-
1
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
2
Based on linear systolic array for convolutional neural network’s calculation optimization and performance analysis
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
3
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
4
Service function chain deployment scheme based on heterogeneous backup and remapping
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
5
AntiGPS spoofing method for UAV based on LSTM-KF model
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
6
Design and implementation of the controller scheduling-time in SDN
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
7
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
8
Threshold model for hot events spreading based on relative impact weight of the user
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
9
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
10
Research progress on dynamic hopping technology for network layer
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
11
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
12
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
13
Behavior-oriented inside network security situation modeling and analysis
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
14
Host security threat analysis approach for network dynamic defense
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
15
Evaluation of blended instruction based on network platform in cryptography teaching
Published 2019-06-01“…网络与信息安全学报…”
Get full text
Article -
16
Design and detection of hardware Trojan based on satisfiability don't cares
Published 2021-04-01“…网络与信息安全学报…”
Get full text
Article -
17
Robust Schnorr-based subgroup multi-signature scheme
Published 2024-08-01“…网络与信息安全学报…”
Get full text
Article -
18
Image recoloring detection based on inter-channel correlation
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
19
Negative feedback scheduling algorithm based on historical information in SDN
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
20
SDN self-protection system based on Renyi entropy
Published 2021-06-01“…网络与信息安全学报…”
Get full text
Article