-
161
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
162
-
163
Evaluation method of privacy protection effect based on multi-layer fuzzy comprehensive evaluation
Published 2020-12-01“…网络与信息安全学报…”
Get full text
Article -
164
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
165
Research on the trusted environment of container cloud based on the TPCM
Published 2021-08-01“…网络与信息安全学报…”
Get full text
Article -
166
Vulnerability identification technology research based on project version difference
Published 2022-02-01“…网络与信息安全学报…”
Get full text
Article -
167
Research on key management scheme for military vehicle network
Published 2018-08-01“…网络与信息安全学报…”
Get full text
Article -
168
Dynamic multi-keyword searchable encryption scheme
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
169
Phishing detection algorithm based on attention and feature fusion
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
170
Differential fault analysis on EMV application cryptogram
Published 2016-04-01“…网络与信息安全学报…”
Get full text
Article -
171
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
172
Research on privacy protection in the process of information exchange
Published 2016-03-01“…网络与信息安全学报…”
Get full text
Article -
173
Research on the reverse analyses and monitoring data of Mirai malware botnet
Published 2017-08-01“…网络与信息安全学报…”
Get full text
Article -
174
Research on the robustness of neural machine translation systems in word order perturbation
Published 2023-10-01“…网络与信息安全学报…”
Get full text
Article -
175
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
176
Temporal link prediction method based on community multi-features fusion and embedded representation
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
177
Scheme of virtual machine trusted migration in cloud environment
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
178
Dynamic and heterogeneous Byzantine system in cloud
Published 2018-05-01“…网络与信息安全学报…”
Get full text
Article -
179
Deepfake swapped face detection based on double attention
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
180
Research on security architecture of strong PUF by adversarial learning
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article