Advanced Search

    column
    Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies
    Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei
    2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459
    Abstract FullText HTML PDF
    Identity Based Group Key Distribution Scheme
    Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong
    2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
    Abstract FullText HTML PDF
    Robust Source Anonymous Federated Learning Shuffle Protocol in IoT
    Chen Jingxue, Gao Kehan, Zhou Erqiang, Qin Zhen
    2023, 60(10): 2218-2233. DOI: 0.7544/issn1000-1239.202330393
    Abstract FullText HTML PDF
    Survey of Artificial Intelligence Based IoT Malware Detection
    Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang
    2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
    Abstract FullText HTML PDF
    Review of Firmware Emulators in Embedded Devices
    Zhang Hao, Shen Shandian, Liu Peng, Yang Zelin, Zhou Wei, Zhang Yuqing
    2023, 60(10): 2255-2270. DOI: 10.7544/issn1000-1239.202330476
    Abstract FullText HTML PDF
    Survey of IoT Device Security Detection
    Zhang Yan, Li Jiatong, Song Xiaoyi, Fan Yuting, Lu Yemian, Zhang Ruoding, Wang Zixin
    2023, 60(10): 2271-2290. DOI: 10.7544/issn1000-1239.202330482
    Abstract FullText HTML PDF
    Machine Learning Based Runtime Detection and Recovery Method Against UAV Sensor Attacks
    Sun Cong, Zeng Huiming, Song Huandong, Wang Yunbo, Zhang Zongxu, Ma Jianfeng
    2023, 60(10): 2291-2303. DOI: 10.7544/issn1000-1239.202330451
    Abstract FullText HTML PDF
    Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects
    Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin
    2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    Abstract FullText HTML PDF
    Quality Optimization Method of Dynamic Binary Translation Code Targeting for RISC-V
    Yu Zihao, Chen Lu, Sun Ninghui, Bao Yungang
    2023, 60(10): 2322-2334. DOI: 10.7544/issn1000-1239.202220296
    Abstract FullText HTML PDF
    Context-Aware Based API Recommendation with Diversity
    Lai Baoqiang, Li Zheng, Zhao Ruilian, Guo Junxia
    2023, 60(10): 2335-2347. DOI: 10.7544/issn1000-1239.202220317
    Abstract FullText HTML PDF
    Multi-User Preference Top-k Skyline Query Method Based on Road Network
    Li Song, Bin Tingliang, Hao Xiaohong, Zhang Liping, Hao Zhongxiao
    2023, 60(10): 2348-2358. DOI: 10.7544/issn1000-1239.202220455
    Abstract FullText HTML PDF
    Exploration Approaches in Deep Reinforcement Learning Based on Intrinsic Motivation: A Review
    Zeng Junjie, Qin Long, Xu Haotian, Zhang Qi, Hu Yue, Yin Quanjun
    2023, 60(10): 2359-2382. DOI: 10.7544/issn1000-1239.202220388
    Abstract FullText HTML PDF
    Vertex Betweenness Centrality Computation Method over Temporal Graphs
    Zhang Tianming, Zhao Jie, Jin Lu, Chen Lu, Cao Bin, Fan Jing
    2023, 60(10): 2383-2393. DOI: 10.7544/issn1000-1239.202220650
    Abstract FullText HTML PDF
    Multi-Agent Deep Deterministic Policy Gradient Method Based on Double Critics
    Ding Shifei, Du Wei, Guo Lili, Zhang Jian, Xu Xiao
    2023, 60(10): 2394-2404. DOI: 10.7544/issn1000-1239.202220399
    Abstract FullText HTML PDF
    A Dataflow Computing System for New Generation of Domestic Heterogeneous Many-Core Processors
    Xiao Qian, Zhao Meijia, Li Mingfan, Shen Li, Chen Junshi, Zhou Wenhao, Wang Fei, An Hong
    2023, 60(10): 2405-2417. DOI: 10.7544/issn1000-1239.202220562
    Abstract FullText HTML PDF
    A Fast Construction Method of the Erasure Code with Small Cross-Cloud Data Center Repair Traffic
    Bao Han, Wang Yijie
    2023, 60(10): 2418-2439. DOI: 10.7544/issn1000-1239.202220580
    Abstract FullText HTML PDF