×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
江苏大学 [4]
上海大学 [2]
复旦大学上海医学院 [1]
内容类型
会议论文 [6]
期刊论文 [1]
发表日期
2018 [2]
2017 [4]
2013 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A cascade framework for masked face detection
会议论文
8th IEEE International Conference on Cybernetics and Intelligent Systems, CIS 2017 and IEEE Conference on Robotics, Automation and Mechatronics, RAM 2017, 2017-11-19
作者:
Bu, Wei[1]
;
Xiao, Jiangjian[2]
;
Zhou, Chuanhong[3]
;
Yang, Minmin[4]
;
Peng, Chengbin[5]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/22
An Integration Testing Framework and Evaluation Metric for Vulnerability Mining Methods
期刊论文
CHINA COMMUNICATIONS, 2018, 卷号: 15, 期号: 2,SI, 页码: 190-208
作者:
Li, Jin[1]
;
Chen, Jinfu[2]
;
Huang, Minhuan[3]
;
Zhou, Minmin[4]
;
Xie, Wanggen[5]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/24
software vulnerability detection
loopholes
information security
evaluation method
testing framework
A Cascade Framework for Masked Face Detection
会议论文
2017 IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (CIS) AND IEEE CONFERENCE ON ROBOTICS, AUTOMATION AND MECHATRONICS (RAM), 2017-01-01
作者:
Bu, Wei[1]
;
Xiao, Jiangjian[2]
;
Zhou, Chuanhong[3]
;
Yang, Minmin[4]
;
Peng, Chengbin[5]
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/04/24
A New Method to Construct the Software Vulnerability Model
会议论文
2017 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND APPLICATIONS (ICCIA), 2017-01-01
作者:
Li, Xiang[1]
;
Chen, Jinfu[2]
;
Lin, Zhechao[3]
;
Zhang, Lin[4]
;
Wang, Zibin[5]
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/24
computer security
vulnerability
vulnerability analysis
vulnerability model
chemical abstract machine
An Integration Testing Platform for Software Vulnerability Detection Method
会议论文
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017-01-01
作者:
Li, Jin[1]
;
Chen, Jinfu[2]
;
Huang, Minhuan[3]
;
Zhou, Minmin[4]
;
Zhang, Lin[5]
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/24
Software vulnerability detection
Loopholes
Information security
Evaluation method
Test platform
A Mining Approach to Obtain the Software Vulnerability Characteristics
会议论文
2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017-01-01
作者:
Li, Xiang[1]
;
Chen, Jinfu[2]
;
Lin, Zhechao[3]
;
Zhang, Lin[4]
;
Wang, Zibin[5]
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/24
Information security
Data mining
Extraction algorithm
Essential characteristics
Software vulnerability
The effects of different types of music on electroencephalogram
会议论文
作者:
Sun, Chenbing/56048611900[0]
;
Bao, Yimin/55085077900[1]
;
Xu, Jiatuo/8365989100[2]
;
Kong, Deqi/56047950200[3]
;
Zhou, Hong/56048061800[4]
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/19
electroencephalogram (EEG)
music therapy
music type
©版权所有 ©2017 CSpace - Powered by
CSpace