• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security
Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu
2018, 55(6): 1117-1142. DOI: 10.7544/issn1000-1239.2018.20170649
Abstract PDF
Private Spatial Decomposition with Adaptive Grid
Zhang Xiaojian, Jin Kaizhong, Meng Xiaofeng
2018, 55(6): 1143-1156. DOI: 10.7544/issn1000-1239.2018.20160963
Abstract PDF
Covert Sequence Channel Based on HTTP/2 Protocol
Liu Zhengyi, Song Tian
2018, 55(6): 1157-1166. DOI: 10.7544/issn1000-1239.2018.20170451
Abstract PDF
Trust-Based Multi-Objectives Task Assignment Model in Cloud Service System
Shu Jian, Liang Changyong, Xu Jian
2018, 55(6): 1167-1179. DOI: 10.7544/issn1000-1239.2018.20170404
Abstract PDF
A Task Scheduling Method for Cloud Workflow Security
Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen
2018, 55(6): 1180-1189. DOI: 10.7544/issn1000-1239.2018.20170425
Abstract PDF
Revocable Attribute Based Encryption in Cloud Storage
Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao
2018, 55(6): 1190-1200. DOI: 10.7544/issn1000-1239.2018.20170063
Abstract PDF
Impossible Differential Attack of Block Cipher ARIA
Xie Gaoqi, Wei Hongru
2018, 55(6): 1201-1210. DOI: 10.7544/issn1000-1239.2018.20170275
Abstract PDF
Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption
Yan Shu, Chen Fan, He Hongjie
2018, 55(6): 1211-1221. DOI: 10.7544/issn1000-1239.2018.20170295
Abstract PDF
Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission
He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng
2018, 55(6): 1222-1235. DOI: 10.7544/issn1000-1239.2018.20170415
Abstract PDF
Adaptive App-DDoS Detection Method Based on Improved AP Algorithm
Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin
2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
Abstract PDF
IC Design with Multiple Engines Running CBC Mode SM4 Algorithm
Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan
2018, 55(6): 1247-1253. DOI: 10.7544/issn1000-1239.2018.20170144
Abstract PDF
An Adaptive Scale Control Method of Multiple UAVs for Persistent Surveillance
Jing Tian, Wang Tao, Wang Weiping, Li Xiaobo, Zhou Xin
2018, 55(6): 1254-1262. DOI: 10.7544/issn1000-1239.2018.20170311
Abstract PDF
Granularity Selections in Generalized Incomplete Multi-Granular Labeled Decision Systems
Wu Weizhi, Yang Li, Tan Anhui, Xu Youhong
2018, 55(6): 1263-1272. DOI: 10.7544/issn1000-1239.2018.20170233
Abstract PDF
Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization
Wang Rongquan, Ouyang Dantong, Wang Yiyuan, Liu Siguang, Zhang Liming
2018, 55(6): 1273-1281. DOI: 10.7544/issn1000-1239.2018.20160809
Abstract PDF
Weibo Popularity Prediction Method Based on Propagation Acceleration
Zhu Hailong, Yun Xiaochun, Han Zhishuai
2018, 55(6): 1282-1293. DOI: 10.7544/issn1000-1239.2018.20161057
Abstract PDF
HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning
Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng
2018, 55(6): 1294-1307. DOI: 10.7544/issn1000-1239.2018.20170238
Abstract PDF
MapReduce Back Propagation Algorithm Based on Structure Parallelism
Ren Gang, Deng Pan, Yang Chao, Wu Changmao
2018, 55(6): 1308-1319. DOI: 10.7544/issn1000-1239.2018.20170024
Abstract PDF
A Collaborative Collusion Detection Method Based on Online Clustering
Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang
2018, 55(6): 1320-1332. DOI: 10.7544/issn1000-1239.2018.20170231
Abstract PDF
General Data Quality Assessment Model and Ontological Implementation
Zhang Xiaoran, Yuan Man
2018, 55(6): 1333-1344. DOI: 10.7544/issn1000-1239.2018.20160764
Abstract PDF
Quality Constraints-Aware Service Composition Based on Task Granulating
Zhang Yiwen, Cui Guangming, Yan Yuanting, Zhao Shu, Zhang Yanping
2018, 55(6): 1345-1355. DOI: 10.7544/issn1000-1239.2018.20170234
Abstract PDF