[1] |
ZHANG Qixian, ZHU Xiaodong, LIU Yuanning, WANG Chaoqun, WU Zukang, LI Xinlong.
Sequential Iris Quality Evaluation Algorithm Based on GA-BP Neural Network
[J]. Journal of Jilin University Science Edition, 2020, 58(6): 1382-1390.
|
[2] |
WANG Hui, RU Xinxin, DAI Tianwang, LOU Yalong, LIU Kun.
Attack Profit Path Prediction Algorithm Based on NAPG Model
[J]. Journal of Jilin University Science Edition, 2019, 57(5): 1169-1178.
|
[3] |
YIN Weishi, LI Jiaqi.
Inverse Problem of Heat Source Identification Based onBayesianDifferential Evolution Algorithm#br#
[J]. Journal of Jilin University Science Edition, 2019, 57(3): 517-522.
|
[4] |
DONG Gang, YU Wei, XUAN Guangzhe.
Analysis and Detection of Attack Characteristics inAdvanced Persistent Threats#br#
[J]. Journal of Jilin University Science Edition, 2019, 57(2): 339-344.
|
[5] |
CHEN Huijuan, ZHAO Xu, CHEN Liang.
Intrusion Awareness Prediction Algorithm for Mobile Networkwith Low Matching Degree Heterogeneous Information in Cloud Computing Environment#br#
[J]. Journal of Jilin University Science Edition, 2019, 57(06): 1449-1455.
|
[6] |
WANG Hui, DAI Tianwang, RU Xinxin, LOU Yalong, AO Shan.
Prediction Method of Node Attack Path Based on OptimizedAG
[J]. Journal of Jilin University Science Edition, 2019, 57(04): 917-926.
|
[7] |
JIANG Jianhua, WU Di, HAO Dehao, WANG Limin, ZHANG Yonggang, LI Keqin.
Density Peaks Clustering Algorithm Based on CDbw and ABC Optimization#br#
[J]. Journal of Jilin University Science Edition, 2018, 56(6): 1469-1475.
|
[8] |
LIU Shuai, LIU Yuanning, ZHU Xiaodong , LIU Wentao, CHENG Yaosong.
Sequence Iris Quality Evaluation Algorithm Based onMorphology and Gray Distribution#br#
[J]. Journal of Jilin University Science Edition, 2018, 56(5): 1156-1162.
|
[9] |
REN Weiwu, ZHANG Bochen, DI Xiaoqiang, LU Yinan.
Density Clustering Anomaly Intrusion DetectionAlgorithm Based on ABCDBSCAN
[J]. Journal of Jilin University Science Edition, 2018, 56(1): 95-100.
|
[10] |
ZHAO Surui, GAO Shuangxi.
Privacy Preserving Algorithm Based on Partial Re-encode of Streaming Data
[J]. Journal of Jilin University Science Edition, 2018, 56(1): 109-113.
|
[11] |
LIU Ying, ZHANG Lijuan, HAN Yanan, PANG Liyan, WANG Shuai.
Financial Credit Risk Evaluation Model of Supply Chain FinanceBased on Particle Swarm Cooperative Optimization Algorithm
[J]. Journal of Jilin University Science Edition, 2018, 56(1): 119-125.
|
[12] |
YAN Wei, ZHANG Jun.
Network Traffic Anomaly DetectionBased on Time Series Analysis
[J]. Journal of Jilin University Science Edition, 2017, 55(05): 1249-1254.
|
[13] |
XUE Yadi, RUAN Wenhui.
Image Encryption Algorithm Based on Combined Chaotic System
[J]. Journal of Jilin University Science Edition, 2017, 55(02): 352-356.
|
[14] |
HUANG Kaifeng, LIU Weichao, LI Li.
MutualAuthentication Scheme Based on Hash Function and Elliptic Curve Cryptography
[J]. Journal of Jilin University Science Edition, 2017, 55(02): 340-344.
|
[15] |
WANG Hui, WANG Zhe, LIU Shufen.
Path Behavior Analysis Method of Network AttackBased on Path Revenue Calculation
[J]. Journal of Jilin University Science Edition, 2017, 55(02): 311-321.
|