Advanced Search

    column
    A Survey on Machine Learning Based Routing Algorithms
    Liu Chenyi, Xu Mingwei, Geng Nan, Zhang Xiang
    2020, 57(4): 671-687. DOI: 10.7544/issn1000-1239.2020.20190866
    Abstract FullText HTML PDF
    A Review on the Application of Machine Learning in SDN Routing Optimization
    Wang Guizhi, Lü Guanghong, Jia Wucai, Jia Chuanghui, Zhang Jianshen
    2020, 57(4): 688-698. DOI: 10.7544/issn1000-1239.2020.20190837
    Abstract FullText HTML PDF
    Building Network Domain Knowledge Graph from Heterogeneous YANG Models
    Dong Yongqiang, Wang Xin, Liu Yongbo, Yang Wang
    2020, 57(4): 699-708. DOI: 10.7544/issn1000-1239.2020.20190882
    Abstract FullText HTML PDF
    DNN Inference Acceleration via Heterogeneous IoT Devices Collaboration
    Sun Sheng, Li Xujing, Liu Min, Yang Bo, Guo Xiaobing
    2020, 57(4): 709-722. DOI: 10.7544/issn1000-1239.2020.20190863
    Abstract FullText HTML PDF
    Bus-Data-Driven Forwarding Scheme for Urban Vehicular Networks
    Tang Xiaolan, Xu Yao, Chen Wenlong
    2020, 57(4): 723-735. DOI: 10.7544/issn1000-1239.2020.20190876
    Abstract FullText HTML PDF
    Adversarial Example Attack Analysis of Low-Dimensional Industrial Control Network System Dataset
    Zhou Wen, Zhang Shikun, Ding Yong, Chen Xi
    2020, 57(4): 736-745. DOI: 10.7544/issn1000-1239.2020.20190844
    Abstract FullText HTML PDF
    burst-Analysis Website Fingerprinting Attack Based on Deep Neural Network
    Ma Chencheng, Du Xuehui, Cao Lifeng, Wu Bei
    2020, 57(4): 746-766. DOI: 10.7544/issn1000-1239.2020.20190860
    Abstract FullText HTML PDF
    Selection of Network Defense Strategies Based on Stochastic Game and Tabu Search
    Sun Qian, Xue Leiqi, Gao Ling, Wang Hai, Wang Yuxiang
    2020, 57(4): 767-777. DOI: 10.7544/issn1000-1239.2020.20190870
    Abstract FullText HTML PDF
    Unified Anomaly Detection for Syntactically Diverse Logs in Cloud Datacenter
    Zhang Shenglin, Li Dongwen, Sun Yongqian, Meng Weibin, Zhang Yuzhe, Zhang Yuzhi, Liu Ying, Pei Dan
    2020, 57(4): 778-790. DOI: 10.7544/issn1000-1239.2020.20190875
    Abstract FullText HTML PDF
    The Optimization Method of Wireless Network Attacks Detection Based on Semi-Supervised Learning
    Wang Ting, Wang Na, Cui Yunpeng, Li Huan
    2020, 57(4): 791-802. DOI: 10.7544/issn1000-1239.2020.20190880
    Abstract FullText HTML PDF
    Cybersecurity Challenges from the Perspective of Emergence
    Qu Leilei, Xiao Ruojin, Shi Wenchang, Liang Bin, Qin Bo
    2020, 57(4): 803-823. DOI: 10.7544/issn1000-1239.2020.20190379
    Abstract FullText HTML PDF
    Survey of Access-Driven Cache-Based Side Channel Attack
    Miao Xinliang, Jiang Liehui, Chang Rui
    2020, 57(4): 824-835. DOI: 10.7544/issn1000-1239.2020.20190581
    Abstract FullText HTML PDF
    Cyber Security Threat Intelligence Sharing Model Based on Blockchain
    Huang Kezhen, Lian Yifeng, Feng Dengguo, Zhang Haixia, Liu Yuling, Ma Xiangliang
    2020, 57(4): 836-846. DOI: 10.7544/issn1000-1239.2020.20190404
    Abstract FullText HTML PDF
    Towards Spatial Range Queries Under Local Differential Privacy
    Zhang Xiaojian, Fu Nan, Meng Xiaofeng
    2020, 57(4): 847-858. DOI: 10.7544/issn1000-1239.2020.20190360
    Abstract FullText HTML PDF
    A Survey on Algorithm Research of Scene Parsing Based on Deep Learning
    Zhang Rui, Li Jintao
    2020, 57(4): 859-875. DOI: 10.7544/issn1000-1239.2020.20190513
    Abstract FullText HTML PDF
    A Semantic Segmentation Method of Traffic Scene Based on Categories-Aware Domain Adaptation
    Jia Yingxia, Lang Congyan, Feng Songhe
    2020, 57(4): 876-887. DOI: 10.7544/issn1000-1239.2020.20190475
    Abstract FullText HTML PDF
    Min-Entropy Transfer Adversarial Hashing
    Zhuo Junbao, Su Chi, Wang Shuhui, Huang Qingming
    2020, 57(4): 888-896. DOI: 10.7544/issn1000-1239.2020.20190476
    Abstract FullText HTML PDF