[1] |
LIU Yahui, SHEN Xingwang, GU Xinghai, PENG Tao, BAO Jinsong, ZHANG Dan.
A Dual-System Reinforcement Learning Method for Flexible Job Shop Dynamic Scheduling
[J]. Journal of Shanghai Jiao Tong University, 2022, 56(9): 1262-1275.
|
[2] |
ZHANG Liang, QU Gang, LI Huixing, JIN Haochun.
Research and Application of Key Technologies of Network Security Situation Awareness for Smart Grid Power Control Systems
[J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 103-109.
|
[3] |
ZHOU Yi, QIN Kangping, SUN Jinwen, FAN Dongqi, ZHENG Yiming.
Real-Time Risk Evaluation Method of Power System Equipment and N-m Fault Contingency Plan Generation Under Typhoon Meteorological Environment
[J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 22-30.
|
[4] |
WU Nan, CHENG Zhetao, DU Liang, SHEN Yingping.
Network Security Inference Method Based on Dempster-Shafer Theory
[J]. Journal of Shanghai Jiao Tong University, 2021, 55(S2): 77-81.
|
[5] |
ZHANG Taolue∗ (张韬略), TU Huizhao (涂辉招), QIU Wei (邱 炜).
Developing High-Precision Maps for Automated Driving in China: Legal Obstacles and the Way to Overcome Them
[J]. J Shanghai Jiaotong Univ Sci, 2021, 26(5): 658-669.
|
[6] |
CHEN Ying, WEI Guoning, TANG Shengyong, KANG Zhiyu.
Global Space Security Situation Analysis and Development Proposal
[J]. Air & Space Defense, 2021, 4(3): 99-104.
|
[7] |
WANG Mingzheng, WANG Yijie, WANG Tianyu, HOU Linzao, LI Mian .
New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions
[J]. J Shanghai Jiaotong Univ Sci, 2020, 25(6): 689-699.
|
[8] |
YANG Guangyu, QIU Hongbing.
Robust Optimization for Energy Efficiency for
Secrecy MIMO SWIPT Systems
[J]. Journal of Shanghai Jiao Tong University, 2020, 54(4): 369-375.
|
[9] |
SUN Zhuo,LIU Dong,XIAO Anhong,MING Pingzhou,GUO Wen,ZHOU Junyi,CHEN Junjie.
Information Security Analysis of Digital Control System
Based on Attack Tree Model
[J]. Journal of Shanghai Jiaotong University, 2019, 53(Sup.1): 68-73.
|
[10] |
HUA Cunqing.
A Survey of Security Detection and Protection for Internet of Things
[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1307-1313.
|
[11] |
YI Ping,WANG Kedi,HUANG Cheng,GU Shuangchi,ZOU Futai,LI Jianhua.
Adversarial Attacks in Artificial Intelligence: A Survey
[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1298-1306.
|
[12] |
XIA Yubin,CHEN Haibo,GUAN Haibing.
Research on Computer System Isolation
[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1339-1347.
|
[13] |
LI Jianhua.
A Survey of New E-Government and Its Security Technologies
[J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381.
|
[14] |
Zhang Wei.
Research on Key Technologies of Air Space
[J]. Air & Space Defense, 2018, 1(1): 13-17.
|
[15] |
Xijiang CHEN, Guang ZHANG, Xianfeng CHEN, Hao WU.
Diversified Safety Science and Engineering Innovation Experiment Platform
[J]. Research and Exploration in Laboratory, 2017, 36(5): 260-263.
|