Computer Science ›› 2020, Vol. 47 ›› Issue (11A): 373-379.doi: 10.11896/jsjkx.200500106
• Information Security • Previous Articles Next Articles
ZHAI Yong, LIU Jin, LIU Lei, CHEN Jie
CLC Number:
[1] LI D R,WANG S L,SHI W Z,et al.On Spatial Data Mining and Knowledge Discovery (SDMKD)[J].Geomatics and Information Science of Wuhan University,2001,26(6):491-499. [2] LI S,DRAGICEVIC S,CASTRO F A,et al.Geospatial big data handling theory and methods:A review and research challenges[J].ISPRS Journal of Photogrammetry and Remote Sensing,2015,115:119-133. [3] LE P,WU Z Y,SHANGGUAN B Y.Design and implementation of a distributed geospatial data storage structure based on spark[J].Geomatics and Information Science of Wuhan University,2018,43(12):2295-2302. [4] WANG Y,WANG S.Research and implementation on spatialdata storage and operation based on hadoop platform[C]//2010 Second IITA International Conference on Geoscience and Remote Sensing.IEEE,2010:275-278. [5] WEI G,VASILAKOS A V,ZHENG Y,et al.A game-theoretic method of fair resource allocation for cloud computing services[J].The Journal of Supercomputing,2010,54(2):252-269. [6] ROUGHGARDEN T.Twenty lectures on algorithmic gametheory[M].Cambridge University Press,2016. [7] ROUGHGARDEN T.Algorithmic game theory[J].Communications of the ACM,2010,53(7):78-86. [8] XU X,YU H.A game theory approach to fair and efficient resource allocation in cloud computing[J].Mathematical Problems in Engineering,2014,2014. [9] NEZARAT A,DASTGHAIBIFARD G H.Efficient nash equi-librium resource allocation based on game theory mechanism in cloud computing by using auction[C]//2015 1st International Conference on Next Generation Computing Technologies (NGCT).IEEE,2015:1-5. [10] MA Y,LI B,ZHANG Y,et al.Efficient auction mechanism with group price for resource allocation in clouds[C]//2014 Second International Conference on Advanced Cloud and Big Data.IEEE,2014:85-92. [11] CHANG C J,TSAI T L,CHEN Y H.Utility and game-theory based network selection scheme in heterogeneous wireless networks[C]//2009 IEEE Wireless Communications and Networking Conference.IEEE,2009:1-5. [12] LI P,TAO Y,XU X Y,et al.Energy consumption balance clustering protocol in wireless sensor network based on game theory[J].Computer Engineering,2018,44(12):156-162. [13] GU Q Y,SUN Y L,GAO F.Research on the Game Theorybased network attack-defense and its application[J].Network information security,2013(1):52-54. [14] JIANG W,FANG B X,TIAN Z H,et al.Evaluating network security and optimal active defense based on attack defense game model[J].Chinese Journal of Computers,2009,32(4):817-827. [15] LIANG X,XIAO Y.Game theory for network security[J].IEEE Communications Surveys & Tutorials,2012,15(1):472-486. [16] JIE B,YANG Y,ZHONG Z W.A virtual computing resource allocation modal of cloud computing based on evolutionary game theory[J].Journal of Beijing Jiaotong University,2013,37(5):75-79. [17] MENG C J,ZHANG F Q,LUO Y F.Nash equilibrium algorithm of cloud resource allocation under game model[J].Hydromechatronics Engineering,2018,46(6):184-192. [18] XU F,WANG S C,YANG W X.Cloud Resource Scheduling Algorithm Based on Game Theory[J].Computer Science,2019,46(S1):295-299. [19] HARDIN G.The tragedy of the commons[J].Science,1968,162(3859):1243-1248. [20] OSTROM E.Governing the commons[M].Cambridge University Press,2015. |
[1] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[2] | YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204. |
[3] | FANG Tao, YANG Yang, CHEN Jia-xin. Optimization of Offloading Decisions in D2D-assisted MEC Networks [J]. Computer Science, 2022, 49(6A): 601-605. |
[4] | XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43. |
[5] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
[6] | WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271. |
[7] | MAO Ying-chi, ZHOU Tong, LIU Peng-fei. Multi-user Task Offloading Based on Delayed Acceptance [J]. Computer Science, 2021, 48(1): 49-57. |
[8] | BAO Jun-bo, YAN Guang-hui, LI Jun-cheng. SIR Propagation Model Combing Incomplete Information Game [J]. Computer Science, 2020, 47(6): 230-235. |
[9] | CHEN Meng-rong,LIN Ying,LAN Wei,SHAN Jin-zhao. Improvement of DPoS Consensus Mechanism Based on Positive Incentive [J]. Computer Science, 2020, 47(2): 269-275. |
[10] | WANG Shuai-hui, HU Gu-yu, PAN Yu, ZHANG Zhi-yue, ZHANG Hai-feng, PAN Zhi-song. Community Detection in Signed Networks with Game Theory [J]. Computer Science, 2020, 47(11A): 449-453. |
[11] | CAI Wei, BAI Guang-wei, SHEN Hang, CHENG Zhao-wei, ZHANG Hui-li. Reinforcement Learning Based Win-Win Game for Mobile Crowdsensing [J]. Computer Science, 2020, 47(10): 41-47. |
[12] | LIU Hai-bo,WU Tian-bo,SHEN Jing,SHI Chang-ting. Advanced Persistent Threat Detection Based on Generative Adversarial Networks and Long Short-term Memory [J]. Computer Science, 2020, 47(1): 281-286. |
[13] | DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning [J]. Computer Science, 2019, 46(8): 1-8. |
[14] | XU Fei, WANG Shao-chang, YANG Wei-xia. Cloud Resource Scheduling Algorithm Based on Game Theory [J]. Computer Science, 2019, 46(6A): 295-299. |
[15] | LI Fang-wei, ZHOU Jia-wei, ZHANG Hai-bo. Anti-eavesdropping Physical Layer Transmission Scheme Based on Time-reversal in D2D Communication Link [J]. Computer Science, 2019, 46(5): 100-104. |
|