[1] |
LU Yiqin, XIE Wenjing, WANG Haihan, et al.
Security-Aware Scheduling Method for Time-Sensitive Networking
[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 1-12.
|
[2] |
QIN Jiancheng, ZHONG Yu, CHENG Zhe, et al.
Fast Modulus Algorithm for Internet of Things Key Exchange Based on Mersenne-like Numbers
[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 24-35.
|
[3] |
WU Haowei, HUANG Fengjiao, YAN Lian, et al.
Legitimate Eavesdropping Scheme for Suspicious Relay Communication Networks
[J]. Journal of South China University of Technology(Natural Science Edition), 2022, 50(10): 70-79.
|
[4] |
LIN Shunjiang, TANG Zhiqiang, XIE Yuquan, et al.
Distributed Calculation of Security-Constrained Optimal Energy Flow in Integrated Power and Gas Energy Systems
[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(7): 36-46.
|
[5] |
LU Yiqin, MAO Zhongshu, CHENG Zhe, et al.
Research on SDN Topology Attack and Its Defense Mechanism
[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(11): 114-122.
|
[6] |
JIANG Cuiling PANG Yilin LIN Jiajun KANG Zhoumao .
Image Hashing Authentication Method Based on
Deep Convolution Neural Network
[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 53-59.
|
[7] |
WANG Lina WANG Bo ZHAI Liming XU Yibo .
JPEG Image Steganography Based on Side Information Estimation
[J]. Journal of South China University of Technology(Natural Science Edition), 2018, 46(5): 9-15.
|
[8] |
WANG Yu-fei LIU Bei-bei HU Yong-jian ZHU Mei-neng.
Detection of Time Domain Forgery of H.265 /HEVC Video
[J]. Journal of South China University of Technology (Natural Science Edition), 2017, 45(1): 26-34.
|
[9] |
WEN Zhi-cheng CHEN Zhi-gang TANG Jun.
Prediction of Network Security Situation on the Basis of Time Series Analysis
[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(5): 137-143,150.
|
[10] |
KE Feng MAI Fan DENG Yuan-yi CHEN Xiao-bin.
Cooperative Jamming Strategy Based on Proximal Gradient Algorithm
[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(5): 1-7.
|
[11] |
Zhou Na-qin Qi De-yu.
Parameterized Decomposition Tree-Based Obfuscation Method with Double Flattening Control Flow
[J]. Journal of South China University of Technology (Natural Science Edition), 2015, 43(5): 132-138.
|
[12] |
Deng Zhuo-ming Liu Ming-bo.
Reinforcement Learning Method Applied to Multiobjective Emergency Control of Transient Voltage Security
[J]. Journal of South China University of Technology (Natural Science Edition), 2015, 43(12): 9-17.
|
[13] |
Xu Hong- yun Xu Jun Gong Yu- jing Xu Meng- zhen.
Algorithms to Generate Location Privacy Area Based on Location Privacy Protection with Spatial Cloaking
[J]. Journal of South China University of Technology (Natural Science Edition), 2014, 42(1): 93-103.
|
[14] |
Luo Yu- ling Du Ming- hui.
Image Encryption Algorithm Based on Quantum Logistic Map in Wavelet Domain
[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(6): 53-62.
|
[15] |
Jin Jian-xiu Zheng Yi-feng Li Xu-qiong.
Evaluation of Image Scrambling Degree Based on Block Information Entropy Variance
[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(3): 8-14.
|