参考文献
[1]Chen Z, Xu T B, Li J, et al. Sharing weights in shallow layers via rotation group equivariant convolutions[J]. Machine Intelligence Research, 2022, 19(2): 115126[2]Anantharaman P, Mu Q, Jadav D. Large scale predictive analytics for hard disk remaining useful life etimation[C] Proc of 2018 IEEE Int Conf on Big Data (BigData Congress). Piscataway, NJ: IEEE, 2018: 251154[3]魏凤标, 吴剑锋, 骆建军. 一种安全存储设备移动存储系统以及安全存储方法: 中国, CN109271813A[P]. 20190125[4]朱兴星, 宣龙, 侯方勇. 移动存储加密系统的比较与研究[J]. 科技信息: 学术版, 2008 (3): 3234[5]曾梦岐, 谷大武, 侯方勇, 等. 自安全磁盘研究综述[J]. 计算机应用研究, 2009, 26(9): 32013204[6]Yining Q I, Tang X, Huang Y. Enabling efficient batch updating verification for multiversioned data in cloud storage[J]. Chinese Journal of Electronics, 2019, 28(2): 377385[7]Wu S, Shen Z, Lee P. Enabling IOefficient redundancy transitioning in erasurecoded KV stores via elastic reedsolomon codes[C] Proc of 2020 Int Symp on Reliable Distributed Systems (SRDS). 2020: 2124[8]Laird C. Taking a hardline approach to encryption[J]. IEEE Computer Society, 2007, 40(3): 1315[9]Hunter P. Is onchip security the answer for mobile devices [J]. Computer Fraud & Security, 2006, 2006(7): 1517[10]Hars L. Discryption: Internal harddisk encryption for secure storage[J]. Computer, 2007, 40(6): 103105[11]Rosenblum M T. Garfinkel virtual machine monitors: Current technology and future trend[J]. IEEE Internet Computing, 2005, 38(5): 3947[12]Shabtai A, Fledel Y, Elovici Y. Securing androidpowered mobile devices using SELinux[J]. IEEE Security & Privacy Magazine, 2010, 8(3): 3644[13]Huang B G. Analysis of traces on storage media by file operation for NTFS file system[J]. Computer Engineering, 2007, 33(23): 281283[14]Harper S J, Athanas P M. A security policy based upon hardware encryption[C] Proc of Hawaii Int Conf on System Sciences. Los Alamitos, CA: IEEE Computer Society, 2004: 18[15]Tang X, Huang Y, Chang C C, et al. Efficient realtime integrity auditing with privacypreserving arbitration for images in cloud storage system[J]. IEEE Access, 2019, 7(3): 21693536[16]王文丰, 李沛武, 赵跃龙, 等. 基于智能网络磁盘的安全存储系统研究与设计[J]. 计算机工程与设计, 2014, 35(5): 16021606
|