• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

DDoS Attack Detection Model Based on Information Entropy and DNN in SDN
Zhang Long, Wang Jinsong
2019, 56(5): 909-918. DOI: 10.7544/issn1000-1239.2019.20190017
Abstract PDF
Delay Tolerant Access Control Method Based on Spatio-Temporal Distribution of Access Requests
Chen Li, Deng Kun, Jiang Tao, Yue Guangxue, Li Panpan, Yang Jun, Xu Xubao
2019, 56(5): 919-928. DOI: 10.7544/issn1000-1239.2019.20190016
Abstract PDF
Intelligent and Efficient Method for Optimal Penetration Path Generation
Wang Shuo, Wang Jianhua, Tang Guangming, Pei Qingqi, Zhang Yuchen, Liu Xiaohu
2019, 56(5): 929-941. DOI: 10.7544/issn1000-1239.2019.20190012
Abstract PDF
Network Defense Decision-Making Method Based on Stochastic Game and Improved WoLF-PHC
Yang Junnan, Zhang Hongqi, Zhang Chuanfu
2019, 56(5): 942-954. DOI: 10.7544/issn1000-1239.2019.20180877
Abstract PDF
DiffSec: A Differentiated Intelligent Network Security Service Model
Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming
2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
Abstract PDF
Implementation and Evaluation of Cooperative Routing in Software Defined Wireless Networking
Fei Ning, Xu Lijie, Cheng Xiaohui
2019, 56(5): 967-976. DOI: 10.7544/issn1000-1239.2019.20180866
Abstract PDF
Uncertain Data Clustering Algorithm Based on Voronoi Diagram in Obstacle Space
Wan Jing, Cui Meiyu, He Yunbin, Li Song
2019, 56(5): 977-991. DOI: 10.7544/issn1000-1239.2019.20170979
Abstract PDF
A Parallel Algorithm for Mining Interactive Features from Large Scale Sequences
Zhao Yuhai, Yin Ying, Li Yuan, Wang Siyao, Wang Guoren
2019, 56(5): 992-1006. DOI: 10.7544/issn1000-1239.2019.20180276
Abstract PDF
Data Driven Prediction for the Difficulty of Mathematical Items
Tong Wei, Wang Fei, Liu Qi, Chen Enhong
2019, 56(5): 1007-1019. DOI: 10.7544/issn1000-1239.2019.20180366
Abstract PDF
The Framework of Protein Function Prediction Based on Boolean Matrix Decomposition
Liu Lin, Tang Lin, Tang Mingjing, Zhou Wei
2019, 56(5): 1020-1033. DOI: 10.7544/issn1000-1239.2019.20180274
Abstract PDF
A Collaborative Filtering Recommendation Algorithm for Multi-Source Heterogeneous Data
Wu Bin, Lou Zhengzheng, Ye Yangdong
2019, 56(5): 1034-1047. DOI: 10.7544/issn1000-1239.2019.20180461
Abstract PDF
Anomaly Detection Algorithm Based on FCM with Adaptive Artificial Fish-Swarm
Xi Liang, Wang Yong, Zhang Fengbin
2019, 56(5): 1048-1059. DOI: 10.7544/issn1000-1239.2019.20180099
Abstract PDF
Noise Level Estimation Algorithm Using Convolutional Neural Network-Based Noise Separation Model
Xu Shaoping, Liu Tingyun, Li Chongxi, Tang Yiling, Hu Lingyan
2019, 56(5): 1060-1070. DOI: 10.7544/issn1000-1239.2019.20180185
Abstract PDF
Audio-Visual Correlated Multimodal Concept Detection
Dian Yujie, Jin Qin
2019, 56(5): 1071-1081. DOI: 10.7544/issn1000-1239.2019.20180463
Abstract PDF
Denoising Autoencoder-Based Language Feature Compensation
Miao Xiaoxiao, Xu Ji, Wang Jian
2019, 56(5): 1082-1091. DOI: 10.7544/issn1000-1239.2019.20180471
Abstract PDF
Static Restart Stochastic Gradient Descent Algorithm Based on Image Question Answering
Li Shengdong, Lü Xueqiang
2019, 56(5): 1092-1100. DOI: 10.7544/issn1000-1239.2019.20180472
Abstract PDF
ElGamal Broadcasting Multi-Signcryption Protocol with UC Security
Li Jianmin, Yu Huifang, Xie Yong
2019, 56(5): 1101-1111. DOI: 10.7544/issn1000-1239.2019.20180130
Abstract PDF
Efficient and Verifiable Encryption Scheme in Lightweight Narrowband Internet of Things Applications
Qian Hanjia, Wang Yihuai, Peng Tao, Chen Cheng, Luo Xizhao
2019, 56(5): 1112-1122. DOI: 10.7544/issn1000-1239.2019.20180217
Abstract PDF
Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead
Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu
2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
Abstract PDF