-
381
-
382
New method for link prediction in directed networks based on triad patterns
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
383
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
384
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
385
-
386
Key-customizable encrypted deduplication with access control for cloud storage
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
387
Trusted graphs of the scientific collaboration network based on social computing
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
388
Research progress of digital image forensic techniques based on deep learning
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
389
Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
390
Reusable attribute-based signature with attribute revocation and authenticated key agreement
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
391
Research on the implementation mechanism of multipath traffic proportion of IPv6 Overlay network
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
392
Function approximation method based on weights gradient descent in reinforcement learning
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
393
Survey of network-layer anonymous communication protocols
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
394
Spammer detection technology of social network based on graph convolution network
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article -
395
Using side-channel and quantization vulnerability to recover DNN weights
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
396
Key management scheme with private key self-healing ability in DTN
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
397
Multiple redundant flow fingerprint model based on time slots
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
398
Survey of software-defined networking data plane security
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
399
Research and prospect of reversible data hiding method with contrast enhancement
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
400
Survey of deterministic service assurance technology in time sensitive networking
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article