中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [12]
计算技术研究所 [2]
长春光学精密机械与物... [2]
中国科学院大学 [1]
自动化研究所 [1]
新疆天文台 [1]
更多
采集方式
OAI收割 [18]
iSwitch采集 [1]
内容类型
会议论文 [11]
期刊论文 [8]
发表日期
2024 [1]
2023 [1]
2013 [1]
2012 [3]
2011 [2]
2010 [3]
更多
学科主题
Computer S... [1]
Computer S... [1]
筛选
浏览/检索结果:
共19条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
提交时间升序
提交时间降序
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
  |  
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Dynamic Heterogeneous Redundancy-Based Joint Safety and Security for Connected Automated Vehicles: Preliminary Simulation and Field Test Results
期刊论文
OAI收割
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2023, 页码: 9
作者:
Li, Yufeng
;
Liu, Qi
;
Zhuang, Weihua
;
Zhou, Yiqing
;
Cao, Chenhong
  |  
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2023/12/04
Safety
Security
Computer crime
Software
Termination of employment
Standards
Consensus protocol
基于通用知识的软件设计安全性评估
期刊论文
OAI收割
计算机系统应用, 2013, 期号: 11, 页码: 1-6,80
戚荣波
;
杜晶
;
杨叶
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2014/12/16
软件安全性
通用知识
攻击模式
软件安全性评估
UML顺序图
software security
common knowledge
attack pattern
software security evaluation
UML sequence diagram
enhance value by building trustworthy software-reliant system of systems from software product lines
会议论文
OAI收割
2012 3rd International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2012, Zurich, Switzerland, June 4, 2012 - June 4, 2012
Li Dong
;
Yang Ye
  |  
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2013/09/22
Network security
Software engineering
virtual machine replay update: improved implementation for modern hardware architecture
会议论文
OAI收割
2012 IEEE 6th International Conference on Software Security and Reliability Companion, SERE-C 2012, Gaithersburg, MD, United states, June 20, 2012 - June 22, 2012
Yu Jiageng
;
Zhou Peng
;
Wu Yanjun
;
Zhao Chen
  |  
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2013/09/22
C (programming language)
Hardware
Microprocessor chips
Security of data
Software reliability
一种基于分组自适应的网络环境快速构建方法
期刊论文
OAI收割
中国科学院研究生院学报, 2012, 卷号: 29, 期号: 4, 页码: 536-542
王佳宾
;
连一峰
;
陈恺
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2012/11/12
security evaluating
network environment
common software
adaptive grouping
Software design for automatic changing feeds control system and video surveillance
会议论文
OAI收割
Beijing, China, July 15, 2011 - July 17, 2011
作者:
Li, Yongjiang
;
Yusup, Aili
;
Sun, Zengwu
;
Guo, Shaoguang
  |  
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/07/02
Software design
Automation
Control
Control theory
Security systems
Telescopes
The effectiveness of real-time embedded software testing (EI CONFERENCE)
会议论文
OAI收割
2011 9th International Conference on Reliability, Maintainability and Safety: Safety First, Reliability Primary, ICRMS'2011, June 12, 2011 - June 15, 2011, Guiyang, China
Zhang B.
;
Shen X.
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2013/03/25
Real-time embedded software is widely applied in the fields with high reliability and security like aviation and space flight etc. In those systems
software quality is of vital importance
and software testing
as a means of guaranteeing the quality of software
is gaining increasingly more attention. The effectiveness of software testing enables people to gain confidence in software correctness. The real-time and embedding features of embedded software lead to the particularity in real-time embedded software testing. On the basis of particularity analysis of embedded software testing
the author of this thesis further conducted research on the effective Software Testing
and proved that it is valid to adopt testing techniques and strategies through experiments. 2011 IEEE.
Research of programming about the level flight of aircraft (EI CONFERENCE)
会议论文
OAI收割
2010 3rd International Conference on Advanced Computer Theory and Engineering, ICACTE 2010, August 20, 2010 - August 22, 2010, Chengdu, China
作者:
Lijiang
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2013/03/25
In order to carries on the plan and the control to aircraft level flight
then obtain that the factors control the level route are the route position and the radius of turn
finally carries on the software simulation using this algorithm
the attitude and the route has been analyzed. First obtain that the factors control the level attitude are the roll angle and the yaw angle
and infers the algorithm of flight route
according to the attitude and the route restraint
and infers the computation algorithm of attitude
produce shortest aircraft level flight road map which through the giving route position on the software surface. According to this algorithm
it may control and plan the aircraft level flight
through to limit of the aircraft security attitude and the route position. 2010 IEEE.
model checking a secure hypervisor
会议论文
OAI收割
Wuhan
Sunlv Wang
;
Jian Liu
;
Qiuping Yi
;
Xian Zhang
  |  
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2011/03/31
CAS monitor
Spin PROMELA language
model checking
platform-virtualization software
secure hypervisor
formal verification
operating systems (computers)
security of data
virtual machines