Showing 1 - 17 results of 17 for search 'Xuehui Du', query time: 0.03s
Refine Results
-
1
Data traceability mechanism based on consortium chain by Shoucai ZHAO, Lifeng CAO, Xuehui DU
Published 2023-10-01Get full text
Article -
2
Privacy protection mechanism of on-demand disclosure on blockchain by Shaozhuo LI, Na WANG, Xuehui DU
Published 2020-06-01Get full text
Article -
3
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN
Published 2021-01-01Get full text
Article -
4
Cross-domain authentication scheme based on consortium blockchain by Jianlin NIU, Zhiyu REN, Xuehui DU
Published 2022-06-01Get full text
Article -
5
Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation by Feng Li, Xuehui Du, Liu Zhang
Published 2022-01-01Get full text
Article -
6
Multi-party efficient audit mechanism for data integrity based on blockchain by Jiashun ZHOU, Na WANG, Xuehui DU
Published 2021-12-01Get full text
Article -
7
Permission clustering-based attribute value optimization by Wenchao WU, Zhiyu REN, Xuehui DU
Published 2021-08-01Get full text
Article -
8
-
9
Multi-tenant virtual domain isolation construction method based on L-DHT by Lifeng CAO, Xin LU, Zhensheng GAO, Xuehui DU
Published 2020-06-01Get full text
Article -
10
Classified risk assessment method of Android application based on multi-factor clustering selection by Fan CHAO, Zhi YANG, Xuehui DU, Bing HAN
Published 2021-04-01Get full text
Article -
11
Android malware detection method based on deep neural network by Fan CHAO, Zhi YANG, Xuehui DU, Yan SUN
Published 2020-10-01Get full text
Article -
12
A quality-of-service-aware dynamic evolution model for space–ground integrated network by Zhuo Yi, Xuehui Du, Ying Liao, Lifeng Cao
Published 2017-08-01Get full text
Article -
13
ABAC access control policy generation technique based on deep learning by Aodi LIU, Xuehui DU, Na WANG, Rui QIAO
Published 2020-12-01Get full text
Article -
14
Scenario-aware access control model by Dibin SHAN, Xuehui DU, Wenjuan WANG, Na WANG, Aodi LIU
Published 2024-02-01Get full text
Article -
15
Access control relationship prediction method based on GNN dual source learning by Dibin SHAN, Xuehui DU, Wenjuan WANG, Aodi LIU, Na WANG
Published 2022-10-01Get full text
Article -
16
-
17