Journal: Science in China Series F: Information Sciences

Volume 65, Issue 7

1 -- 16Weiwei Wu, Su Hu, Di Lin, Gang Wu 0001. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
1 -- 13Zhong Ji, Kexin Chen, Yuqing He, Yanwei Pang, Xuelong Li 0001. Heterogeneous memory enhanced graph reasoning network for cross-modal retrieval
1 -- 19Di Cui, Lingling Fan 0003, Sen Chen, Yuanfang Cai, Qinghua Zheng, Yang Liu 0003, Ting Liu 0002. Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects
1 -- 16Bo Peng, Mingmin Chi, Chao Liu. Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing
1 -- 19Huanruo Li, Yunfei Guo, Shumin Huo, Hongchao Hu, Penghao Sun. Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
1 -- 2Liyang Zhou, Zhifang Zhang. Explicit construction of minimum bandwidth rack-aware regenerating codes
1 -- 3Weibei Fan, Jianxi Fan, Yujie Zhang, Zhijie Han 0001, Guoliang Chen 0008. Communication and performance evaluation of 3-ary n-cubes onto network-on-chips
1 -- 2Xiaomao Cao, Jianxin Yi, Ziping Gong, Xianrong Wan. Automatic target recognition combining angular diversity and time diversity for multistatic passive radar
1 -- 2Li Feng 0004, Shuiqing Xu, Ke Zhang 0006, Yi Chai, Darong Huang. Fault estimation based on high order iterative learning scheme for systems subject to nonlinear uncertainties
1 -- 15Ya Shuang, Hanting Zhao, Meng-Lin Wei, Qiang Cheng, Shi Jin 0002, Tiejun Cui, Philipp del Hougne, LianLin Li. One-bit quantization is good for programmable coding metasurfaces
1 -- 15Xingguo Zeng, Jianjun Liu, Xin Ren, Wei Yan, Qiang Fu, Xingye Gao, Wangli Chen, Wei Zuo, Chunlai Li. Pan-location mapping and localization for the in-situ science exploration of Zhurong Mars rover
1 -- 2Gaofeng Cheng, Huan Chen, Pingzhi Fan, Li Li, Li Hao. A layered grouping random access scheme based on dynamic preamble selection for massive machine type communications
1 -- 15Hanjie Liu, Jinde Cao, Wei Huang 0017, Xinli Shi, Xudong Wang. Complex network approach for the evaluation of asphalt pavement design and construction: a longitudinal study
1 -- 18Xiaoyi Yin, Zhen Cui, Hong Chang, Bingpeng Ma, Shiguang Shan. Extending generalized unsupervised manifold alignment
1 -- 3Nan Nan, Xiaohong Guan, Yixin Wang, Youtian Du. Common quantitative characteristics of music melodies - pursuing the constrained entropy maximization casually in composition
1 -- 2Jiangong Chen, Xia Lei, Yue Xiao 0001, Hongyan Zhang 0006, Yuan Ding, Gang Wu 0001. Polarized spatial and directional modulation toward secure wireless transmission
1 -- 13Chenchen Peng, Weihai Zhang. Multicriteria optimization problems of finite horizon stochastic cooperative linear-quadratic difference games
1 -- 3Ying He 0004, Ellis Inglut, Cunjin Luo. Malware incident response (IR) informed by cyber threat intelligence (CTI)
1 -- 2Jiaqi Zhao 0005, Hui Zhu 0001, Fengwei Wang, Rongxing Lu, Hui Li 0006, Zhongmin Zhou, Haitao Wan. ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data
1 -- 18Haoyu Chen, Deqing Zou, Hai Jin 0001, Shouhuai Xu, Bin Yuan. SAND: semi-automated adaptive network defense via programmable rule generation and deployment
1 -- 2Shang Shi, Yonghui Sun, Yinlong Hu, Xin Yu. Robust fixed-time output-feedback control for linear systems without chattering: an exact uncertainty compensation method
1 -- 2Yan Huang, Chuanchuan Yang, Zhangyuan Chen. 3DPF-FBN: video inpainting by jointly 3D-patch filling and neural network refinement
1 -- 2Andrew Chi-Chih Yao, Xia Yin, Yinqun Liu, Guoliang Li. Perspectives from the second Global Forum on Development of Computer Science
1 -- 11Yi Zhao 0011, Ke Xu, Qi Li, Haiyang Wang, Dan Wang 0002, Min Zhu. Intelligent networking in adversarial environment: challenges and opportunities
1 -- 19Guangrui Liu, Weizhe Zhang, Xinjie Li, Kaisheng Fan, Shui Yu. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems
1 -- 3Hui Wang, Dawu Gu, Yuanyuan Zhang, Yikun Hu. An empirical study of security issues in SSO server-side implementations
1 -- 2Shuang Shi, Zhongyang Fei, Xudong Zhao 0001. Time-scheduled observer design for switched linear systems with unknown inputs
1 -- 2Jinhui Liu, Yong Yu, Hongliang Bi, Yanqi Zhao, Shijia Wang, Huanguo Zhang. Post quantum secure fair data trading with deterability based on machine learning
1 -- 12Xiao-Jie Li, Cong Li, Xiang Li 0010. The impact of information dissemination on vaccination in multiplex networks
1 -- 2Zihan Li, Ping Wang 0011, Chaojie Zhu, Yunfeng Hu, Hong Chen 0003. MPC-based strategy for longitudinal and lateral stabilization of a vehicle under extreme conditions
1 -- 3Jing Liang 0005, Boyang Qu, Baolei Li, Kunjie Yu, Caitong Yue. Locating multiple roots of nonlinear equation systems via multi-strategy optimization algorithm with sequence quadratic program
1 -- 12Kui Zhang, Hang Zhou 0007, Huanyu Bian, Weiming Zhang 0001, Nenghai Yu. Certified defense against patch attacks via mask-guided randomized smoothing