-
361
Intrusion detection model based on non-symmetric convolution auto-encode and support vector machine
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
362
Link prediction method based on complex network dynamics model
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
363
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
364
Research on QR code logistics privacy based on segmented encryption and time-limited control
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
365
Online medical privacy protection strategy under information value-added mechanism
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
366
-
367
Micro-blog topic detection algorithm based on topic model
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
368
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
369
Analysis and design of visual secret sharing scheme for gray image
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
370
Image double fragile watermarking algorithm based on block neighborhood
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
371
Strategy of container migration and honeypot deployment based on signal game in cloud environment
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
372
Research on strong robustness watermarking algorithm based on dynamic difference expansion
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
373
Autonomous security analysis and penetration testing model based on attack graph and deep Q-learning network
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
374
Control-flow integrity technology based on the combination of software and hardware
Published 2024-10-01“…网络与信息安全学报…”
Get full text
Article -
375
Android malware detection method based on deep neural network
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
376
Research on outsourcing of digital image forensics based on privacy preserving
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
377
Network security of the National Natural Science Foundation of China: today and prospects
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
378
Research on Android malware detection based on permission and behavior
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
379
Access control relationship prediction method based on GNN dual source learning
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
380
Feature extraction of side channel signal based on EMD and difference spectrum of singular value
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article