CORC

浏览/检索结果: 共57条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
A Tutorial on Federated Learning from Theory to Practice: Foundations, Software Frameworks, Exemplary Use Cases, and Selected Trends 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 824-850
作者:  M. Victoria Luzón;  Nuria Rodríguez-Barroso;  Alberto Argente-Garrido;  Daniel Jiménez-López;  Jose M. Moyano
收藏  |  浏览/下载:2/0  |  提交时间:2024/03/18
IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 卷号: 35, 期号: 2, 页码: 418-432
作者:  Zhao, Yang-Yang;  Chen, Ming-Yu;  Liu, Yu-Hang;  Yang, Zong-Hao;  Zhu, Xiao-Jing
收藏  |  浏览/下载:7/0  |  提交时间:2020/12/10
The research and application of trusted startup of embedded TPM 会议论文
Shenyang, China, July 27-29, 2020
作者:  Shang WL(尚文利);  Zhang, Xiule;  Chen, Xin;  Liu XD(刘贤达);  Chen CY(陈春雨)
收藏  |  浏览/下载:7/0  |  提交时间:2020/10/10
Malicious code detection based on CNNs and multi-objective algorithm 期刊论文
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 卷号: 129, 页码: 50-58
作者:  Cui, Zhihua;  Du, Lei;  Wang, Penghong;  Cai, Xingjuan;  Zhang, Wensheng
收藏  |  浏览/下载:59/0  |  提交时间:2019/07/11
Research on Malicious Code Evolution and Traceability Technology 期刊论文
Ruan Jian Xue Bao/Journal of Software, 2019, 卷号: 30, 期号: 8
作者:  Song, Wen-Na;  Peng, Guo-Jun;  Fu, Jian-Ming;  Zhang, Huan-Guo;  Chen, Shi-Lü
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
Droidward: an effective dynamic analysis method for vetting android applications 期刊论文
Cluster computing-the journal of networks software tools and applications, 2018, 卷号: 21, 期号: 1, 页码: 265-275
作者:  Yang, Yubin;  Wei, Zongtao;  Xu, Yong;  He, Haiwu;  Wang, Wei
收藏  |  浏览/下载:58/0  |  提交时间:2019/05/09
Research on Malicious JavaScript Detection Technology Based on LSTM 期刊论文
IEEE ACCESS, 2018, 卷号: Vol.6, 页码: 59118-59125
作者:  Fang, Yong;  Huang, Cheng;  Liu, Liang;  Xue, Min
收藏  |  浏览/下载:4/0  |  提交时间:2019/02/25
Detection technology of malicious code based on semantic 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 卷号: 76, 期号: 19
作者:  Lu, Qingmei;  Wang, Yulin
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:10/0  |  提交时间:2019/12/13
基于纹理指纹的恶意代码变种检测方法研究 期刊论文
2016, 2016
韩晓光; 曲武; 姚宣霞; 郭长友; 周芳; HAN Xiao-guang; QU Wu; YAO Xuan-xia; GUO Chang-you; ZHOU Fang
收藏  |  浏览/下载:8/0


©版权所有 ©2017 CSpace - Powered by CSpace