共 23 条
[1]
Wang S., Li Y., Xu R., Wei Y., Shao S., Research on characteristics of first-order sea clutter for hf sky-surface wave radar, IET Microwaves Antennas & Propagation, 10, 10, pp. 1124-1134, (2016)
[2]
Xiaoming Fu, Dirk Kutscher, Satyajayant, Misra, Et al., Information-centric networking security, IEEE Communications Magazine, 6, 8, pp. 43-47, (2018)
[3]
Francia G A, Ming Y, Trifas M, Applied image processing to multimedia information security[C], International Conference on ImageAnalysis & Signal Processing, (2009)
[4]
Bera A., Kumar A., Rakshit D., Prabhu R., Sen U., Information complementarity in multipartite quantum states and security in cryptography, Physical Review A, 93, 3, pp. 166-168, (2015)
[5]
Alam M., Bokhari M. U., Information Security Policy Architecture, International Conference on Computational Intelligence & Multimedia Applications IEEE Computer Society, (2007)
[6]
Hausken K., He F., On the effectiveness of security countermeasures for critical infrastructures, Risk Analysis, 36, 4, pp. 711-726, (2016)
[7]
Ji W., Li Z., Poor H. V., Timmerer C., Zhu W., Guest editorial multimedia economics for future networks: Theory, methods, and applications, IEEE Journal on Selected Areas in Communications, 37, 7, pp. 1473-1477, (2019)
[8]
Canovas A., Jimenez J. M., Romero O., Lloret J., Multimedia data flow traffic classification using intelligent models based on traffic patterns, IEEE Network, 32, 6, pp. 100-107, (2018)
[9]
Britto P. X., Selvan S., A hybrid soft computing: sgp clustering methodology for enhancing network lifetime in wireless multimedia sensor networks, Soft Computing, 59, 6, pp. 117-125, (2019)
[10]
Pan Zhou, Yingxue Zhou, Dapeng, Wu, Et al., Differentially private online learning for cloud-based video recommendation with multimedia big data in social networks, IEEE Transactions on Multimedia, 13, 8, pp. 2709-2714, (2016)