共 20 条
- [2] Mechanical verification of transaction processing systems [J]. ICFEM 2000: THIRD INTERNATIONAL CONFERENCE ON FORMAL ENGINEERING METHODS, PROCEEDINGS, 2000, : 89 - 97
- [3] Chung KS, 2014, I C INF COMM TECH CO, P621, DOI 10.1109/ICTC.2014.6983231
- [4] API Method Recommendation without Worrying about the Task-API Knowledge Gap [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 293 - 304
- [5] Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging [J]. IEEE ACCESS, 2019, 7 : 119557 - 119565
- [6] Kakade N., 2020, P 11 INT C COMP COMM, P1
- [7] Kaushik S., 2012, P STUD CONT ENG SYST, P14
- [9] CNN Based Malicious Website Detection by Invalidating Multiple Web Spams [J]. IEEE ACCESS, 2020, 8 : 97258 - 97266
- [10] Peng L., Digit. Commun. Netw., DOI [10.1016/j.dcan2020.05.008, DOI 10.1016/J.DCAN2020.05.008]