[1] |
SUN Zeyu, XU Chen, SU Yanchao, LI Chuanfeng, NIE Yalin.
CCRP:Cross-Layer-Sensing Clustering Routing Protocol in Fog Computing
[J]. Computer Engineering and Applications, 2021, 57(9): 109-117.
|
[2] |
SHENG Jianhui, FAN Yinting, XIA Minjie.
Physical Layer Security Performance Analysis for Wireless Sensor Network
[J]. Computer Engineering and Applications, 2021, 57(8): 91-95.
|
[3] |
HUI Hui, GOU Bo, WANG Ying.
Secure Transmission Scheme for Successive Relaying Networks Under Eavesdropping Environment
[J]. Computer Engineering and Applications, 2021, 57(4): 77-82.
|
[4] |
WANG Zhendong, ZHANG Lin, LI Dahai.
Survey of Intrusion Detection Systems for Internet of Things Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(4): 18-27.
|
[5] |
CHENG Shuai, WU Huafeng, MEI Xiaojun.
Alternative Nonnegative Constrained Framework-Based Cooperative Localization Algorithm in Ocean Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(23): 129-136.
|
[6] |
GAO Jian, SUN Yi, WANG Runzheng, YUAN Deyu.
Research on Mining Detection Model of Browser Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(22): 125-130.
|
[7] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[8] |
CAO Lei, LI Zhanbin, YANG Yongsheng, ZHAO Longfei.
Intrusion Detection Method Based on Two-Layer Attention Networks
[J]. Computer Engineering and Applications, 2021, 57(19): 142-149.
|
[9] |
YANG Shu, SU Fang.
Distributed Data Security Integrated Application System Based on Microservices
[J]. Computer Engineering and Applications, 2021, 57(18): 238-247.
|
[10] |
XU Chen, DONG Decun, OU Dongxiu.
Research on Optimal of Time-of-Day Control Data Input Source at Intersection
[J]. Computer Engineering and Applications, 2021, 57(17): 230-236.
|
[11] |
SONG Shijie, CHEN Kaiyan, ZHANG Yang.
Security Evaluation Framework of Deep Learning Side Channel Analysis from Information Entropy
[J]. Computer Engineering and Applications, 2021, 57(17): 138-146.
|
[12] |
TAN Lijuan, ZHENG Wei, LIU Youlin, FAN Xin, YANG Fengyu.
Survey of Airborne Software Test and Verification Methods for Airworthiness Standards
[J]. Computer Engineering and Applications, 2021, 57(15): 9-22.
|
[13] |
GONG Junhui, HU Xiaohui, DU Yongwen.
Research on Selection of Optimal Defense Strategy Based on Evolutionary Game
[J]. Computer Engineering and Applications, 2021, 57(13): 116-123.
|
[14] |
LIU Jiajia, WU Hao, LI Panpan.
Research on Edge Computing Security of Railway 5G Mobile Communication System
[J]. Computer Engineering and Applications, 2021, 57(12): 1-10.
|
[15] |
SUN Zeyu, DONG Hanlei, SU Yanchao, XU Chen, NIE Yalin, LI Chuanfeng.
MDR:Multi-parameter Data Reconstruction Method Based on Energy Efficient in Sensor Networks
[J]. Computer Engineering and Applications, 2021, 57(11): 103-110.
|