[1] |
DAI Zhiming, ZHOU Mingtuo, YANG Yang, LI Jian, LIU Jun.
Fog computing resource scheduling in intelligent factories
[J]. Journal of University of Chinese Academy of Sciences, 2021, 38(5): 702-711.
|
[2] |
LIU Ting, LUO Xiliang.
Online task offloading in mobile edge computing
[J]. Journal of University of Chinese Academy of Sciences, 0, (): 21542-21542.
|
[3] |
ZHU Zhaowei, LIU Ting, QIAN Hua, LUO Xiliang.
Online task offloading in non-stationary fog-enabled networks
[J]. , 2020, 37(5): 699-707.
|
[4] |
LAI Xunfei, LIANG Xuwen, XIE Zhuochen, LI Zongwang.
Intrusion detection method based on entity embedding and long short-term memory networks
[J]. , 2020, 37(4): 553-561.
|
[5] |
ZHAO Ze, XU Youyu, TANG Liang, BU Zhiyong.
Internet traffic classification based on the improved one-versus-one method
[J]. , 2020, 37(4): 570-576.
|
[6] |
XUE Kaiping, LIU Bin, LI Wei, HONG Peilin.
A format feature extracting and classifying algorithm for unknown data link frame
[J]. , 2018, 35(4): 521-528.
|
[7] |
TIAN Jie, WANG Weiqiang, SUN Yi.
Recognition of overlaid Chinese characters in videos without binarization
[J]. , 2018, 35(3): 402-408.
|
[8] |
YE Yanling, FU Xiaotong, ZHANG Yuqing, YUE Hongzhou.
An automated and directed testing technique for target behavior of Android application
[J]. , 2018, 35(3): 409-416.
|
[9] |
YAN Zhitao, FANG Binxing, LIU Qixu, CUI Xiang.
A wireless router-based lightweight defense framework for IoT devices
[J]. , 2017, 34(6): 759-770.
|
[10] |
WANG Kaiyong, DENG Yu.
Identification of spatial connection intensity of Zhongyuan urban agglomeration based on microblogging
[J]. , 2016, 33(6): 775-782.
|
[11] |
YAN Shujun, WANG Wenjie, ZHANG Yuqing.
An efficient method of web fingerprint identification
[J]. , 2016, 33(5): 679-685.
|
[12] |
HOU Jinzhong, ZHANG Libo, LUO Tiejian.
A distributed storage method of balancing video resources
[J]. , 2016, 33(5): 686-692.
|
[13] |
CAO Laicheng, ZHAO Jianjun, CUI Xiang, LI Ke.
Cyberspace device identification based on K-means with cosine distance measure
[J]. , 2016, 33(4): 562-569.
|
[14] |
WU Jingzheng, WU Yanjun, WU Zhifei, YANG Mutian, LUO Tianyue, WANG Yongji.
An Android privacy leakage malicious application detection approach based on directed information flow
[J]. , 2015, 32(6): 807-815.
|
[15] |
DONG Ying, ZHANG Yuqing, YUE Hongzhou.
Vulnerability exploitation for Joomla content management system
[J]. , 2015, 32(6): 825-835.
|