期刊文献+
共找到979篇文章
< 1 2 49 >
每页显示 20 50 100
Blind parameter estimation of pseudo-random binary code-linear frequency modulation signal based on Duffing oscillator at low SNR 被引量:1
1
作者 Ke Wang Xiaopeng Yan† +2 位作者 Ze Li Xinhong Hao Honghai Yu 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第5期312-319,共8页
Conventional parameter estimation methods for pseudo-random binary code-linear frequency modulation(PRBC-LFM)signals require prior knowledge,are computationally complex,and exhibit poor performance at low signal-to-no... Conventional parameter estimation methods for pseudo-random binary code-linear frequency modulation(PRBC-LFM)signals require prior knowledge,are computationally complex,and exhibit poor performance at low signal-to-noise ratios(SNRs).To overcome these problems,a blind parameter estimation method based on a Duffing oscillator array is proposed.A new relationship formula among the state of the Duffing oscillator,the pseudo-random sequence of the PRBC-LFM signal,and the frequency difference between the PRBC-LFM signal and the periodic driving force signal of the Duffing oscillator is derived,providing the theoretical basis for blind parameter estimation.Methods based on amplitude method,short-time Fourier transform method,and power spectrum entropy method are used to binarize the output of the Duffing oscillator array,and their performance is compared.The pseudo-random sequence is estimated using Duffing oscillator array synchronization,and the carrier frequency parameters are obtained by the relational expressions and characteristics of the difference frequency.Simulation results show that this blind estimation method overcomes limitations in prior knowledge and maintains good parameter estimation performance up to an SNR of-35 dB. 展开更多
关键词 Duffing oscillator pseudo-random binary code-linear frequency modulation(PRBC-LFM)signal blind parameter estimation low signal-to-noise ratio(SNR)
原文传递
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
2
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Binary Code Similarity Detection:Retrospective Review and Future Directions
3
作者 Shengjia Chang Baojiang Cui Shaocong Feng 《Computers, Materials & Continua》 2025年第12期4345-4374,共30页
Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation va... Binary Code Similarity Detection(BCSD)is vital for vulnerability discovery,malware detection,and software security,especially when source code is unavailable.Yet,it faces challenges from semantic loss,recompilation variations,and obfuscation.Recent advances in artificial intelligence—particularly natural language processing(NLP),graph representation learning(GRL),and large language models(LLMs)—have markedly improved accuracy,enabling better recognition of code variants and deeper semantic understanding.This paper presents a comprehensive review of 82 studies published between 1975 and 2025,systematically tracing the historical evolution of BCSD and analyzing the progressive incorporation of artificial intelligence(AI)techniques.Particular emphasis is placed on the role of LLMs,which have recently emerged as transformative tools in advancing semantic representation and enhancing detection performance.The review is organized around five central research questions:(1)the chronological development and milestones of BCSD;(2)the construction of AI-driven technical roadmaps that chart methodological transitions;(3)the design and implementation of general analytical workflows for binary code analysis;(4)the applicability,strengths,and limitations of LLMs in capturing semantic and structural features of binary code;and(5)the persistent challenges and promising directions for future investigation.By synthesizing insights across these dimensions,the study demonstrates how LLMs reshape the landscape of binary code analysis,offering unprecedented opportunities to improve accuracy,scalability,and adaptability in real-world scenarios.This review not only bridges a critical gap in the existing literature but also provides a forward-looking perspective,serving as a valuable reference for researchers and practitioners aiming to advance AI-powered BCSD methodologies and applications. 展开更多
关键词 binary code similarity detection semantic code representation graph-based modeling representation learning large language models
在线阅读 下载PDF
Statistical Recognition Method of Binary BCH Code 被引量:6
4
作者 Jiafeng Wang Yang Yue Jun Yao 《Communications and Network》 2011年第1期17-22,共6页
In this paper, a statistical recognition method of the binary BCH code is proposed. The method is applied to both primitive and non-primitive binary BCH code. The block length is first recognized based on the cyclic f... In this paper, a statistical recognition method of the binary BCH code is proposed. The method is applied to both primitive and non-primitive binary BCH code. The block length is first recognized based on the cyclic feature under the condition of the frame length known. And then candidate polynomials are achieved which meet the restrictions. Among the candidate polynomials, the most optimal polynomial is selected based on the minimum rule of the weights sum of the syndromes. Finally, the best polynomial was factorized to get the generator polynomial recognized. Simulation results show that the method has strong capability of anti-random bit error. Besides, the algorithm proposed is very simple, so it is very practical for hardware im-plementation. 展开更多
关键词 binary BCH code BLIND Recognition code Length GENERATOR POLYNOMIAL
在线阅读 下载PDF
Novel non-coherent integration method using binary phase-coded radar signal 被引量:2
5
作者 田黎育 何苗 +1 位作者 刘斌 傅雄军 《Journal of Beijing Institute of Technology》 EI CAS 2013年第1期60-66,共7页
The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m s... The m series with 511 bits is taken as an example being applied in non-coherent integra- tion algorithm. A method to choose the bi-phase code is presented, which is 15 kinds of codes are picked out of 511 kinds of m series to do non-coherent integration. It is indicated that the power in- creasing times of larger target sidelobe is less than the power increasing times of smaller target main- lobe because of the larger target' s pseudo-randomness. Smaller target is integrated from larger tar- get sidelobe, which strengthens the detection capability of radar for smaller targets. According to the sidelobes distributing characteristic, a method is presented in this paper to remove the estimated sidelobes mean value for signal detection after non-coherent integration. Simulation results present that the SNR of small target can be improved approximately 6. 5 dB by the proposed method. 展开更多
关键词 binary phase-coded signal non-coherent integration code agility peak sidelobe level(PSL) mainlobe-peak sidelobe ratio
在线阅读 下载PDF
Buffer Overflow Detection on Binary Code 被引量:2
6
作者 郑燕飞 李晖 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期224-229,共6页
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach. 展开更多
关键词 binary code buffer overflow integer range constraint feature abstract graph
在线阅读 下载PDF
Implementation of a kind of FPGA-based binary phase coded radar signal processor architecture 被引量:1
7
作者 田黎育 孙密 万阳良 《Journal of Beijing Institute of Technology》 EI CAS 2012年第4期526-531,共6页
A flexible field programmable gate array based radar signal processor is presented. The radar signal processor mainly consists of five functional modules: radar system timer, binary phase coded pulse compression(PC... A flexible field programmable gate array based radar signal processor is presented. The radar signal processor mainly consists of five functional modules: radar system timer, binary phase coded pulse compression(PC), moving target detection (MTD), constant false alarm rate (CFAR) and target dots processing. Preliminary target dots information is obtained in PC, MTD, and CFAR modules and Nios I! CPU is used for target dots combination and false sidelobe target removing. Sys- tem on programmable chip (SOPC) technique is adopted in the system in which SDRAM is used to cache data. Finally, a FPGA-based binary phase coded radar signal processor is realized and simula- tion result is given. 展开更多
关键词 field programmable gate array(FPGA) radar signal processor system on programma-ble chip (SOPC) binary phase coded
在线阅读 下载PDF
Research of Methods for Lost Data Reconstruction in Erasure Codes over Binary Fields 被引量:2
8
作者 Dan Tang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期43-48,共6页
In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of inform... In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future. 展开更多
关键词 binary fields data reconstruction decoding erasure codes
在线阅读 下载PDF
SIMULATED-ANNEALING-BASED SELECTION OF BINARY CODES
9
作者 李炳成 《Journal of Electronics(China)》 1991年第4期317-323,共7页
Binary code signals have been widely used in various radars due to their simpleimplementation,but the selection of the binary codes with high comporession ratio and lowsidelobes is not solved well,because of the diffi... Binary code signals have been widely used in various radars due to their simpleimplementation,but the selection of the binary codes with high comporession ratio and lowsidelobes is not solved well,because of the difficult processing in mathmatics and expensivecalculation cost.In this paper,neural computing is introduced into the field of the selection ofbinary codes and a new method based’on simulated annealing(SA)is proposed.The experimentsshow that the proposed method is able to select the optimal binary codes with much less timecost than the known methods,furhtermore the optimization selection of the binary codes versusthe calculation cost tradeoff is easier. 展开更多
关键词 binary codeS Selecting codeS SIDELOBES SIMULATED annealing(SA)
在线阅读 下载PDF
THE NEW METHOD OF GENERATION OF BINARY TREES FROM ZER0(0) AND ONE(1) CODES
10
作者 蔡恒 《Journal of China Textile University(English Edition)》 EI CAS 1995年第2期94-99,共6页
A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-no... A binary tree can be represented by a code reflecting the traversal of the corresponding regular binary tree in given monotonic order. A different coding scheme based on the branches of a regular binary tree with n-nodes is proposed. It differs from the coding scheme generally used and makes no distinction between internal nodes and terminal nodes. A code of a regular binary tree with nnodes is formed by labeling the left branches by O’s and the right branches by l’s and then traversing these branches in pre-order. Root is always assumed to be on a left branch. 展开更多
关键词 code TRAVERSAL MONOTONIC order binary TREE RECURSION backtrack approach algorithm design.
在线阅读 下载PDF
DECODING ALGORITHM BASED QN REVISED SYNDROME FOR THE BINARY (23,12,7) GOLAY CODE
11
作者 马建峰 王育民 《Journal of Electronics(China)》 1995年第1期33-37,共5页
A decoding algorithm based on revised syndromes to decode the binary (23,12,7) Golay code is presented. The algorithm strongly depends on the algebraic properties of the code. For the algorithm, the worst complexity i... A decoding algorithm based on revised syndromes to decode the binary (23,12,7) Golay code is presented. The algorithm strongly depends on the algebraic properties of the code. For the algorithm, the worst complexity is about 683 mod2 additions, which is less than that of the algorithms available for the code, the average complexity is approximately 319 mod2 additions, which is slightly more than that of Blaum’s algorithm for the code. 展开更多
关键词 binary GOLAY code Revised SYNDROME DECODING
在线阅读 下载PDF
Palmprint Recognition Based on Statistical Local Binary Orientation Code
12
作者 Mei-Ru Mu Qiu-Qi Ruan 《Journal of Electronic Science and Technology》 CAS 2010年第3期230-236,共7页
A novel coding based method named as local binary orientation code (LBOCode) for palmprint recognition is proposed. The palmprint image is firstly convolved with a bank of Gabor filters, and then the orientation inf... A novel coding based method named as local binary orientation code (LBOCode) for palmprint recognition is proposed. The palmprint image is firstly convolved with a bank of Gabor filters, and then the orientation information is attained with a winner-take-all rule. Subsequently, the resulting orientation mapping array is operated by uniform local binary pattern. Accordingly, LBOCode image is achieved which contains palmprint orientation information in pixel level. Further we divide the LBOCode image into several equal-size and nonoverlapping regions, and extract the statistical code histogram from each region independently, which builds a global description of palmprint in regional level. In matching stage, the matching score between two palmprints is achieved by calculating the two spatial enhanced histograms' dissimilarity, which brings the benefit of computational simplicity. Experimental results demonstrate that the proposed method achieves more promising recognition performance compared with that of several state-of-the-art methods. 展开更多
关键词 Gabor filter local binary pattern orientation code palmprint recognition.
在线阅读 下载PDF
Multi-Wavelength vs. Binary Code Pattern Unwrapping in Fringe Projection Method 被引量:1
13
作者 R. Talebi J. Johnson +1 位作者 A. Abdel-Dayem M. Saadatseresht 《通讯和计算机(中英文版)》 2014年第3期291-304,共14页
关键词 二进制代码 多波长 条纹 投射法 相位展开 码型 固相萃取 不连续性
在线阅读 下载PDF
Binary Cyclic Codes and Minimal Codewords
14
作者 Selda Calkavur 《Computer Technology and Application》 2013年第9期486-489,共4页
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal... Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes. 展开更多
关键词 Linear code cyclic code binary cyclic code generator polynomial minimal codeword secret sharing.
在线阅读 下载PDF
A Novel Decoding Method for Non-Binary TCM Codes
15
作者 Riyadh A. Al-Hilali Abdulkareem S. Abdallah Raad H. Thaher 《Communications and Network》 2014年第1期22-28,共7页
A new non-binary decoding method, which is called Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes which is based on the trellis diagram representing the ... A new non-binary decoding method, which is called Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes which is based on the trellis diagram representing the convolutional encoder. Yaletharatalhussein decoding algorithm outperforms the Viterbi algorithm and other algorithms in its simplicity, very small computational complexity, decoding reliability for high states TCM codes that suitable for Fourth-Generation (4G), decreasing errors with increasing word length, and easy to implement with real-time applications. The proposed Yaletharatalhussein decoding algorithm deals with non-binary error control coding of the convolutional and TCM codes. Convolutional codes differ from block codes in that a block code takes a fixed message length and encodes it, whereas a convolutional code can encode a continuous stream of data, and a hard-decision decoding can easily be realized using the Yaletharatalhussein algorithm. The idea of non-binary codes has been extended for symbols defined over rings of integers, which outperform binary codes with only a small increase in decoding complexity. The simulation results show that the performance of the nonbinary TCM-based Yaletharatalhussein algorithm outperforms the binary and non-binary decoding methods. 展开更多
关键词 Convolutional codeS coded MODULATION (CM) Trellis code MODULATION (TCM) Non-binary Error Correcting codeS Groups Rings of Integers
在线阅读 下载PDF
Bandwidth optimization of a Planar Inverted-F Antenna using binary and real coded genetic algorithms
16
作者 AMEERUDDEN Mohammad Riyad RUGHOOPUTH Harry C S 《重庆邮电大学学报(自然科学版)》 北大核心 2009年第2期276-283,共8页
With the exponential development of mobile communications and the miniaturization of radio frequency transceivers, the need for small and low profile antennas at mobile frequencies is constantly growing. Therefore, ne... With the exponential development of mobile communications and the miniaturization of radio frequency transceivers, the need for small and low profile antennas at mobile frequencies is constantly growing. Therefore, new antennas should be developed to provide larger bandwidth and at the same time small dimensions. Although the gain in bandwidth performances of an antenna are directly related to its dimensions in relation to the wavelength, the aim is to keep the overall size of the antenna constant and from there, find the geometry and structure that give the best performance. The design and bandwidth optimization of a Planar Inverted-F Antenna (PIFA) were introduced in order to achieve a larger bandwidth in the 2 GHz band, using two optimization techniques based upon genetic algorithms (GA), namely the Binary Coded GA (BCGA) and Real-Coded GA (RCGA). During the optimization process, the different PIFA models were evaluated using the finite-difference time domain (FDTD) method-a technique belonging to the general class of differential time domain numerical modeling methods. 展开更多
关键词 实数编码遗传算法 平面倒F天线 带宽优化 二进制编码 有限差分时域 数值模拟方法 天线性能 优化技术
在线阅读 下载PDF
An Analytical Method to Mitigate the False Alarm Rates of Polar Code Blind Detection in 5G New Radio
17
作者 Gao Jian Piao Jinnan +1 位作者 Dai Jincheng Niu Kai 《China Communications》 2025年第9期140-150,共11页
In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, differen... In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, different from that in the 4G LTE system, the cyclic redundancy check(CRC) in polar decoding plays both error correction and error detection roles. Consequently, the false alarm rates(FAR) may not meet the system requirements(FAR<1.52 × 10^(−5)). In this paper, to mitigate the FAR in polar code blind detection, we attach a binary classifier after the polar decoder to further remove the false alarm results and meanwhile retain the correct DCI. This classifier works by tracking the squared Euclidean distance ratio(SEDR) between the received signal and hypothesis. We derive an analytical method to fast compute proper classification threshold that is implementation-friendly in practical use. Combining the well-designed classifier, we show that some very short CRC sequences can even be used to meet the FAR requirements. This consequently reduces the CRC overhead and contributes to the system error performance improvements. 展开更多
关键词 binary classifier blind detection classifi cation threshold 5G NR polar codes
在线阅读 下载PDF
高效Unicode/GB编码转换算法的设计和实现 被引量:4
18
作者 倪晓军 《计算机技术与发展》 2009年第9期21-24,共4页
为了在存储空间和运算能力严格受限的嵌入式系统中实现Unicode和GB2312编码的相互转换,设计了一种高效率的编码转换算法。该算法通过提取数据表中公共部分实现压缩存储,采用索引和二分法查找相结合的方式进行快速查找,和传统的转换算法... 为了在存储空间和运算能力严格受限的嵌入式系统中实现Unicode和GB2312编码的相互转换,设计了一种高效率的编码转换算法。该算法通过提取数据表中公共部分实现压缩存储,采用索引和二分法查找相结合的方式进行快速查找,和传统的转换算法相比约节省25%的存储空间,查找效率最高约提高3倍。该算法可在无操作系统支持的嵌入式系统中实现汉字编码之间的高效率的转换。 展开更多
关键词 汉字编码 GB2312 UNIcode 索引 二分法查找
在线阅读 下载PDF
基于函数拆分对抗二进制代码相似性检测
19
作者 魏然 舒辉 《信息工程大学学报》 2026年第1期64-71,共8页
二进制代码相似性检测能够识别软件中的同源函数,进而定位关键模块。攻击者将其应用于逆向工程,给软件安全带来了风险。代码混淆可以增加软件的复杂程度,增强其抗检测能力。传统代码混淆主要在函数内部实现,存在空间开销和运行时开销大... 二进制代码相似性检测能够识别软件中的同源函数,进而定位关键模块。攻击者将其应用于逆向工程,给软件安全带来了风险。代码混淆可以增加软件的复杂程度,增强其抗检测能力。传统代码混淆主要在函数内部实现,存在空间开销和运行时开销大的问题。为此,提出了基于函数拆分的方法进行代码混淆,进而对抗二进制代码相似性检测。该方法在程序的中间表示层实现。首先,基于支配树将原函数的基本块集合划分为多个子集。其次,通过“定义—使用”链识别子集间的数据依赖关系。接着,引入控制变量以修复子集间的控制流。最后,通过代码重写生成子函数。实验结果表明,经过函数拆分混淆后的程序,使二进制相似性检测模型的召回率降至1.3%(函数池大小为1 024),代码膨胀率为原始模型的2.06倍。 展开更多
关键词 代码混淆 二进制代码相似性检测 函数拆分 支配树
在线阅读 下载PDF
联合语义和结构的跨架构二进制相似性检测工具
20
作者 汪小雨 金新懿 贾鹏 《通信技术》 2026年第1期104-114,共11页
二进制代码相似性检测技术在软件安全、漏洞挖掘、代码复用检测及知识产权保护等领域具有重要意义。由于不同硬件架构的指令集和编译环境差异显著,跨架构二进制代码相似性检测技术面临诸多挑战。研究设计了联合语义和结构特征的跨架构... 二进制代码相似性检测技术在软件安全、漏洞挖掘、代码复用检测及知识产权保护等领域具有重要意义。由于不同硬件架构的指令集和编译环境差异显著,跨架构二进制代码相似性检测技术面临诸多挑战。研究设计了联合语义和结构特征的跨架构二进制代码相似性检测工具。该工具以反汇编代码为输入,通过微调预训练语言模型构建面向汇编语义的BinBERT表示,并结合属性控制流图与图神经网络刻画函数级结构特征,在孪生网络框架下实现跨架构函数相似性度量。最终实验数据显示,所提工具在测试数据集上达到了98.98%的准确率、0.9899的F1得分、0.9872的ROC曲线下面积,充分证明了该工具在跨架构二进制代码相似性检测上的有效性和实用性。 展开更多
关键词 软件安全 二进制程序 跨架构分析 代码相似性检测
在线阅读 下载PDF
上一页 1 2 49 下一页 到第
使用帮助 返回顶部