[1] LENAT D B. CYC:a large-scale investment in knowledge infrastructure[J]. Communications of the ACM, 1995, 38(11):33-38. [2] ANDERSON A R, PIROLLI P L. Spread of activation[J]. Journal of Experimental Psychology:Learning, Memory, and Cognition, 1984, 10(4):791-798. [3] COLLINS A M, LOFTUS E F. A spreading-activation theory of semantic processing[J]. Psychological Review, 1975, 82(6):407-428. [4] FU X, WEI H. Problem solving by soaking the concept network[J]. Computer Science and Information Systems, 2011, 8(3):761-778. [5] YOLANDA B. Exploring synergies between content-based filtering and spreading activation techniques in knowledge-based recommender systems[J]. Information Sciences, 2011, 181(21):4823-4846. [6] DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6):644-654. [7] THOMPSON E. MD5 collisions and the impact on computer forensics[J]. Digital Investigation, 2005, 2(1):36-40. [8] LIANG J, LAI X J. Improved collision attack on hash function MD5[J]. Journal of Computer Science and Technology, 2007, 22(1):79-87. [9] KAVUT S. Results on rotation-symmetric S-boxes[J]. Information Sciences, 2012, 201:93-113. [10] BORISSOV Y L, LEE M H. Bounds on key appearance equivocation for substitution ciphers[J]. IEEE Transactions on Information Theory, 2007, 53(6):2294-2296. [11] WANG C, ZHANG H G, LIU L. Evolutionary cryptography theory based generating method for a secure Koblitz elliptic curve and its improvement by a hidden Markov models[J]. Science China Information Sciences, 2012, 55(4):911-920. [12] KUO W. Secure modulus data hiding scheme[J]. KSII Transactions on Internet and Information Systems, 2013, 7(3):600-612. [13] QIN C, CHANG C C, HSU T J. Effective fragile watermarking for image authentication with high-quality recovery capability[J]. KSII Transactions on Internet and Information Systems, 2013, 7(11):2941-2956. [14] FENG B, WANG Z, WANG D, et al. A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and simplified Chinese characters[J]. KSII Transactions on Internet and Information Systems, 2014, 8(1):269-281. [15] SHANNON C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1949, 28(4):656-715. |