-
361
-
362
-
363
Research on security defense of mobile edge computing
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
364
Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
365
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
366
Survey of text classification methods based on deep learning
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
367
Data protection impact assessment system in the mode of risk management
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
368
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
369
Malware detection approach based on improved SOINN
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
370
Introduction to cyberspace security discipline
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
371
Design of reputation-driven blockchain sharding consensus and incentive mechanism
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
372
Survey of FPGA based recurrent neural network accelerator
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
373
Research of public infrastructure system and security policy in cyberspace
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
374
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
375
Permission clustering-based attribute value optimization
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
376
Methods of security situation prediction for industrial internet fused attention mechanism and BSRU
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
377
Chinese adversarial text generation method based on punctuation insertion
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
378
Blur detection of digital forgery using mathematical morphology
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
379
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
380
Control method to prevent malicious UAV intrusion into electricity inspection area
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article