• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Efficient Multi-Authority CP-ABE IoT Data Sharing Scheme with Hidden Policies
Zhang Xuewang, Yao Yaning, Fu Jiali, Xie Haofei
2023, 60(10): 2193-2202. DOI: 10.7544/issn1000-1239.202330459
Abstract PDF
Identity Based Group Key Distribution Scheme
Wang Houzhen, Qin Wanying, Liu Qin, Yu Chunwu, Shen Zhidong
2023, 60(10): 2203-2217. DOI: 10.7544/issn1000-1239.202330457
Abstract PDF
Robust Source Anonymous Federated Learning Shuffle Protocol in IoT
Chen Jingxue, Gao Kehan, Zhou Erqiang, Qin Zhen
2023, 60(10): 2218-2233. DOI: 10.7544/issn1000-1239.202330393
Abstract PDF
Survey of Artificial Intelligence Based IoT Malware Detection
Liu Qixu, Liu Jiaxi, Jin Ze, Liu Xinyu, Xiao Juxin, Chen Yanhui, Zhu Hongwen, Tan Yaokang
2023, 60(10): 2234-2254. DOI: 10.7544/issn1000-1239.202330450
Abstract PDF
Review of Firmware Emulators in Embedded Devices
Zhang Hao, Shen Shandian, Liu Peng, Yang Zelin, Zhou Wei, Zhang Yuqing
2023, 60(10): 2255-2270. DOI: 10.7544/issn1000-1239.202330476
Abstract PDF
Survey of IoT Device Security Detection
Zhang Yan, Li Jiatong, Song Xiaoyi, Fan Yuting, Lu Yemian, Zhang Ruoding, Wang Zixin
2023, 60(10): 2271-2290. DOI: 10.7544/issn1000-1239.202330482
Abstract PDF
Machine Learning Based Runtime Detection and Recovery Method Against UAV Sensor Attacks
Sun Cong, Zeng Huiming, Song Huandong, Wang Yunbo, Zhang Zongxu, Ma Jianfeng
2023, 60(10): 2291-2303. DOI: 10.7544/issn1000-1239.202330451
Abstract PDF
Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects
Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin
2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
Abstract PDF
Quality Optimization Method of Dynamic Binary Translation Code Targeting for RISC-V
Yu Zihao, Chen Lu, Sun Ninghui, Bao Yungang
2023, 60(10): 2322-2334. DOI: 10.7544/issn1000-1239.202220296
Abstract PDF
Context-Aware Based API Recommendation with Diversity
Lai Baoqiang, Li Zheng, Zhao Ruilian, Guo Junxia
2023, 60(10): 2335-2347. DOI: 10.7544/issn1000-1239.202220317
Abstract PDF
Multi-User Preference Top-k Skyline Query Method Based on Road Network
Li Song, Bin Tingliang, Hao Xiaohong, Zhang Liping, Hao Zhongxiao
2023, 60(10): 2348-2358. DOI: 10.7544/issn1000-1239.202220455
Abstract PDF
Exploration Approaches in Deep Reinforcement Learning Based on Intrinsic Motivation: A Review
Zeng Junjie, Qin Long, Xu Haotian, Zhang Qi, Hu Yue, Yin Quanjun
2023, 60(10): 2359-2382. DOI: 10.7544/issn1000-1239.202220388
Abstract PDF
Vertex Betweenness Centrality Computation Method over Temporal Graphs
Zhang Tianming, Zhao Jie, Jin Lu, Chen Lu, Cao Bin, Fan Jing
2023, 60(10): 2383-2393. DOI: 10.7544/issn1000-1239.202220650
Abstract PDF
Multi-Agent Deep Deterministic Policy Gradient Method Based on Double Critics
Ding Shifei, Du Wei, Guo Lili, Zhang Jian, Xu Xiao
2023, 60(10): 2394-2404. DOI: 10.7544/issn1000-1239.202220399
Abstract PDF
A Dataflow Computing System for New Generation of Domestic Heterogeneous Many-Core Processors
Xiao Qian, Zhao Meijia, Li Mingfan, Shen Li, Chen Junshi, Zhou Wenhao, Wang Fei, An Hong
2023, 60(10): 2405-2417. DOI: 10.7544/issn1000-1239.202220562
Abstract PDF
A Fast Construction Method of the Erasure Code with Small Cross-Cloud Data Center Repair Traffic
Bao Han, Wang Yijie
2023, 60(10): 2418-2439. DOI: 10.7544/issn1000-1239.202220580
Abstract PDF