Showing 1 - 20 results of 65 for search 'Fei KANG', query time: 0.06s
Refine Results
-
1
-
2
Crack Location and Degree Detection Method Based on YOLOX Model by Linlin Wang, Junjie Li, Fei Kang
Published 2022-12-01
Article -
3
Hindrance stressors, ego depletion and knowledge sharing by Fei Kang, Ying Zhang, Han Zhang
Published 2022-01-01
Article -
4
Method of diversity software protection based on fusion compilation by Xiaobing XIONG, Hui SHU, Fei KANG
Published 2020-12-01
Article -
5
Intelligent Detection of Underwater Defects in Concrete Dams Based on YOLOv8s-UEC by Chenxi Liang, Yang Zhao, Fei Kang
Published 2024-09-01
Article -
6
Design and implementation of hardware-based dynamic instruction set randomization framework by San DU, Hui SHU, Fei KANG
Published 2017-11-01
Article -
7
Design and implementation of hardware-based dynamic instruction set randomization framework by San DU,Hui SHU,Fei KANG
Published 2017-11-01
Article -
8
Key security detection based on dynamic binary instrumentation by Hao LIN, Fei KANG, Yan GUANG
Published 2017-11-01
Article -
9
Key security detection based on dynamic binary instrumentation by Hao LIN,Fei KANG,Yan GUANG
Published 2017-11-01
Article -
10
A Review of Detection Technologies for Underwater Cracks on Concrete Dam Surfaces by Dong Chen, Ben Huang, Fei Kang
Published 2023-03-01
Article -
11
-
12
-
13
Deep Learning for Joint Pilot Design and Channel Estimation in MIMO-OFDM Systems by Xiao-Fei Kang, Zi-Hui Liu, Meng Yao
Published 2022-05-01
Article -
14
Software protection technology based on code fragmentation by Jingcheng GUO, Hui SHU, Xiaobing XIONG, Fei KANG
Published 2020-12-01
Article -
15
Effect of Track Support Structures on Friction-Induced Vibrations of Wheelset-Track Systems by Hua Fu, Fei Kang, Shanglin Liu, Xi Kang
Published 2023-01-01
Article -
16
BiN: A Two-Level Learning-Based Bug Search for Cross-Architecture Binary by Hao Wu, Hui Shu, Fei Kang, Xiaobing Xiong
Published 2019-01-01
Article -
17
A Survey on Penetration Path Planning in Automated Penetration Testing by Ziyang Chen, Fei Kang, Xiaobing Xiong, Hui Shu
Published 2024-09-01
Article -
18
FIRMCORN: Vulnerability-Oriented Fuzzing of IoT Firmware via Optimized Virtual Execution by Zhijie Gui, Hui Shu, Fei Kang, Xiaobing Xiong
Published 2020-01-01
Article -
19
High resistance botnet based on smart contract by Hao ZHAO, Hui SHU, Fei KANG, Ying XING
Published 2021-08-01
Article -
20
Failure Cause Analysis and Optimization Design of the Transmission Shaft for Guideway Rubber-tyred Vehicle by Yi YANG, Zhicheng TAN, Fei KANG, Xin ZHANG, Saiwu LIU
Published 2024-03-01
Article