-
61
EN-Bypass: a security assessment method on e-mail user interface notification
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
62
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
63
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…网络与信息安全学报…”
Get full text
Article -
64
Traditional guidance mechanism based deep robust watermarking
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
65
Access control relationship prediction method based on GNN dual source learning
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
66
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
67
Hard-coded backdoor detection method based on semantic conflict
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
68
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
69
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
70
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
71
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
72
Temporal link prediction method based on community multi-features fusion and embedded representation
Published 2023-02-01“…网络与信息安全学报…”
Get full text
Article -
73
Gender forgery of faces by fusing wavelet shortcut connection generative adversarial network
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
74
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
75
Software diversification method based on binary rewriting
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
76
Privacy-preserving federated learning framework with dynamic weight aggregation
Published 2022-10-01“…网络与信息安全学报…”
Get full text
Article -
77
Survey on vertical federated learning: algorithm, privacy and security
Published 2023-04-01“…网络与信息安全学报…”
Get full text
Article -
78
Academic connotation and research trends of privacy computing
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article -
79
Technology and practice of intelligent governance for financial data security
Published 2023-06-01“…网络与信息安全学报…”
Get full text
Article -
80
Identity-based anonymous cloud auditing scheme with compact tags
Published 2022-12-01“…网络与信息安全学报…”
Get full text
Article