2021年论文

2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2005 2004 2002

  1. [1] Ge S, Xu M, Qiao T, et al. A novel file carving algorithm for docker container logs recorded by json-file logging driver[J]. Forensic Science International: Digital Investigation, 2021, 39: 301272.
  2. [2] Wu X, Qiao T, Xu M, et al. Secure reversible data hiding in encrypted images based on adaptive prediction-error labeling[J]. Signal Processing, 2021: 108200.
  3. [3] Yu Y, Zheng N, Qiao T, et al. Distinguishing between natural and recolored images via lateral chromatic aberration[J]. Journal of Visual Communication and Image Representation, 2021, 80: 103295.
  4. [4] 王刚阳,徐明,伍益明,胡沁伶,郑宁. 面向网络攻击下弹性均值趋同的智能体群组编队[J].控制理论与应用, 2021,38(7):1071-1081
  5. [5] 胡沁伶, 郑宁, 徐明, 等. DoS攻击下具备隐私保护的多智能体系统均值趋同控制[J]. 自动化学报, 2021, 47: 1-11.
  6. [6] Zhou X, Xu M, Wu Y, et al. Deep Model Poisoning Attack on Federated Learning[J]. Future Internet, 2021, 13(3): 73.
  7. [7] Wang S, Zheng N, Xu M. A Compression Resistant Steganography Based on Differential Manchester Code[J]. Symmetry, 2021, 13(2): 165.
  8. [8] Zhao Q, Zheng N, Bao Q. Location Spoofing Detection for Social Network Service using Camera Fingerprint[C]. Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. 2020: 1-6.
  9. [9] 徐明, 蒋奔驰. 基于纹理和颜色感知距离的对抗样本生成算法[J]. 电子科技大学学报, 2021, 50(4): 558-564.
  10. [10] Liu H, Bao Q, Qiu H, et al. Source Identification of Asymptomatic Spread on Networks[J]. IEEE Access, 2021, 9: 34142-34155.
  11. [11] Shi D, Xu M, Wu T, et al. Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks[J]. Mobile Information Systems, 2021.
  12. [12] 许艳萍,仇建,叶挺聪,徐明,张桦,吴以凡,张灵均.汪云路理论+实践类课程线上教学探索案例[J].计算机教育,2021, 5:129-132,141
  13. [13] Ying W, Xu J. Influence Circle Covering in Large-Scale Social Networks: a Shift Approach[J]. IEEE Access, 2021, 9: 146110-146122.