-
41
Trajectory privacy protection mechanism of obfuscating paths based on vehicles cooperation
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
42
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
43
Evidence classification method of chat text based on DSR and BGRU model
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
44
Two-stage community detection algorithm based on label propagation
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
45
Verification on policies for network functions in SDN/NFV-based environment
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
46
Multi-objective optimization placement strategy for SDN security controller considering Byzantine attributes
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
47
QLearning based business differentiating routing mechanism in SDN architecture
Published 2018-09-01“…网络与信息安全学报…”
Get full text
Article -
48
Research on parallel coordinate visualization technology based on principal component analysis and K-means clustering
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
49
Research on continuous monitoring of cloud computing service
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
50
Encrypted and obfuscation WebShell detection for high-speed network traffic
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
51
Task scheduling optimization strategy for roadside unit based on security strength
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
52
Privacy leakage risk assessment for reversible neural network
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
53
Malicious code within model detection method based on model similarity
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
54
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
55
Adversarial examples detection method based on boundary values invariants
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
56
Research on backup and remapping of network slice based on security classification
Published 2018-11-01“…网络与信息安全学报…”
Get full text
Article -
57
Security evaluation method for confidential and stable complex systems
Published 2019-04-01“…网络与信息安全学报…”
Get full text
Article -
58
Access control model for multi-source heterogeneous data in big data environment
Published 2019-02-01“…网络与信息安全学报…”
Get full text
Article -
59
Two improved content extraction signature schemes
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
60
Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article