Computer Science ›› 2019, Vol. 46 ›› Issue (8): 138-144.doi: 10.11896/j.issn.1002-137X.2019.08.023
• Network & Communication • Previous Articles Next Articles
ZHAO Zhi-gang1,3, ZHOU Gen-gui2, LI Hu-xiong3
CLC Number:
[1]JI X P,WANG B,LIU D C,et al.Improving interdependent networks robustness by adding connectivity links[J].Physica A:Statistical Mechanics and its Applications,2016,444:9-19. [2]RUAN Y R,LAO S Y,WANG J D,et al.Algorithm of Significance Evaluation of Complex Network Nodes Based on Neighborhood Similarity[J].Chinese Journal of Physics,2017,66(3):365-373.(in Chinese) 阮逸润,老松杨,王竣德,等.基于邻域相似度的复杂网络节点重要度评估算法[J].物理学报,2017,66(3):365-373. [3]ZHOU J,PAN J X,CHENG K Q.Research on BBV Network Model Evolution Based on New Local World[J].Computer Engineering,2010,36(19):266-268.(in Chinese) 周健,潘家鑫,程克勤.基于新局域世界的BBV网络模型演化研究[J].计算机工程,2010,36(19):266-268. [4]MONOSTORI J.Supply Chains’ Robustness:Challenges and Opportunities[J].Procedia CIRP,2018,67:110-115. [5]LIU H,ZHOU G G,FU P H,et al.Research on Delivery Attack Strategy Based on Supply Chain Network[J].Computer Scien-ce,2013,40(7):98-101.(in Chinese) 柳虹,周根贵,傅培华,等.基于供应链网络的传递攻击策略研究[J].计算机科学,2013,40(7):98-101. [6]NIE T Y,GUO Z,ZHAO K,et al.The dynamic correlation between degree and betweenness of complex network under attack[J].Physica A:Statistical Mechanics and its Applications,2016,457:129-137. [7]ZHANG Y,XIONG J,FENG C.Analysis on Robustness of Sup- ply Chain NetworkBased on Complex Network[J].Computer Simulation,2012,29(11):370-373.(in Chinese) 张怡,熊杰,冯春.基于复杂网络的供应链网络鲁棒性分析[J].计算机仿真,2012,29(11):370-373. [8]FU C Q,WANG Y,WANG X Y,et al.Multi-node attack strategy of complex networks due to cascading breakdown[J].Chaos,Solitons and Fractals,2018,106:61-66. [9]WANG X.Research on Agri-food Supply Chain Modeling and Network Risk Propagation Based on Complex Network [D].Changchun:Jilin University,2017.(in Chinese) 王杏.基于复杂网络的农产品供应链建模与网络风险传播研究[D].长春:吉林大学,2017. [10]MAO K.Research on Stability and Robustness of Complex Network Structure[J].Computer Science,2015,42(4):85-88.(in Chinese) 毛凯.复杂网络结构的稳定性与鲁棒性研究[J].计算机科学,2015,42(4):85-88. [11]CAO W B,XIONG X.Local Evolution Mechanism of Complex Supply Chain Network Based on Edge Benefit [J].Computer Application Research,2016,33(1):75-77.(in Chinese) 曹文彬,熊曦.边效益因素下复杂供应链网络局域演化机制[J].计算机应用研究,2016,33(1):75-77. [12]LIU H,ZHOU G G,FU P H.Local Evolution Model Research of Layered Supply Chains Complex Networks [J].Computer Science,2013,40(2):270-273.(in Chinese) 柳虹,周根贵,傅培华.分层供应链复杂网络局部演化模型研究[J].计算机科学,2013,40(2):270-273. [13]BELLINGERI M,CASSI D.Robustness of weighted networks [J].Physica A:Statistical Mechanics and its Applications,2018,489:47-55. [14]LIN J H,GUO Q,DONG W Z,et al.Identifying the Node Spreading Influence with Largest K-core Values[J].Physics Letters A,2014,378(45):3279-3284. [15]SAITO K,KIMURA M,OHARA K,et al.Super mediator-A New Centrality Measure of Node Importance for Information Diffusion Over Social Network[J].Information Sciences,2016,329(C):985-1000. [16]SUN L S,HUANG Y C,CHEN Y Y,et al.Vulnerability Assessment of Urban Railtransit Based on Multi-static Weighted Method in Beijing [J].Transportation Research Part A:Policy and Practice,2018,108:12-24. |
[1] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[2] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[3] | CHEN Ming-xin, ZHANG Jun-bo, LI Tian-rui. Survey on Attacks and Defenses in Federated Learning [J]. Computer Science, 2022, 49(7): 310-323. |
[4] | WU Zi-bin, YAN Qiao. Projected Gradient Descent Algorithm with Momentum [J]. Computer Science, 2022, 49(6A): 178-183. |
[5] | GUO Xing-chen, YU Yi-biao. Robust Speaker Verification with Spoofing Attack Detection [J]. Computer Science, 2022, 49(6A): 531-536. |
[6] | YANG Ya-hong, WANG Hai-rui. DDoS Attack Detection Method in SDN Environment Based on Renyi Entropy and BiGRU Algorithm [J]. Computer Science, 2022, 49(6A): 555-561. |
[7] | CAO Yang-chen, ZHU Guo-sheng, SUN Wen-he, WU Shan-chao. Study on Key Technologies of Unknown Network Attack Identification [J]. Computer Science, 2022, 49(6A): 581-587. |
[8] | LIANG Yi-wen, DU Yu-song. Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao [J]. Computer Science, 2022, 49(6A): 485-489. |
[9] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[10] | GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522. |
[11] | LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362. |
[12] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[13] | LI Peng-yu, LIU Sheng-li, YIN Xiao-kang, LIU Hao-hui. Detection Method of ROP Attack for Cisco IOS [J]. Computer Science, 2022, 49(4): 369-375. |
[14] | LI Jia-rui, LING Xiao-bo, LI Chen-xi, LI Zi-mu, YANG Jia-hai, ZHANG Lei, WU Cheng-nan. Dynamic Network Security Analysis Based on Bayesian Attack Graphs [J]. Computer Science, 2022, 49(3): 62-69. |
[15] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
|