-
781
Fast handover authentication scheme in 5G mobile edge computing scenarios
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
782
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
783
Research and realization on USBKEY based network storage user data protection
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
784
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01“…网络与信息安全学报…”
Get full text
Article -
785
Link prediction method for dynamic networks based on matching degree of nodes
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
786
User behavior pattern mining method based on multi-dimension and multi-granularity analysis in telecom networks
Published 2018-10-01“…网络与信息安全学报…”
Get full text
Article -
787
-
788
Research on cross-domain access control technology
Published 2021-02-01“…网络与信息安全学报…”
Get full text
Article -
789
-
790
Adversarial subdomain adaptation network for mismatched steganalysis
Published 2022-06-01“…网络与信息安全学报…”
Get full text
Article -
791
High resistance botnet based on smart contract
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
792
Suggestion on establishing curriculum system for information security major
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
793
Automated Windows domain penetration method based on reinforcement learning
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
794
Review of domestic and international financial security
Published 2017-02-01“…网络与信息安全学报…”
Get full text
Article -
795
Cache of cryptographic key based on query popularity
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
796
-
797
Mining behavior pattern of mobile malware with convolutional neural network
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
798
Sarcasm detection method based on fusion of text semantics and social behavior information
Published 2023-08-01“…网络与信息安全学报…”
Get full text
Article -
799
Research on active defense application based on honeypot
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
800
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article