[1] |
ZHAO Beiying, JI Weifeng, WENG Jiang, SUN Yan, LI Yingqi, WU Xuan.
Trusted Routing Protocol for Flying Ad Hoc Networks
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(12): 2304-2314.
|
[2] |
ZHANG Mingjun, YANG Sihua, YAO Bing.
Exploring Relationship Between Traditional Lattices and Graph Lattices of Topological Coding
[J]. Journal of Frontiers of Computer Science and Technology, 2021, 15(11): 2171-2183.
|
[3] |
SUN Yan, JI Weifeng, WENG Jiang.
Selection of Defensive Optimal Strategy for Moving Target Signal Game
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(9): 1510-1520.
|
[4] |
GU Jianan, ZHENG Beilei, WENG Chuliang.
Survey on Protection Mechanisms for Untrusted Hypervisor in Cloud
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(2): 200-214.
|
[5] |
ZHOU Jian, SUN Liyan, FU Ming.
Research on Wallet Protection Against Currency Failure in Blockchain
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(12): 2039-2049.
|
[6] |
LI Bin, JIANG Jianguo.
Minority Decision: More Secure Voting Mechanism for Distributed Consistency Algorithm
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1693-1701.
|
[7] |
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo.
Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme
[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(10): 1702-1711.
|
[8] |
ZHOU Hanxun, YANG Yang, FENG Runze, XIONG Junkun, WAN Ming, GUO Wei.
Stochastic Propagation Model of Worms in Internet of Vehicles
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(9): 1524-1533.
|
[9] |
LI Cong, GE Hongwei.
Robust Speech Feature Extraction Based on Nonlinear Power-Function Gammachirp Filter
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(8): 1351-1359.
|
[10] |
SUN Ziwen, LI Song.
Lightweight Authentication Protocol for Location Privacy Using PUF in Mobile RFID System
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(3): 418-428.
|
[11] |
DUAN Yucong, ZHANG Xinyue, ZHOU Zhangbing, HUANG Mengxing, CAO Chunjie, ZHOU Xiaoyi.
Security Provision for Implicit Typed Resources
[J]. Journal of Frontiers of Computer Science and Technology, 2019, 13(12): 2061-2072.
|
[12] |
ZHANG Sheng, ZHAO Jue, CHEN Rongyuan.
Research Advances on Network Security Logs Visualization
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(5): 681-696.
|
[13] |
LI Pan, ZHAO Wentao, LIU Qiang, CUI Jianjing, YIN Jianping.
Security Issues and Their Countermeasuring Techniques of Machine Learning: A Survey
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 171-184.
|
[14] |
ZHAO Chao, WANG Huiqiang, LIN Junyu, LV Hongwu, HAN Jizhong.
Attack Graph Analysis Method for Large Scale Network Security Hardening
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 263-273.
|
[15] |
GAO Ni, HE Yiyue, SHEN Yuan, GAO Ling.
Hierarchical Vulnerability Remediation Model Based on Vulnerability Type Clustering
[J]. Journal of Frontiers of Computer Science and Technology, 2018, 12(2): 274-281.
|