Reference: Yu Tao, Yang DongYu, Ma Rui, et al.Enhanced-visual-cryptography-based optical information hiding system[J].Acta Physica Sinica,2020,69(14):96-103. WANG Junxiang, MAO Ningxiong, ZHAO Yi, et al.Large Color Image Based High-Performance Reversible Data Hiding Hcheme for Various Capacities[J].Journal of Applied Sciences,2019,37(05):744-760. QU M, TANG J, SHANG J, et al. An attention-based collaboration framework for multi-view network representation learning[C]//Proceedings of the 2017 ACM Conference on Information and Knowledge Management. New York:ACM, 2017:1767-1776. SUN Y,WANG S,HSIEH T Y,et al. MEGAN:a generative adversarial network for multi-view network embedding[C]//Proceedings of the 28th International Joint Conference on Artificial Intelligence. San Francisco:Morgan Kaufmann,2019:3527-3533. WAN Yuzhang,ZHANG Xiaoming,XIONG Jijun, et al.Low Power Consumption High Precision Positioning Module Design for Wide Area Wireless Sensor Net Nodes Based on Post-RTK[J].Journal of Sichuan Ordnance,2018,39(12):212-217. Yao Fuguang, Zhong Xianxin, Zhou Jingchao.Granular computing:a new method of intelligent modeling for big data fusion[J].Journal of Nanjing University of Science and Technology,2018,42(04):503-510. WU Lei, YUAN Peng, DING Weilong.Research on Data Synchronization Protocol between Intelligent Home Gateway and Cloud Server[J].Computer Technology and Development,2018,28(09):151-155. QIN Shiyue, ZHOU Fucai, LIU Lu.Searchable Encryption Scheme of Genomic Data Based on Suffix Tree[J]. Journal of Northeastern University(Natural Science),2019,40(04):461-466. EVANGELIO R H, PATZOLD M, and KELLER I. Adaptively splitted GMM with feedback improvement for the task of background subtraction[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(5): 863-874. NIU Shufen, YANG Xiyan, LI Zhenbin,et al. Hybrid Signcryption Scheme Based on Heterogeneous System[J]. Computer Engineering and Applications, 2019, 55(3): 61-67. ZHONG Yanru, LIU Huayi, SUN Xiyan,et al.2D Chebyshev-Sine map for image encryption[J]. Journal of Zhejiang University(Science Edition),2019(02):131-141+160. CHEN Xiaodong, DI Xiaoqiang, LI Jinqing. Optical image encryption algorithm based on multi-chaosand fractional Fourier[J].Journal of Nanjing University(Natural Science),2019(02):251-263. QIN Jing, AN Wen, JI Changqing, et al. Review of privacy protection mechanisms in wireless body area network[J]. Journal of Computer Applications, 2021, 41(4): 970-975. HE D, ZEADALLY S, KUMAR N, et al. Anonymous authentication for wireless body area networks with provable security[J]. IEEE Systems Journal,2017,11(4):2590-2601. YAN T,LU Y,ZHANG N. Privacy disclosure from wearable devices[C]//Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing. New York:ACM,2015:13-18. PENG Hui, CHEN Hong, ZHANG XiaoYing, et al. Location Privacy Preservation in Wireless Sensor Networks[J]. Journal of Software,2015,26(3):617-639. MURILLO-ESCOBAR M A,CARDOZA-AVENDAÑO L,LÓPEZGUTIÉRREZ R M, et al. A double chaotic layer encryption algorithm for clinical signals in telemedicine[J]. Journal of Medical Systems,2017,41(4):No. 59.
|