-
641
Survey of text classification methods based on deep learning
Published 2020-08-01“…网络与信息安全学报…”
Get full text
Article -
642
Data protection impact assessment system in the mode of risk management
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
643
-
644
Analysis of DoS attacks on Docker inter-component stdio copy
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
645
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
646
Clustering algorithm preserving differential privacy in the framework of Spark
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
647
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
648
Malware detection approach based on improved SOINN
Published 2019-12-01“…网络与信息安全学报…”
Get full text
Article -
649
Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty
Published 2022-04-01“…网络与信息安全学报…”
Get full text
Article -
650
Introduction to cyberspace security discipline
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
651
Living body recognition method based on facial feature point motion
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
652
Survey of FPGA based recurrent neural network accelerator
Published 2019-08-01“…网络与信息安全学报…”
Get full text
Article -
653
Research of public infrastructure system and security policy in cyberspace
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
654
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01“…网络与信息安全学报…”
Get full text
Article -
655
Privacy-preserving access control for public wireless LAN utilizing the bitcoin blockchain
Published 2020-04-01“…网络与信息安全学报…”
Get full text
Article -
656
Permission clustering-based attribute value optimization
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
657
Methods of security situation prediction for industrial internet fused attention mechanism and BSRU
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
658
Detection method of mixed coin transaction based on CoinJoin——take the Wasabi platform as an example
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
659
-
660
Research on models of network security evaluation and analysis
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article