2013年论文

2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2005 2004 2002

  1. [1] Ming Xu, Lingfei Wu, Shuhui Qi, Jian Xu, Haiping Zhang, Yizhi Ren ,Ning Zheng. A similarity metric method of obfuscated malware using function-call graph. Journal in Computer Virology, 2013, 9(1): 35-47 [PDF] [BibTex] [RIS]
  2. [2] 徐明,黄立,张海平,徐建.郑宁.头部缺失的JPEG文件碎片恢复.中国图象图形学报, 2013, 18(1): 24-34 [PDF]
  3. [3] Ming Xu, Xue Yang, Beibei Wu, Jun Yao, Haiping Zhang, Jian Xu, Ning Zheng. A Metadata-Based Method for Recovering Files and File Traces from YAFFS2 [J]. Digital Investigation,10(2013), 62-72. http://dx.doi.org/10.1016/j.diin.2013.02.006. [PDF] [BibTex] [RIS]
  4. [4] Haiming Lai, Ming Xu, Jian Xu, Yizhi Ren, Ning Zheng. Evaluating Data Storage Structures of MapReduce [C]. In : Proceeding of the 8th International Conference on Computer Science & Education (ICCSE 2013), April 26-28, 2013. Colombo, Sri Lanka, 141-145 [PDF]
  5. [5] 徐建,郭鸣,徐翀,徐明,郑宁. 一种分布式环境中的近邻检测方法[J].电子学报, 2013, 41(5): 1001-1006. [PDF]
  6. [6] Fei Kong, Ming Xu, Yizhi Ren, Jian Xu, Haiping Zhang, Ning Zheng.A Webmail Reconstructing Method from Windows XP Memory Dumps. In proceeding of the 2013 Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering. Volume 240, 2013, pp 211-217 [PDF] [BibTex] [RIS]
  7. [7] Ning Zheng, Yixing Wang, Ming Xu. A LBP-Based Method for Detecting Copy-Move Forgery with Rotation. In proceeding of the 2013 Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering. Volume 240, 2013, pp 261-267 [PDF] [BibTex] [RIS]
  8. [8] Shuhui Qi, Ming Xu, Ning Zheng. A malware variant detection method based on byte randomness test [J]. Journal of Computers, 2013, 8(10): 2469-2477 (EI) [PDF] [BibTex] [RIS]
  9. [9] Beibei Wu, Ming Xu, Haiping Zhang, Jian Xu, Yizhi Ren, Ning Zheng. A recovery approach for SQLite history recorders from YAFFS2 [C]. In: Proceedings of the Information and Communication Technology, 2013, 295-299 (EI) [PDF] [BibTex] [RIS]