-
1
Robust-PFedproto: robust federated prototype learning based on personalized layers
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
2
Biomimetic security model based on immune system control mechanism
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
3
Vulnerability benchmark generation algorithm based on finite state machines
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
4
Radio frequency fingerprint identification method based on syntactic recognition
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
5
Federated learning secrecy rate optimization for 6G intelligent reflecting surface assistance
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
6
Multi-task adversarial attribution method based on hierarchical structure
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
7
Security scheme for time-critical TRDP message
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
8
LightLSB: a lightweight secure transmission mechanism for large-scale biometric images in computing limited environment
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
9
Blockchain smart contract vulnerability detection based on GR algorithm
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
10
Research on intrusion detection model based on synchronization of heterogenous executer
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
11
Review on the safety of LIDAR-based point cloud object detection
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
12
Privacy-preserving multi-dimensional multi-function data aggregation scheme in smart grid
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
13
Cross-representation transferable adversarial examples generation for audio classification
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
14
Efficient anonymous authentication protocol for internet of vehicles based on Chinese cryptographic SM2
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
15
Survey on incentive-driven federated learning: privacy and security
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
16
Survey of differentially private methods for trajectory data
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
17
Video dual-domain watermarking algorithm based on hybrid DWT-DCT and frame grouping
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
18
Lightweight cross domain authentication for satellite internet
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
19
Secure aggregation for semi-decentralized federated learning under heterogeneous data
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
20
Research on adversarial examples defense method based on multi-modal feature fusion
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article