Advanced Search

    column
    Survey of Copyright Protection Schemes Based on DNN Model
    Fan Xuefeng, Zhou Xiaoyi, Zhu Bingbing, Dong Jinwei, Niu Jun, Wang He
    2022, 59(5): 953-977. DOI: 10.7544/issn1000-1239.20211115
    Abstract FullText HTML PDF
    Survey of Protocol Security of Industrial Control System
    Fang Dongliang, Liu Puzhuo, Qin Chuan, Song Zhanwei, Sun Yuyan, Shi Zhiqiang, Sun Limin
    2022, 59(5): 978-993. DOI: 10.7544/issn1000-1239.20211132
    Abstract FullText HTML PDF
    Survey on Machine Learning-Based Anomaly Detection for Industrial Internet
    Liu Qixu, Chen Yanhui, Ni Jieshuo, Luo Cheng, Liu Caiyun, Cao Yaqin, Tan Ru, Feng Yun, Zhang Yue
    2022, 59(5): 994-1014. DOI: 10.7544/issn1000-1239.20211147
    Abstract FullText HTML PDF
    Research and Challenges on Reverse Analysis Technology of Industrial Control Protocol
    Huang Tao, Fu Anmin, Ji Yukai, Mao An, Wang Zhanfeng, Hu Chao
    2022, 59(5): 1015-1034. DOI: 10.7544/issn1000-1239.20211149
    Abstract FullText HTML PDF
    Survey of Industrial Control Systems Security
    Yang Ting, Zhang Jiayuan, Huang Zaiqi, Chen Yujie, Huang Chenglong, Zhou Wei, Liu Peng, Feng Tao, Zhang Yuqing
    2022, 59(5): 1035-1053. DOI: 10.7544/issn1000-1239.20211154
    Abstract FullText HTML PDF
    Survey of Ubiquitous Computing Security
    Li Yin, Chen Yong, Zhao Jingxin, Yue Xinghui, Zheng Chen, Wu Yanjun, Wu Gaofei
    2022, 59(5): 1054-1081. DOI: 10.7544/issn1000-1239.20211248
    Abstract FullText HTML PDF
    Quantum K-Nearest Neighbor Classification Algorithm for Privacy Data Analysis of Industrial Internet
    Chang Yan, Lin Yusheng, Huang Siwei, Zhang Shibin
    2022, 59(5): 1082-1091. DOI: 10.7544/issn1000-1239.20211146
    Abstract FullText HTML PDF
    Action Identification Without Bounds on Applications Based on Self-Attention Mechanism
    Wang Chong, Wei Ziling, Chen Shuhui
    2022, 59(5): 1092-1104. DOI: 10.7544/issn1000-1239.20211158
    Abstract FullText HTML PDF
    An Integrated Protection Method of Moving Target Defense and Access Control Based on IPv6 Network
    Li Zhenyu, Ding Yong, Yuan Fang, Zhang Kun
    2022, 59(5): 1105-1119. DOI: 10.7544/issn1000-1239.20211118
    Abstract FullText HTML PDF
    An Edge Zero-Trust Model Against Compromised Terminals Threats in Power IoT Environments
    Feng Jingyu, Yu Tingting, Wang Ziying, Zhang Wenbo, Han Gang, Huang Wenhua
    2022, 59(5): 1120-1132. DOI: 10.7544/issn1000-1239.20211129
    Abstract FullText HTML PDF
    Security Testing of Visual Perception Module in Autonomous Driving System
    Wu Hao, Wang Hao, Su Xing, Li Minghao, Xu Fengyuan, Zhong Sheng
    2022, 59(5): 1133-1147. DOI: 10.7544/issn1000-1239.20211139
    Abstract FullText HTML PDF
    Classification Method of Industrial Internet Intrusion Detection Based on Feature Selection
    Ren Jiadong, Zhang Yafei, Zhang Bing, Li Shangyang
    2022, 59(5): 1148-1159. DOI: 10.7544/issn1000-1239.20211152
    Abstract FullText HTML PDF
    Survey of 3-Dimensional Point Cloud Processing Based on Deep Learning
    Li Jiaojiao, Sun Hongyan, Dong Yu, Zhang Ruohan, Sun Xiaopeng
    2022, 59(5): 1160-1179. DOI: 10.7544/issn1000-1239.20210131
    Abstract FullText HTML PDF