Advanced Search

    column
    Survey of Copyright Protection Schemes Based on DNN Model
    Fan Xuefeng, Zhou Xiaoyi, Zhu Bingbing, Dong Jinwei, Niu Jun, Wang He
    2022, 59(5): 953-977. DOI: 10.7544/issn1000-1239.20211115
    Abstract PDF
    Survey of Protocol Security of Industrial Control System
    Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin
    2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    Abstract PDF
    Survey on Machine Learning-Based Anomaly Detection for Industrial Internet
    Liu Qixu, Chen Yanhui, Ni Jieshuo, Luo Cheng, Liu Caiyun, Cao Yaqin, Tan Ru, Feng Yun, Zhang Yue
    2022, 59(5): 994-1014. DOI: 10.7544/issn1000-1239.20211147
    Abstract PDF
    Research and Challenges on Reverse Analysis Technology of Industrial Control Protocol
    Huang Tao, Fu Anmin, Ji Yukai, Mao An, Wang Zhanfeng, Hu Chao
    2022, 59(5): 1015-1034. DOI: 10.7544/issn1000-1239.20211149
    Abstract PDF
    Survey of Industrial Control Systems Security
    Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing
    2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
    Abstract PDF
    Survey of Ubiquitous Computing Security
    Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei
    2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248
    Abstract PDF
    Quantum K-Nearest Neighbor Classification Algorithm for Privacy Data Analysis of Industrial Internet
    Chang Yan, Lin Yusheng, Huang Siwei, Zhang Shibin
    2022, 59(5): 1082-1091. DOI: 10.7544/issn1000-1239.20211146
    Abstract PDF
    Action Identification Without Bounds on Applications Based on Self-Attention Mechanism
    Wang Chong, Wei Ziling, Chen Shuhui
    2022, 59(5): 1092-1104. DOI: 10.7544/issn1000-1239.20211158
    Abstract PDF
    An Integrated Protection Method of Moving Target Defense and Access Control Based on IPv6 Network
    Li Zhenyu, Ding Yong, Yuan Fang, Zhang Kun
    2022, 59(5): 1105-1119. DOI: 10.7544/issn1000-1239.20211118
    Abstract PDF
    An Edge Zero-Trust Model Against Compromised Terminals Threats in Power IoT Environments
    Feng Jingyu, Yu Tingting, Wang Ziying, Zhang Wenbo, Han Gang, Huang Wenhua
    2022, 59(5): 1120-1132. DOI: 10.7544/issn1000-1239.20211129
    Abstract PDF
    Security Testing of Visual Perception Module in Autonomous Driving System
    Wu Hao, Wang Hao, Su Xing, Li Minghao, Xu Fengyuan, Zhong Sheng
    2022, 59(5): 1133-1147. DOI: 10.7544/issn1000-1239.20211139
    Abstract PDF
    Classification Method of Industrial Internet Intrusion Detection Based on Feature Selection
    Ren Jiadong, Zhang Yafei, Zhang Bing, Li Shangyang
    2022, 59(5): 1148-1159. DOI: 10.7544/issn1000-1239.20211152
    Abstract PDF
    Survey of 3-Dimensional Point Cloud Processing Based on Deep Learning
    Li Jiaojiao, Sun Hongyan, Dong Yu, Zhang Ruohan, Sun Xiaopeng
    2022, 59(5): 1160-1179. DOI: 10.7544/issn1000-1239.20210131
    Abstract PDF