-
121
Federated learning secrecy rate optimization for 6G intelligent reflecting surface assistance
Published 2025-04-01“…网络与信息安全学报…”
Get full text
Article -
122
Identity authentication scheme of Android client based on identifiers
Published 2017-04-01“…网络与信息安全学报…”
Get full text
Article -
123
Study on privacy preserving encrypted traffic detection
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
124
Multi-task adversarial attribution method based on hierarchical structure
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
125
Privacy-preserving image processing in cloud computing
Published 2016-01-01“…网络与信息安全学报…”
Get full text
Article -
126
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
127
Human action recognition method based on multi-view semi-supervised ensemble learning
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article -
128
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
129
Software diversity evaluation method based on the properties of ROP/JOP gadgets
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
130
Discussions on the talent cultivation of cyber security
Published 2016-02-01“…网络与信息安全学报…”
Get full text
Article -
131
Review of communication optimization methods in federated learning
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
132
-
133
Time based incremental backup scheme for mobile cloud computing
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
134
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
135
Implementation of shared file encrypted storage hierarchical access control scheme
Published 2016-07-01“…网络与信息安全学报…”
Get full text
Article -
136
Security scheme for time-critical TRDP message
Published 2025-06-01“…网络与信息安全学报…”
Get full text
Article -
137
Facial recognition targeted attack algorithm based on multiscale frequency decomposition and meta-learning
Published 2025-02-01“…网络与信息安全学报…”
Get full text
Article -
138
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
139
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
140
A differentially-private mechanism for multi-level data publishing
Published 2015-12-01“…网络与信息安全学报…”
Get full text
Article