Computer Science ›› 2022, Vol. 49 ›› Issue (7): 332-339.doi: 10.11896/jsjkx.210600107
• Information Security • Previous Articles Next Articles
LI Tang, QIN Xiao-lin, CHI He-yu, FEI Ke
CLC Number:
[1]ZHANG T,LI Q,ZHANG C S,et al.Current trends in the development of intelligent unmanned autonomous systems[J].Frontiers of Information Technology & Electronic Engineering,2017,18(1):11-22. [2]SCHUYLER T J,IRVIN B,ABAD K,et al.Application of aSmall Unmanned Aerial System to Measure Ammonia Emissions from a Pilot Amine-CO2Capture System[J].Sensors,2020,20(23):6974. [3]CUNNINGHAM M,SAMSON C,LALIBERTÉJ,et al.Inversion of Magnetic Data Acquired with a Rotary-Wing Unmanned Aircraft System for Gold Exploration[J].Pure and Applied.Geophys,2021,178:501-516. [4]ZHANG M.Research on Optimization Algorithm of UAV and Logistics Vehicle Collaborative Distribution Based on Dynamic Collection[D].Harbin:Harbin Engineering University,2020. [5]ZHOU Y M,ZHAOH R,CHEN J F,et al.A novel missionplanning method for UAVs' course of action[J].Computer Communications,2020,152(4):345-356. [6]BHATT G D.Knowledge management in organizations:examining the interaction between technologies,techniques,and people[J].Journal of Knowledge Management,2001,5(1):68-75. [7]MA Y,ZHAO Y J,QI X,et al.Cooperative communicationframework design for the unmanned aerial vehicles-unmanned surface vehicles formation[J].Advances in Mechanical Engineering,2018,10(5):1-9. [8]ELMARZOUQI N,GARCIA E,LAPAYRE J.ACCM:a NewArchitecture Model for CSCW[C]//2007 11th International Conference on Computer Supported Cooperative Work in Design.Melbourne,VIC,Australia:IEEE,2007:84-91. [9]KULKARNI D,AHMED T,TRIPATHI A.A Generative Programming Framework for Context-Aware CSCW Applications[J].ACM Transactions on Software Engineering and Methodo-logy,2012,21(2):1-35. [10]MAHFOUDH H B,SERUGENDO D S G,NAJA N,et al.Learning-based coordination model for spontaneous self-composition of reliable services in a distributed system[J].International Journal on Software Tools for Technology Transfer,2020,22:417-436. [11]GELERNTER D.Generative communication in Linda[J].ACM Transactions on Programming Languages and Systems,1985,7(1):80-112. [12]OMICINI A.Formal ReSpecT in the A & A Perspective[J].Electronic Notes in Theoretical Computer Science,2007,175(2):97-117. [13]CASELLI A,CIATTO G,SERUGENDO G D M,et al.Engi-neering Semantic Self-composition of Services Through Tuple-Based Coordination[J].ISoLA,2020,12477:205-223. [14]CASADEI R,VIROLI M,RICCI A,et al.Tuple-Based Coordination in Large-Scale Situated Systems[J].Coordination Models and Languages,2021,12717:149-167. [15]MAMEI M,ZAMBONELLI F.Programming pervasive and mobile computing applications[J].ACM Transactions on Software Engineering and Methodology,2009,18(4):1-56. [16]FLORIANO E,ALCHIERI E,ARANHA D F,et al.Providing privacy on the tuple space model[J].Journal of Internet Services and Applications,2017 8(19):1-16. [17]CRAB S,KUHN E.A coordination-based access control model for space-based computing [C]//Proceedings of the 27th Annual ACM Symposium on Applied Computing,Association for Computing Machinery.New York,NY,USA,2012:1560-1562. [18]JIA Y N,LI Q,QIU S Q.Distributed Leader-Follower FlightControl for Large-Scale Clusters of Small Unmanned Aerial Vehicles[J].IEEE Access,2018,6:32790-32799. [19]GUO H Y.Research on Coordinated Flight Strategy for Mutil-UAV Based on Bee Colony Algorithm[D].Harbin:Harbin Engineering University,2012. [20]QIU H X,DUAN H B,FAN Y M.Multiple unmanned aerial ve-hicle autonomous formation based on the behavior mechanism in pigeon flocks[J].Control Theory & Applications,2015,32(10):1298-1304. [21]CERI S,GOTTLOB G,TANCA L.Logic Programming and Databases [M].Berlin:Springer-Verlag,1990:9-11. [22]BRAMER M.Logic Programming with Prolog [M].London:Springer-Verlag,2005:187-210. [23]VITEK J,BRYCE C,ORIOL M.Coordinating processes withsecure spaces[J].Science of Computer Programming,2003,46(1):163-193. |
[1] | LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | JIAN Qi-rui, CHEN Ze-mao, WU Xiao-kang. Authentication and Key Agreement Protocol for UAV Communication [J]. Computer Science, 2022, 49(8): 306-313. |
[4] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[5] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[6] | ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362. |
[7] | DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284. |
[8] | JIANG Cheng-man, HUA Bao-jian, FAN Qi-liang, ZHU Hong-jun, XU Bo, PAN Zhi-zhong. Empirical Security Study of Native Code in Python Virtual Machines [J]. Computer Science, 2022, 49(6A): 474-479. |
[9] | TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484. |
[10] | LYU Peng-peng, WANG Shao-ying, ZHOU Wen-fang, LIAN Yang-yang, GAO Li-fang. Quantitative Method of Power Information Network Security Situation Based on Evolutionary Neural Network [J]. Computer Science, 2022, 49(6A): 588-593. |
[11] | DENG Kai, YANG Pin, LI Yi-zhou, YANG Xing, ZENG Fan-rui, ZHANG Zhen-yu. Fast and Transmissible Domain Knowledge Graph Construction Method [J]. Computer Science, 2022, 49(6A): 100-108. |
[12] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[13] | JIAO Xiang, WEI Xiang-lin, XUE Yu, WANG Chao, DUAN Qiang. Automatic Modulation Recognition Based on Deep Learning [J]. Computer Science, 2022, 49(5): 266-278. |
[14] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[15] | CHANG Geng, ZHAO Lan, CHEN Wen. MLSTM:A Password Guessing Method Based on Multiple Sequence Length LSTM [J]. Computer Science, 2022, 49(4): 354-361. |
|