Advanced Search

    column
    DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
    Zhang Long, Wang Jinsong
    2019, 56(5): 909-918. DOI: 10.7544/issn1000-1239.2019.20190017
    Abstract FullText HTML PDF
    Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
    Chen Li, Deng Kun, Jiang Tao, Yue Guangxue, Li Panpan, Yang Jun, Xu Xubao
    2019, 56(5): 919-928. DOI: 10.7544/issn1000-1239.2019.20190016
    Abstract FullText HTML PDF
    Intelligent and Efficient Method for Optimal Penetration Path Generation
    Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu
    2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
    Abstract FullText HTML PDF
    Network Defense Decision-Making Method Based on Stochastic Game and Improved WoLF-PHC
    Yang Junnan, Zhang Hongqi, Zhang Chuanfu
    2019, 56(5): 942-954. DOI: 10.7544/issn1000-1239.2019.20180877
    Abstract FullText HTML PDF
    DiffSec: A Differentiated Intelligent Network Security Service Model
    Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming
    2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    Abstract FullText HTML PDF
    Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
    Fei Ning, Xu Lijie, Cheng Xiaohui
    2019, 56(5): 967-976. DOI: 10.7544/issn1000-1239.2019.20180866
    Abstract FullText HTML PDF
    Uncertain Data Clustering Algorithm Based on Voronoi Diagram in Obstacle Space
    Wan Jing, Cui Meiyu, He Yunbin, Li Song
    2019, 56(5): 977-991. DOI: 10.7544/issn1000-1239.2019.20170979
    Abstract FullText HTML PDF
    A Parallel Algorithm for Mining Interactive Features from Large Scale Sequences
    Zhao Yuhai, Yin Ying, Li Yuan, Wang Siyao, Wang Guoren
    2019, 56(5): 992-1006. DOI: 10.7544/issn1000-1239.2019.20180276
    Abstract FullText HTML PDF
    Data Driven Prediction for the Difficulty of Mathematical Items
    Tong Wei, Wang Fei, Liu Qi, Chen Enhong
    2019, 56(5): 1007-1019. DOI: 10.7544/issn1000-1239.2019.20180366
    Abstract FullText HTML PDF
    The Framework of Protein Function Prediction Based on Boolean Matrix Decomposition
    Liu Lin, Tang Lin, Tang Mingjing, Zhou Wei
    2019, 56(5): 1020-1033. DOI: 10.7544/issn1000-1239.2019.20180274
    Abstract FullText HTML PDF
    A Collaborative Filtering Recommendation Algorithm for Multi-Source Heterogeneous Data
    Wu Bin, Lou Zhengzheng, Ye Yangdong
    2019, 56(5): 1034-1047. DOI: 10.7544/issn1000-1239.2019.20180461
    Abstract FullText HTML PDF
    Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
    Xi Liang, Wang Yong, Zhang Fengbin
    2019, 56(5): 1048-1059. DOI: 10.7544/issn1000-1239.2019.20180099
    Abstract FullText HTML PDF
    Noise Level Estimation Algorithm Using Convolutional Neural Network-Based Noise Separation Model
    Xu Shaoping, Liu Tingyun, Li Chongxi, Tang Yiling, Hu Lingyan
    2019, 56(5): 1060-1070. DOI: 10.7544/issn1000-1239.2019.20180185
    Abstract FullText HTML PDF
    Audio-Visual Correlated Multimodal Concept Detection
    Dian Yujie, Jin Qin
    2019, 56(5): 1071-1081. DOI: 10.7544/issn1000-1239.2019.20180463
    Abstract FullText HTML PDF
    Denoising Autoencoder-Based Language Feature Compensation
    Miao Xiaoxiao, Xu Ji, Wang Jian
    2019, 56(5): 1082-1091. DOI: 10.7544/issn1000-1239.2019.20180471
    Abstract FullText HTML PDF
    Static Restart Stochastic Gradient Descent Algorithm Based on Image Question Answering
    Li Shengdong, Lü Xueqiang
    2019, 56(5): 1092-1100. DOI: 10.7544/issn1000-1239.2019.20180472
    Abstract FullText HTML PDF
    ElGamal Broadcasting Multi-Signcryption Protocol with UC Security
    Li Jianmin, Yu Huifang, Xie Yong
    2019, 56(5): 1101-1111. DOI: 10.7544/issn1000-1239.2019.20180130
    Abstract FullText HTML PDF
    Efficient and Verifiable Encryption Scheme in Lightweight Narrowband Internet of Things Applications
    Qian Hanjia, Wang Yihuai, Peng Tao, Chen Cheng, Luo Xizhao
    2019, 56(5): 1112-1122. DOI: 10.7544/issn1000-1239.2019.20180217
    Abstract FullText HTML PDF
    Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead
    Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu
    2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    Abstract FullText HTML PDF