• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Privacy Protection Incentive Mechanism Based on User-Union Matching in Mobile Crowdsensing
Xiong Jinbo, Ma Rong, Niu Ben, Guo Yunchuan, Lin Li
2018, 55(7): 1359-1370. DOI: 10.7544/issn1000-1239.2018.20180080
Abstract PDF
A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy
Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei
2018, 55(7): 1371-1392. DOI: 10.7544/issn1000-1239.2018.20170982
Abstract PDF
A Secure Transmission Model Between the Nodes in Clusters of Wireless Service System for Internet of Things
Zhou Weiwei, Yu Bin
2018, 55(7): 1393-1408. DOI: 10.7544/issn1000-1239.2018.20170920
Abstract PDF
An Attribute-Based Broadcast Encryption Scheme Suitable for the Broadcasting Network
Li Xuejun, Yuan Yawen, Jin Chunhua
2018, 55(7): 1409-1420. DOI: 10.7544/issn1000-1239.2018.20180085
Abstract PDF
Position Based Digital Signature Scheme in IoTs
Que Mengfei, Zhang Junwei, Yang Chao, Yang Li, Ma Jianfeng, Cui Wenxuan
2018, 55(7): 1421-1431. DOI: 10.7544/issn1000-1239.2018.20180065
Abstract PDF
Ultra-Lightweight RFID Electronic Ticket Authentication Scheme in IoT
Wang Yue, Fan Kai
2018, 55(7): 1432-1439. DOI: 10.7544/issn1000-1239.2018.20180075
Abstract PDF
Home Wireless Router Protection Method Based on Cyber Deception
Liu Qixu, Xu Chenchen, Liu Jingqiang, Hu Enze, Jin Ze
2018, 55(7): 1440-1450. DOI: 10.7544/issn1000-1239.2018.20180087
Abstract PDF
CREBAD: Chip Radio Emission Based Anomaly Detection Scheme of IoT Devices
Ni Mingtao, Zhao Bo, Wu Fusheng, Fan Peiru
2018, 55(7): 1451-1461. DOI: 10.7544/issn1000-1239.2018.20180067
Abstract PDF
Blockchain-Based Trust Management Framework for Distributed Internet of Things
Ren Yanbing, Li Xinghua, Liu Hai, Cheng Qingfeng, Ma Jianfeng
2018, 55(7): 1462-1478. DOI: 10.7544/issn1000-1239.2018.20180073
Abstract PDF
PRE-TUAN: Proxy Re-Encryption Based Trusted Update Scheme of Authorization for Nodes on IoT Cloud
Su Mang, Cao Mengyuan, Xie Rongna, Fu Anmin
2018, 55(7): 1479-1487. DOI: 10.7544/issn1000-1239.2018.20180056
Abstract PDF
Efficient Detection of False Data Fusion in IoT
Xu Zhiwei, Zhang Yujun
2018, 55(7): 1488-1497. DOI: 10.7544/issn1000-1239.2018.20180123
Abstract PDF
A Large-Scale Cross-Platform Homologous Binary Retrieval Method
Chen Yu, Liu Zhongjin, Zhao Weiwei, Ma Yuan, Shi Zhiqiang, Sun Limin
2018, 55(7): 1498-1507. DOI: 10.7544/issn1000-1239.2018.20180078
Abstract PDF
A Feature-Based Co-Clustering Model
Zhang Fei, Zhang Libo, Luo Tiejian, Wu Yanjun
2018, 55(7): 1508-1524. DOI: 10.7544/issn1000-1239.2018.20170252
Abstract PDF
CUDA-TP: A GPU-Based Parallel Algorithm for Top-Down Intact Protein Identification
Duan Qiong, Tian Bo, Chen Zheng, Wang Jie, He Zengyou
2018, 55(7): 1525-1538. DOI: 10.7544/issn1000-1239.2018.20170080
Abstract PDF
Question Similarity Calculation Based on Key Information
Qi Le, Zhang Yu, Liu Ting
2018, 55(7): 1539-1547. DOI: 10.7544/issn1000-1239.2018.20170507
Abstract PDF
An Attention-Based Approach for Chemical Compound and Drug Named Entity Recognition
Yang Pei, Yang Zhihao, Luo Ling, Lin Hongfei, Wang Jian
2018, 55(7): 1548-1556. DOI: 10.7544/issn1000-1239.2018.20170506
Abstract PDF
Node Selection Algorithm During Multi-Nodes Repair Progress in Distributed Storage System
Liu Pei, Jiang Ziyi, Cao Xiu
2018, 55(7): 1557-1568. DOI: 10.7544/issn1000-1239.2018.20160915
Abstract PDF
High Throughput MicroBenchmark Research for Processor MicroArchitecture Evaluation
Xue Rui, Miao Futao, Ye Xiaochun, Sun Ninghui, Xu Wenxing
2018, 55(7): 1569-1583. DOI: 10.7544/issn1000-1239.2018.20170053
Abstract PDF
Iterative Identification of Maximal Convex Custom Instruction for Extensible Processors
Wang Shanshan, Liu Wanjun, Xiao Chenglong
2018, 55(7): 1584-1596. DOI: 10.7544/issn1000-1239.2018.20170384
Abstract PDF