Advanced Search

    column
    Brain-like Machine: Thought and Architecture
    Huang Tiejun, Yu Zhaofei, Liu Yijun
    2019, 56(6): 1135-1148. DOI: 10.7544/issn1000-1239.2019.20190240
    Abstract FullText HTML PDF
    3D Memristor Array Based Neural Network Processing in Memory Architecture
    Mao Haiyu, Shu Jiwu
    2019, 56(6): 1149-1160. DOI: 10.7544/issn1000-1239.2019.20190099
    Abstract FullText HTML PDF
    A Secure Encryption Scheme for Deep Learning Accelerators
    Zuo Pengfei, Hua Yu, Xie Xinfeng, Hu Xing, Xie Yuan, Feng Dan
    2019, 56(6): 1161-1169. DOI: 10.7544/issn1000-1239.2019.20190109
    Abstract FullText HTML PDF
    Modeling Computational Feature of Multi-Layer Neural Network
    Fang Rongqiang, Wang Jing, Yao Zhicheng, Liu Chang, Zhang Weigong
    2019, 56(6): 1170-1181. DOI: 10.7544/issn1000-1239.2019.20190111
    Abstract FullText HTML PDF
    Training and Software Simulation for ReRAM-Based LSTM Neural Network Acceleration
    Liu He, Ji Yu, Han Jianhui, Zhang Youhui, Zheng Weimin
    2019, 56(6): 1182-1191. DOI: 10.7544/issn1000-1239.2019.20190113
    Abstract FullText HTML PDF
    Accelerating Fully Connected Layers of Sparse Neural Networks with Fine-Grained Dataflow Architectures
    Xiang Taoran, Ye Xiaochun, Li Wenming, Feng Yujing, Tan Xu, Zhang Hao, Fan Dongrui
    2019, 56(6): 1192-1204. DOI: 10.7544/issn1000-1239.2019.20190117
    Abstract FullText HTML PDF
    A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks
    Hai Mo, Zhu Jianming
    2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
    Abstract FullText HTML PDF
    Multi-Constrained Energy-Saving Routing Algorithm in Software-Defined Data Center Networks
    He Rongxi, Lei Tianying, Lin Ziwei
    2019, 56(6): 1219-1230. DOI: 10.7544/issn1000-1239.2019.20180029
    Abstract FullText HTML PDF
    Node Location Verification Framework for WSN
    Miao Chunyu, Chen Lina, Wu Jianjun, Zhou Jiaqing, Feng Xuhang
    2019, 56(6): 1231-1243. DOI: 10.7544/issn1000-1239.2019.20170660
    Abstract FullText HTML PDF
    Personalized Privacy Preserving Link Prediction in Social Networks
    Meng Xuying, Zhang Qijia, Zhang Hanwen, Zhang Yujun, Zhao Qinglin
    2019, 56(6): 1244-1251. DOI: 10.7544/issn1000-1239.2019.20180306
    Abstract FullText HTML PDF
    An Automatic Detection Method for Privacy Leakage Across Application Components
    Li Zhen, Tang Zhanyong, Li Zhengqiao, Wang Hai, Gong Xiaoqing, Chen Feng, Chen Xiaojiang, Fang Dingyi
    2019, 56(6): 1252-1262. DOI: 10.7544/issn1000-1239.2019.20180548
    Abstract FullText HTML PDF
    Detecting Malicious Domains Using Co-Occurrence Relation Between DNS Query
    Peng Chengwei, Yun Xiaochun, Zhang Yongzheng, Li Shuhao
    2019, 56(6): 1263-1274. DOI: 10.7544/issn1000-1239.2019.20180481
    Abstract FullText HTML PDF
    Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
    Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei
    2019, 56(6): 1275-1289. DOI: 10.7544/issn1000-1239.2019.20180466
    Abstract FullText HTML PDF
    Attribute-Based Encryption for Data Security Sharing of Internet of Things
    Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei
    2019, 56(6): 1290-1301. DOI: 10.7544/issn1000-1239.2019.20180288
    Abstract FullText HTML PDF
    An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network
    Yu Yaxin, Wang Lei
    2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068
    Abstract FullText HTML PDF
    A Hierarchical Deep Correlative Fusion Network for Sentiment Classification in Social Media
    Cai Guoyong, Lü Guangrui, Xu Zhi
    2019, 56(6): 1312-1324. DOI: 10.7544/issn1000-1239.2019.20180341
    Abstract FullText HTML PDF
    A MD fuzzy k-modes Algorithm for Clustering Categorical Matrix-Object Data
    Li Shunyong, Zhang Miaomiao, Cao Fuyuan
    2019, 56(6): 1325-1337. DOI: 10.7544/issn1000-1239.2019.20180737
    Abstract FullText HTML PDF
    Progress and Challenges of Graph Summarization Techniques
    Wang Xiong, Dong Yihong, Shi Weijie, Pan Jianfei
    2019, 56(6): 1338-1355. DOI: 10.7544/issn1000-1239.2019.20180371
    Abstract FullText HTML PDF