计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
Monthly. Since 1958
Editor in Chief:Xu Zhiwei
More....
Current Issue In Press Review Papers Most Read Most Download Articles Highly Cited Papers
  Journal of Computer Research and Development--2018, 55 (6)   Published: 01 June 2018
 
 

Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security Hot!

Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu
Journal of Computer Research and Development. 2018, 55 (6): 1117-1142;  doi: 10.7544/issn1000-1239.2018.20170649
Abstract | Download: PDF (3633KB)
 
 

Private Spatial Decomposition with Adaptive Grid

Zhang Xiaojian, Jin Kaizhong, Meng Xiaofeng
Journal of Computer Research and Development. 2018, 55 (6): 1143-1156;  doi: 10.7544/issn1000-1239.2018.20160963
Abstract | Download: PDF (5569KB)
 
 

Covert Sequence Channel Based on HTTP/2 Protocol

Liu Zhengyi, Song Tian
Journal of Computer Research and Development. 2018, 55 (6): 1157-1166;  doi: 10.7544/issn1000-1239.2018.20170451
Abstract | Download: PDF (2110KB)
 
 

Trust-Based Multi-Objectives Task Assignment Model in Cloud Service System

Shu Jian, Liang Changyong, Xu Jian
Journal of Computer Research and Development. 2018, 55 (6): 1167-1179;  doi: 10.7544/issn1000-1239.2018.20170404
Abstract | Download: PDF (5001KB)
 
 

A Task Scheduling Method for Cloud Workflow Security

Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen
Journal of Computer Research and Development. 2018, 55 (6): 1180-1189;  doi: 10.7544/issn1000-1239.2018.20170425
Abstract | Download: PDF (3197KB)
 
 

Revocable Attribute Based Encryption in Cloud Storage

Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao
Journal of Computer Research and Development. 2018, 55 (6): 1190-1200;  doi: 10.7544/issn1000-1239.2018.20170063
Abstract | Download: PDF (2145KB)
 
 

Impossible Differential Attack of Block Cipher ARIA

Xie Gaoqi, Wei Hongru
Journal of Computer Research and Development. 2018, 55 (6): 1201-1210;  doi: 10.7544/issn1000-1239.2018.20170275
Abstract | Download: PDF (1826KB)
 
 

Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption

Yan Shu, Chen Fan, He Hongjie
Journal of Computer Research and Development. 2018, 55 (6): 1211-1221;  doi: 10.7544/issn1000-1239.2018.20170295
Abstract | Download: PDF (5457KB)
 
 

Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission

He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng
Journal of Computer Research and Development. 2018, 55 (6): 1222-1235;  doi: 10.7544/issn1000-1239.2018.20170415
Abstract | Download: PDF (3388KB)
 
 

Adaptive App-DDoS Detection Method Based on Improved AP Algorithm

Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin
Journal of Computer Research and Development. 2018, 55 (6): 1236-1246;  doi: 10.7544/issn1000-1239.2018.20170124
Abstract | Download: PDF (2147KB)
 
 

IC Design with Multiple Engines Running CBC Mode SM4 Algorithm

Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan
Journal of Computer Research and Development. 2018, 55 (6): 1247-1253;  doi: 10.7544/issn1000-1239.2018.20170144
Abstract | Download: PDF (2058KB)
 
 

An Adaptive Scale Control Method of Multiple UAVs for Persistent Surveillance

Jing Tian, Wang Tao, Wang Weiping, Li Xiaobo, Zhou Xin
Journal of Computer Research and Development. 2018, 55 (6): 1254-1262;  doi: 10.7544/issn1000-1239.2018.20170311
Abstract | Download: PDF (3356KB)
 
 

Granularity Selections in Generalized Incomplete Multi-Granular Labeled Decision Systems

Wu Weizhi, Yang Li, Tan Anhui, Xu Youhong
Journal of Computer Research and Development. 2018, 55 (6): 1263-1272;  doi: 10.7544/issn1000-1239.2018.20170233
Abstract | Download: PDF (940KB)
 
 

Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization

Wang Rongquan,Ouyang Dantong,Wang Yiyuan,Liu Siguang, Zhang Liming
Journal of Computer Research and Development. 2018, 55 (6): 1273-1281;  doi: 10.7544/issn1000-1239.2018.20160809
Abstract | Download: PDF (2246KB)
 
 

Weibo Popularity Prediction Method Based on Propagation Acceleration

Zhu Hailong, Yun Xiaochun, Han Zhishuai
Journal of Computer Research and Development. 2018, 55 (6): 1282-1293;  doi: 10.7544/issn1000-1239.2018.20161057
Abstract | Download: PDF (4169KB)
 
 

HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning

Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng
Journal of Computer Research and Development. 2018, 55 (6): 1294-1307;  doi: 10.7544/issn1000-1239.2018.20170238
Abstract | Download: PDF (6304KB)
 
 

MapReduce Back Propagation Algorithm Based on Structure Parallelism

Ren Gang, Deng Pan, Yang Chao, Wu Changmao
Journal of Computer Research and Development. 2018, 55 (6): 1308-1319;  doi: 10.7544/issn1000-1239.2018.20170024
Abstract | Download: PDF (3151KB)
 
 

A Collaborative Collusion Detection Method Based on Online Clustering

Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang
Journal of Computer Research and Development. 2018, 55 (6): 1320-1332;  doi: 10.7544/issn1000-1239.2018.20170231
Abstract | Download: PDF (3974KB)
 
 

General Data Quality Assessment Model and Ontological Implementation

Zhang Xiaoran, Yuan Man
Journal of Computer Research and Development. 2018, 55 (6): 1333-1344;  doi: 10.7544/issn1000-1239.2018.20160764
Abstract | Download: PDF (2109KB)
 
 

Quality Constraints-Aware Service Composition Based on Task Granulating

Zhang Yiwen, Cui Guangming, Yan Yuanting, Zhao Shu, Zhang Yanping
Journal of Computer Research and Development. 2018, 55 (6): 1345-1355;  doi: 10.7544/issn1000-1239.2018.20170234
Abstract | Download: PDF (3350KB)
 
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech