UM

Browse/Search Results:  1-8 of 8 Help

Selected(0)Clear Items/Page:    Sort:
The Construction of Smart Tourism City and Digital Marketing of Cultural Tourism Industry under Network Propaganda Strategy Journal article
Guo, Kaimeng, Gu, Yinan. The Construction of Smart Tourism City and Digital Marketing of Cultural Tourism Industry under Network Propaganda Strategy[J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022, 4932415.
Authors:  Guo, Kaimeng;  Gu, Yinan
Favorite | TC[WOS]:6 TC[Scopus]:10  IF:1.968/2.079 | Submit date:2023/01/30
Texture Synthesizability Assessment via Deep Siamese-Type Network Journal article
Hao, Chuanyan, Yang, Zhi Xin, He, Liping, Wu, Weimin. Texture Synthesizability Assessment via Deep Siamese-Type Network[J]. Security and Communication Networks, 2022, 2022, 1626747.
Authors:  Hao, Chuanyan;  Yang, Zhi Xin;  He, Liping;  Wu, Weimin
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:1.968/2.079 | Submit date:2022/08/31
Texture Synthesizability Assessment  Deep Siamese-type Network  
Texture Synthesizability Assessment via Deep Siamese-Type Network Journal article
Hao, Chuanyan, Yang, Zhi Xin, He, Liping, Wu, Weimin. Texture Synthesizability Assessment via Deep Siamese-Type Network[J]. Security and Communication Networks, 2022, 2022, 1626747.
Authors:  Hao, Chuanyan;  Yang, Zhi Xin;  He, Liping;  Wu, Weimin
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:1.968/2.079 | Submit date:2022/05/17
Texture Synthesizability Assessment  Deep Siamese-type Network  
Seeking best-balanced patch-injecting strategies through optimal control approach Journal article
Huang, Kaifan, Li, Pengdeng, Yang, Lu Xing, Yang, Xiaofan, Tang, Yuan Yan. Seeking best-balanced patch-injecting strategies through optimal control approach[J]. Security and Communication Networks, 2019, 2019.
Authors:  Huang, Kaifan;  Li, Pengdeng;  Yang, Lu Xing;  Yang, Xiaofan;  Tang, Yuan Yan
Favorite | TC[WOS]:7 TC[Scopus]:8  IF:1.968/2.079 | Submit date:2022/05/23
Defending against the Advanced Persistent Threat: An Optimal Control Approach Journal article
Li, Pengdeng, Yang, Xiaofan, Xiong, Qingyu, Wen, Junhao, Tang, Yuan Yan. Defending against the Advanced Persistent Threat: An Optimal Control Approach[J]. SECURITY AND COMMUNICATION NETWORKS, 2018.
Authors:  Li, Pengdeng;  Yang, Xiaofan;  Xiong, Qingyu;  Wen, Junhao;  Tang, Yuan Yan
Favorite | TC[WOS]:33 TC[Scopus]:31  IF:1.968/2.079 | Submit date:2018/10/30
Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization Journal article
Yushu Zhang, Di Xiao, Kwok-Wo Wong, Jiantao Zhou, Sen Bai, Moting Su. Perturbation meets key-based interval splitting arithmetic coding: security enhancement and chaos generalization[J]. Security and Communication Networks, 2015, 9(1), 43-53.
Authors:  Yushu Zhang;  Di Xiao;  Kwok-Wo Wong;  Jiantao Zhou;  Sen Bai; et al.
Adobe PDF | Favorite | TC[WOS]:3 TC[Scopus]:4  IF:1.968/2.079 | Submit date:2018/12/22
Arithmetic Coding  Chaotic Map  Joint Compression And Encryption  Perturbation  
SCADA communication and security issues Journal article
Gao J., Liu J., Rajan B., Nori R., Fu B., Xiao Y., Liang W., Philip Chen C.L.. SCADA communication and security issues[J]. Security and Communication Networks, 2014, 7(1), 175.
Authors:  Gao J.;  Liu J.;  Rajan B.;  Nori R.;  Fu B.; et al.
Favorite | TC[WOS]:53 TC[Scopus]:76 | Submit date:2018/10/30
Communication  Scada  Security  Smart Grid  
Nonintrusive tracing in the Internet Journal article
Olteanu A., Xiao Y., Liu J., Chen T.M., Chen C.L.P.. Nonintrusive tracing in the Internet[J]. Security and Communication Networks, 2013, 6(7), 833-843.
Authors:  Olteanu A.;  Xiao Y.;  Liu J.;  Chen T.M.;  Chen C.L.P.
Favorite | TC[WOS]:1 TC[Scopus]:3  IF:1.968/2.079 | Submit date:2019/02/11
Internet  Nonintrusive  Tracing