• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

column
A Survey on Machine Learning Based Routing Algorithms
Liu Chenyi, Xu Mingwei, Geng Nan, Zhang Xiang
2020, 57(4): 671-687. DOI: 10.7544/issn1000-1239.2020.20190866
Abstract PDF
A Review on the Application of Machine Learning in SDN Routing Optimization
Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen
2020, 57(4): 688-698. DOI: 10.7544/issn1000-1239.2020.20190837
Abstract PDF
Building Network Domain Knowledge Graph from Heterogeneous YANG Models
Dong Yongqiang, Wang Xin, Liu Yongbo, Yang Wang
2020, 57(4): 699-708. DOI: 10.7544/issn1000-1239.2020.20190882
Abstract PDF
DNN Inference Acceleration via Heterogeneous IoT Devices Collaboration
Sun Sheng, Li Xujing, Liu Min, Yang Bo, Guo Xiaobing
2020, 57(4): 709-722. DOI: 10.7544/issn1000-1239.2020.20190863
Abstract PDF
Bus-Data-Driven Forwarding Scheme for Urban Vehicular Networks
Tang Xiaolan, Xu Yao, Chen Wenlong
2020, 57(4): 723-735. DOI: 10.7544/issn1000-1239.2020.20190876
Abstract PDF
Adversarial Example Attack Analysis of Low-Dimensional Industrial Control Network System Dataset
Zhou Wen, Zhang Shikun, Ding Yong, Chen Xi
2020, 57(4): 736-745. DOI: 10.7544/issn1000-1239.2020.20190844
Abstract PDF
burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network
Ma Chencheng, Du Xuehui, Cao Lifeng, Wu Bei
2020, 57(4): 746-766. DOI: 10.7544/issn1000-1239.2020.20190860
Abstract PDF
Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search
Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang
2020, 57(4): 767-777. DOI: 10.7544/issn1000-1239.2020.20190870
Abstract PDF
Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter
Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan
2020, 57(4): 778-790. DOI: 10.7544/issn1000-1239.2020.20190875
Abstract PDF
The Optimization Method of Wireless Network Attacks Detection Based on Semi-Supervised Learning
Wang Ting, Wang Na, Cui Yunpeng, Li Huan
2020, 57(4): 791-802. DOI: 10.7544/issn1000-1239.2020.20190880
Abstract PDF
Cybersecurity Challenges from the Perspective of Emergence
Qu Leilei, Xiao Ruojin, Shi Wenchang, Liang Bin, Qin Bo
2020, 57(4): 803-823. DOI: 10.7544/issn1000-1239.2020.20190379
Abstract PDF
Survey of Access-Driven Cache-Based Side Channel Attack
Miao Xinliang, Jiang Liehui, Chang Rui
2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581
Abstract PDF
Cyber Security Threat Intelligence Sharing Model Based on Blockchain
Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang
2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
Abstract PDF
Towards Spatial Range Queries Under Local Differential Privacy
Zhang Xiaojian, Fu Nan, Meng Xiaofeng
2020, 57(4): 847-858. DOI: 10.7544/issn1000-1239.2020.20190360
Abstract PDF
A Survey on Algorithm Research of Scene Parsing Based on Deep Learning
Zhang Rui, Li Jintao
2020, 57(4): 859-875. DOI: 10.7544/issn1000-1239.2020.20190513
Abstract PDF
A Semantic Segmentation Method of Traffic Scene Based on Categories-Aware Domain Adaptation
Jia Yingxia, Lang Congyan, Feng Songhe
2020, 57(4): 876-887. DOI: 10.7544/issn1000-1239.2020.20190475
Abstract PDF
Min-Entropy Transfer Adversarial Hashing
Zhuo Junbao, Su Chi, Wang Shuhui, Huang Qingming
2020, 57(4): 888-896. DOI: 10.7544/issn1000-1239.2020.20190476
Abstract PDF