-
401
-
402
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
403
Implementation of SM3 algorithm based on SoPC component
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
404
Android malware family classification method based on the image of bytecodeConstruction of MDS matrices
Published 2016-06-01“…网络与信息安全学报…”
Get full text
Article -
405
Reversible data hiding scheme based on enhanced image smoothness
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
406
Metric-based learning approach to botnet detection with small samples
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
407
Blockchain storage:technologies and challenges
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
408
Survey on incentive-driven federated learning: privacy and security
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
409
Data security and protection techniques in big data:a survey
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
410
Scheme for identifying malware traffic with TLS data based on machine learning
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
411
Blockchain data access control scheme based on CP-ABE algorithm
Published 2020-06-01“…网络与信息安全学报…”
Get full text
Article -
412
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
413
Survey of differentially private methods for trajectory data
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
414
Construction of cyberspace security course system of comprehensive practice and graded customs clearance
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
415
Application and risk response of deep synthesis technology
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
416
HEVC information hiding approach based on intra prediction modes modulation
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
417
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
418
-
419
Destruction strategy for disks based on AES encrypted storage
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
420
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article