Citation: | Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin. Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things[J]. Journal of Computer Research and Development, 2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406 |
[1] | Yue Guangxue, Chen Guanglu, Lu Min, Yang Xiaohui, Liu Jianhua, Huang Chunlan, Yang Zhongming. A Computation Offloading Algorithm with Path Selection Based on K-shell Influence Maximization[J]. Journal of Computer Research and Development, 2021, 58(9): 2025-2039. DOI: 10.7544/issn1000-1239.2021.20200338 |
[2] | Cao Jiuxin, Gao Qingqing, Xia Rongqing, Liu Weijia, Zhu Xuelin, Liu Bo. Information Propagation Prediction and Specific Information Suppression in Social Networks[J]. Journal of Computer Research and Development, 2021, 58(7): 1490-1503. DOI: 10.7544/issn1000-1239.2021.20200809 |
[3] | Zhang Liqing, Guo Dong, Wu Shaoling, Cui Haibo, Wang Wei. An Ultra Lightweight Container that Maximizes Memory Sharing and Minimizes the Runtime Environment[J]. Journal of Computer Research and Development, 2019, 56(7): 1545-1555. DOI: 10.7544/issn1000-1239.2019.20180511 |
[4] | Yan Xiaoqiang, Ye Yangdong. Cross-Media Clustering by Share and Private Information Maximization[J]. Journal of Computer Research and Development, 2019, 56(7): 1370-1382. DOI: 10.7544/issn1000-1239.2019.20180470 |
[5] | Zhang Fenxiang, Chen Huahui, Qian Jiangbo, Dong Yihong. HSSM: A Hierarchical Method for Streaming Submodular Maximization[J]. Journal of Computer Research and Development, 2016, 53(8): 1792-1805. DOI: 10.7544/issn1000-1239.2016.20160140 |
[6] | Li Xiaokang, Zhang Xi, Sun Hao, Sun Guangzhong. Influence Maximization Across Multi-Channels in Social Network[J]. Journal of Computer Research and Development, 2016, 53(8): 1709-1718. DOI: 10.7544/issn1000-1239.2016.20160211 |
[7] | Guo Jingfeng, Lü Jiaguo. Influence Maximization Based on Information Preference[J]. Journal of Computer Research and Development, 2015, 52(2): 533-541. DOI: 10.7544/issn1000-1239.2015.20131311 |
[8] | Zhu Xiang, Jia Yan, Nie Yuanping, Qu Ming. Event Propagation Analysis on Microblog[J]. Journal of Computer Research and Development, 2015, 52(2): 437-444. DOI: 10.7544/issn1000-1239.2015.20140187 |
[9] | Chen Hao and Wang Yitong. Threshold-Based Heuristic Algorithm for Influence Maximization[J]. Journal of Computer Research and Development, 2012, 49(10): 2181-2188. |
[10] | Qi Yingjian, Luo Siwei, Huang Yaping, Li Aijun, Liu Yunhui. An Annealing Expectation Maximization Algorithm[J]. Journal of Computer Research and Development, 2006, 43(4): 654-660. |