计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2018 Vol. 55, No. 6
Published: 01 June 2018

   
 
1117 Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security Hot!
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu
DOI: 10.7544/issn1000-1239.2018.20170649
2018 Vol. 55 (6): 1117-1142 [Abstract] ( 795 ) HTML (1 KB)  PDF (3633 KB)  ( 620 )
1143 Private Spatial Decomposition with Adaptive Grid
Zhang Xiaojian, Jin Kaizhong, Meng Xiaofeng
DOI: 10.7544/issn1000-1239.2018.20160963
2018 Vol. 55 (6): 1143-1156 [Abstract] ( 181 ) HTML (1 KB)  PDF (5569 KB)  ( 211 )
1157 Covert Sequence Channel Based on HTTP/2 Protocol
Liu Zhengyi, Song Tian
DOI: 10.7544/issn1000-1239.2018.20170451
2018 Vol. 55 (6): 1157-1166 [Abstract] ( 97 ) HTML (1 KB)  PDF (2110 KB)  ( 121 )
1167 Trust-Based Multi-Objectives Task Assignment Model in Cloud Service System
Shu Jian, Liang Changyong, Xu Jian
DOI: 10.7544/issn1000-1239.2018.20170404
2018 Vol. 55 (6): 1167-1179 [Abstract] ( 112 ) HTML (1 KB)  PDF (5001 KB)  ( 144 )
1180 A Task Scheduling Method for Cloud Workflow Security
Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen
DOI: 10.7544/issn1000-1239.2018.20170425
2018 Vol. 55 (6): 1180-1189 [Abstract] ( 111 ) HTML (1 KB)  PDF (3197 KB)  ( 139 )
1190 Revocable Attribute Based Encryption in Cloud Storage
Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao
DOI: 10.7544/issn1000-1239.2018.20170063
2018 Vol. 55 (6): 1190-1200 [Abstract] ( 106 ) HTML (1 KB)  PDF (2145 KB)  ( 130 )
1201 Impossible Differential Attack of Block Cipher ARIA
Xie Gaoqi, Wei Hongru
DOI: 10.7544/issn1000-1239.2018.20170275
2018 Vol. 55 (6): 1201-1210 [Abstract] ( 75 ) HTML (1 KB)  PDF (1826 KB)  ( 138 )
1211 Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption
Yan Shu, Chen Fan, He Hongjie
DOI: 10.7544/issn1000-1239.2018.20170295
2018 Vol. 55 (6): 1211-1221 [Abstract] ( 50 ) HTML (1 KB)  PDF (5457 KB)  ( 90 )
1222 Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission
He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2018.20170415
2018 Vol. 55 (6): 1222-1235 [Abstract] ( 87 ) HTML (1 KB)  PDF (3388 KB)  ( 138 )
1236 Adaptive App-DDoS Detection Method Based on Improved AP Algorithm
Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin
DOI: 10.7544/issn1000-1239.2018.20170124
2018 Vol. 55 (6): 1236-1246 [Abstract] ( 99 ) HTML (1 KB)  PDF (2147 KB)  ( 129 )
1247 IC Design with Multiple Engines Running CBC Mode SM4 Algorithm
Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan
DOI: 10.7544/issn1000-1239.2018.20170144
2018 Vol. 55 (6): 1247-1253 [Abstract] ( 52 ) HTML (1 KB)  PDF (2058 KB)  ( 84 )
1254 An Adaptive Scale Control Method of Multiple UAVs for Persistent Surveillance
Jing Tian, Wang Tao, Wang Weiping, Li Xiaobo, Zhou Xin
DOI: 10.7544/issn1000-1239.2018.20170311
2018 Vol. 55 (6): 1254-1262 [Abstract] ( 87 ) HTML (1 KB)  PDF (3356 KB)  ( 130 )
1263 Granularity Selections in Generalized Incomplete Multi-Granular Labeled Decision Systems
Wu Weizhi, Yang Li, Tan Anhui, Xu Youhong
DOI: 10.7544/issn1000-1239.2018.20170233
2018 Vol. 55 (6): 1263-1272 [Abstract] ( 61 ) HTML (1 KB)  PDF (940 KB)  ( 118 )
1273 Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization
Wang Rongquan,Ouyang Dantong,Wang Yiyuan,Liu Siguang, Zhang Liming
DOI: 10.7544/issn1000-1239.2018.20160809
2018 Vol. 55 (6): 1273-1281 [Abstract] ( 61 ) HTML (1 KB)  PDF (2246 KB)  ( 92 )
1282 Weibo Popularity Prediction Method Based on Propagation Acceleration
Zhu Hailong, Yun Xiaochun, Han Zhishuai
DOI: 10.7544/issn1000-1239.2018.20161057
2018 Vol. 55 (6): 1282-1293 [Abstract] ( 77 ) HTML (1 KB)  PDF (4169 KB)  ( 117 )
1294 HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning
Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng
DOI: 10.7544/issn1000-1239.2018.20170238
2018 Vol. 55 (6): 1294-1307 [Abstract] ( 71 ) HTML (1 KB)  PDF (6304 KB)  ( 107 )
1308 MapReduce Back Propagation Algorithm Based on Structure Parallelism
Ren Gang, Deng Pan, Yang Chao, Wu Changmao
DOI: 10.7544/issn1000-1239.2018.20170024
2018 Vol. 55 (6): 1308-1319 [Abstract] ( 66 ) HTML (1 KB)  PDF (3151 KB)  ( 120 )
1320 A Collaborative Collusion Detection Method Based on Online Clustering
Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang
DOI: 10.7544/issn1000-1239.2018.20170231
2018 Vol. 55 (6): 1320-1332 [Abstract] ( 144 ) HTML (1 KB)  PDF (3974 KB)  ( 125 )
1333 General Data Quality Assessment Model and Ontological Implementation
Zhang Xiaoran, Yuan Man
DOI: 10.7544/issn1000-1239.2018.20160764
2018 Vol. 55 (6): 1333-1344 [Abstract] ( 92 ) HTML (1 KB)  PDF (2109 KB)  ( 116 )
1345 Quality Constraints-Aware Service Composition Based on Task Granulating
Zhang Yiwen, Cui Guangming, Yan Yuanting, Zhao Shu, Zhang Yanping
DOI: 10.7544/issn1000-1239.2018.20170234
2018 Vol. 55 (6): 1345-1355 [Abstract] ( 64 ) HTML (1 KB)  PDF (3350 KB)  ( 95 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech