[1] |
Chenyang GE, Qinrang LIU, Xue PEI, Shuai WEI, Zhengbin ZHU.
Efficient collaborative defense scheme against distributed denial of service attacks in software defined network
[J]. Journal of Computer Applications, 2023, 43(8): 2477-2485.
|
[2] |
Yue CHI, Zhengping LI, Chao XU, Bo FENG.
Highlight removal algorithm for medical endoscopic images
[J]. Journal of Computer Applications, 2023, 43(4): 1278-1283.
|
[3] |
Jingcheng XU, Xuebin CHEN, Yanling DONG, Jia YANG.
DDoS attack detection by random forest fused with feature selection
[J]. Journal of Computer Applications, 2023, 43(11): 3497-3503.
|
[4] |
HU Ziqi, XIE Kai, WEN Chang, LI Meiran, HE Jianbiao.
Low dose CT image enhancement based on generative adversarial network
[J]. Journal of Computer Applications, 2023, 43(1): 280-288.
|
[5] |
Zefang HAN, Xiong ZHANG, Hong SHANGGUAN, Xinglong HAN, Jing HAN, Gang FENG, Xueying CUI.
Artifacts sensing generative adversarial network for low-dose CT denoising
[J]. Journal of Computer Applications, 2022, 42(7): 2301-2310.
|
[6] |
Xiangju LIU, Xiaobao LU, Xianjin FANG, Linsong SHANG.
Low-rate denial-of-service attack detection method under software defined network environment
[J]. Journal of Computer Applications, 2022, 42(4): 1301-1307.
|
[7] |
Yingzhi LI, Man LI, Ping DONG, Huachun ZHOU.
Multi‑type application‑layer DDoS attack detection method based on integrated learning
[J]. Journal of Computer Applications, 2022, 42(12): 3775-3784.
|
[8] |
WANG Bo, REN Yingqi, HUANG Dongyan.
H-Algorand:public blockchain consensus mechanism based on multi-block output
[J]. Journal of Computer Applications, 2020, 40(7): 2150-2154.
|
[9] |
LIU Xiangju, LIU Pengcheng, XU Hui, ZHU Xiaojuan.
Distributed denial of service attack detection method based on software defined Internet of things
[J]. Journal of Computer Applications, 2020, 40(3): 753-759.
|
[10] |
CHEN Yi, ZHANG Meijing, XU Fajian.
Slow HTTP DoS attack detection method based on one-dimensional convolutional neural network
[J]. Journal of Computer Applications, 2020, 40(10): 2973-2979.
|
[11] |
MA Lan, CUI Bohua, LIU Xuan, YUE Meng, WU Zhijun.
Hidden semi-Markov model-based approach to detect DDoS attacks in application layer of SWIM system
[J]. Journal of Computer Applications, 2019, 39(7): 1973-1978.
|
[12] |
GAO Qinquan, HUANG Weiping, DU Min, WEI Mengyu, KE Dongzhong.
Design of augmented reality navigation simulation system for pelvic minimally invasive surgery based on stereoscopic vision
[J]. Journal of Computer Applications, 2018, 38(9): 2660-2665.
|
[13] |
KONG Yazhou, ZHANG Liancheng, WANG Zhenxing.
Address hopping proactive defense model in IPv6 based on sliding time window
[J]. Journal of Computer Applications, 2018, 38(7): 1936-1940.
|
[14] |
GAO Jingzhi, LIU Yi, BAI Xu, ZHANG Quan, GUI Zhiguo.
Stationary wavelet domain deep residual convolutional neural network for low-dose computed tomography image estimation
[J]. Journal of Computer Applications, 2018, 38(12): 3584-3590.
|
[15] |
WU Ruohao, DONG Ping, ZHENG Tao.
Malicious scanning protection technology based on OpenDayLight
[J]. Journal of Computer Applications, 2018, 38(1): 188-193.
|