-
21
Approach of sensor network backup based on smart and cooperative network
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
22
Evaluation of blended instruction based on network platform in cryptography teaching
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
23
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
24
Robust Schnorr-based subgroup multi-signature scheme
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
25
Image recoloring detection based on inter-channel correlation
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
26
Chinese NER based on improved Transformer encoder
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
27
Negative feedback scheduling algorithm based on historical information in SDN
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
28
Research on structure and defense of adversarial example in deep learning
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
29
Research on consistency protection mechanism for secure states of virtual domain in cloud environment
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
30
SDN self-protection system based on Renyi entropy
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
31
Shoulder-surfing resistant PIN-entry method
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
32
Linear transformation shift register sequences
Published 2016-05-01“…网络与信息安全学报…”
Get full text
Article -
33
JPEG recapture image tamper detection method based on block effect grid offset
Published 2017-12-01“…网络与信息安全学报…”
Get full text
Article -
34
Semi-fragile watermarking technology based on SVD decomposition and Hadamard transform
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
35
Data traceability mechanism based on consortium chain
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
36
Security analysis in heterogeneous fault-tolerant control plane
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
37
Secure control plane for SDN using Bayesian Stackelberg games
Published 2017-11-01“…网络与信息安全学报…”
Get full text
Article -
38
Dynamic hierarchical quantum information sharing protocol
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
39
Analysis on anonymity and regulation of digital currency transactions based on game theory
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
40
Cyber security entity recognition method based on residual dilation convolution neural network
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article