Advanced Search

    column
    Situation, Trends and Prospects of Deep Learning Applied to Cyberspace Security
    Zhang Yuqing, Dong Ying, Liu Caiyun, Lei Kenan, Sun Hongyu
    2018, 55(6): 1117-1142. DOI: 10.7544/issn1000-1239.2018.20170649
    Abstract FullText HTML PDF
    Private Spatial Decomposition with Adaptive Grid
    Zhang Xiaojian, Jin Kaizhong, Meng Xiaofeng
    2018, 55(6): 1143-1156. DOI: 10.7544/issn1000-1239.2018.20160963
    Abstract FullText HTML PDF
    Covert Sequence Channel Based on HTTP/2 Protocol
    Liu Zhengyi, Song Tian
    2018, 55(6): 1157-1166. DOI: 10.7544/issn1000-1239.2018.20170451
    Abstract FullText HTML PDF
    Trust-Based Multi-Objectives Task Assignment Model in Cloud Service System
    Shu Jian, Liang Changyong, Xu Jian
    2018, 55(6): 1167-1179. DOI: 10.7544/issn1000-1239.2018.20170404
    Abstract FullText HTML PDF
    A Task Scheduling Method for Cloud Workflow Security
    Wang Yawen, Guo Yunfei, Liu Wenyan, Hu Hongchao, Huo Shumin, Cheng Guozhen
    2018, 55(6): 1180-1189. DOI: 10.7544/issn1000-1239.2018.20170425
    Abstract FullText HTML PDF
    Revocable Attribute Based Encryption in Cloud Storage
    Wang Guangbo, Liu Haitao, Wang Chenlu, Wang Pengcheng, Lian Lin, Hui Wentao
    2018, 55(6): 1190-1200. DOI: 10.7544/issn1000-1239.2018.20170063
    Abstract FullText HTML PDF
    Impossible Differential Attack of Block Cipher ARIA
    Xie Gaoqi, Wei Hongru
    2018, 55(6): 1201-1210. DOI: 10.7544/issn1000-1239.2018.20170275
    Abstract FullText HTML PDF
    Reversible Data Hiding in Encrypted Image Based on Neighborhood Prediction Using XOR-Permutation Encryption
    Yan Shu, Chen Fan, He Hongjie
    2018, 55(6): 1211-1221. DOI: 10.7544/issn1000-1239.2018.20170295
    Abstract FullText HTML PDF
    Deduplication on Encrypted Data Based on Zero-Knowledge Proof and Key Transmission
    He Simeng, Yang Chao, Jiang Qi, Yang Li, Ma Jianfeng
    2018, 55(6): 1222-1235. DOI: 10.7544/issn1000-1239.2018.20170415
    Abstract FullText HTML PDF
    Adaptive App-DDoS Detection Method Based on Improved AP Algorithm
    Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin
    2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124
    Abstract FullText HTML PDF
    IC Design with Multiple Engines Running CBC Mode SM4 Algorithm
    Fan Lingyan, Zhou Meng, Luo Jianjun, Liu Hailuan
    2018, 55(6): 1247-1253. DOI: 10.7544/issn1000-1239.2018.20170144
    Abstract FullText HTML PDF
    An Adaptive Scale Control Method of Multiple UAVs for Persistent Surveillance
    Jing Tian, Wang Tao, Wang Weiping, Li Xiaobo, Zhou Xin
    2018, 55(6): 1254-1262. DOI: 10.7544/issn1000-1239.2018.20170311
    Abstract FullText HTML PDF
    Granularity Selections in Generalized Incomplete Multi-Granular Labeled Decision Systems
    Wu Weizhi, Yang Li, Tan Anhui, Xu Youhong
    2018, 55(6): 1263-1272. DOI: 10.7544/issn1000-1239.2018.20170233
    Abstract FullText HTML PDF
    Solving Minimal Hitting Sets Method with SAT Based on DOEC Minimization
    Wang Rongquan, Ouyang Dantong, Wang Yiyuan, Liu Siguang, Zhang Liming
    2018, 55(6): 1273-1281. DOI: 10.7544/issn1000-1239.2018.20160809
    Abstract FullText HTML PDF
    Weibo Popularity Prediction Method Based on Propagation Acceleration
    Zhu Hailong, Yun Xiaochun, Han Zhishuai
    2018, 55(6): 1282-1293. DOI: 10.7544/issn1000-1239.2018.20161057
    Abstract FullText HTML PDF
    HL-DAQ: A Dynamic Adaptive Quantization Coding for Hash Learning
    Zhao Liang, Wang Yongli, Du Zhongshu, Chen Guangsheng
    2018, 55(6): 1294-1307. DOI: 10.7544/issn1000-1239.2018.20170238
    Abstract FullText HTML PDF
    MapReduce Back Propagation Algorithm Based on Structure Parallelism
    Ren Gang, Deng Pan, Yang Chao, Wu Changmao
    2018, 55(6): 1308-1319. DOI: 10.7544/issn1000-1239.2018.20170024
    Abstract FullText HTML PDF
    A Collaborative Collusion Detection Method Based on Online Clustering
    Sun Yong, Tan Wenan, Jin Ting, Zhou Liangguang
    2018, 55(6): 1320-1332. DOI: 10.7544/issn1000-1239.2018.20170231
    Abstract FullText HTML PDF
    General Data Quality Assessment Model and Ontological Implementation
    Zhang Xiaoran, Yuan Man
    2018, 55(6): 1333-1344. DOI: 10.7544/issn1000-1239.2018.20160764
    Abstract FullText HTML PDF
    Quality Constraints-Aware Service Composition Based on Task Granulating
    Zhang Yiwen, Cui Guangming, Yan Yuanting, Zhao Shu, Zhang Yanping
    2018, 55(6): 1345-1355. DOI: 10.7544/issn1000-1239.2018.20170234
    Abstract FullText HTML PDF