• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Survey of Copyright Protection Schemes Based on DNN Model
Fan Xuefeng, Zhou Xiaoyi, Zhu Bingbing, Dong Jinwei, Niu Jun, Wang He
2022, 59(5): 953-977. DOI: 10.7544/issn1000-1239.20211115
Abstract PDF
Survey of Protocol Security of Industrial Control System
Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin
2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
Abstract PDF
Survey on Machine Learning-Based Anomaly Detection for Industrial Internet
Liu Qixu, Chen Yanhui, Ni Jieshuo, Luo Cheng, Liu Caiyun, Cao Yaqin, Tan Ru, Feng Yun, Zhang Yue
2022, 59(5): 994-1014. DOI: 10.7544/issn1000-1239.20211147
Abstract PDF
Research and Challenges on Reverse Analysis Technology of Industrial Control Protocol
Huang Tao, Fu Anmin, Ji Yukai, Mao An, Wang Zhanfeng, Hu Chao
2022, 59(5): 1015-1034. DOI: 10.7544/issn1000-1239.20211149
Abstract PDF
Survey of Industrial Control Systems Security
Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing
2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
Abstract PDF
Survey of Ubiquitous Computing Security
Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei
2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248
Abstract PDF
Quantum K-Nearest Neighbor Classification Algorithm for Privacy Data Analysis of Industrial Internet
Chang Yan, Lin Yusheng, Huang Siwei, Zhang Shibin
2022, 59(5): 1082-1091. DOI: 10.7544/issn1000-1239.20211146
Abstract PDF
Action Identification Without Bounds on Applications Based on Self-Attention Mechanism
Wang Chong, Wei Ziling, Chen Shuhui
2022, 59(5): 1092-1104. DOI: 10.7544/issn1000-1239.20211158
Abstract PDF
An Integrated Protection Method of Moving Target Defense and Access Control Based on IPv6 Network
Li Zhenyu, Ding Yong, Yuan Fang, Zhang Kun
2022, 59(5): 1105-1119. DOI: 10.7544/issn1000-1239.20211118
Abstract PDF
An Edge Zero-Trust Model Against Compromised Terminals Threats in Power IoT Environments
Feng Jingyu, Yu Tingting, Wang Ziying, Zhang Wenbo, Han Gang, Huang Wenhua
2022, 59(5): 1120-1132. DOI: 10.7544/issn1000-1239.20211129
Abstract PDF
Security Testing of Visual Perception Module in Autonomous Driving System
Wu Hao, Wang Hao, Su Xing, Li Minghao, Xu Fengyuan, Zhong Sheng
2022, 59(5): 1133-1147. DOI: 10.7544/issn1000-1239.20211139
Abstract PDF
Classification Method of Industrial Internet Intrusion Detection Based on Feature Selection
Ren Jiadong, Zhang Yafei, Zhang Bing, Li Shangyang
2022, 59(5): 1148-1159. DOI: 10.7544/issn1000-1239.20211152
Abstract PDF
Survey of 3-Dimensional Point Cloud Processing Based on Deep Learning
Li Jiaojiao, Sun Hongyan, Dong Yu, Zhang Ruohan, Sun Xiaopeng
2022, 59(5): 1160-1179. DOI: 10.7544/issn1000-1239.20210131
Abstract PDF