Zobrazeno 1 - 10
of 38
pro vyhledávání: '"Yuanping Nie"'
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 8788 (2023)
To address the issue of insufficient testing caused by the continuous reduction of software development cycles, many organizations maintain bug repositories and bug tracking systems to ensure real-time updates of bugs. However, each day, a large numb
Externí odkaz:
https://doaj.org/article/5af20651ff754e389e2c52278e39fa71
Publikováno v:
IEEE Access, Vol 8, Pp 50843-50858 (2020)
Dual-source jamming is an effective way to prevent monopulse radar systems from performing accurate angle measurements. In this investigation, based on noncoherent dual-source jamming, we propose a cooperative deception approach, which has the benefi
Externí odkaz:
https://doaj.org/article/969c2febc352448ca3eaf0da190cb14c
Publikováno v:
Remote Sensing, Vol 14, Iss 3, p 491 (2022)
An elliptical Hough transform (EHT) algorithm is proposed in the framework of track-before-detect (TBD) for joint detection and tracking of weak exoatmospheric targets. The new approach exploits the fact that when restricted to a two-body problem, th
Externí odkaz:
https://doaj.org/article/a3c350f1d59a4bfbb41c301677a1b892
Autor:
Zhi Wang, Leshi Shao, Kai Cheng, Yuanzhao Liu, Jianan Jiang, Yuanping Nie, Xiang Li, Xiaohui Kuang
Publikováno v:
International Journal of Intelligent Systems. 37:7180-7199
Autor:
Taotao Gu, Xiang Li, Shuaibing Lu, Jianwen Tian, Yuanping Nie, Xiaohui Kuang, Zhechao Lin, Chenyifan Liu, Jie Liang, Yu Jiang
Publikováno v:
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.
Publikováno v:
2022 7th IEEE International Conference on Data Science in Cyberspace (DSC).
Publikováno v:
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence.
Deep neural networks have been demonstrated to be vulnerable to adversarial examples, which fool networks by adding human-imperceptible perturbations to benign examples. At present, the practical transfer-based black-box attacks are attracting signif
Publikováno v:
2022 7th IEEE International Conference on Data Science in Cyberspace (DSC).
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2020 (2020)
For malware detection, current state-of-the-art research concentrates on machine learning techniques. Binaryn-gram OpCode features are commonly used for malicious code identification and classification with high accuracy. Binary OpCode modification i
Publikováno v:
IEEE Access, Vol 8, Pp 50843-50858 (2020)
Dual-source jamming is an effective way to prevent monopulse radar systems from performing accurate angle measurements. In this investigation, based on noncoherent dual-source jamming, we propose a cooperative deception approach, which has the benefi