• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Brain-like Machine: Thought and Architecture
Huang Tiejun, Yu Zhaofei, Liu Yijun
2019, 56(6): 1135-1148. DOI: 10.7544/issn1000-1239.2019.20190240
Abstract PDF
3D Memristor Array Based Neural Network Processing in Memory Architecture
Mao Haiyu, Shu Jiwu
2019, 56(6): 1149-1160. DOI: 10.7544/issn1000-1239.2019.20190099
Abstract PDF
A Secure Encryption Scheme for Deep Learning Accelerators
Zuo Pengfei, Hua Yu, Xie Xinfeng, Hu Xing, Xie Yuan, Feng Dan
2019, 56(6): 1161-1169. DOI: 10.7544/issn1000-1239.2019.20190109
Abstract PDF
Modeling Computational Feature of Multi-Layer Neural Network
Fang Rongqiang, Wang Jing, Yao Zhicheng, Liu Chang, Zhang Weigong
2019, 56(6): 1170-1181. DOI: 10.7544/issn1000-1239.2019.20190111
Abstract PDF
Training and Software Simulation for ReRAM-Based LSTM Neural Network Acceleration
Liu He, Ji Yu, Han Jianhui, Zhang Youhui, Zheng Weimin
2019, 56(6): 1182-1191. DOI: 10.7544/issn1000-1239.2019.20190113
Abstract PDF
Accelerating Fully Connected Layers of Sparse Neural Networks with Fine-Grained Dataflow Architectures
Xiang Taoran, Ye Xiaochun, Li Wenming, Feng Yujing, Tan Xu, Zhang Hao, Fan Dongrui
2019, 56(6): 1192-1204. DOI: 10.7544/issn1000-1239.2019.20190117
Abstract PDF
A Propagation Mechanism Combining an Optimal Propagation Path and Incentive in Blockchain Networks
Hai Mo, Zhu Jianming
2019, 56(6): 1205-1218. DOI: 10.7544/issn1000-1239.2019.20180419
Abstract PDF
Multi-Constrained Energy-Saving Routing Algorithm in Software-Defined Data Center Networks
He Rongxi, Lei Tianying, Lin Ziwei
2019, 56(6): 1219-1230. DOI: 10.7544/issn1000-1239.2019.20180029
Abstract PDF
Node Location Verification Framework for WSN
Miao Chunyu, Chen Lina, Wu Jianjun, Zhou Jiaqing, Feng Xuhang
2019, 56(6): 1231-1243. DOI: 10.7544/issn1000-1239.2019.20170660
Abstract PDF
Personalized Privacy Preserving Link Prediction in Social Networks
Meng Xuying, Zhang Qijia, Zhang Hanwen, Zhang Yujun, Zhao Qinglin
2019, 56(6): 1244-1251. DOI: 10.7544/issn1000-1239.2019.20180306
Abstract PDF
An Automatic Detection Method for Privacy Leakage Across Application Components
Li Zhen, Tang Zhanyong, Li Zhengqiao, Wang Hai, Gong Xiaoqing, Chen Feng, Chen Xiaojiang, Fang Dingyi
2019, 56(6): 1252-1262. DOI: 10.7544/issn1000-1239.2019.20180548
Abstract PDF
Detecting Malicious Domains Using Co-Occurrence Relation Between DNS Query
Peng Chengwei, Yun Xiaochun, Zhang Yongzheng, Li Shuhao
2019, 56(6): 1263-1274. DOI: 10.7544/issn1000-1239.2019.20180481
Abstract PDF
Security Analysis of Authentication Protocol of WMN Client and LTCA Based on Logic of Events
Xiao Meihua, Li Yanan, Song Jiawen, Wang Xizhong, Li Wei, Zhong Xiaomei
2019, 56(6): 1275-1289. DOI: 10.7544/issn1000-1239.2019.20180466
Abstract PDF
Attribute-Based Encryption for Data Security Sharing of Internet of Things
Zhao Zhiyuan, Wang Jianhua, Zhu Zhiqiang, Sun Lei
2019, 56(6): 1290-1301. DOI: 10.7544/issn1000-1239.2019.20180288
Abstract PDF
An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network
Yu Yaxin, Wang Lei
2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068
Abstract PDF
A Hierarchical Deep Correlative Fusion Network for Sentiment Classification in Social Media
Cai Guoyong, Lü Guangrui, Xu Zhi
2019, 56(6): 1312-1324. DOI: 10.7544/issn1000-1239.2019.20180341
Abstract PDF
A MD fuzzy k-modes Algorithm for Clustering Categorical Matrix-Object Data
Li Shunyong, Zhang Miaomiao, Cao Fuyuan
2019, 56(6): 1325-1337. DOI: 10.7544/issn1000-1239.2019.20180737
Abstract PDF
Progress and Challenges of Graph Summarization Techniques
Wang Xiong, Dong Yihong, Shi Weijie, Pan Jianfei
2019, 56(6): 1338-1355. DOI: 10.7544/issn1000-1239.2019.20180371
Abstract PDF