-
1
Carrier-independent deep optical watermarking algorithm
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
2
Data recommendation algorithm of network security event based on knowledge graph
Published 2023-12-01“…网络与信息安全学报…”
Get full text
Article -
3
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
4
Based on linear systolic array for convolutional neural network’s calculation optimization and performance analysis
Published 2018-12-01“…网络与信息安全学报…”
Get full text
Article -
5
Group-oriented ciphertext-policy attribute-based encryption with expressive access policy
Published 2017-05-01“…网络与信息安全学报…”
Get full text
Article -
6
Service function chain deployment scheme based on heterogeneous backup and remapping
Published 2018-06-01“…网络与信息安全学报…”
Get full text
Article -
7
Analysis of different anti-interference system models based on discrete time Markov chain
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article -
8
AntiGPS spoofing method for UAV based on LSTM-KF model
Published 2020-10-01“…网络与信息安全学报…”
Get full text
Article -
9
Design and implementation of the controller scheduling-time in SDN
Published 2018-01-01“…网络与信息安全学报…”
Get full text
Article -
10
Automatic method for searching impossible differentials and zero-correlation linear hulls of ARX block ciphers
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
11
Symbolic execution based control flow graph extraction method for Android native codes
Published 2017-07-01“…网络与信息安全学报…”
Get full text
Article -
12
Threshold model for hot events spreading based on relative impact weight of the user
Published 2017-09-01“…网络与信息安全学报…”
Get full text
Article -
13
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…网络与信息安全学报…”
Get full text
Article -
14
Novel role analysis method for network domain users
Published 2017-03-01“…网络与信息安全学报…”
Get full text
Article -
15
Research progress on dynamic hopping technology for network layer
Published 2021-12-01“…网络与信息安全学报…”
Get full text
Article -
16
Automated deobfuscation and family classification system for Excel 4.0 macros
Published 2024-06-01“…网络与信息安全学报…”
Get full text
Article -
17
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
18
Software watermarking scheme with cloud computing constraints
Published 2016-09-01“…网络与信息安全学报…”
Get full text
Article -
19
Behavior-oriented inside network security situation modeling and analysis
Published 2016-08-01“…网络与信息安全学报…”
Get full text
Article -
20
Host security threat analysis approach for network dynamic defense
Published 2018-04-01“…网络与信息安全学报…”
Get full text
Article