-
241
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
242
A differentially-private mechanism for multi-level data publishing
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
243
Reinforcement learning based group key agreement scheme with reduced latency for VANET
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
244
Physical-social attributes integrated Sybil detection for Tor bridge distribution
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
245
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
246
Construction of academic discipline of science and engineering and orientation for their ranking under the new situation
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
247
An ownership transfer protocol for wearable devices
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
248
Suppress the diffusion of rumors with nodes closeness mining
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
249
Research and design of authenticated encryption algorithm based on AES round function
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
250
Human action recognition based on back propagation neural network
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
251
Risk assessment method for network attack surface based on Bayesian attack graph
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
252
Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
253
Research progress of access control model and policy in online social networks
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
254
Classified risk assessment method of Android application based on multi-factor clustering selection
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
255
Design and implementation of hardware-based dynamic instruction set randomization framework
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
256
Research on SDN deployment practice for WAN egress traffic scheduling
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
257
Exploring the talent training mode of“cybersecurity doctor”
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
258
Progressive active inference method of protocol state machine
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
259
Robust deepfake detection method based on siamese network
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
260
Software protection technology based on code fragmentation
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article