| [1] | 
													
														LU Yiqin, XIE Wenjing, WANG Haihan, et al. 
														
															Security-Aware Scheduling Method for Time-Sensitive Networking
														[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 1-12.
													 | 
												
																																																																																
													| [2] | 
													
														QIN Jiancheng, ZHONG Yu, CHENG Zhe, et al. 
														
															Fast Modulus Algorithm for Internet of Things Key Exchange Based on Mersenne-like Numbers
														[J]. Journal of South China University of Technology(Natural Science Edition), 2023, 51(5): 24-35.
													 | 
												
																																																																																
													| [3] | 
													
														WU Haowei, HUANG Fengjiao, YAN Lian, et al. 
														
															Legitimate Eavesdropping Scheme for Suspicious Relay Communication Networks
														[J]. Journal of South China University of Technology(Natural Science Edition), 2022, 50(10): 70-79.
													 | 
												
																																																																																
													| [4] | 
													
														LIN Shunjiang, TANG Zhiqiang, XIE Yuquan, et al. 
														
															Distributed Calculation of Security-Constrained Optimal Energy Flow in Integrated Power and Gas Energy Systems
														[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(7): 36-46.
													 | 
												
																																																																																
													| [5] | 
													
														LU Yiqin, MAO Zhongshu, CHENG Zhe, et al. 
														
															Research on SDN Topology Attack and Its Defense Mechanism
														[J]. Journal of South China University of Technology (Natural Science Edition), 2020, 48(11): 114-122.
													 | 
												
																																																																																
													| [6] | 
													
														JIANG Cuiling PANG Yilin LIN Jiajun KANG Zhoumao . 
														
															 Image Hashing Authentication Method Based on 
Deep Convolution Neural Network 
  
														[J]. Journal of South China University of Technology (Natural Science Edition), 2018, 46(5): 53-59.
													 | 
												
																																																																																
													| [7] | 
													
														WANG Lina WANG Bo ZHAI Liming XU Yibo . 
														
															 JPEG Image Steganography Based on Side Information Estimation 
  
														[J]. Journal of South China University of Technology(Natural Science Edition), 2018, 46(5): 9-15.
													 | 
												
																																																																																
													| [8] | 
													
														WANG Yu-fei LIU Bei-bei HU Yong-jian ZHU Mei-neng. 
														
															Detection of Time Domain Forgery of H.265 /HEVC Video
														[J]. Journal of South China University of Technology (Natural Science Edition), 2017, 45(1): 26-34.
													 | 
												
																																																																																
													| [9] | 
													
														WEN Zhi-cheng  CHEN Zhi-gang  TANG Jun. 
														
															Prediction of Network Security Situation on the Basis of Time Series Analysis
														[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(5): 137-143,150.
													 | 
												
																																																																																
													| [10] | 
													
														KE Feng MAI Fan DENG Yuan-yi CHEN Xiao-bin. 
														
															Cooperative Jamming Strategy Based on Proximal Gradient Algorithm
														[J]. Journal of South China University of Technology (Natural Science Edition), 2016, 44(5): 1-7.
													 | 
												
																																																																																
													| [11] | 
													
														Zhou Na-qin Qi De-yu. 
														
															Parameterized Decomposition Tree-Based Obfuscation Method with Double Flattening Control Flow
														[J]. Journal of South China University of Technology (Natural Science Edition), 2015, 43(5): 132-138.
													 | 
												
																																																																																
													| [12] | 
													
														Deng Zhuo-ming Liu Ming-bo. 
														
															Reinforcement Learning Method Applied to Multiobjective Emergency Control of Transient Voltage Security
														[J]. Journal of South China University of Technology (Natural Science Edition), 2015, 43(12): 9-17.
													 | 
												
																																																																																
													| [13] | 
													
														Xu Hong- yun Xu Jun Gong Yu- jing Xu Meng- zhen. 
														
															Algorithms to Generate Location Privacy Area Based on Location Privacy Protection with Spatial Cloaking
														[J]. Journal of South China University of Technology (Natural Science Edition), 2014, 42(1): 93-103.
													 | 
												
																																																																																
													| [14] | 
													
														Luo Yu- ling Du Ming- hui. 
														
															Image Encryption Algorithm Based on Quantum Logistic Map in Wavelet Domain
														[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(6): 53-62.
													 | 
												
																																																																																
													| [15] | 
													
														Jin Jian-xiu Zheng Yi-feng Li Xu-qiong. 
														
															Evaluation of Image Scrambling Degree Based on Block Information Entropy Variance
														[J]. Journal of South China University of Technology (Natural Science Edition), 2013, 41(3): 8-14.
													 |