Computer Science ›› 2025, Vol. 52 ›› Issue (6A): 240900110-6.doi: 10.11896/jsjkx.240900110
• Information Security • Previous Articles Next Articles
ZHU Keda, CAI Ruijie, LIU Shengli
CLC Number:
[1]ZHAO N,SU J S,ZHAO B K,et al.A Survey on Hidden Servi-ce Location Technologies in Anonymous Communication System [J].Chinese Journal of Computers,2022,45(2):393-411. [2]MA X G,LI T Y,LIU F L,et al.Robust network flow watermarking algorithm based on dynamic interval compression [J].Application Research of Computers,2023,40(10):3144-3148,3154. [3]ZHANG L C,KONG Y Z,GUO Y,et al.Survey on networkflow watermarking;model,interferences,applications,technologies and security [J].IET Communications,2018,12(14):1639-1648. [4]CHEN Q,SHEN T,LI P F,et al.Optical watermarking reconstruction method based on FC-DenseNets-BC neural network [J].Optical Technique,2021,47(2):223-230. [5]MELLIMI S,RAJPUT V,ANSARI I A,et al.A fast and efficient image watermarking scheme based on deep neural network[J].Pattern Recognition Letters,2021,151:222-228. [6]ZHENG G,HU D H,GE H,et al.End-to-end image steganography and watermarking driven by generative adversarial networks[J].Journal of Image and Graphics,2021,26(10):2485-2502. [7]WANG F.Simulation of Network Big Data Lossless Encryption Algorithm Based on Two-Way Defense[J].Computer Simulation,2021,38(10):316-319. [8]ZHANG L,LUO J Z,YANG M,et al.Interval Centroid Based Flow Watermarking Technique for Anonymous Communication Traceback [J].Journal of Software,2011,22(10):2358-2371. [9]LI Q K,LIU G J,LIU W W,et al.Detecting Network Watermark Through Multi-flow Joint Entropy of Centroid [J].Journal of Chinese Computer Systems,2017,38(11):2443-2447. [10]ZHANG Y J,CHEN K,ZHOU G,et al.Research Progress of Neural Networks Watermarking Technology[J].Journal of Computer Research and Development,2021,58(5):964-976. [11]XIA D X,WANG L N,SONG Y F,et al.Review of Deep Neural Network Model Digital Watermarking Technology [J].Science Technology and Engineering,2023,23(5):1799-1811. [12]YANG A S,WANG L,CAO Y J,et al.Neural network model integrity verification algorithm based on reversible watermark [J].Computer Engineering and Design,2024,45(2):383-389. [13]LIU Y L,HE H J,CHEN F,et al.Traceable DNN Model Protection Based on Watermark Neural Network [J].Journal of Applied Sciences,2023,41(2):183-196. [14]TAO J,ZHU Z C,WANG Z Y,et al.A Feature Watermarking Generation and Embedding Scheme for IPv6 Network [J].Journal of Computer Research and Development,2021,58(11):2400-2415. [15]ZHAO X Q,SUN L,WANG Y J,et al.Covert Channel Construction Method based on IPv6 Protocol [J].Communications Technology,2021,54(1):158-163. [16]WU Q,LI Y H,ZHU Q L.HMM-Viterbi Based Network Resource Data Processing Method and Its Application [J].Mobile Communications,2022,46(2):89-94. [17]FENG L,ZHU R J,WU H Z,et al.Survey of Neural Network Watermarking[J].Journal of Applied Sciences,2021,39(6):881-892. [18]WANG X C,ZHANG L,YU Y Q,et al.Robust image watermarking network algorithm based on effective neural architecture search [J].Journal of Zhejiang University(Science Edition),2021,48(3):261-269. [19]DI Y L,ZHANG Y Z,WANG T Q,et al.Low Distortion Watermark Scheme Based on Redistributable Anticollusion Coding [J].Journal of Data Acquisition and Processing,2023,38(2):413-425. [20]SONG Y,SHEN Q J,YANG H S.Reversible Database Watermarking Scheme Based on Cuckoo Algorithm [J].Computer Applications and Software,2021,38(12):304-313. |
[1] | BIAN Hui, MENG Changqian, LI Zihan, CHEN Zihaoand XIE Xuelei. Continuous Sign Language Recognition Based on Graph Convolutional Network and CTC/Attention [J]. Computer Science, 2025, 52(6A): 240400098-9. |
[2] | HONG Yi, SHEN Shikai, SHE Yumei, YANG Bin, DAI Fei, WANG Jianxiao, ZHANG Liyi. Multivariate Time Series Prediction Based on Dynamic Graph Learning and Attention Mechanism [J]. Computer Science, 2025, 52(6A): 240700047-8. |
[3] | LI Weirong, YIN Jibin. FB-TimesNet:An Improved Multimodal Emotion Recognition Method Based on TimesNet [J]. Computer Science, 2025, 52(6A): 240900046-8. |
[4] | JIN Hong, CHEN Like, YOU Lan, LYU Shunying, ZHOU Kaicheng, XIAO Kui. Point-of-interest Recommendation Based on Geospatial-TemporalCorrelations and Social Influence [J]. Computer Science, 2025, 52(5): 128-138. |
[5] | KONG Chao, WANG Wei, HUANG Subin, ZHANG Yi, MENG Dan. Autonomous Obstacle Avoidance Method for Unmanned Surface Vehicles Based on ImprovedProximal Policy Optimization [J]. Computer Science, 2025, 52(4): 40-48. |
[6] | LIU Tengfei, CHEN Liyue, FANG Jiangyi, WANG Leye. SCFNet:Fusion Framework of External Spatial Features for Spatio-temporal Prediction [J]. Computer Science, 2025, 52(4): 110-118. |
[7] | DENG Ceyu, LI Duantengchuan, HU Yiren, WANG Xiaoguang, LI Zhifei. Joint Inter-word and Inter-sentence Multi-relationship Modeling for Review-basedRecommendation Algorithm [J]. Computer Science, 2025, 52(4): 119-128. |
[8] | XIONG Keqin, RUAN Sijie, YANG Qianyu, XU Changwei , YUAN Hanning. Mobility Data-driven Location Type Inference Based on Crowd Voting [J]. Computer Science, 2025, 52(3): 169-179. |
[9] | WANG Huiqiang, HUANG Feihu, PENG Jian, JIANG Yuan, ZHANG Linghao. Multivariate Time Series Forecasting Based on Temporal Dependency and Variable Interaction [J]. Computer Science, 2025, 52(2): 67-79. |
[10] | WANG Tianyi, LIN Youfang, GONG Letian, CHEN Wei, GUO Shengnan, WAN Huaiyu. Check-in Trajectory and User Linking Based on Natural Language Augmentation [J]. Computer Science, 2025, 52(2): 99-106. |
[11] | ZHANG Yusong, XU Shuai, YAN Xingyu, GUAN Donghai, XU Jianqiu. Survey on Cross-city Human Mobility Prediction [J]. Computer Science, 2025, 52(1): 102-119. |
[12] | WANG Jiabin, LUO Junren, ZHOU Yanzhong, WANG Chao, ZHANG Wanpeng. Survey on Event Extraction Methods:Comparative Analysis of Deep Learning and Pre-training [J]. Computer Science, 2024, 51(9): 196-206. |
[13] | BAI Wenchao, BAI Shuwen, HAN Xixian, ZHAO Yubo. Efficient Query Workload Prediction Algorithm Based on TCN-A [J]. Computer Science, 2024, 51(7): 71-79. |
[14] | LEI Yongsheng, DING Meng, SHEN Yao, LI Juhao, ZHAO Dongyue, CHEN Fushi. Action Recognition Model Based on Improved Two Stream Vision Transformer [J]. Computer Science, 2024, 51(7): 229-235. |
[15] | DONG Wanqing, ZHAO Zirong, LIAO Huimin, XIAO Hui, ZHANG Xiaoliang. Research and Implementation of Urban Traffic Accident Risk Prediction in Dynamic Road Network [J]. Computer Science, 2024, 51(6A): 230500118-10. |
|