作者:
Xiaodu Yang1,2;
出处: Computer Networks 2024 Vol.238 P110120
摘要: Cobalt Strike is the most prevalent attack tool abused by cyber-criminals to achieve command and control on victim hosts over HTTPS traffics. It appea ...
作者: Tiezheng GUO1;Zhiwei ZHANG1;Ye YUAN1;Xiaochun YANG2;Guoren WANG1; (1. School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100029, China 2. School of Computer Science and Engineering, Northeastern University, Shenyang 110167, China cszwzhang@outlook.com)
出处: Frontiers of Computer Science 2024 Vol.18 No.3 P183104
关键词: data sharing;blockchain;concurrency control protocol;crosschain
摘要: With the development of information technology and cloud computing, data sharing has become an important part of scientific research. In traditional d ...
作者: Abdulkadhim, Fahad Ghalib1, 2; Yi, Zhang1; Tang, Chengkai1; Onaizah, Ameer N.3; Ahmed, Basheer1 (1Northwestern Polytechnical University, Shaanxi, Xian; 710072, China;2Department of Computer Science, University of Kufa, Najaf; 54003, Iraq;3School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China)
出处: Applied Nanoscience (Switzerland) 2024
作者: Ma,Zhichao1;Li,Kan1; (1School of Computer Science & Technology, Beijing Institute of Technology, Beijing, 100081, China)
出处: Mathematics 2024 Vol.12 No.1
摘要: Transformer-based models for action segmentation have achieved high frame-wise accuracy against challenging benchmarks. However, they rely on multiple ...
作者: Lei,Tianwei1;Xue,Jingfeng1;Wang,Yong1;Baker,Thar2;Niu,Zequn13; (1School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China;2School of Architecture, Technology and Engineering, University of Brighton, Brighton BN2 4GJ, United Kingdom;3The Open University of China, Beijing, 100039, China)
出处: Journal of King Saud University - Computer and Information Sciences 2024 Vol.36 No.1
摘要: With the proliferation of malware on IoT devices, research on IoT malicious code has also become more mature. Most studies use learning models to dete ...
作者: Sun,Yongjiao1;Li,Boyang245;Bi,Xin3;Feng,Qiang1; (1School of Computer Science and Engineering, Northeastern University, Shenyang, 110819, China;2School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China;3Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines, Northeastern University, Shenyang, 110819, China;4Tangshan Research Institute, BIT, Tangshan, 063000, China;5Hebei Province Key Laboratory of Big Data Science and Intelligent Technology, Tangshan, 063000, China)
出处: Expert Systems with Applications 2024 Vol.243
摘要: Data have become a valuable digital resource. It has in turn precipitated the emergence of big data marketplaces. For social network date in the marke ...
作者: Sun,Yongjiao1;Li,Boyang256;Yang,Kai1;Bi,Xin3;Zhao,Xiangning4; (1School of Computer Science and Engineering, Northeastern University, Shenyang, 110819, China;2School of Computer Science and Technology, Beijing Institute of Technology, Beijing, 100081, China;3Key Laboratory of Ministry of Education on Safe Mining of Deep Metal Mines, Northeastern University, Shenyang, 110819, China;4TianGong University, Tianjin, 300387, China;5Tangshan Research Institute, BIT, Tangshan, 063000, China;6Hebei Province Key Laboratory of Big Data Science and Intelligent Technology, Tangshan, 063000, China)
出处: Expert Systems with Applications 2024 Vol.245
摘要: In recent years, the burgeoning data market has witnessed a surge in data exchange, playing a pivotal role in augmenting the predictive and decision-m ...
作者: Liu,Weihua12;Lin,Chaochao3;Chen,Duanduan1;Niu,Lijuan4;Zhang,Rui4;Pi,Zhaoqiong5; (1School of Medical Technology, Beijing Institute of Technology, 5 Zhongguancun South Street, Haidian, Beijing, 100081, China;2AthenaEyesCO., LTD., Building 14, No. 39 Jianshan Road, Changsha, Hunan, 410205, China;3School of Computer Science and Technology, Beijing Institute of Technology, 5 Zhongguancun South Street, Haidian, Beijing, 100081, China;4Department of Ultrasound, National Cancer Center/National Clinical Research Center for Cancer/Cancer Hospital, Chinese Academy of Medical Sciences, Peking Union Medical College, No. 17 Nanli, Panjiayuan, Chaoyang, Beijing, 100021, China;5Xiangya School of Medicine, Central South University, No. 172, Tongzipo Road, Changsha, Hunan, 410083, China)
出处: Computer Methods and Programs in Biomedicine 2024 Vol.244
摘要: Background and Objective: Thyroid nodule segmentation is a crucial step in the diagnostic procedure of physicians and computer-aided diagnosis systems ...
作者: 董昊1;,赵恒泰2;,王子尧2;,袁野1;,张奥千1; (1北京理工大学计算机学院;2东北大学计算机科学与工程学院)
出处: 计算机科学 2024 第51卷 第1期 P124-132
关键词: 区块链;实用拜占庭容错;事务并发;多版本时间戳排序;Tendermint
摘要: 现有的许可链系统大多采取串行的事务执行方式,无法利用多核处理器的性能优势。在共识算法性能较高的许可链中,这种串行的事务执行方法将会成为性能瓶颈。为降低排序-执行-验证架构的许可链中事务执行的时间开销,文中提出了两种事务并发模型。首先,提出了基于地址表的并行执行模型,通过静态分析的方法将事务的读写集映 ...
作者: 马祥天1;,王立志1;,黄华2; (1北京理工大学计算机学院;2北京师范大学人工智能学院)
出处: 计算机学报 2024 第47卷 第1期 P190-212
关键词: 快照光谱成像;编码孔径;图像重构;优化模型;深度学习
摘要: 光谱图像含有丰富的空间和光谱信息,能够反映目标的组成、结构和材料特性,在航天遥感、医疗诊断和机器视觉等领域具有重要的应用价值.近年来,光谱成像技术作为热点研究领域受到广泛关注.传统光谱成像技术采用沿空间维度或光谱维度扫描的方式,依次获取待测物体表面的光谱信息.由于曝光时间较长,传统光谱成像技术不适用 ...