Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Xiaoxiao Pei"'
Publikováno v:
Ceramics International. 48:18270-18277
Autor:
Zibin Huang, Yixin Wan, Tingting Wang, Junli Wang, YingFen Li, Huimin Wang, Xiaoxiao Pei, Dehui Leng
Publikováno v:
Inorganic Chemistry. 60:17258-17267
Plasmonics, especially the localized surface plasmon resonance (LSPR) in non-noble metal bismuth nanoparticles (Bi NPs), and its spectral features and applications have stimulated increasing research interest in recent years. However, the lack of mat
Publikováno v:
Biochemical Systematics and Ecology. 108:104646
Publikováno v:
Inorganic Chemistry Communications. 151:110579
Publikováno v:
Bioorganic Chemistry. 132:106351
Autor:
Lei, Xuan, Jianfeng, Hua, Fan, Zhang, Zhiquan, Wang, Xiaoxiao, Pei, Ying, Yang, Yunlong, Yin, David L, Creech
Publikováno v:
Genes
The Taxodium hybrid ‘Zhongshanshan 406’ (T. hybrid ‘Zhongshanshan 406’) [Taxodium mucronatum Tenore × Taxodium distichum (L.). Rich] has an outstanding advantage in flooding tolerance and thus has been widely used in wetland afforestation in
Publikováno v:
IEEE Transactions on Reliability. 67:1199-1218
As one of the most popular software testing techniques, fuzzing can find a variety of weaknesses in a program, such as software bugs and vulnerabilities, by generating numerous test inputs. Due to its effectiveness, fuzzing is regarded as a valuable
Publikováno v:
Computers & Security. 65:329-343
Centralized management is typically applied in modern operating system (OS) architecture; however, such systems are prone to crash when any certain component of the OS is explicitly damaged. The basic reason is that these OSes can rarely support a th
Autor:
Dehui Leng, Tingting Wang, YingFen Li, Zibin Huang, Huimin Wang, Yixin Wan, Xiaoxiao Pei, Junli Wang
Publikováno v:
Inorganic Chemistry; 11/15/2021, Vol. 60 Issue 22, p17258-17267, 10p
Publikováno v:
CSCloud
Fuzzing is attractive for finding vulnerabilities in binary programs. However, when the application's input space is huge, fuzzing cannot deal with it well. For discovering vulnerabilities more effective, researchers came up concolic testing, and the