-
6381
-
6382
-
6383
Approach to keyword search over encrypted data in cloud
Published 2014-11-01“…Tongxin xuebao…”
Get full text
Article -
6384
-
6385
-
6386
-
6387
Survey on model inversion attack and defense in federated learning
Published 2023-11-01“…Tongxin xuebao…”
Get full text
Article -
6388
Constructions of rotation symmetric 2-resilient functions with 4t<sub>-</sub>1 number of variables
Published 2020-11-01“…Tongxin xuebao…”
Get full text
Article -
6389
Optimization and realization of SWIPT relay channel transmission rate based on rateless code
Published 2019-05-01“…Tongxin xuebao…”
Get full text
Article -
6390
Semi-supervised Gaussian process classification algorithm addressing the class imbalance
Published 2013-05-01“…Tongxin xuebao…”
Get full text
Article -
6391
VLSI implementation of AES algorithm against differential power attack and differential fault attack
Published 2010-01-01“…Tongxin xuebao…”
Get full text
Article -
6392
-
6393
-
6394
Directional evidence conflict measurement approach
Published 2016-07-01“…Tongxin xuebao…”
Get full text
Article -
6395
-
6396
-
6397
Identity-based anonymity authentication protocol in the heterogeneous wireless network
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
6398
-
6399
-
6400
Cross-dataset person re-identification method based on multi-pool fusion and background elimination network
Published 2020-10-01“…Tongxin xuebao…”
Get full text
Article