-
421
Malware prediction technique based on program gene
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
422
Scheme of extending elliptic curve method to three phases
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
423
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
424
Evolution,characteristics and revelation of the US cyber-security review system
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
425
Study of high-speed malicious Web page detection system based on two-step classifier
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
426
Analysis of security extension protocol in e-mail system
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
427
Construction of the content extraction signature scheme based on the thought of the batch scheme
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
428
Reasoning method for predicting crime partner by using intimacy network of bank accounts
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
429
Video dual-domain watermarking algorithm based on hybrid DWT-DCT and frame grouping
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
430
Toward discovering and exploiting private server-side Web API
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
431
Research on electromagnetic radiation based side-channel analysis method for hardware Trojan detection
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
432
Intelligent vulnerability detection system based on graph structured source code slice
Published 2021-10-01“…网络与信息安全学报…”
Get full text
Article -
433
Lightweight cross domain authentication for satellite internet
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
434
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
435
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
436
Research on scenario-based mechanism in privacy-aware mobile networks
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
437
Code security of mobile backup modules on the Android platform
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
438
Fragile watermarking technique for detecting image
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
439
Tag dynamic ownership transfer protocol for multi-owner with weights
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
440
Secure aggregation for semi-decentralized federated learning under heterogeneous data
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article