Computer Science ›› 2025, Vol. 52 ›› Issue (10): 404-411.doi: 10.11896/jsjkx.240800015
• Information Security • Previous Articles Next Articles
ZHU Ziyi1, ZHANG Jianhui1,2, ZENG Junjie1 and ZHANG Hongyuan1
CLC Number:
[1]YANG S,LI F,TRAJANOVSKI S,et al.Recent advances of resource allocation in network function virtualization[J].IEEE Transactions on Parallel and Distributed Systems,2020,32(2):295-314. [2]MATENCIO E A,WANG Q,CALERO J M A.SliceNetVS-witch:Definition,design and implementation of 5G multi-tenant network slicing in software data paths[J].IEEE Transactions on Network and Service Management,2020,17(4):2212-2225. [3]TANG L,WANG K,ZHANG Y,et al.Service function chainanomaly detection based on distributed generative adversarial network in network slicing scenario[J] Journal of Electronics & Information Technology,2023,45(1):262-271. [4]RUI L L,CHEN S Y,WANG S Y,et al.SFC Orchestration Method for Edge Cloud and Central Cloud Collaboration:QoS and Energy Consumption Joint Optimization Combined With Reputation Assessment[J].IEEE Transactions on Parallel and Distributed Systems,2023,34(10):2735-2748. [5]COELHO R W,LEONARDO E J,MARTIMIANO L A F,et al.A survey of the characteristics of SDN,NFV and information security in IoT and 5G networks[J].Revista Brasileira de Computação Aplicada,2023,15(3):96-105. [6]LI B,CHENG B,LIU X,et al.Joint Resource Optimization and Delay-Aware Virtual Network Function Migration in Data Center Networks [J].IEEE Transactions on Network and Service Management,2021,18(3):2960-2974. [7]ZHANG Q X,XIAO Y K,LIU F,et al.Joint Optimization ofChain Placement and Request Scheduling for Network Function Virtualization[C]//2017 IEEE 37th International Conference on Distributed Computing Systems(ICDCS).IEEE,2017:731-741. [8]BARI F,CHOWDHURY S R,AHMED R,et al.Orchestrating virtualized network functions[J].IEEE Transactions on Network and Service Management,2016,13(4):725-739. [9]HUANG H,JIANG J,YANG Y K,et al.Online Service Function Chain Orchestration Method for Profit Maximization[J].Computer Science,2023,50(6):66-73. [10]LIU H T,DING S D,WANG S Y,et al.Multi-objective optimization service function chain placement algorithm based on reinforcement learning[J].Journal of Network and Systems Ma-nagement,2022,30(4):58-83. [11]HUANG Z W,ZHONG W J,LI D G,et al.Delay Constrained SFC Orchestration for Edge Intelligence-Enabled IIoT:A DRL Approach[J].Journal of Network and Systems Management,2023,31(3):53-79. [12]XU H S,FAN G L,SUN L B,et al.Dynamic SFC placementscheme with parallelized SFCs and reuse of initialized VNFs:An A3C-based DRL approach[J].Journal of King Saud University-Computer and Information Sciences,2023,35(6):101577. [13]JEONG E D,YOO J H,HONG J W K.SFC Consolidation:Energy-aware SFC Management using Deep Reinforcement Lear-ning[C]//2024 IEEE Network Operations and Management Symposium.IEEE,2024:1-5. [14]RAN J,WANG W K,HU H F.Dynamic Service Function Chain Deployment and Readjustment Method Based on Deep Reinforcement Learning[J].Sensors,2023,23(6):3054. [15]TANG L,HE L Q,LIAN Q Y,et al.Virtual Network FunctionPlacement Optimization Algorithm Based on Improve Deep Reinforcement Learning[J].Journal of Electronics & Information Technology,2021,43(6):1724-1732. [16]LIU D H,WEI D E,XUAN H J,et al.Improved double deep Q network algorithm for service function chain deployment[J].Journal of Xidian University,2024,51(1):52-59. [17]HUANG W W,LI S,WANG S N,et al.An Improved Adaptive Service Function Chain Mapping Method Based on Deep Reinforcement Learning[J].Electronics,2023,12(6):1307-1325. [18]WANG T F,FAN Q L,LI X H,et al.Drl-sfcp:Adaptive service function chains placement with deep reinforcement learning[C]//IEEE International Conference on Communications(ICC 2021).2021:1-6. [19]LIU Y C,LU Y,QIAO W X,et al.A dynamic compositionmechanism of security service chaining oriented to SDN/NFV-enabled networks[J].IEEE Access,2018,6:53918-53929. [20]ALALUNA M,FERROLHO L,FIGUEIRA J R,et al.Secure multi-cloud virtual network embedding[C]//Computer Communications.2020:252-265. [21]TORKZABAN N,BARAS J S.Trust-aware service functionchain embedding:A path-based approach[C]//2020 IEEE Conference on Network Function Virtualization and Software Defined Networks(NFV-SDN).IEEE,2020:31-36. [22]ZHANG P Y,WANG C,JIANG C X,et al.Resource manage-ment and security scheme of ICPSs and IoT based on VNE algorithm[J].IEEE Internet of Things Journal,2021,9(22):22071-22080. [23]VELICKOVIC P,CUCURULL G,CASANOVA A,et al.Graph attention networks[C]//IRLR 2018.2018. [24]YAN Z X,GE J G,WU Y L, et al.Automatic virtual networkembedding:A deep reinforcement learning approach with graph convolutional networks[J].IEEE Journal on Selected Areas in Communications,2020,38(6):1040-1057. [25]ZHANG P Y,LI H S,NI Y J,et al.Security aware virtual net-work embedding algorithm using information entropy TOPSIS[J].Journal of Network and Systems Management,2020,28(1):35-57. [26]LIU X B,WANG B H,LIU S Q,et al.Heuristic algorithm for secure virtual network embedding [J].Systems Engineering and Electronic,2018,40(3):676-681. |
[1] | HU Yongqing, YANG Han, LIU Ziyuan, QING Guangjun, DAI Qinglong. ACCF:Time Prediction Mechanism-driven Top-k Flow Measurement [J]. Computer Science, 2025, 52(10): 98-105. |
[2] | DUAN Pengsong, ZHANG Yihang, FANG Tao, CAO Yangjie, WANG Chao. WiLCount:A Lightweight Crowd Counting Model for Wireless Perception Scenarios [J]. Computer Science, 2025, 52(10): 317-327. |
[3] | WANG Pengrui, HU Yuxiang, CUI Pengshuai, DONG Yongji, XIA Jiqiang. SRv6 Functional Conformance Verification Mechanism Based on the Programmable Data Plane [J]. Computer Science, 2025, 52(10): 328-335. |
[4] | XU Jia, LIU Jingyi, XU Lijie, LIU Linfeng. Wireless Charging Scheduling with Minimized Maximum Return-to-Work Time for Heterogeneous Mobile Rechargeable Devices [J]. Computer Science, 2025, 52(10): 336-347. |
[5] | WU Moxun, PENG Zeshun, YU Minghe, LI Xiaohua, DONG Xiaomei, NIE Tiezheng, YU Ge. Approach for Lightweight Verifiable Data Management Based on Blockchains [J]. Computer Science, 2025, 52(10): 348-356. |
[6] | HE Hao, ZHANG Hui. Intrusion Detection Method Based on Improved Active Learning [J]. Computer Science, 2025, 52(10): 357-365. |
[7] | WU Jiagao, YI Jing, ZHOU Zehui, LIU Linfeng. Personalized Federated Learning Framework for Long-tailed Heterogeneous Data [J]. Computer Science, 2025, 52(9): 232-240. |
[8] | SHEN Tao, ZHANG Xiuzai, XU Dai. Improved RT-DETR Algorithm for Small Object Detection in Remote Sensing Images [J]. Computer Science, 2025, 52(8): 214-221. |
[9] | LONG Tie, XIAO Fu, FAN Weibei, HE Xin, WANG Junchang. Cubic+:Enhanced Cubic Congestion Control for Cross-datacenter Networks [J]. Computer Science, 2025, 52(8): 335-342. |
[10] | YE Miao, WANG Jue, JIANG Qiuxiang, WANG Yong. SDN-based Integrated Communication and Storage Edge In-network Storage Node Selection Method [J]. Computer Science, 2025, 52(8): 343-353. |
[11] | FAN Xinggang, JIANG Xinyang, GU Wenting, XU Juntao, YANG Youdong, LI Qiang. Effective Task Offloading Strategy Based on Heterogeneous Nodes [J]. Computer Science, 2025, 52(8): 354-362. |
[12] | ZHAO Jihong, MA Jian, LI Qianwen, NING Lijuan. Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms [J]. Computer Science, 2025, 52(7): 287-294. |
[13] | LIU Wenfei, LIU Jiafei, WANG Qi, WU Jingli, LI Gaoshi. Component Reliability Analysis of Interconnected Networks Based on Star Graph [J]. Computer Science, 2025, 52(7): 295-306. |
[14] | CHEN Shangyu, HU Hongchao, ZHANG Shuai, ZHOU Dacheng, YANG Xiaohan. Tor Multipath Selection Based on Threaten Awareness [J]. Computer Science, 2025, 52(7): 363-371. |
[15] | ZHOU Lei, SHI Huaifeng, YANG Kai, WANG Rui, LIU Chaofan. Intelligent Prediction of Network Traffic Based on Large Language Model [J]. Computer Science, 2025, 52(6A): 241100058-7. |
|