Computer Science ›› 2021, Vol. 48 ›› Issue (5): 328-333.doi: 10.11896/jsjkx.200300177
• Information Security • Previous Articles Next Articles
WU Shao-qian, LI Xi-ming
CLC Number:
[1]GOODFELLOW I J,POUGET-ABADIE J,MIRA M,et al.Generative Adversarial Networks[C]//Advances in Neural Information Processing Systems 2014.MIT Press Boston,2014:2672-2680. [2]ABADI M,ANDERSEN D G.Learning to Protect Communications with Adversarial Neural Cryptography[EB/OL].(2016-10-21) [2020-03-20].https://arxiv.org/abs/1610.06918. [3]COUTINHO M,ALBUQUERQUE R D O,BORGES F,et al.Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography[J].Sensors,2018,18(5):1306. [4]GOMEZ A N,HUANG S C,ZHANG I,et al.Unsupervised Cipher Cracking Using Discrete GANs[EB/OL].(2018-1-15) [2020-03-20].https://arxiv.org/abs/1801.04883. [5]ZHU J Y,PARK T,ISOLA P,et al.Unpaired image-to-imagetranslation using cycle-consistent adversarial networks[C]//Proceedings of the 2017 IEEE International Conference on Computer Vision.IEEE New Jersey Piscataway,2017:2242-2251. [6]CIPHER A D,BRIAN J W.Cryptanalysis of Shift Stream Ge-nerated Stream Cipher Systems-Book Review[J].Cryptologia,1984,8(4):360-363. [7]SUCHITA D,FABIO D T,MARK S.Vigenère scores for malware detection[J].Computer Virology and Hacking Techniques,2018,14(2):157-165. [8]HITAJ B,GASTI P,ATENIESE G,et al.PassGAN:A DeepLearning Approach for Password Guessing[C]//Applied Cryptography and Network Security-17th International Conference.Springer Berlin Heidelberg,2019:217-237. [9]LI X M,WU J R,WU S Q,et al.Study on fuzzy key encryption based on GAN[J].Application Research of Computers,2020,37(6):1779-1781,1793. [10]LI X M,WU J R,WU S Q,et al.Study on adversarial encryption based on generative adversarial networks[J].Computer Engineering and Applications:2020,56(10):69-74. [11]ZHENG W C C,CHUAH C W,JANAKA A.Review on Lea-kage Resilient Key Exchange Security Model.[J].IJCNIS,2019,11(1):119. [12]YANG X B,BOUSSAKTA S.A New Development of Symme-tric Key Cryptosystem[C]//Proceedings of IEEE International Conference on Communications.IEEE New Jersey Piscataway,2008:1546-1550. [13]DIFFIE W,HELLMAN M E.New directions in cryptography[J].IEEE,1976,22(6):644-654. [14]WANG C J,XU X L,LI Y,et al.Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks[C]//Information Security and Cryptology—10th International Conference.Springer Berlin Heidelberg,2014:424-442. [15]GULRAJANI I,AHMED F,ARJOVSKY M,et al.ImprovedTraining of Wasserstein GANs[C]//In Advances in Neural Information Processing Systems 30:Annual Conference on Neural Information Processing Systems 2017.MIT Press Boston,2017:5769-5779. [16]ZOU D M,BALAN R,SINGH M.On Lipschitz Bounds of Ge-neral Convolutional Neural Networks[J].IEEE Transactions on Information Theory,2020,66(3):1738-1759. [17]RADFORF A,METZ L,CHINTALA S.Unsupervised Repre-sentation Learning with Deep Convolutional Generative Adversarial Networks[EB/OL].(2016-01-07) [2020-03-20].https://arxiv.org/abs/1511.06434 . [18]YASUTAKA F,KAZUSHI I.ResNet and Batch-normalization Improve Data Separability.[C]//Proceedings of the 11th Asian Conference on Machine Learning.JMLR,2019:94-108. [19]HENK C A V T,SUSHIL J.Encyclopedia of Cryptography and Security(2nd Edition)[M].Berlin:Springer,2011:675. [20]GAO J Q,LI B Y,LIAO H K,et al.Research and performance analysis of advanced encryption AES algorithm[J].Network Security Technology & Application,2019(10):28-30. |
[1] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[2] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[3] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[4] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[5] | YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192. |
[6] | XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223. |
[7] | GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328. |
[8] | DOU Zhi, WANG Ning, WANG Shi-jie, WANG Zhi-hui, LI Hao-jie. Sketch Colorization Method with Drawing Prior [J]. Computer Science, 2022, 49(4): 195-202. |
[9] | LI Si-quan, WAN Yong-jing, JIANG Cui-ling. Multiple Fundamental Frequency Estimation Algorithm Based on Generative Adversarial Networks for Image Removal [J]. Computer Science, 2022, 49(3): 179-184. |
[10] | SHI Da, LU Tian-liang, DU Yan-hui, ZHANG Jian-ling, BAO Yu-xuan. Generation Model of Gender-forged Face Image Based on Improved CycleGAN [J]. Computer Science, 2022, 49(2): 31-39. |
[11] | LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang. Multi-target Category Adversarial Example Generating Algorithm Based on GAN [J]. Computer Science, 2022, 49(2): 83-91. |
[12] | TAN Xin-yue, HE Xiao-hai, WANG Zheng-yong, LUO Xiao-dong, QING Lin-bo. Text-to-Image Generation Technology Based on Transformer Cross Attention [J]. Computer Science, 2022, 49(2): 107-115. |
[13] | CHEN Gui-qiang, HE Jun. Study on Super-resolution Reconstruction Algorithm of Remote Sensing Images in Natural Scene [J]. Computer Science, 2022, 49(2): 116-122. |
[14] | ZHANG Wei-qi, TANG Yi-feng, LI Lin-yan, HU Fu-yuan. Image Stream From Paragraph Method Based on Scene Graph [J]. Computer Science, 2022, 49(1): 233-240. |
[15] | JIANG Zong-li, FAN Ke, ZHANG Jin-li. Generative Adversarial Network and Meta-path Based Heterogeneous Network Representation Learning [J]. Computer Science, 2022, 49(1): 133-139. |
|