-
761
Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
762
Adversarial patch defense algorithm based on PatchTracker
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
763
Research on scenario-based mechanism in privacy-aware mobile networks
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article -
764
Research on the incentive mechanism of trusted transactions based on blockchain
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
765
Code security of mobile backup modules on the Android platform
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
766
Fragile watermarking technique for detecting image
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
767
Research on cyberspace security situation awareness
Published 2016-10-01“…网络与信息安全学报…”
Get full text
Article -
768
Tag dynamic ownership transfer protocol for multi-owner with weights
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
769
Gender forgery of faces by fusing wavelet shortcut connection generative adversarial network
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
770
Multi-query based key node mining algorithm for social networks
Published 2024-02-01“…网络与信息安全学报…”
Get full text
Article -
771
5G network slicing function migration mechanism based on particle swarm optimization algorithm
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
772
Trusted platform for third-party cloud computing online evaluation and analysis technology
Published 2019-10-01“…网络与信息安全学报…”
Get full text
Article -
773
Machine learning security and privacy:a survey
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
774
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
775
Individual health passport storage, sharing and verification scheme based on blockchain
Published 2024-04-01“…网络与信息安全学报…”
Get full text
Article -
776
Research on security scenarios and security models for 6G networking
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
777
Exploration and practice of PRIDE teaching mode oriented to cybersecurity talent cultivation
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
778
Twitter user geolocation method based on single-point toponym matching and local toponym filtering
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
779
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
780
Research on credit card transaction security supervision based on PU learning
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article