-
221
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
222
ContractGuard:defend Ethereum smart contract with embedded intrusion detection
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
223
Privacy-preserving image processing in cloud computing
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
224
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
225
Credible distributed identity authentication system of microgrid based on blockchain
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
226
Human action recognition method based on multi-view semi-supervised ensemble learning
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
227
Reversible data hiding in encrypted images based on fine-grained embedding room reservation
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
228
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
229
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
230
Study and optimization on system architectures of Larbin
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
231
Discussions on the talent cultivation of cyber security
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
232
Review of communication optimization methods in federated learning
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
233
Discuss on cultivating mode of information security and law inter-disciplinary talents
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
234
-
235
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
236
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
237
Implementation of shared file encrypted storage hierarchical access control scheme
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
238
Triple receiver public key encryption cryptosystem
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
239
Key path analysis method for large-scale industrial control network
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
240
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article