{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T10:30:48Z","timestamp":1748687448340,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602060","61772454","61811530332","61811540410","61572176","61873090","L1824034"],"award-info":[{"award-number":["61602060","61772454","61811530332","61811540410","61572176","61873090","L1824034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst. Man Cybern, Syst."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/tsmc.2019.2937551","type":"journal-article","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T05:59:56Z","timestamp":1568181596000},"page":"4505-4519","source":"Crossref","is-referenced-by-count":6,"title":["Using Conditional Random Fields to Optimize a Self-Adaptive Bell\u2013LaPadula Model in Control Systems"],"prefix":"10.1109","volume":"51","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8929-7554","authenticated-orcid":false,"given":"Li","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5473-8738","authenticated-orcid":false,"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9081-8153","authenticated-orcid":false,"given":"Zhuo","family":"Tang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"CRF++ Yet Another CRF Toolkit","year":"2005","author":"kudo","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/BF01589116"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2014.10.006"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2807793"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/89.861385"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2006.10.017"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3115\/1073445.1073473"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1049\/cje.2017.09.020"},{"key":"ref35","first-page":"243","article-title":"Semi-supervised learning with generative adversarial networks on digital signal modulation classification","volume":"55","author":"tu","year":"2018","journal-title":"Comput Mater Continua"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10578-9_36"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63839"},{"key":"ref11","first-page":"29","article-title":"Integrating flexible support for security policies into the Linux operating system","author":"loscocco","year":"2001","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2017.7867600"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2868482"},{"key":"ref14","first-page":"47","article-title":"An improved MLS policy model","author":"liu","year":"2017","journal-title":"Proc IEEE Int Conf Anti Counterfeiting"},{"key":"ref15","first-page":"1818","article-title":"Application of modified BLP model on mobile Web operating system","author":"zhu","year":"2017","journal-title":"Proc IEEE Trustcom\/BigDataSE\/ISPA"},{"key":"ref16","first-page":"180","article-title":"Security models and information flow","author":"mclean","year":"2002","journal-title":"Proc IEEE Comput Soc Symp Res Security Privacy"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/356850.356852"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1988.8106"},{"key":"ref19","first-page":"108","article-title":"Designing the GEMSOS security kernel for security and performance","volume":"30","author":"schell","year":"1985","journal-title":"Proc 8th Nat Comput Security Conf"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835821"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2868372"},{"key":"ref27","first-page":"13","article-title":"Vulnerability extrapolation: Assisted discovery of vulnerabilities using machine learning","author":"yamaguchi","year":"2011","journal-title":"Proc 5th USENIX Conf Offensive Technol"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2836968"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/35.312842"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1063\/1.1570541"},{"key":"ref5","first-page":"282","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proc 18th Int Conf Mach Learn"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.21236\/ADA023588"},{"key":"ref7","first-page":"229","article-title":"Secure computer system: A mathematical model","author":"bell","year":"1973"},{"journal-title":"Secure Computer Systems Mathematical Foundations","year":"1973","author":"bell","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2017.8071977"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2012.36"},{"key":"ref20","first-page":"192","article-title":"An improved BLP model with more flexibility","author":"yang","year":"2017","journal-title":"Proc Int Conf Embedded Softw Syst"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/FMEC.2017.7946429"},{"key":"ref21","first-page":"1137","article-title":"Research on trusted network model based on BLP model","author":"ou","year":"2009","journal-title":"Proc 4th Int Conf Comput Sci Converg Inf Technol"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.261"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/sec.786"},{"key":"ref26","first-page":"1288","article-title":"A probabilistic framework based on hidden Markov model for fiducial identification in image-guided radiation treatments","volume":"8","author":"mu","year":"2008","journal-title":"IEEE Trans Med Imag"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2017.2667703"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics: Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6221021\/9456769\/08830369.pdf?arnumber=8830369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:53:18Z","timestamp":1652194398000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8830369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":39,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tsmc.2019.2937551","relation":{},"ISSN":["2168-2216","2168-2232"],"issn-type":[{"type":"print","value":"2168-2216"},{"type":"electronic","value":"2168-2232"}],"subject":[],"published":{"date-parts":[[2021,7]]}}}