Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 552-556.doi: 10.11896/jsjkx.210300237
• Information Security • Previous Articles Next Articles
ZONG Si-jie, QIN Tian, HE Long-bing
CLC Number:
[1]COLUMBUS L.2018 roundup of Internet of Things forecastsand marketestimates[EB/OL].https://www.forbes.com/sites/louiscolumbus/2018/12/13/2018-roundup-of-internet-of-things-forecasts-and-market-estimates/#428d6ab27d83,2018. [2]COLUMBUS L.Roundup of Internet of Things forecasts and market estimates[EB/OL].https://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-of-internet-of-things-forecasts-and-market-estimates-2016/#27232e3d292d,2016. [3]ZHOU H L,LQUO X H,FENG X S.Thematic analysis on security issues of the Internet of Things [J].Computer Knowledge and Technology,2019,15(12):17-18. [4]BI R,LI X G,JIANG J.Internet of Things security incident cases and problem analysis [J].Telecommunications Network Technology,2014(12):10-13. [5]YAN Z,ZHANG P,VASILAKOS A V.A survey on trust management for Internet of Things[J].Journal of Network & Computer Applications,2014,42(3):120-134. [6]PETROULAKIS N E,TRAGOS E Z,FRAGKIADAKIS A G,et al.A lightweight framework for secure life-logging in smart environments[J].Information Security Tech.Report,2013,17(3):58-70. [7]DI R,SALLERAS X,SIGNORINI M,et al.A blockchain-based Trust System for the Internet of Things[C]//ACM SACMAT 2018.ACM,2018. [8]BYUNG-YOON S.A Public-key Cryptography Processor sup-porting P-224 ECC and 2048-bit RSA[J].Journal of IKEEE,2018,22(3):522-531. [9]KOBLITZ N.Elliptic Curve Cryptosystem[J].Mathematics ofComputation,1987,47(177):203-209. [10]BAO F,CHEN I R.Trust management for the internet of things and its application to service composition[C]//World of Wireless,Mobile & Multimedia Networks.IEEE,2012. |
[1] | LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267. |
[2] | ZHANG Jia, DONG Shou-bin. Cross-domain Recommendation Based on Review Aspect-level User Preference Transfer [J]. Computer Science, 2022, 49(9): 41-47. |
[3] | CAO Xiao-wen, LIANG Mei-yu, LU Kang-kang. Fine-grained Semantic Reasoning Based Cross-media Dual-way Adversarial Hashing Learning Model [J]. Computer Science, 2022, 49(9): 123-131. |
[4] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[5] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[6] | YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204. |
[7] | DAI Zhao-xia, LI Jin-xin, ZHANG Xiang-dong, XU Xu, MEI Lin, ZHANG Liang. Super-resolution Reconstruction of MRI Based on DNGAN [J]. Computer Science, 2022, 49(7): 113-119. |
[8] | WU Zi-bin, YAN Qiao. Projected Gradient Descent Algorithm with Momentum [J]. Computer Science, 2022, 49(6A): 178-183. |
[9] | XU Guo-ning, CHEN Yi-peng, CHEN Yi-ming, CHEN Jin-yin, WEN Hao. Data Debiasing Method Based on Constrained Optimized Generative Adversarial Networks [J]. Computer Science, 2022, 49(6A): 184-190. |
[10] | YIN Xiu, LIU Xi-lin, LIU Xi-yu. Study on Computing Capacity of Novel Numerical Spiking Neural P Systems with MultipleSynaptic Channels [J]. Computer Science, 2022, 49(6A): 223-231. |
[11] | YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501. |
[12] | YIN Wen-bing, GAO Ge, ZENG Bang, WANG Xiao, CHEN Yi. Speech Enhancement Based on Time-Frequency Domain GAN [J]. Computer Science, 2022, 49(6): 187-192. |
[13] | XU Hui, KANG Jin-meng, ZHANG Jia-wan. Digital Mural Inpainting Method Based on Feature Perception [J]. Computer Science, 2022, 49(6): 217-223. |
[14] | LUO Jun-ren, ZHANG Wan-peng, LU Li-na, CHEN Jing. Survey on Online Adversarial Planning for Real-time Strategy Game [J]. Computer Science, 2022, 49(6): 287-296. |
[15] | GAO Zhi-yu, WANG Tian-jing, WANG Yue, SHEN Hang, BAI Guang-wei. Traffic Prediction Method for 5G Network Based on Generative Adversarial Network [J]. Computer Science, 2022, 49(4): 321-328. |
|