-
321
Study of cross-domain identity authentication in SOA environment
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
322
Research on forensics of privacy violations in cloud environment
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
323
-
324
Method of botnet network nodes detection base on communication similarity
Published 2018-10-01“…网络与信息安全学报…”
Get full text
Article -
325
Lip forgery detection via spatial-frequency domain combination
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
326
Research of a spam filter based on improved naive Bayes algorithm
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
327
Java deserialization vulnerability defense technologybased on run-time detection
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
328
Privacy-preserving scheme for logistics systems based on 2D code and information hiding
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
329
Information security vulnerability scoring model for intelligent vehicles
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
330
Reversible data hiding scheme based on asymmetric histogram modification
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article -
331
Improvement of the blockchain protocol based on memory-hard function
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
332
Trusted storage mechanism of distributed electric energy data based on blockchain
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
333
Deep learning-based method for mobile social networks with strong sparsity for link prediction
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
334
Blockchain-based taffic condition early-warning scheme for VANET
Published 2018-07-01“…网络与信息安全学报…”
Get full text
Article -
335
Secure key-sharing algorithm based on smart grid
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
336
-
337
Contrastive meta-learning framework for few-shot cross-lingual text classification
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
338
GRU-based multi-scenario gait authentication for smartphones
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
339
Blockchain based adaptive federated learning in computational power network
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
340
Study on the reliability of hypergraphs based on non-backtracking matrix centrality
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article