[1] |
SHEN Lixiang,MU Dejun,CAO Guo,XIE Guangqian,SHU Fangyong.
Constructing formal verification models for hardware Trojans
[J]. Journal of Xidian University, 2021, 48(3): 146-153.
|
[2] |
CHEN Siji,ZHAI Sheping,WANG Yijing.
Blockchain privacy protection algorithm based on ring signature
[J]. Journal of Xidian University, 2020, 47(5): 86-93.
|
[3] |
SHU Xinfeng,WANG Changtai,WANG Yan,ZHANG Lili.
Propositional projection temporal logic based distributed model checking method
[J]. Journal of Xidian University, 2020, 47(4): 39-47.
|
[4] |
DUAN Zhao, LIU Kunlong.
Dynamic program verification via a CPAChecker
[J]. Journal of Xidian University, 2019, 46(1): 33-38.
|
[5] |
QIN Maoyuan;MU Dejun;HU Wei;MAO Baolei.
Fine-granularity gate level formal verification method for hardware security
[J]. Journal of Xidian University, 2018, 45(5): 143-148.
|
[6] |
CAO Peng;BAO Hong;DU Jingli;PENG Fujun.
Cable-membrane modeling and shape optimization of the space membrane antenna
[J]. Journal of Xidian University, 2018, 45(2): 54-58+65.
|
[7] |
YING Zuobin;MA Jianfeng;CUI Jiangtao.
Attribute-based encryption with location verification and policy adjusting supporting the cloud mobile office
[J]. Journal of Xidian University, 2017, 44(2): 57-62+190.
|
[8] |
WANG Qi;CHEN Xiaoliang.
Algorithm for estimating confusion states of flexible manufacturing systems
[J]. Journal of Xidian University, 2017, 44(2): 69-74.
|
[9] |
MA Qian;DUAN Zhenhua.
Automatic theorem proving technique for MSVL
[J]. J4, 2016, 43(1): 75-81.
|
[10] |
JIANG Zhongyuan;ZHANG Xiuyan;MA Ziyue.
Capacity optimization for power storage systems in smart grids
[J]. J4, 2015, 42(6): 106-112.
|
[11] |
ZHANG Xiuyan;ZHONG Chunfu;JIA Jianyuan.
Method to compute the reachability set of S3PR
[J]. J4, 2015, 42(5): 105-109.
|
[12] |
ZHANG Li;ZHAO Liangxu;WANG Shouguang;WANG Chengying.
Optimal linear constraint transformation method for α-nets
[J]. J4, 2015, 42(5): 183-187+212.
|
[13] |
CHEN Xiaoliang;JIANG Zhongyuan;YE Jianhong .
Confusion detection and prevention policies for workflow nets
[J]. J4, 2015, 42(2): 77-83.
|
[14] |
ZHU Chengcheng;DONG Lida.
Concurrency bug test for a class of multithreaded software
[J]. J4, 2015, 42(2): 167-173+212.
|
[15] |
LI Ye;WANG Yinghui;YU Zhenhua.
Formal modeling of cyber-physical systems using object-oriented Petri nets
[J]. J4, 2014, 41(2): 165-171.
|