Citation: | Xiao Chen, Ma Shilong, Lü Weifeng, et al. Selective control mechanism for multi-datastream security in streaming media system[J]. Journal of Beijing University of Aeronautics and Astronautics, 2008, 34(11): 1292-1297. (in Chinese) |
[1] Jin T, Sheng X Z, Lu J. Admire, a prototype of large scale e-collaboration platform //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:335-343 [2] Huang T, Yu X N.An adaptive mixing audio gateway in heterogeneous networks for admire system //Li M L. Grid and Cooperative Computing, Lecture Notes in Computer Science (LNCS) 3033. Berlin:Springer-Verlag,2003:294-302 [3] Yin H, Lin C, Qiu F,et al. CASM: A content-aware protocol for secure video multicast[J]. IEEE Trans on Multimedia,2006,8(2):270-277 [4] Liu F W, Koenig H. A novel encryption algorithm for high sesolution video //Proc of NOSSDAV05.New York:ACM Press,2005:69-74 [5] ITU-T H.235(v3). Security and encryption for h-Series (H.323 and other H.245-based) multimedia terminals[S] [6] Maples T, Spanos G. Performance study of a selective encryption scheme for the security of networked, real-time video //4th Int Conf on Computer Comm and Networks. Wash. D C: IEEE Computer Society Press,1995:2-10 [7] Tang L. Methods for encrypting and decrypting MPEG video data efficiently //Proceedings of the 4th ACM International Conference on Multimedia. Boston, MA: ACM Press, 1996:219-230 [8] Servetti A,Martin J C. Perception-based partial encryption of compressed speech [J]. IEEE Trans on Speech and Audio Processing,2002,10:637-643 [9] Cheng H, Li X B.Partial encryption of compressed images and videos[J]. IEEE Trans on Signal Processing,2000,3: 2439 2451 [10] Tosun A S, Feng W C. On error preserving encryption algorithms for wireless video transmission //Proc of the 9th ACM International Conference on Multimedia.New York:ACM Press,2001: 302-308 [11] Lookabaugh T, Sicker D C, Keaton D M, et al. Security analysis of selectively encrypted MPEG-2 streams //Proc of the Multimedia Systems and Applications VI. Bellingham: SPIE Press, 2003:10-21 [12] Qiao T L, Narhstedt K. Comparison of MPEG encryption algorithms[J]. Computer and Graphics,1998,22 (4): 437-448 [13] Robertazzi T G. Computer networks and system: queuing theory and performance evaluation[M]. Berlin: Springer, 2000 [14] Martello S, Toth P. Knapsack problems: algorithms and computer implementations[M]. Chichester: John Wiley & Sons, 1990 [15] Sahni S. Approximate algorithms for the 0-1 knapsack problem [J]. Journal of the Assoc for Computing Machinery, 1975,22(1):115-124
|
[1] | Huang T T. A varying coefficient geographically weighted spatial lag model for compositional data[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(7):2256-2264 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0347. |
[2] | LI R Z,JIANG B,YU Z Q,et al. Data-driven fault detection and diagnosis for UAV swarms[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1586-1592 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0441. |
[3] | LIU W,YAN S,WANG X B,et al. Consensus control of multi-agent systems with uncertain communication networks[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(5):1463-1473 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0518. |
[4] | GUO R P,WANG H R,WANG D. Multilevel relation analysis and mining method of image-text[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(2):684-694 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0599. |
[5] | LI Dan, CUI Wen-feng, CHEN Gui-peng. ptimal dynamic response exploration for SIMO Buck converter based on differential evolution algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0356 |
[6] | LI Ruiqi, HUANG Yongqiang, LIU Liang, YUE Meng. Data Security Transmission Protection Mechanism for L-band Digital Aeronautical Communications System Based on Domestic Cryptographic Algorithms[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0656 |
[7] | NA Qiang, XIANG Peng, ZHENG Huaizhou, ZHOU Shun, HE Hongye. Similarity Analysis of Pre-Launch Data for Aerospace Rocket Testing Based on Adaptive DTW Algorithm[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0524 |
[8] | WANG X K,MENG Q W,XU H,et al. MP-WFRFT secure communication method based on multi-cascade chaotic encryption[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(6):1960-1968 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0500. |
[9] | ZHANG Dongping, WANG Mengting, LU Zhanhong, REN Ye, LIU Zhiyong, YANG Li. Intrusion Detection in Industrial Control Systems Based on Data Augmentation by Large Time Series Models[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0755 |
[10] | ZHOU N,ZHANG S L,ZHANG C. Discrete sparrow search algorithm incorporating rough data-deduction for solving hybrid flow-shop scheduling problems[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(2):398-408 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0424. |
[11] | CHANG Z N,HU M H,ZHANG Y,et al. A multi-objective optimal control trajectory optimization method for aircraft under wind influence[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(11):3521-3531 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0836. |
[12] | ZHANG Wen-qiang, CHEN Yi-yi, LEI Guo-qiang, WANG Guang-yu, ZHI Ya-fei, MAO Xue-rui. Data Processing Methodology of the Icing Meteorological Detection in FAR 25 Appendix C[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0569 |
[13] | CAO X W,YAO D,SUN F R,et al. Airspace sector planning method based on radar data mining[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(12):3237-3244 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0573. |
[14] | LEI Yao-lin, DING Wen-rui, LUO Yi-zhe, WANG Yu-feng, LIU Si-qi, ZHANG Zhi-lan. Trajectory planning and resource allocation methods in UAV data collection missions[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0531 |
[15] | WANG Jin-hua, LIU Rui, CAO Jie. Rolling bearing fault diagnosis method based on multi domain adaptation[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023-0166 |
[16] | XIONG Liang, ZHANG Rui, XU Bin, HUANG Qiao-ping. Research on Evolution Mechanism of Configuration and Parameter Solution Model of Air Data Sensing System for Aircraft[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0339 |
[17] | KONG B A,LU S,WANG H W. Incremental computing methods of canonical correlation analysis for compositional data streams[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(10):2851-2858 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0765. |
[18] | WU Xin, WU Youli, NIU Deqing, CAI Yuxuan, XU Yang, CHEN Bian. Application of data cube association mining in infrared anti-jamming[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(11): 2304-2313. doi: 10.13700/j.bh.1001-5965.2021.0096 |
[19] | MA Zhiwei, LI Haojie, FAN Xin, LUO Zhongxuan, LI Jianjun, WANG Zhihui. A real scene underwater semantic segmentation method and related dataset[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(8): 1515-1524. doi: 10.13700/j.bh.1001-5965.2021.0527 |
[20] | JI Xiaoqi, SONG Zikai, YU Junqing. Player movement data analysis on soccer field reconstruction[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(8): 1543-1552. doi: 10.13700/j.bh.1001-5965.2022.0131 |