[1] |
Tianchen QIU, Xiaoying ZHENG, Yongxin ZHU, Songlin FENG.
Federated Learning Architecture for Non-IID Data
[J]. Computer Engineering, 2023, 49(7): 110-117.
|
[2] |
ZHANG Qingqing, TANG Hongbo, YOU Wei, PU Liming.
Dynamic Scheduling Strategy of NFV Mimic Defense Architecture Based on Evolutionary Game
[J]. Computer Engineering, 2022, 48(4): 30-38,49.
|
[3] |
YANG Ke, ZHANG Fan, GUO Wei, ZHAO Bo, MU Qing.
A Method for Solving the Metadata Randomness Problem of Mimic Storage
[J]. Computer Engineering, 2022, 48(2): 140-146,155.
|
[4] |
SUN Pengyu, ZHANG Hengwei, TAN Jinglei, LI Chenwei, MA Junqiang, WANG Jindong.
Network Security Defense Decision Method Based on Time Game
[J]. Computer Engineering, 2022, 48(11): 145-151.
|
[5] |
WEI Shuai, ZHANG Huihua, SU Ye, XUE Pengfei, WEN Liang.
Majority Voting Algorithm Based on High-Order Heterogeneity for Mimic Defense System
[J]. Computer Engineering, 2021, 47(5): 30-35.
|
[6] |
WU Zhengjiang, YAO Qi, FENG Sifeng, GU Qing.
Optimization Scheme of Competitive Arbitration Based on Binary Database Log
[J]. Computer Engineering, 2021, 47(5): 24-29.
|
[7] |
WANG Zi, WANG Zhihua, HAN Yong, JIN Jianlong, HUANG Tianming, ZHU Jiang.
Research on Mulit-Layer Cooperative Defense Model Oriented to Network Security of Power System
[J]. Computer Engineering, 2021, 47(12): 131-140.
|
[8] |
LAI Yanling, SHI Junfeng, CHEN Jixin, BAI Hanli, TANG Xiaolan, DENG Biying, ZHENG Desheng.
Adversarial Example Defense Model Based on U-Net
[J]. Computer Engineering, 2021, 47(12): 163-170.
|
[9] |
LI Lingshu, WU Jiangxing.
SaaS Security Oriented Virtual Network Function Embedding Method Under Cloud-Network Integration
[J]. Computer Engineering, 2021, 47(12): 30-39.
|
[10] |
HUANG Jingqi, JIA Xiping, CHEN Daoxin, BAI Kejia, LIAO Xiuxiu.
Image Attack Algorithm Based on Bi-Adversary Mechanism
[J]. Computer Engineering, 2021, 47(11): 150-157.
|
[11] |
YANG Lin, WANG Yongjie.
Network Defense Strategy Selection Method Based on Single-Point Multi-Step Game
[J]. Computer Engineering, 2021, 47(1): 154-164.
|
[12] |
JIANG Yan, ZHANG Liguo.
Survey of Adversarial Attacks and Defense Methods for Deep Learning Model
[J]. Computer Engineering, 2021, 47(1): 1-11.
|
[13] |
HUANG Tinghui, DING Yong, LI Sijun.
Research on MT6D-based Lightweight Security Protocol for Internet of Things
[J]. Computer Engineering, 2020, 46(9): 117-122.
|
[14] |
ZHONG Zhicheng, XU Bingfeng, GU Jiugen.
Minimum Defense Cost Calculation Method for CPS Based on Attack Defense Tree
[J]. Computer Engineering, 2020, 46(8): 132-138.
|
[15] |
GUO Wei, XIE Guangwei, ZHANG Fan, LI Min.
Design and Implementation of a Mimic Architecture for Distributed Storage System
[J]. Computer Engineering, 2020, 46(6): 12-19.
|