兰州大学机构库

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT 期刊论文
Future Generation Computer Systems-The International Journal of eScience, 2023, 卷号: 148, 页码: 201-210
Authors:  Ye, Guodong;  Liu, X(刘忻);  Fan, Siqi;  Tan, Yuan;  Zhou, QG(周庆国);  Zhou, R(周睿);  Zhou, Xiaokang
Favorite  |    Submit date:2023/09/04
Embeddings  Graph neural networks  Internet of things  Binary code similarity  Code reuse  Code similarities  Detection approach  Heterogeneous graph  Security issues  Supply chain vulnerability  Third parties  Traditional devices  Vulnerability detection  
Monocarbonyl curcumin analog A2 potently inhibits angiogenesis by inducing ROS-dependent endothelial cell death 期刊论文
ACTA PHARMACOLOGICA SINICA, 2019, 卷号: 40, 期号: 11, 页码: 1412-1423
Authors:  Liu Bin;  Cui Liusu;  Zhou, B(周波);  Zhang Lingling;  Liu Zhihui;  Zhang Lu
Adobe PDF(4485Kb)  |  Favorite  |    Submit date:2020/08/06
monocarbonyl curcumin analog  angiogenesis  apoptosis  autophagy  necroptosis  reactive oxygen species  vascular endothelial cell  bafilomycin A1  wortmannin  
Code classification with graph neural networks: Have you ever struggled to make it work? 期刊论文
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 卷号: 233
Authors:  Yu, Qingchen;  Liu, X(刘忻);  Zhou, QG(周庆国);  Zhuge, Jianwei;  Wu, Chunming
Favorite  |    Submit date:2023/09/04
Codes (symbols)  Deep learning  Message passing  Network coding  Network security  Classification tasks  Code classification  Deep learning  Graph neural networks  Message-passing  Model learning  Network-based  Problem formulation  Software vulnerabilities  Vulnerability detection  
NTP DRDoS attack vulnerability and mitigation 会议论文
Applied Mechanics and Materials, Guilin, China, June 22, 2014 - June 23, 2014
Authors:  Alfraih Abdulaziz Nasser, A.;  Chen, Wen Bo
Favorite  |    Submit date:2017/01/18
Network security  Computer operating systems  Denial-of-service attack  Machine tools  Network protocols  Personal computers  Servers  Transmission control protocol  Amplification factors  Computer device  Denial of Service  Distributed networks  Linux servers  Network time protocol  Set time  
网络安全综合评价方法的研究及应用 学位论文
博士, 兰州: 兰州大学, 2005
Authors:  申健
Favorite  |    Submit date:2019/01/18
网络安全  安全评价  德尔菲法  层次分析法  
Vulnerability of a coupled natural and human system in a changing environment: dynamics of Lanzhou's urban landscape 期刊论文
LANDSCAPE ECOLOGY, 2014, 卷号: 29, 期号: 10, 页码: 1709-1723
Authors:  Fan, PL;  Xie, YW;  Qi, JG;  Chen, JQ;  Huang, HQ;  Fan, PL (reprint author), Michigan State Univ, Sch Planning Design & Construct, E Lansing, MI 48824 USA.
Adobe PDF(990Kb)  |  Favorite  |    Submit date:2015/12/18
Lanzhou  Urban sustainability  History  Urban sprawl  Vulnerability  
Long-Term Growth of Alfalfa Increased Soil Organic Matter Accumulation and Nutrient Mineralization in a Semi-Arid Environment 期刊论文
FRONTIERS IN ENVIRONMENTAL SCIENCE, 2021, 卷号: 9
Authors:  Song, Xin;  Fang, Chao;  Yuan, Zi-Qiang;  Li, Feng-Min
Adobe PDF(3817Kb)  |  Favorite  |    Submit date:2021/06/17
legumesMedicago sativa Lland use changeplant nutrientsroot biomasssoil properties  
An Efficient Smart Contract Vulnerability Detector Based on Semantic Contract Graphs Using Approximate Graph Matching 期刊论文
IEEE Internet of Things Journal, 2023, 卷号: PP, 期号: 99, 页码: 1-1
Authors:  Zhang, Yingli;  Ma, Jiali;  Liu, X(刘忻);  Ye, Guodong;  Jin, Qun;  Ma, Jianhua;  Zhou, QG(周庆国)
Favorite  |    Submit date:2023/09/04
Approximation algorithms  Blockchain  Extraction  Internet of things  Libraries  Semantic Web  Semantics  Approximate graph matching  Block-chain  Security  Security and privacy  Semantic contract graph  Smart blockchain  Source-coding  Vulnerability  Vulnerability detection  Smart Blockchain  Smart Contracts  Semantic Contract Graph  Approximate Graph Matching