-
401
Research on construction technology of artificial intelligence security knowledge graph
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
402
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
403
Recommendation algorithm based on GMM clustering and FOA-GRNN model
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
404
CAN bus flood attack detection based on communication characteristics
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
405
Video tampering detection algorithm based on spatial constraint and gradient structure information
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
406
Research on the cultivation of cyber security talents under the perspective of double tops based on Jiangsu province
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
407
Survey of community privacy in social network
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
408
Survey on public key encryption with equality test
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
409
Quantum dialogue protocol based on self-dual quantum low density parity check codes
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
410
Double adversarial attack against license plate recognition system
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
411
-
412
Application progress of SGX in trusted computing area
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
413
App-DDoS detection method using partial binary tree based SVM algorithm
Published 2018-03-01“…网络与信息安全学报…”
Get full text
Article -
414
Academic connotation and research trends of privacy computing
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
415
Research and implementation of fuzzing testing based on HTTP proxy
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
416
Research on security multi-party computing based on game theory
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
417
Global randomized consensus algorithm resist collusion attack based on game theory
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
418
Key security detection based on dynamic binary instrumentation
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
419
Game model based security strategy of heterogeneous controllers in the cloud
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
420