[1] |
LU Yiqin, XIE Wenjing, WANG Haihan, et al.
Security-Aware Scheduling Method for Time-Sensitive Networking
[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 1-12.
|
[2] |
QIN Jiancheng, ZHONG Yu, CHENG Zhe, et al.
Fast Modulus Algorithm for Internet of Things Key Exchange Based on Mersenne-like Numbers
[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 24-35.
|
[3] |
WU Haowei, HUANG Fengjiao, YAN Lian, et al.
Legitimate Eavesdropping Scheme for Suspicious Relay Communication Networks
[J]. Journal of South China University of Technology(Natural Science Edition), 2022, 50(10): 70-79.
|
[4] |
YANG Peng WU Qiming .
Attribute-Aware Task Allocation and Privacy-Preserving Coordination Mechanism for MCS
[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(8): 38-48.
|
[5] |
LIN Shunjiang, TANG Zhiqiang, XIE Yuquan, et al.
Distributed Calculation of Security-Constrained Optimal Energy Flow in Integrated Power and Gas Energy Systems
[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(7): 36-46.
|
[6] |
LU Yiqin, MAO Zhongshu, CHENG Zhe, et al.
Research on SDN Topology Attack and Its Defense Mechanism
[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(11): 114-122.
|
[7] |
JIANG Cuiling PANG Yilin LIN Jiajun KANG Zhoumao .
Image Hashing Authentication Method Based on
Deep Convolution Neural Network
[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 53-59.
|
[8] |
WU Haotian TANG Hongxiang WANG Jianming.
A Reversible Visual Transformation Algorithm for JPEG Images
[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 16-21.
|
[9] |
MEI Yuan YE Dengpan LIU Changrui .
Review of Image Retrieval Technologies in Encrypted Domain
[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 78-86.
|
[10] |
WANG Lina WANG Bo ZHAI Liming XU Yibo .
JPEG Image Steganography Based on Side Information Estimation
[J]. Journal of South China University of Technology(Natural Science Edition), 2018, 46(5): 9-15.
|
[11] |
WANG Hui-yong FENG Yong ZHAO Ling-zhong TANG Shi-jie.
A Secure Multi-Party Computation Protocol on the Basis of Multi-Key Homomorphism
[J]. Journal of South China University of Technology (Natural Science Edition), 2017, 45(7): 69-76.
|
[12] |
WANG Yu-fei LIU Bei-bei HU Yong-jian ZHU Mei-neng.
Detection of Time Domain Forgery of H.265 /HEVC Video
[J]. Journal of South China University of Technology (Natural Science Edition), 2017, 45(1): 26-34.
|
[13] |
WEN Zhi-cheng CHEN Zhi-gang TANG Jun.
Prediction of Network Security Situation on the Basis of Time Series Analysis
[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(5): 137-143,150.
|
[14] |
KE Feng MAI Fan DENG Yuan-yi CHEN Xiao-bin.
Cooperative Jamming Strategy Based on Proximal Gradient Algorithm
[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(5): 1-7.
|
[15] |
WANG Zhi-dong WANG Gang XU Zhi-heng TONG Jin-fang SHI Quan ZHU Ge-lan.
Encryption and Decryption Methods of GOOSE Packets Based on Domain Implication
[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(4): 63-70.
|