计算机研究与发展
       ISSN 1000-1239   CN 11-1777/TP  
   RSS  Email Alert     
   
 
Nianqi Search Key words Adv search
33
2018 Vol. 55, No. 6
Published: 01 June 2018

   
 
1117 Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security Hot!
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu
DOI: 10.7544/issn1000-1239.2018.20170649
2018 Vol. 55 (6): 1117-1142 [Abstract] ( 2000 ) HTML (260 KB)  PDF (3633 KB)  ( 1770 )
1143 Private Spatial Decomposition with Adaptive Grid
Zhang Xiaojian, Jin Kaizhong, Meng Xiaofeng
DOI: 10.7544/issn1000-1239.2018.20160963
2018 Vol. 55 (6): 1143-1156 [Abstract] ( 465 ) HTML (170 KB)  PDF (5569 KB)  ( 411 )
1157 Covert Sequence Channel Based on HTTP/2 Protocol
Liu Zhengyi, Song Tian
DOI: 10.7544/issn1000-1239.2018.20170451
2018 Vol. 55 (6): 1157-1166 [Abstract] ( 308 ) HTML (97 KB)  PDF (2110 KB)  ( 333 )
1167 Trust-Based Multi-Objectives Task Assignment Model in Cloud Service System
Shu Jian, Liang Changyong, Xu Jian
DOI: 10.7544/issn1000-1239.2018.20170404
2018 Vol. 55 (6): 1167-1179 [Abstract] ( 329 ) HTML (116 KB)  PDF (5001 KB)  ( 322 )
1180 A Task Scheduling Method for Cloud Workflow Security
Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen
DOI: 10.7544/issn1000-1239.2018.20170425
2018 Vol. 55 (6): 1180-1189 [Abstract] ( 365 ) HTML (95 KB)  PDF (3197 KB)  ( 342 )
1190 Revocable Attribute Based Encryption in Cloud Storage
Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao
DOI: 10.7544/issn1000-1239.2018.20170063
2018 Vol. 55 (6): 1190-1200 [Abstract] ( 485 ) HTML (160 KB)  PDF (2145 KB)  ( 317 )
1201 Impossible Differential Attack of Block Cipher ARIA
Xie Gaoqi, Wei Hongru
DOI: 10.7544/issn1000-1239.2018.20170275
2018 Vol. 55 (6): 1201-1210 [Abstract] ( 320 ) HTML (190 KB)  PDF (1826 KB)  ( 329 )
1211 Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption
Yan Shu, Chen Fan, He Hongjie
DOI: 10.7544/issn1000-1239.2018.20170295
2018 Vol. 55 (6): 1211-1221 [Abstract] ( 295 ) HTML (84 KB)  PDF (5457 KB)  ( 311 )
1222 Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission
He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng
DOI: 10.7544/issn1000-1239.2018.20170415
2018 Vol. 55 (6): 1222-1235 [Abstract] ( 395 ) HTML (129 KB)  PDF (3388 KB)  ( 350 )
1236 Adaptive App-DDoS Detection Method Based on Improved AP Algorithm
Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin
DOI: 10.7544/issn1000-1239.2018.20170124
2018 Vol. 55 (6): 1236-1246 [Abstract] ( 289 ) HTML (119 KB)  PDF (2147 KB)  ( 322 )
1247 IC Design with Multiple Engines Running CBC Mode SM4 Algorithm
Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan
DOI: 10.7544/issn1000-1239.2018.20170144
2018 Vol. 55 (6): 1247-1253 [Abstract] ( 339 ) HTML (51 KB)  PDF (2058 KB)  ( 234 )
1254 An Adaptive Scale Control Method of Multiple UAVs for Persistent Surveillance
Jing Tian, Wang Tao, Wang Weiping, Li Xiaobo, Zhou Xin
DOI: 10.7544/issn1000-1239.2018.20170311
2018 Vol. 55 (6): 1254-1262 [Abstract] ( 343 ) HTML (71 KB)  PDF (3356 KB)  ( 359 )
1263 Granularity Selections in Generalized Incomplete Multi-Granular Labeled Decision Systems
Wu Weizhi, Yang Li, Tan Anhui, Xu Youhong
DOI: 10.7544/issn1000-1239.2018.20170233
2018 Vol. 55 (6): 1263-1272 [Abstract] ( 279 ) HTML (160 KB)  PDF (940 KB)  ( 333 )
1273 Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization
Wang Rongquan,Ouyang Dantong,Wang Yiyuan,Liu Siguang, Zhang Liming
DOI: 10.7544/issn1000-1239.2018.20160809
2018 Vol. 55 (6): 1273-1281 [Abstract] ( 316 ) HTML (107 KB)  PDF (2246 KB)  ( 238 )
1282 Weibo Popularity Prediction Method Based on Propagation Acceleration
Zhu Hailong, Yun Xiaochun, Han Zhishuai
DOI: 10.7544/issn1000-1239.2018.20161057
2018 Vol. 55 (6): 1282-1293 [Abstract] ( 337 ) HTML (98 KB)  PDF (4169 KB)  ( 329 )
1294 HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning
Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng
DOI: 10.7544/issn1000-1239.2018.20170238
2018 Vol. 55 (6): 1294-1307 [Abstract] ( 279 ) HTML (141 KB)  PDF (6304 KB)  ( 263 )
1308 MapReduce Back Propagation Algorithm Based on Structure Parallelism
Ren Gang, Deng Pan, Yang Chao, Wu Changmao
DOI: 10.7544/issn1000-1239.2018.20170024
2018 Vol. 55 (6): 1308-1319 [Abstract] ( 314 ) HTML (153 KB)  PDF (3151 KB)  ( 313 )
1320 A Collaborative Collusion Detection Method Based on Online Clustering
Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang
DOI: 10.7544/issn1000-1239.2018.20170231
2018 Vol. 55 (6): 1320-1332 [Abstract] ( 396 ) HTML (126 KB)  PDF (3974 KB)  ( 302 )
1333 General Data Quality Assessment Model and Ontological Implementation
Zhang Xiaoran, Yuan Man
DOI: 10.7544/issn1000-1239.2018.20160764
2018 Vol. 55 (6): 1333-1344 [Abstract] ( 548 ) HTML (1 KB)  PDF (2109 KB)  ( 437 )
1345 Quality Constraints-Aware Service Composition Based on Task Granulating
Zhang Yiwen, Cui Guangming, Yan Yuanting, Zhao Shu, Zhang Yanping
DOI: 10.7544/issn1000-1239.2018.20170234
2018 Vol. 55 (6): 1345-1355 [Abstract] ( 300 ) HTML (124 KB)  PDF (3350 KB)  ( 312 )
计算机研究与发展
·
·
·
·
·
·
·F5000
·
More....  
More....  
EI Village
China Computer Federation
Institute of Computing, Chinese Academy of Sciences
More....  
 
 
Copyright © Editorial Board of Journal of Computer Research and Development
Supported by:Beijing Magtech