咨询与建议

限定检索结果

文献类型

  • 152 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 153 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 78 篇 工学
    • 26 篇 计算机科学与技术...
    • 18 篇 软件工程
    • 15 篇 网络空间安全
    • 11 篇 控制科学与工程
    • 10 篇 航空宇航科学与技...
    • 9 篇 机械工程
    • 8 篇 仪器科学与技术
    • 4 篇 交通运输工程
    • 4 篇 食品科学与工程(可...
    • 3 篇 材料科学与工程(可...
    • 3 篇 土木工程
    • 3 篇 农业工程
    • 2 篇 化学工程与技术
    • 2 篇 地质资源与地质工...
    • 2 篇 环境科学与工程(可...
  • 47 篇 医学
    • 25 篇 临床医学
    • 9 篇 中西医结合
    • 7 篇 中药学(可授医学、...
    • 5 篇 公共卫生与预防医...
    • 4 篇 基础医学(可授医学...
    • 3 篇 药学(可授医学、理...
    • 2 篇 口腔医学
  • 13 篇 理学
    • 3 篇 生物学
    • 3 篇 生态学
  • 12 篇 农学
    • 8 篇 农业资源与环境
    • 2 篇 作物学
  • 12 篇 管理学
    • 11 篇 管理科学与工程(可...
  • 10 篇 哲学
    • 10 篇 哲学
  • 3 篇 教育学
    • 3 篇 教育学
  • 2 篇 经济学
    • 1 篇 理论经济学
  • 1 篇 文学
  • 1 篇 军事学

主题

  • 5 篇 大鼠
  • 5 篇 糖尿病
  • 4 篇 丝胶
  • 4 篇 朱子
  • 4 篇 神经肽y
  • 4 篇 《大学》
  • 3 篇 neural regenerat...
  • 3 篇 小孔节流
  • 3 篇 应用
  • 3 篇 耐药基因
  • 3 篇 液体动静压球轴承
  • 3 篇 神经元
  • 3 篇 hippocampus
  • 3 篇 土地评价
  • 2 篇 心力衰竭
  • 2 篇 凋亡
  • 2 篇 抗性
  • 2 篇 变弯度机翼
  • 2 篇 角振动台
  • 2 篇 坐骨神经

机构

  • 16 篇 承德医学院
  • 11 篇 中国海洋大学
  • 11 篇 北京理工大学
  • 10 篇 陕西师范大学
  • 8 篇 华南农业大学
  • 8 篇 中国航空研究院
  • 6 篇 school of comput...
  • 5 篇 中航工业北京长城...
  • 5 篇 南京航空航天大学
  • 4 篇 军事医学科学院卫...
  • 3 篇 上海理工大学
  • 3 篇 承德市中心医院
  • 3 篇 北京航空航天大学
  • 3 篇 军事科学院军事医...
  • 2 篇 东南大学
  • 2 篇 department of hu...
  • 2 篇 中国飞机强度研究...
  • 2 篇 新疆医科大学第一...
  • 2 篇 中国医学科学院
  • 2 篇 复旦大学附属中山...

作者

  • 15 篇 薛景凤
  • 14 篇 薛景锋
  • 12 篇 王静凤
  • 12 篇 jingfeng xue
  • 10 篇 薛长湖
  • 10 篇 李敬峰
  • 9 篇 王景峰
  • 9 篇 薛静锋
  • 8 篇 薛斌
  • 7 篇 付秀美
  • 7 篇 王文娟
  • 7 篇 薛月菊
  • 6 篇 xue jingfeng
  • 6 篇 杨敬锋
  • 5 篇 changzhen hu
  • 5 篇 张梦杰
  • 5 篇 陈志宏
  • 5 篇 王玉明
  • 5 篇 赵小林
  • 5 篇 付文亮

语言

  • 135 篇 中文
  • 18 篇 英文
检索条件"作者=Jingfeng Xue"
153 条 记 录,以下是1-10 订阅
排序:
A CMA-ES-Based Adversarial Attack Against Black-Box Object Detectors
收藏 引用
Chinese Journal of Electronics 2021年 第3期30卷 406-412页
作者: LYU Haoran TAN Yu'an xue Yuan WANG Yajie xue jingfeng School of Computer Science and Technology Beijing Institute of Technology Academy of Military Science
Object detection is one of the essential tasks of computer vision. Object detectors based on the deep neural network have been used more and more widely in safe-sensitive applications, like face recognition, video sur... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Fast Cross-Platform Binary Code Similarity Detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 128-138页
作者: Jinxue PENG Yong WANG jingfeng xue Zhenyan LIU School of Computer Science and Technology Beijing Institute of Technology
Cross-platform binary code similarity detection aims at detecting whether two or more pieces of binary code are similar or not. Existing approaches that combine control flow graphs(CFGs)-based function representation ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 同方期刊数据库 同方期刊数据库 评论
Semi-valid Fuzz Testing Case Generation for Stateful Network Protocol
收藏 引用
Tsinghua Science and Technology 2017年 第5期22卷 458-468页
作者: Rui Ma Shuaimin Ren Ke Ma Changzhen Hu jingfeng xue the Beiiing Key Laboratory of Software Security Engineering Technology School of SoftwareBeijing Institute of TechnologyBering 100081China the Internet Center Institute of Communication Standard Research.China Academy of Information and Communication TechnologyBering 100191China
Network protocols are divided into stateless and stateful. Stateful network protocols have complex communication interactions and state transitions. However, the existing network protocol fuzzing does not support stat... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Software System Evolution Analysis Method Based on Algebraic Topology
收藏 引用
Tsinghua Science and Technology 2018年 第5期23卷 599-609页
作者: Chun Shan Liyuan Liu jingfeng xue Changzhen Hu Hongjin Zhu School of Software Beijing Institute of Technology Beijing 100081 China
The analysis of software system evolution is highly significant in software research as the evolution runs throughout the lifecycle of a software system. Considering a software system as an algebraic engineering syste... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine
收藏 引用
Tsinghua Science and Technology 2016年 第3期21卷 352-360页
作者: Rui Ma Daguang Wang Changzhen Hu Wendong Ji jingfeng xue Beijing Key Laboratory of Software Security Engineering Technology School of Software Beijing Institute of Technology
To improve the efficiency and coverage of stateful network protocol fuzzing, this paper proposes a new method, using a rule-based state machine and a stateful rule tree to guide the generation of fuzz testing data. Th... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Design and validation of a variable camber wing structure
收藏 引用
Chinese Journal of Aeronautics 2024年 第2期37卷 1-11页
作者: Xiasheng SUN jingfeng xue Jin ZHOU Zhigang WANG Wenjuan WANG Mengjie ZHANG Chinese Aeronautical Establishment Beijing 100012China School of Aeronautic Science and Engineering Beihang UniversityBeijing 100191China Aircraft Strength Research Institute of China Xi’an 710065China Graduate School of Chinese Aeronautical Establishment Yangzhou 225002China
Variable camber wing technology is one of the important development trends of green aviation at *** smooth,seamless,continuous and adaptive change of wing camber,the aerodynamic performance is improved in achieving in... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
WCM-WTrA: A Cross-Project Defect Prediction Method Based on Feature Selection and Distance-Weight Transfer Learning
收藏 引用
Chinese Journal of Electronics 2022年 第2期31卷 354-366页
作者: LEI Tianwei xue jingfeng WANG Yong NIU Zequn SHI Zhiwei ZHANG Yu School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center School of Electrical and Information Engineering Beijing University of Civil Engineering and Architecture
Cross-project defect prediction is a hot topic in the field of defect prediction. How to reduce the difference between projects and make the model have better accuracy is the core problem. This paper starts from two p... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
A Practical Online Approach to Protecting Kernel Heap Buffers in Kernel Modules
收藏 引用
China Communications 2016年 第11期13卷 143-152页
作者: Donghai Tian Xiaoqi Jia Junhua Chen Changzhen Hu jingfeng xue Beijing Key Laboratory of Software Security Engineering Technique School of SoftwareBeijing Institute of Technology Shanghai Key Laboratory of Integrated Administration Technologies for Information Security Shanghai Jiao Tong University State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences & University of Chinese Academy of Sciences Key Laboratory of IOT Application Technology of Universities in Yunnan Province Yunnan Minzu University
Heap overflow attack is one of the major memory corruption attacks that have become prevalent for decades. To defeat this attack,many protection methods are proposed in recent years. However,most of these existing met... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Improved ID-Based Group Key Agreement Protocol
收藏 引用
Tsinghua Science and Technology 2014年 第5期19卷 421-428页
作者: Kangwen Hu jingfeng xue Changzhen Hu Rui Ma Zhiqiang Li School of Software Beijing Institute of Technology
ID-based constant-round group key agreement protocols are efficient in both computation and communication, but previous protocols did not provide valid message authentication. An improvement based on attack analysis i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
QARF: A Novel Malicious Traffic Detection Approach via Online Active Learning for Evolving Traffic Streams
收藏 引用
Chinese Journal of Electronics 2024年 第3期33卷 645-656页
作者: Zequn NIU jingfeng xue Yong WANG Tianwei LEI Weijie HAN Xianwei GAO School of Computer Science and Technology Beijing Institute of Technology School of Space Information Space Engineering University
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论