期刊文献+
共找到265篇文章
< 1 2 14 >
每页显示 20 50 100
软件结构测试自动化关键技术研究 被引量:8
1
作者 高海昌 贺晓红 +1 位作者 冯博琴 朱利 《微电子学与计算机》 CSCD 北大核心 2005年第2期25-28,共4页
基于自主开发的自动化白盒测试工具WBoxTool,本文对开发软件结构性测试自动化工具的一些关键技术进行了研究,重点研究了静态测试、插装技术和自动测试用例选择技术。并介绍了WBoxTool的系统体系结构。分析和探讨了当前基于结构的软件测... 基于自主开发的自动化白盒测试工具WBoxTool,本文对开发软件结构性测试自动化工具的一些关键技术进行了研究,重点研究了静态测试、插装技术和自动测试用例选择技术。并介绍了WBoxTool的系统体系结构。分析和探讨了当前基于结构的软件测试中存在的问题和进一步的研究方向。 展开更多
关键词 结构测试 白盒 静态测试 代码插装 测试用例
下载PDF
对白盒SMS4实现的一种有效攻击 被引量:14
2
作者 林婷婷 来学嘉 《软件学报》 EI CSCD 北大核心 2013年第9期2238-2249,共12页
传统的密码模型都假设密码系统的运行终端和计算环境是可信任的,但是,随着攻击方式的发展,这样的模型显得越来越脆弱.而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的资源以外,还对密码系统的内部运行完全可见,并完全掌控执... 传统的密码模型都假设密码系统的运行终端和计算环境是可信任的,但是,随着攻击方式的发展,这样的模型显得越来越脆弱.而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的资源以外,还对密码系统的内部运行完全可见,并完全掌控执行环境.因此,能够抵抗白盒攻击的密码算法具有更高层次的安全意义.2009年提出的SMS4算法的白盒实现,其目标是在白盒攻击环境下能够防止SMS4算法的密钥被恢复.在回顾已有研究的基础上,针对该SMS4算法的白盒实现提出了一种有效的攻击,并详细解释了如何以低于247的时间复杂度找出嵌入其中的轮密钥,说明了该白盒设计方法的不可靠性,并为设计安全的白盒实现提供了一种参考. 展开更多
关键词 白盒 SMS4 攻击
下载PDF
软件构件技术的研究
3
作者 唐勇 李秀龙 陈晶 《哈尔滨师范大学自然科学学报》 CAS 2001年第6期50-53,共4页
本文从分析当前软件产业的现状及存在的问题入手 ,指出了用传统方法解决问题的弊端 .最后提出了一种有效的解决方案———软件构件技术 ,通过从不同的角度对软件构件技术的论述 ,得出结论 :软件构件是实现软件复用的关键因素 。
关键词 面向对象 软件复用 软件构件 黑匣子 白匣子 灰匣子 软件开发 代码重用 源代码
下载PDF
在线仿真和离线仿真的建模机理 被引量:9
4
作者 李颖栋 许晖 +1 位作者 刘春杨 董平省 《油气储运》 CAS 北大核心 2011年第3期170-172,3,共3页
采用GL公司的SPS动态模拟分析软件建立延安-西安成品油管道系统在线实时监控系统和离线仿真培训系统模型。在线实时仿真需要从SCADA系统中实时获得模型驱动所需要的关键性数据。SPS在线仿真基于"黑箱"理论,主要利用管道两端... 采用GL公司的SPS动态模拟分析软件建立延安-西安成品油管道系统在线实时监控系统和离线仿真培训系统模型。在线实时仿真需要从SCADA系统中实时获得模型驱动所需要的关键性数据。SPS在线仿真基于"黑箱"理论,主要利用管道两端的压力、流量、温度等数据对管道的水力状态进行模拟仿真,可以用于仪表分析,管道泄漏检测和定位,清管球跟踪,全线任意位置点的压力、温度、流量预测等。在线仿真软件的实时动态模拟,对管道的启/停输操作和管道满流输送具有重要的指导意义,可为全线水力操作提供参考。 展开更多
关键词 延安-西安成品油管道 在线仿真 离线仿真 机理 白箱 黑箱
原文传递
基于会计管理活动论的智能会计宏观作用机制研究 被引量:8
5
作者 续慧泓 杨周南 董木欣 《北京工商大学学报(社会科学版)》 CSSCI 北大核心 2022年第5期48-58,共11页
会计具有宏观作用是较为广泛的共识,但关于如何建立起微观会计与宏观经济之间的联系,大多数研究关注的是会计信息的宏观估值和契约功能。基于会计管理活动论,认为智能化环境在资源、方法和工具、行为逻辑上对会计产生了影响,催生了智能... 会计具有宏观作用是较为广泛的共识,但关于如何建立起微观会计与宏观经济之间的联系,大多数研究关注的是会计信息的宏观估值和契约功能。基于会计管理活动论,认为智能化环境在资源、方法和工具、行为逻辑上对会计产生了影响,催生了智能会计的概念,扩展了会计在宏微观领域的职能。智能会计宏观作用突破传统会计围绕政策“输入/输出”效果检验的“黑箱”机制,形成了具有行为感知、推理决策、资源配置、过程监督能力的宏微观会计管理活动关联的“白箱”机制。“白箱”机制的作用借助两条路径展开,一是从微观经济活动数据感知到报告形成,再到宏观经济指标关联映射和穿透、追溯的信息流;二是建立微观经济资源与宏观经济产出之间的控制关联。“白箱”机制的技术结构分为资源层、工具与方法层和行为层三个层次。在此基础上,进一步分析了“白箱”机制在资源一体化配置、政策关联关系、风险控制、价值协同、财会监督、政府治理等领域的作用。因此,财政部门应加强智能化环境下相关会计管理政策和制度的研究,构建开放、共享的宏微观一体化会计管理和服务平台,以提升会计服务宏观经济政策调控和微观管理效率的能力。 展开更多
关键词 会计管理活动 智能会计 宏观作用 “白箱” 传导机制
下载PDF
TDBU教学模式在生物医学工程专业实验教学中的应用 被引量:7
6
作者 但果 董磊 刘子琛 《实验技术与管理》 CAS 北大核心 2014年第7期159-162,179,共5页
生物医学工程属于交叉学科,而且实践性强,生物医学工程专业的本科生需要在短短的4年时间同时学好医学类、生物类、电子类以及计算机类课程,这对于任何一名学生而言都是一项巨大的挑战。为了解决这个问题,首次提出了TDBU(Top-down&Bo... 生物医学工程属于交叉学科,而且实践性强,生物医学工程专业的本科生需要在短短的4年时间同时学好医学类、生物类、电子类以及计算机类课程,这对于任何一名学生而言都是一项巨大的挑战。为了解决这个问题,首次提出了TDBU(Top-down&Bottom-up)教学模式,并利用该模式改进生物医学工程的专业实验教学。该模式的主要特点是学生以团队形式参与并完成可以切分成若干模块的完整项目,而且学生可以选择项目的难易程度。由于该模式可以确保各个层次的学生完成项目,因此对于激发学生的学习兴趣、建立学生的自信心、提高学生的实践能力,有着非常深远的意义。 展开更多
关键词 TDBU 教学模式 生物医学工程 黑盒 白盒
下载PDF
白色污染治理现状与对策 被引量:8
7
作者 刘香丽 《当代化工研究》 2017年第12期65-66,共2页
白色污染治理工作在新时期出现了新的困境。深入分析治理现状,认为白色污染依然严重,在田地覆膜、超市购物袋、餐馆餐盒方面尤为严重,对此应该从深入立法、技术升级、全面回收、广泛宣传动员等方面开展进一步的白色污染治理。
关键词 白色污染 田地覆膜 购物袋 餐盒
下载PDF
学生程序的柔性自动测试与评分系统 被引量:5
8
作者 贺志明 《上海工程技术大学学报》 CAS 2005年第2期145-149,共5页
说明了自动测试与评分系统的意义,介绍了系统的实现框架,在黑箱测试与白箱测试的基础上,提出了一种学生程序的柔性自动测试与评分方法,实现了自动测试与评分的具体、及时的信息反馈。
关键词 自动测试 黑箱 白箱
下载PDF
DCVAE-adv:A Universal Adversarial Example Generation Method for White and Black Box Attacks
9
作者 Lei Xu Junhai Zhai 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2024年第2期430-446,共17页
Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The gen... Deep neural network(DNN)has strong representation learning ability,but it is vulnerable and easy to be fooled by adversarial examples.In order to handle the vulnerability of DNN,many methods have been proposed.The general idea of existing methods is to reduce the chance of DNN models being fooled by observing some designed adversarial examples,which are generated by adding perturbations to the original images.In this paper,we propose a novel adversarial example generation method,called DCVAE-adv.Different from the existing methods,DCVAE-adv constructs adversarial examples by mixing both explicit and implicit perturbations without using original images.Furthermore,the proposed method can be applied to both white box and black box attacks.In addition,in the inference stage,the adversarial examples can be generated without loading the original images into memory,which greatly reduces the memory overhead.We compared DCVAE-adv with three most advanced adversarial attack algorithms:FGSM,AdvGAN,and AdvGAN++.The experimental results demonstrate that DCVAE-adv is superior to these state-of-the-art methods in terms of attack success rate and transfer ability for targeted attack.Our code is available at https://github.com/xzforeverlove/DCVAE-adv. 展开更多
关键词 deep neural network adversarial examples white box attack black box attack robustness
原文传递
中医黑箱法说辨析 被引量:5
10
作者 傅海辉 《医学与哲学(A)》 北大核心 2010年第12期12-15,共4页
如何看待中医整体方法是一个争论不休的问题。一种流行的观点是:中医方法是控制论的黑箱法,这是中医的优势之一。这一看法在理论上不符合黑箱法的基本方法论原则,在实践上亦乏善可陈。该观点不但将中医推向了困境,而且误导了人们关于中... 如何看待中医整体方法是一个争论不休的问题。一种流行的观点是:中医方法是控制论的黑箱法,这是中医的优势之一。这一看法在理论上不符合黑箱法的基本方法论原则,在实践上亦乏善可陈。该观点不但将中医推向了困境,而且误导了人们关于中医的发展思路。 展开更多
关键词 中医 整体论 黑箱 白箱 控制论
下载PDF
A New Feistel-Type White-Box Encryption Scheme 被引量:4
11
作者 Ting-Ting Lin Xue-Jia Lai +1 位作者 Wei-Jia Xue Yin Jia 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第2期386-395,共10页
The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almo... The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement. 展开更多
关键词 white-box equivalent key Feistel network CRYPTOGRAPHY ASASASA
原文传递
基于白盒化技术的配电站监控系统的应用
12
作者 王渝鑫 袁三男 +2 位作者 瞿祎程 李文龙 陈思蕊 《上海电力大学学报》 CAS 2024年第2期156-160,共5页
针对配电站监控系统对厂站设备适配和监控系统迭代升级的需求,提出了一种应用白盒化嵌入式系统技术的方案。该方案采用白盒化开放接口设计,制定统一规范接口,并在程序软件设计上采用协议库动态管理的方法,从而实现了监控系统的灵活管理... 针对配电站监控系统对厂站设备适配和监控系统迭代升级的需求,提出了一种应用白盒化嵌入式系统技术的方案。该方案采用白盒化开放接口设计,制定统一规范接口,并在程序软件设计上采用协议库动态管理的方法,从而实现了监控系统的灵活管理,同时显著降低了建网和后期维护成本,有效提高了配电站监管平台开发和运行的可靠性。 展开更多
关键词 配电站 嵌入式 白盒化 开放接口 动态管理
下载PDF
WBZUC:novel white-box ZUC-128 stream cipher 被引量:1
13
作者 Yang Yatao Zhang Ruoqing +2 位作者 Dong hui Ma Yingjie Zhang Xiaowei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第2期96-106,共11页
White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in ... White-box cryptography is critical in a communication system to protect the secret key from being disclosed in a cryptographic algorithm code implementation.The stream cipher is a main dataflow encryption approach in mobile communication.However,research work on white-box cryptographic implementation for stream cipher is rare.A new white-box Zu Chongzhi-128(ZUC-128)cryptographic implementation algorithm named WBZUC was proposed.WBZUC adopts lookup table and random coding in the non-linear function to make the intermediate value chaotic without changing the final encryption result.Thus,the WBZUC algorithm’s security gets improved compared with the original ZUC-128 algorithm.As for the efficiency,a test experiment on WBZUC shows that the average speed of key generation,encryption,and decryption can reach at 33.74 kbit/s,23.31 kbit/s,24.06 kbit/s respectively.Despite its running speed is relatively a bit lower than original ZUC-128 algorithm,WBZUC can provide better security and comprehensive performance in mobile communication system environment. 展开更多
关键词 Zu Chongzhi-128(ZUC-128)algorithm white-box cryptography cryptographic implementation lookup table secure communication
原文传递
人工智能对设计的影响 被引量:3
14
作者 刘瑜 田晓劼(整理) +2 位作者 余依爽(整理) 萨拉·雅各布斯(译) 黄延峰(译) 《景观设计学(中英文)》 CSCD 2018年第2期52-55,共4页
本次访谈围绕人工智能及其可能的设计应用展开。受访人刘瑜深入浅出地阐述了数据在人工智能领域的作用以及深度学习的边界问题,并就人工智能在现阶段能够发挥的辅助设计功能及其未来发展趋势进行了探讨。刘瑜认为,通过深度学习,人工智... 本次访谈围绕人工智能及其可能的设计应用展开。受访人刘瑜深入浅出地阐述了数据在人工智能领域的作用以及深度学习的边界问题,并就人工智能在现阶段能够发挥的辅助设计功能及其未来发展趋势进行了探讨。刘瑜认为,通过深度学习,人工智能在相对封闭的领域内表现出色,但相比人类充满创造力和伦理性的开放式思维,它仍存在局限,特别是在介于感性和理性之间的设计领域,它无法取代人类设计师进行设计。尽管如此,设计师可以把一些常规的基础性工作交由人工智能去完成,从而在设计创新和用户沟通上投入更多精力。 展开更多
关键词 人工智能 数据 深度学习 设计 黑箱 白箱
原文传递
An adaptive neuro-fuzzy inference system white-box model for real-time multiphase flowing bottom-hole pressure prediction in wellbores
15
作者 Chibuzo Cosmas Nwanwe Ugochukwu Ilozurike Duru 《Petroleum》 EI CSCD 2023年第4期629-646,共18页
The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirica... The majority of published empirical correlations and mechanistic models are unable to provide accurate flowing bottom-hole pressure(FBHP)predictions when real-time field well data are used.This is because the empirical correlations and the empirical closure correlations for the mechanistic models were developed with experimental datasets.In addition,most machine learning(ML)FBHP prediction models were constructed with real-time well data points and published without any visible mathematical equation.This makes it difficult for other readers to use these ML models since the datasets used in their development are not open-source.This study presents a white-box adaptive neuro-fuzzy inference system(ANFIS)model for real-time prediction of multiphase FBHP in wellbores.1001 real well data points and 1001 normalized well data points were used in constructing twenty-eight different Takagi eSugeno fuzzy inference systems(FIS)structures.The dataset was divided into two sets;80%for training and 20%for testing.Statistical performance analysis showed that a FIS with a 0.3 range of influence and trained with a normalized dataset achieved the best FBHP prediction performance.The optimal ANFIS black-box model was then translated into the ANFIS white-box model with the Gaussian input and the linear output membership functions and the extracted tuned premise and consequence parameter sets.Trend analysis revealed that the novel ANFIS model correctly simulates the anticipated effect of input parameters on FBHP.In addition,graphical and statistical error analyses revealed that the novel ANFIS model performed better than published mechanistic models,empirical correlations,and machine learning models.New training datasets covering wider input parameter ranges should be added to the original training dataset to improve the model's range of applicability and accuracy. 展开更多
关键词 Machine learning models Empirical correlations Mechanistic models Multiphase flowing bottom-hole pressure Adaptive neuro-fuzzy inference system white-box model
原文传递
基于总线的机载设备快速测试系统设计
16
作者 姬进 范新明 +1 位作者 郭建奇 闫稳 《山西电子技术》 2023年第2期25-28,共4页
传统机载设备测试方法依赖于产品端测试程序的各种接口文件,而这些接口文件实现过程可能由于人的因素导致错误而出现开发进展缓慢,为了达到快速开发的目的,首先分析出了机载嵌入式产品的测试需求,然后总结传统测试过程的弊端,提出一种... 传统机载设备测试方法依赖于产品端测试程序的各种接口文件,而这些接口文件实现过程可能由于人的因素导致错误而出现开发进展缓慢,为了达到快速开发的目的,首先分析出了机载嵌入式产品的测试需求,然后总结传统测试过程的弊端,提出一种基于总线的快速测试系统设计方法,通过总线将产品变为测试设备的一个远程终端,实现黑盒到白盒的转换,可以大大降低测试程序开发难度,最后设计了产品整体测试流程和功能电路详细测试过程,经试验测试表明该测试方法满足预期测试要求且高效。 展开更多
关键词 快速 总线 白盒 测试流程
下载PDF
Local imperceptible adversarial attacks against human pose estimation networks
17
作者 Fuchang Liu Shen Zhang +2 位作者 Hao Wang Caiping Yan Yongwei Miao 《Visual Computing for Industry,Biomedicine,and Art》 EI 2023年第1期318-328,共11页
Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classif... Deep neural networks are vulnerable to attacks from adversarial inputs.Corresponding attack research on human pose estimation(HPE),particularly for body joint detection,has been largely unexplored.Transferring classification-based attack methods to body joint regression tasks is not straightforward.Another issue is that the attack effectiveness and imperceptibility contradict each other.To solve these issues,we propose local imperceptible attacks on HPE networks.In particular,we reformulate imperceptible attacks on body joint regression into a constrained maximum allowable attack.Furthermore,we approximate the solution using iterative gradient-based strength refinement and greedy-based pixel selection.Our method crafts effective perceptual adversarial attacks that consider both human perception and attack effectiveness.We conducted a series of imperceptible attacks against state-of-the-art HPE methods,including HigherHRNet,DEKR,and ViTPose.The experimental results demonstrate that the proposed method achieves excellent imperceptibility while maintaining attack effectiveness by significantly reducing the number of perturbed pixels.Approximately 4%of the pixels can achieve sufficient attacks on HPE. 展开更多
关键词 Adversarial attack Human pose estimation white-box attack IMPERCEPTIBILITY Local perturbation
下载PDF
The Current and Future of Software Securities and Vulnerabilities
18
作者 Cuixue Zhang Meijiao Zhou +1 位作者 Yalian Xie Xiangli Li 《Journal of Software Engineering and Applications》 2014年第1期1-5,共5页
As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform tra... As it has been stepping into the e-time period, software, which is considered as the key factor of the network and computer development, has become an integral part of everyday life. Millions of people may perform transaction through internet, mobile phone, ATM, and send e-mails, handle word processing or spreadsheets for different purposes. In another word, the network and information have been related to our daily life completely. Then, by IT advancing, the awareness of software security becomes a hot and serious topic. This paper will give some comments in various aspects, such as, in the beginning of the SDLC (System Development Life Cycle), how do designers analyze the functional and non-functional requirements and choose the proper development model? And then the testing professors take which kinds of methods to test the software with white-box testing or black-box testing to discover the vulnerabilities and flaws. At the same time, the paper gives some examples to demonstrate why the security of software is pretty important and what we should do to secure that. In addition, the paper will talk something about the enterprises’ actions to build a more secure network environment. 展开更多
关键词 e-Time SDLC SOFTWARE Security white-box TESTING and BLACK-box TESTING
下载PDF
General digital rights management solution based on white-box cryptography
19
作者 Liu Jun Hu Yupu Chen Jie 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第1期52-63,共12页
Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of crypto... Digital rights management(DRM) applications are usually confronted with threats like key extraction, code lifting, and illegal distribution. White-box cryptography aims at protecting software implementations of cryptographic algorithms and can be employed into DRM applications to provide security. A general DRM solution based on white-box cryptography was proposed to address the three threats mentioned above. The method is to construct a general perturbation-enabled white-box compiler for lookup-table based white-box block ciphers, such that the white-box program generated by this compiler provides traceability along with resistance against key extraction and code lifting. To get a traceable white-box program, the idea of hiding a slight perturbation in the lookup-table was employed, aiming at perturbing its decryption functionality, so that each user can be identified. Security analysis and experimental results show that the proposed DRM solution is secure and practical. 展开更多
关键词 digital rights management(DRM) white-box cryptography traceable white-box program white-box compiler
原文传递
Web代码安全人工审计内容的研究 被引量:2
20
作者 何斌颖 杨林海 《江西科学》 2014年第4期536-538,548,共4页
Web系统的大量应用,各种安全事故频发,除了操作系统的安全漏洞以外,web系统的代码在编制的时候,不良的编码习惯、对操作过程中在代码中显露出安全重视不够等因素,导致系统在生产线中存在或大或小的隐患。web系统上线之前,系统一般会进... Web系统的大量应用,各种安全事故频发,除了操作系统的安全漏洞以外,web系统的代码在编制的时候,不良的编码习惯、对操作过程中在代码中显露出安全重视不够等因素,导致系统在生产线中存在或大或小的隐患。web系统上线之前,系统一般会进行白盒、黑盒测试,但是并不能保障足够的安全,还应对代码和运行环境等进行详细的人工审计,可以大大减少安全事故。 展开更多
关键词 代码审计 白盒 黑盒 安全漏洞 安全渗透
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部