Showing 1 - 20 results of 38 for search 'Xuehui Du', query time: 0.06s
Refine Results
-
1
Data traceability mechanism based on consortium chain by Shoucai ZHAO, Lifeng CAO, Xuehui DU
Published 2023-10-01
Article -
2
-
3
Cross-domain authentication scheme based on consortium blockchain by Jianlin NIU, Zhiyu REN, Xuehui DU
Published 2022-06-01
Article -
4
Privacy protection mechanism of on-demand disclosure on blockchain by Shaozhuo LI, Na WANG, Xuehui DU
Published 2020-06-01
Article -
5
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN
Published 2021-01-01
Article -
6
Cross-domain authentication scheme based on consortium blockchain by Jianlin NIU, Zhiyu REN, Xuehui DU
Published 2022-06-01
Article -
7
Building a Cloud IDS Using an Efficient Feature Selection Method and SVM by Wenjuan Wang, Xuehui Du, Na Wang
Published 2019-01-01
Article -
8
Malicious PDF document detection based on mixed feature by Xuehui DU, Yangdong LIN, Yi SUN
Published 2019-02-01
Article -
9
Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation by Feng Li, Xuehui Du, Liu Zhang
Published 2022-01-01
Article -
10
Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network by Aodi Liu, Xuehui Du, Na Wang
Published 2019-01-01
Article -
11
Research progress of access control based on blockchain by Zhensheng GAO, Lifeng CAO, Xuehui DU
Published 2021-12-01
Article -
12
Multi-party efficient audit mechanism for data integrity based on blockchain by Jiashun ZHOU, Na WANG, Xuehui DU
Published 2021-12-01
Article -
13
Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition by Xin Lu, Lifeng Cao, Xuehui Du
Published 2020-01-01
Article -
14
Permission clustering-based attribute value optimization by Wenchao WU, Zhiyu REN, Xuehui DU
Published 2021-08-01
Article -
15
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN
Published 2021-01-01
Article -
16
Malicious PDF document detection based on mixed feature by Xuehui DU, Yangdong LIN, Yi SUN
Published 2019-02-01
Article -
17
Data traceability mechanism based on consortium chain by Shoucai ZHAO, Lifeng CAO, Xuehui DU
Published 2023-10-01
Article -
18
-
19
Multi-tenant virtual domain isolation construction method based on L-DHT by Lifeng CAO, Xin LU, Zhensheng GAO, Xuehui DU
Published 2020-06-01
Article -
20
Multi-tenant virtual domain isolation construction method based on L-DHT by Lifeng CAO, Xin LU, Zhensheng GAO, Xuehui DU
Published 2020-06-01
Article