Computer Science ›› 2022, Vol. 49 ›› Issue (3): 346-353.doi: 10.11896/jsjkx.210700068
• Information Security • Previous Articles Next Articles
LI Su, SONG Bao-yan, LI Dong, WANG Jun-lu
CLC Number:
[1]AHMAD R W,HASAN H,YAQOOB I,et al.Blockchain forAerospace and Defense:Opportunities and Open Research Challenges[J].Computers & Industrial Engineering,2021,151:106982. [2]TIAN G H,HU Y H,CHEN X F.Research progress of block-chain system attack and defense technology[J].Journal of Software,2021,32(5):1495-1525. [3]WAN P K,HUANG L,HOLTSKOG H.Blockchain-enabledInformation Sharing within a Supply Chain:A Systematic Lite-rature Review[J].IEEE Access,2020,8:49645-49656. [4]CAI T,LIN H,CHEN W H,et al.Blockchain-enabled Efficient Data Sharing Scheme for Internet of Things[J].Journal of Software,2021,32(4):953-972. [5]WEI L F,ZHU J Y,HENG X R,et al.Design and implementation of intelligent traceability system for aquatic product quality and safety based on block chain technology and HACCP ma-nagement[J].Fishery Modernization,2020,47(4):8. [6]BARTOLETTI M,BRACCIALI A,LANDE S,et al.A general framework for blockchain analytics[C]//Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers.Las Vegas,Nevada,USA,2017:11-15. [7]HE P,YU G,ZHANG Y F,et al.Review of Blockchain Technology and Application[J].Computer Science,2017,44(4):1-7. [8]IEMIEUX V L.Trusting records:is blockchain technology theanswer?[J].Records Management Journal,2016,26(2):110-139. [9]WANG S,DINH T A,LIN Q,et al.ForkBase:An EfficientStorage Engine for Blockchain and Forkable Applications[J].arXiv:1802.04949,2018. [10]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//IEEE European Symposium on Security & Privacy Workshops.IEEE,2017:1-3. [11]KRAFT D.Difficulty control for blockchain-based consensussystems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413. [12]DANNEN C.Introducing Ethereum and Solidity:Foundations of Cryptocurrency and Blockchain Programming for Beginners[M].Apress,2017. [13]DINH T T A,WANG J,CHEN G,et al.BLOCKBENCH:aframework for analyzing private blockchains[C]//International Conference on Management of Data.2017:1085-1100. [14]CAO Y,MIAO Z G.An Improved Apriori Algorithm for Fre-quent Terms Optimization Based on Vector Matrix[J].Journal of Jilin University (Natural Science Edition),2016,54(2):349-353. [15]JIN H,DAI X,XIAO J.Towards a Novel Architecture for Enabling Interoperability amongst Multiple Blockchains[C]//International Conference on Distributed Computing Systems.IEEE Computer Society,2018:1203-1211. [16]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and Progress[J].Chinese Journal of Computers,2018,41(5):969-988. [17]WANG Q G,HE P,NIE T Z,et al.Overview of Blockchain System Data Storage and Query Technology[J].Computer Science,2018,45(12):12-18. [18]LIU L J.Research and application of improved Apriori algorithm[J].Computer Engineering and Design,2017(12):142-146. [19]BIAN G Q,WANG Y.An Improved Apriori Algorithm Basedon Matrix and Weight[J].Microelectronics & Computer,2017,34(1):137-140. [20]LI Y,ZHENG K,YAN Y,et al.EtherQL:a query layer forblockchain system[C]//International Conference on Database Systems for Advanced Applications.2017. [21]ENRICO C,SERENA N,ANTONINO N,et al.A two-tierBlockchain framework to increase protection and autonomy of smart objects in the IoT[J].Computer Communications,2022,181:338-356. [22]LUU L,NARAYANAN V,ZHENG C,et al,A secure sharding protocol for open blockchains[C]//2016 ACM SIGSAC Confe-rence.ACM,2016. [23]WANG Z H,LIU P Z,SONG C B,et al.Research on FlexibleTrustable Traceability System of Agricultural Products Based on Blockchain[J].Computer Engineering,2020,46(12):319-326. [24]HAN H.Blockchain infiltration into data transaction to solvetraceability and authorization “pain points”[J].Communications World,2017(19):1. [25]HUANG Z Z,ZHANG X D,ZHAO J H,et al.Design of know-lege sharing mechanism based on blockchain[J].Journal of Chongqing University of Technology(Natural Science),2021,35(9):143-151. [26]QIAO R,CAO Y,WANG Q X.Dynamic data traceability me-chanism of internet of things based on alliance chain[J].Journal of Software,2019,30(6):1614-1631. [27]SONG S,PENG W.BLOCCE+:An Improved Blockchain-Based Covert Communication Approach[J].Journal of Chongqing University of Technology(Natural Science),2020,34(9):238-244. [28]XI L,WANG R D,FAN H Y,et al.Unsupervised Anomaly Detection Model based on Sample Association Perception[J].Chinese Journal of Computers,2021,44(11):2317-2331. |
[1] | LIU Xing-guang, ZHOU Li, LIU Yan, ZHANG Xiao-ying, TAN Xiang, WEI Ji-bo. Construction and Distribution Method of REM Based on Edge Intelligence [J]. Computer Science, 2022, 49(9): 236-241. |
[2] | YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204. |
[3] | SHI Dian-xi, ZHAO Chen-ran, ZHANG Yao-wen, YANG Shao-wu, ZHANG Yong-jun. Adaptive Reward Method for End-to-End Cooperation Based on Multi-agent Reinforcement Learning [J]. Computer Science, 2022, 49(8): 247-256. |
[4] | YU Bin, LI Xue-hua, PAN Chun-yu, LI Na. Edge-Cloud Collaborative Resource Allocation Algorithm Based on Deep Reinforcement Learning [J]. Computer Science, 2022, 49(7): 248-253. |
[5] | LI Meng-fei, MAO Ying-chi, TU Zi-jian, WANG Xuan, XU Shu-fang. Server-reliability Task Offloading Strategy Based on Deep Deterministic Policy Gradient [J]. Computer Science, 2022, 49(7): 271-279. |
[6] | YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495. |
[7] | XIE Wan-cheng, LI Bin, DAI Yue-yue. PPO Based Task Offloading Scheme in Aerial Reconfigurable Intelligent Surface-assisted Edge Computing [J]. Computer Science, 2022, 49(6): 3-11. |
[8] | HONG Zhi-li, LAI Jun, CAO Lei, CHEN Xi-liang, XU Zhi-xiong. Study on Intelligent Recommendation Method of Dueling Network Reinforcement Learning Based on Regret Exploration [J]. Computer Science, 2022, 49(6): 149-157. |
[9] | GUO Yu-xin, CHEN Xiu-hong. Automatic Summarization Model Combining BERT Word Embedding Representation and Topic Information Enhancement [J]. Computer Science, 2022, 49(6): 313-318. |
[10] | FAN Jing-yu, LIU Quan. Off-policy Maximum Entropy Deep Reinforcement Learning Algorithm Based on RandomlyWeighted Triple Q -Learning [J]. Computer Science, 2022, 49(6): 335-341. |
[11] | ZHANG Jia-neng, LI Hui, WU Hao-lin, WANG Zhuang. Exploration and Exploitation Balanced Experience Replay [J]. Computer Science, 2022, 49(5): 179-185. |
[12] | LI Peng, YI Xiu-wen, QI De-kang, DUAN Zhe-wen, LI Tian-rui. Heating Strategy Optimization Method Based on Deep Learning [J]. Computer Science, 2022, 49(4): 263-268. |
[13] | ZHOU Qin, LUO Fei, DING Wei-chao, GU Chun-hua, ZHENG Shuai. Double Speedy Q-Learning Based on Successive Over Relaxation [J]. Computer Science, 2022, 49(3): 239-245. |
[14] | OUYANG Zhuo, ZHOU Si-yuan, LYU Yong, TAN Guo-ping, ZHANG Yue, XIANG Liang-liang. DRL-based Vehicle Control Strategy for Signal-free Intersections [J]. Computer Science, 2022, 49(3): 46-51. |
[15] | HUANG Xin-quan, LIU Ai-jun, LIANG Xiao-hu, WANG Heng. Load-balanced Geographic Routing Protocol in Aerial Sensor Network [J]. Computer Science, 2022, 49(2): 342-352. |
|