Computer Science ›› 2019, Vol. 46 ›› Issue (3): 217-220.doi: 10.11896/j.issn.1002-137X.2019.03.032
• Information Security • Previous Articles Next Articles
ZHANG Jian-an
CLC Number:
[1]WU M T,ZHAN J,LIN C W.Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets[J].IEEE Access,2017,PP(99):1 [2]XIANG L,PENG J X,ZHANG L.Network Clustering Algo- rithm Based on Energy Time Competition Mechanism in Hete-rogeneous Network Environment[J].Bulletin of Science and Technology,2017,33(8):185-188.(in Chinese) 向岚,彭进香,张莉.异构网络环境中基于能量时间竞争机制的网络分簇算法研究[J].科技通报,2017,33(8):185-188. [3]LUO C,FYLAKIS A,PARTALA J,et al.A data hiding approach for sensitive smartphone data[C]∥ACM International Joint Conference on Pervasive and Ubiquitous Computing.ACM,2016:557-568. [4]ZHANG X,ZHANG Y,JIN C F,et al.A Dynamic Almost Blank Subframes Allocation for Interference Coordination in Heterogeneous Networks[J].Computer Measurement & Control,2016,24(7):215-218.(in Chinese) 张新,张艳,金春凤,等.异构网络动态配置空白子帧干扰协调算法[J].计算机测量与控制,2016,24(7):215-218. [5]SHARMA S,TOSHNIWAL D.Scalable two-phase co-occurring sensitive pattern hiding using MapReduce[J].Journal of Big Data,2017,4(1):4-14. [6]LI S B,WANG L R,LIU P,et al.A HEVC Information Hiding Approach Based on Motion Vection Space Encoding[J].Chinese Journal of Computers,2016,39(7):1450-1463.(in Chinese) 李松斌,王凌睿,刘鹏,等.一种基于运动矢量空间编码的HEVC信息隐藏方法[J].计算机学报,2016,39(7):1450-1463. [7]LIN C W,LIU Q,FOURNIER-VIGER P,et al.A sanitization approach for hiding sensitive itemsets based on particle swarm optimization[J].Engineering Applications of Artificial Intelligence,2016,53(C):1-18. [8]GAO B,ZHAI J T,DAI Y W.Information hiding method based on Have messages in BitTorrent protocol[J].Journal of Computer Applications,2017,37(1):200-205.(in Chinese) 高斌,翟江涛,戴跃伟.基于BitTorrent协议Have消息的信息隐藏方法[J].计算机应用,2017,37(1):200-205. [9]KHEDEKAR L S.Security:An effective technique to protecting sensitive information using quick response code[C]∥International Conference on Communication and Signal Processing.IEEE,2016:1185-1188. [10]PENG Y B,XIE X T.The adaptive Web information extraction based on single DOM tree characteristics and classification[J].Electronic Design Engineering,2017,25(19):56-59.(in Chinese) 彭艳兵,谢馨庭.基于单DOM树特征预分类的自适应Web信息抽取方法[J].电子设计工程,2017,25(19):56-59. [11]YANG M J,SHAO D,LIU K Y.Vertical handoff for heterogeneous wireless network based on mobile terminal priority[J].Journal of Dalian Polytechnic University,2018,20(1):73-78.(in Chinese) 杨明极,邵丹,刘恺怿.移动终端在异构无线网络中的接入方法[J].大连工业大学学报,2018,20(1):73-78. [12]FEI H H.Research on Optimal Detection Method of User Infor- mation Resources In Network[J].Computer Simulation,2017(12):318-320.(in Chinese) 费宏慧.导构网络中用户信息资源优化检测方法研究[J].计算机仿真,2017(12):318-320. [13]Innowireless Co.L.Method of switching connection to femtocell and wifi ap in sdn[J].New Patents & Technology,2016,21(3):12. [14]MA B,DENG H,XIE X Z.Two-sided Matching Model Based Vertical Handover Algorithm in Heterogeneous Wireless Networks[J].Journal of Electronics & Information Technology,2018,40(2):421-429.(in Chinese) 马彬,邓红,谢显中.基于双向匹配模型的异构网络垂直切换算法[J].电子与信息学报,2018,40(2):421-429. [15]LI X W,WANG X J,TIAN F X,et al.Analysis and Implementation of Handover Process of Dual Connectivity Technology based on Heterogeneous Networks[J].Study on Optical Communications,2017,43(2):68-70.(in Chinese) 李小文,王晓娟,田凤仙,等.基于异构网双连接技术切换流程的分析与实现[J].光通信研究,2017,43(2):68-70. [16]WU W G,ZHANG Z W,WANG Q S.A Information Security Risk Assesment Model Based on AHP and Fuzzy Comprehensive Evaluation.Journal of Chongqing University of Technology(Natural Science),2017,31(7):162-167.(in Chinese) 吴文刚,张志文,王庆生.基于模糊综合评判和AHP信息安全风险评估模型.重庆理工大学学报(自然科学),2017,31(7):162-167. |
[1] | CHANG Geng, ZHAO Lan, CHEN Wen. MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [J]. Computer Science, 2022, 49(4): 354-361. |
[2] | XIE Zhi-jie, ZHANG Min, LI Zhen-han, WANG Hong-jun. Analysis of Large-scale Real User Password Data Based on Cracking Algorithms [J]. Computer Science, 2020, 47(11): 48-54. |
[3] | CHEN Gui-ping,WANG Zi-niu. Multiple Encrypted Storage Technology of User Information Based on Big Data Analysis [J]. Computer Science, 2018, 45(7): 150-153. |
[4] | XIE Ming,WU Chan-le. Topic Extracting with User Information Protection on Web [J]. Computer Science, 2011, 38(3): 203-205. |
|