[1] |
WANG Lei, WANG Wenfa, SONG Huina, ZHANG Shuai.
Design Pattern Recognition Based on Similarity Scoring and Secondary Subsystems
[J]. Computer Engineering, 2023, 49(1): 210-222.
|
[2] |
SUN Jiayi, WEI Yongzhuang.
Template Attacks Against Lightweight Block Cipher Algorithm DoT
[J]. Computer Engineering, 2021, 47(3): 155-159,165.
|
[3] |
CHENG Zhiwei, CHEN Caisen, ZHU Lianjun, MO Weifeng, WANG Huiyu.
Cache Timing Template Attack Method Based on Pearson Correlation Coefficient
[J]. Computer Engineering, 2019, 45(7): 159-163.
|
[4] |
LING Hang,WU Zhen,DU Zhibo,WANG Min,RAO Jintao.
Algebraic Side Channel Attack Against EPCBC Based on Hamming Weight
[J]. Computer Engineering, 2017, 43(8): 156-160,168.
|
[5] |
HU Yong-Bei, ZHENG Ye-Yang, SHU Jun.
A New Template Attack Method of Advanced Encryption Standard
[J]. Computer Engineering, 2013, 39(8): 166-168.
|
[6] |
HU Fu, JIN Mao-Zhong, CHEN Zhi-Bo, CHEN Fei-Xiang, LAI Chang-Qiang.
Optimized GLR Algorithm for Software Reverse Engineering
[J]. Computer Engineering, 2013, 39(6): 12-20.
|
[7] |
DU Wei-Xiang, TUN Li-Fa, BO Fan, HONG Zheng.
A Semiautomatic Protocol Reverse Method Based on Message Sequence Analysis
[J]. Computer Engineering, 2012, 38(19): 277-280.
|
[8] |
SUN Mao-Hua, JIU Huai-Kou, GAO Hong-Hao.
Verification of Database Interaction Behavior for Web Applications
[J]. Computer Engineering, 2012, 38(16): 52-56.
|
[9] |
LIU Jiu, ZHONG Cheng, BANG Jiang-Quan, LV Wan-Qi, HUI Huo-Wang.
Code Obfuscation Algorithm Based on Protecting Program Design Class Diagram
[J]. Computer Engineering, 2012, 38(14): 44-47.
|
[10] |
CENG Feng, ZHONG Chi-Chu, YANG Tong, TAO Shan.
Scattered Point Cloud Normal Vector Calculation Based on SOM
[J]. Computer Engineering, 2012, 38(08): 287-290.
|
[11] |
WANG Xin, QIU Quan, SUN Hong-Chao.
Halo: Reverse Engineering Tool Based on Eclipse
[J]. Computer Engineering, 2012, 38(01): 45-47.
|
[12] |
CHEN Yang, CUI Han-Guo, LIU Jian-Xin, DAI Xing-.
Improved Algorithm for Advancing Front Growth in Quadrilateral Mesh Generation
[J]. Computer Engineering, 2011, 37(9): 291-292.
|
[13] |
WANG Gong-Qing, SONG Kai, ZHANG Yang, CHEN Kai-Ya.
Optical Fault Injection Attack on Advanced Encryption Standard Algorithm
[J]. Computer Engineering, 2011, 37(21): 97-99.
|
[14] |
GUO Zhi-Chang, ZHANG Beng, LONG Jian-Min, GUO Gao-Ran, CUI Chen.
BIOS Rootkit Detection Based on Behavior Characteristics
[J]. Computer Engineering, 2011, 37(2): 251-252.
|
[15] |
LIU Xiao-Yan.
Point-cloud Data Segmentation Based on Fuzzy Maximum Likelihood Estimate Clustering
[J]. Computer Engineering, 2010, 36(06): 86-88.
|