-
9061
Model of runtime memory leak detection based on the virtual machine introspection
Published 2013-08-01“…Tongxin xuebao…”
Get full text
Article -
9062
-
9063
Detecting malicious domain names based on AGD
Published 2018-07-01“…Tongxin xuebao…”
Get full text
Article -
9064
-
9065
Surface sliding mode controller for chaotic oscillation in power system with power disturbance
Published 2019-01-01“…Tongxin xuebao…”
Get full text
Article -
9066
-
9067
Application of artificial intelligence technology in the field of security vulnerability
Published 2018-08-01“…Tongxin xuebao…”
Get full text
Article -
9068
-
9069
Lost-minimum post-training parameter quantization method for convolutional neural network
Published 2022-04-01“…Tongxin xuebao…”
Get full text
Article -
9070
Influence diffusion model based on affinity of dynamic social network
Published 2016-10-01“…Tongxin xuebao…”
Get full text
Article -
9071
Influence maximization algorithm based on social network
Published 2022-08-01“…Tongxin xuebao…”
Get full text
Article -
9072
-
9073
-
9074
-
9075
Single channel multicomponents separating
Published 2006-01-01“…Tongxin xuebao…”
Get full text
Article -
9076
Design of a subnonsecond Gauusisan pulse generator based on the RF transistor
Published 2005-01-01“…Tongxin xuebao…”
Get full text
Article -
9077
Survey on the causal consistency of data
Published 2020-03-01“…Tongxin xuebao…”
Get full text
Article -
9078
Ciphertext policy attribute-based encryption scheme supporting direct revocation
Published 2016-05-01“…Tongxin xuebao…”
Get full text
Article -
9079
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
9080
Semidefinite relaxation detector for higher-order modulated multiple-antenna systems
Published 2007-01-01“…Tongxin xuebao…”
Get full text
Article