| [1] | 
													
														DAI Zhiming, ZHOU Mingtuo, YANG Yang, LI Jian, LIU Jun. 
														
															Fog computing resource scheduling in intelligent factories
														[J]. Journal of University of Chinese Academy of Sciences, 2021, 38(5): 702-711.
													 | 
												
																																																																																
													| [2] | 
													
														LIU Ting, LUO Xiliang. 
														
															Online task offloading in mobile edge computing
														[J]. Journal of University of Chinese Academy of Sciences, 0, (): 21542-21542.
													 | 
												
																																																																																
													| [3] | 
													
														ZHU Zhaowei, LIU Ting, QIAN Hua, LUO Xiliang. 
														
															Online task offloading in non-stationary fog-enabled networks
														[J]. , 2020, 37(5): 699-707.
													 | 
												
																																																																																
													| [4] | 
													
														LAI Xunfei, LIANG Xuwen, XIE Zhuochen, LI Zongwang. 
														
															Intrusion detection method based on entity embedding and long short-term memory networks
														[J]. , 2020, 37(4): 553-561.
													 | 
												
																																																																																
													| [5] | 
													
														ZHAO Ze, XU Youyu, TANG Liang, BU Zhiyong. 
														
															Internet traffic classification based on the improved one-versus-one method
														[J]. , 2020, 37(4): 570-576.
													 | 
												
																																																																																
													| [6] | 
													
														XUE Kaiping, LIU Bin, LI Wei, HONG Peilin. 
														
															A format feature extracting and classifying algorithm for unknown data link frame
														[J]. , 2018, 35(4): 521-528.
													 | 
												
																																																																																
													| [7] | 
													
														TIAN Jie, WANG Weiqiang, SUN Yi. 
														
															Recognition of overlaid Chinese characters in videos without binarization
														[J]. , 2018, 35(3): 402-408.
													 | 
												
																																																																																
													| [8] | 
													
														YE Yanling, FU Xiaotong, ZHANG Yuqing, YUE Hongzhou. 
														
															An automated and directed testing technique for target behavior of Android application
														[J]. , 2018, 35(3): 409-416.
													 | 
												
																																																																																
													| [9] | 
													
														YAN Zhitao, FANG Binxing, LIU Qixu, CUI Xiang. 
														
															A wireless router-based lightweight defense framework for IoT devices
														[J]. , 2017, 34(6): 759-770.
													 | 
												
																																																																																
													| [10] | 
													
														WANG Kaiyong, DENG Yu. 
														
															Identification of spatial connection intensity of Zhongyuan urban agglomeration based on microblogging
														[J]. , 2016, 33(6): 775-782.
													 | 
												
																																																																																
													| [11] | 
													
														YAN Shujun, WANG Wenjie, ZHANG Yuqing. 
														
															An efficient method of web fingerprint identification
														[J]. , 2016, 33(5): 679-685.
													 | 
												
																																																																																
													| [12] | 
													
														HOU Jinzhong, ZHANG Libo, LUO Tiejian. 
														
															A distributed storage method of balancing video resources
														[J]. , 2016, 33(5): 686-692.
													 | 
												
																																																																																
													| [13] | 
													
														CAO Laicheng, ZHAO Jianjun, CUI Xiang, LI Ke. 
														
															Cyberspace device identification based on K-means with cosine distance measure
														[J]. , 2016, 33(4): 562-569.
													 | 
												
																																																																																
													| [14] | 
													
														WU Jingzheng, WU Yanjun, WU Zhifei, YANG Mutian, LUO Tianyue, WANG Yongji. 
														
															An Android privacy leakage malicious application detection approach based on directed information flow
														[J]. , 2015, 32(6): 807-815.
													 | 
												
																																																																																
													| [15] | 
													
														DONG Ying, ZHANG Yuqing, YUE Hongzhou. 
														
															Vulnerability exploitation for Joomla content management system
														[J]. , 2015, 32(6): 825-835.
													 |