences and Bioengineering Rice University Houston USA Department of Biology and Biochemistry University of Houston Houston USA Grupo de Neurocomputación Biológica Dpto. de Ingeniería Informática Escuela Politécnica Superior Universidad Autónoma de Madrid Madrid Spain Department of Biological Sciences University of Southern California Los Angeles USA Center for Neuroscience Korea Institute of Science and Technology Seoul South Korea Department of Neurology Albert Einstein College of Medicine Bronx USA Center for Neuroscience KIST Seoul South Korea Department of Neuroscience University of Science and Technology Daejon South Korea Systems Neuroscience Group QIMR Berghofer Medical Research Institute Herston Australia Department of Psychology Yonsei University Seoul South Korea Department of Psychiatry Kyung Hee University Hospital at Gangdong Seoul South Korea Department of Psychiatry Veterans Administration Boston Healthcare System and Harvard Medical School Brockton USA Department of Electrical and Electronic Engineering The University of Melbourne Parkvil
A1 Functional advantages of cell-type heterogeneity in neural circuits Tatyana O. Sharpee A2 Mesoscopic modeling of propagating waves in visual cortex Alain Destexhe A3 Dynamics and biomarkers of mental disorders Mits...
来源: 评论