Computer Science ›› 2026, Vol. 53 ›› Issue (2): 442-453.doi: 10.11896/jsjkx.250300041
• Information Security • Previous Articles
ZHANG Wanyou, SONG Lipeng
CLC Number:
| [1]RADICATI.GROUP.Email statistics report 2022-2026[R/OL].https://www.radicati.com/wp/wp-content/uploads/2022/11/Email-Statistics-Report-2022-2026-Executive-Summary.pdf. [2]RAO S,VERMA A K,BHATIA T.A review on social spam detection:Challenges,open is-sues,and future directions[J].Expert Systems with Applications,2021,186:115742. [3]MACAS M,WU C,FUERTES W.A survey on deep learning for cybersecurity:Progress,challenges,and opportunities[J].Computer Networks,2022,212:109032. [4]BOUKE M A,ABDULLAH A,ALSHATEBI S H,et al.The intersection of targeted advertising and security:Unraveling the mystery of overheard conversations[J].Telematics and Informatics Reports,2023,11:100092. [5]ALKARAKI J N,GAWANMEH A,FACHKHA C.Blockchain for email security:A perspective on existing and potential solutions for phishing attacks[C]//2023 Fifth International Confe-rence on Blockchain Computing and Applications(BCCA).IEEE,2023:404-411. [6]BOUKE M A,ABDULLAH A,UDZIR N I,et al.Overcoming the challenges of data lack,leakage,and dimensionality in intrusion detection systems:a comprehensive review[J].Journal of Communication and Information Systems,2024,39(1):22-34. [7]WONGWATKIT R,RAKTHAM M,PHAWANANTHAPHUTI T.Intelligent blacklist security system for protecting spammer in corporate email solution:A case of corporate email ser-vice provider in thailand[C]//2022 24th International Confe-rence on Advanced Communication Technology(ICACT).IEEE,2022:387-391. [8]SURWADE A U.Blocking Phishing e-mail by extracting header information of e-mails[C]//2020 International Conference on Smart Innovations in Design,Environment,Management,Planning and Computing(ICSIDEMPC).IEEE,2020:151-155. [9]BOUKE M A,ALRAMLI O I,ABDULLAH A.XAIRF-WFP:a novel XAI-based random forest classifier for advanced email spam detection[J].International Journal of Information Security,2025,24(1):5. [10]LI X,ZHANG D,WU B.Detection method of phishing email based on persuasion principle[C]//2020 IEEE 4th Information Technology,Networking,Electronic and Automation Control Conference(ITNEC).IEEE,2020:571-574. [11]HEIDING F,SCHNEIER B,VISHWANATH A,et al.Devising and detecting phishing emails using large language models[J].arXiv:2308.12287,2023. [12]SYMANTEC.Symantec cloud email security[EB/OL].https://docs.broadcom.com/doc/emailsecurity-cloud-2019-11-service-description-en. [13]XIAO D,JIANG M Y.Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm[C]//2020 IEEE International Symposium on Dependable,Autonomic and Secure Computing(DASC).IEEE,2020:222-229. [14]WEI W,WANG Q,XU H,et al.Highly complex resource scheduling for stochastic demands in heterogeneous clouds[J].Journal of Grid Computing,2021,19:1-16. [15]WEI W,WANG Q,YANG W,et al.Efficientstochastic scheduling for highly complex resource placement in edge clouds[J].Journal of Network and Computer Applications,2022,202:103365. [16]WEI W,LI H,YANG W.Cost-effective stochastic resourceplacement in edge clouds with horizontal and vertical sharing[J].Future Generation Computer Systems,2023,138:213-225. [17]GILL S S,GARRAGHAN P,STANKOVSKI V,et al.Holistic resource management for sustainable and reliable cloud computing:An innovative solution to global challenge[J].Journal of Systems and Software,2019,155:104-129. [18]AHLAWAT C,KRISHNAMURTHI R.Q-learning with function Approximator for clustering based Optimal resource Allocation in fog environment[C]//Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing.2022:127-135. [19]JEONG B,BAEK S,PARK S,et al.Stable and efficient resource management using deep neural network on cloud computing[J].Neurocomputing,2023,521:99-112. [20]YU B,LI X H,PAN C Y,et al.Edge-cloud collaborative resource allocation algorithm based on deep reinforcement learning[J].Chinese Journal of Computer Science,2022,49(7):248-253. [21]GAN D,GE X,LI Q.An optimal transport-based federated rein-forcement learning approach for resource allocation in cloud-edge collaborative IoT[J].IEEE Internet of Things Journal,2023,11(2):2407-2419. [22]NAWROCKI P,SMENDOWSKI M.FinOps-driven optimization of cloud resource usage for high-performance computing using machine learning[J].Journal of Computational Science,2024,79:102292. [23]NEEMA G,KADAN A B,VIJAYAN V P.Multi-objective load balancing in cloud infrastructure through fuzzy based decision making and genetic algorithm based optimization[J].IAES International Journal of Artificial Intelligence,2023,12(2):678. [24]YANG Z M,ZUO L L,JI W.Joint optimization method for node deployment and resource allocation based on edge-end collaboration[J].Chinese Journal of Computer Science,2024,51(S2):665-671. [25]SHAIK M B,REDDY K S,CHOKKANATHAN K,et al.A Hybrid Particle Swarm Optimization and Simulated Annealing with Load Balancing Mechanism for Resource Allocation in Fog-Cloud Environments[J].IEEE Access,2024,12:172439-172450. [26]SENTHIL KUMAR A M,PADMANABAN K,VELMURU-GAN A K,et al.A novel resource management framework in a cloud computing environment using hybrid cat swarm BAT(HCSBAT) algorithm[J].Distributed and Parallel Databases,2023,41(1):53-63. [27]NARWAL A.Resource Utilization Based on Hybrid WOA-LOA Optimization with Credit Based Resource Aware Load Balancing and Scheduling Algorithm for Cloud Computing[J].Journal of Grid Computing,2024,22(3):61. [28]PRECIADO V M,ZARGHAM M,ENYIOHA C,et al.Optimal resource allocation for network protection against spreading processes[J].IEEE Transactions on Control of Network Systems,2014,1(1):99-108. [29]WANG M,SONG L.Efficient defense strategy against spam and phishing email:An evolutionary game model[J].Journal of Information Security and Applications,2021,61:102947. [30]OGURA M,PRECIADO V M,MASUDA N.Optimal Con-tainment of Epidemics over Temporal Activity-Driven Networks[J].SIAM Journal on Applied Mathematics,2019:79(3):986-1006. [31]HAMOUDA E,ELHAFSI M,SON J.Securing Network Resilience:Leveraging Node Centrality for Cyberattack Mitigation and Robustness Enhancement[J].Information Systems Frontiers,2024,26(1):1-16. |
| [1] | HUAN Haisheng, ZHAO Peng, CHEN Nuo, KA Zuming. Review of Offloading Technologies Research in Mobile Edge Computing [J]. Computer Science, 2026, 53(2): 367-378. |
| [2] | LI Fang, YUAN Baochun, SHEN Hang, WANG Tianjing, BAI Guangwei. Deep Reinforcement Learning-based Aircraft Task Offloading in Low Earth Orbit Satellite Networks [J]. Computer Science, 2026, 53(2): 406-415. |
| [3] | ZHANG Minghao, XIAO Bohuai, ZHENG Song, CHEN Xing. Resource Allocation Method with Workload-time Windows for Serverless Applications inCloud-edge Collaborative Environment [J]. Computer Science, 2025, 52(6): 336-345. |
| [4] | PENG Mingtian, WANG Weishuai, TIAN Feng, LI Jiangtao, LU Yan, MA Shuyan, ZHU Honglin, LIU Chi. Personalized Multi-attribute Airline Itinerary Recommendation System by Graph ConvolutionalNeural Network [J]. Computer Science, 2025, 52(11A): 250200088-6. |
| [5] | XU Haiyang, LIU Hailong, YANG Chaoyun, WANG Shuo, LI Zhanhuai. MMOS:Memory Resource Sharing Methods to Support Overselling in Multi-tenant Databases [J]. Computer Science, 2024, 51(2): 27-35. |
| [6] | YANG Zheming, ZUO Lulu, JI Wen. Joint Optimization Method for Node Deployment and Resource Allocation Based on End-EdgeCollaboration [J]. Computer Science, 2024, 51(11A): 240200010-7. |
| [7] | XUE Jianbin, YU Bowen, XU Xiaofeng, DOU Jun. Queueing Theory-based Joint Optimization of Communication and Computing Resources in Edge Computing Networks [J]. Computer Science, 2024, 51(11A): 240100103-9. |
| [8] | XUE Jianbin, TIAN Guiying, MA Yuling, SHAO Fei, WANG Tao. Study on Optimization of Long-distance Relay Communication and Computational Offloading Strategy Based on Self-powered UAVs [J]. Computer Science, 2024, 51(11A): 240300069-7. |
| [9] | LUO Junren, ZOU Mingwo, CHEN Shaofei, ZHANG Wanpeng, CHEN Jing. Research Progress on Colonel Blotto Game Models and Solving Methods [J]. Computer Science, 2024, 51(1): 84-98. |
| [10] | CHEN Yipeng, YANG Zhe, GU Fei, ZHAO Lei. Resource Allocation Strategy Based on Game Theory in Mobile Edge Computing [J]. Computer Science, 2023, 50(2): 32-41. |
| [11] | LI Xiaohuan, CHEN Bitao, KANG Jiawen, YE Jin. Coalition Game-assisted Joint Resource Optimization for Digital Twin-assisted Edge Intelligence [J]. Computer Science, 2023, 50(2): 42-49. |
| [12] | CHEN Yong-quan, JIANG Ying. Analysis Method of APP User Behavior Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(8): 78-85. |
| [13] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
| [14] | TANG Feng, FENG Xiang, YU Hui-qun. Multi-task Cooperative Optimization Algorithm Based on Adaptive Knowledge Transfer andResource Allocation [J]. Computer Science, 2022, 49(7): 254-262. |
| [15] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
|
||