-
621
Research on the method of discovering specific organization structure in bank account transaction network
Published 2020-02-01“…网络与信息安全学报…”
Get full text
Article -
622
Research on the robustness of convolutional neural networks in image recognition
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
623
Review of semantic-based privacy-preserving approaches in LBS
Published 2016-12-01“…网络与信息安全学报…”
Get full text
Article -
624
Robust image hiding algorithm for secure multimodal biometrics
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
625
Multi-party efficient audit mechanism for data integrity based on blockchain
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
626
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
627
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
628
Analysis of the situation and problem on the legislation of cyberspace in China
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
629
Suggestions on cyber security talents cultivation
Published 2016-03-01“…网络与信息安全学报…”
Get full text
Article -
630
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
631
-
632
Reflections on China’s participation in the global governance of cyberspace
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
633
-
634
Analysis method on the properties of social networks of internet nuisance communities
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
635
Research on security defense of mobile edge computing
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
636
Firmware vulnerability analysis based on formal verification of software and hardware
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
637
Federated learning scheme for mobile network based on reputation evaluation mechanism and blockchain
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
638
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
639
Research on synthesis data generation method for logo recognition
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article -
640
Java deserialization gadget chain discovery method based on hybrid analysis
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article