Found: 15
Select item for more details and to access through your institution.
Personalized lightweight distributed network intrusion detection system in fog computing.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 28, doi. 10.11959/j.issn.2096-109x.2023035
- By:
- Publication type:
- Article
Software diversity evaluating method based on gadget feature analysis.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 161, doi. 10.11959/j.issn.2096-109x.2023047
- By:
- Publication type:
- Article
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 135, doi. 10.11959/j.issn.2096-109x.2023045
- By:
- Publication type:
- Article
Adaptive selection method of desensitization algorithm based on privacy risk assessment.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 49, doi. 10.11959/j.issn.2096-109x.2023037
- By:
- Publication type:
- Article
Double adversarial attack against license plate recognition system.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 16, doi. 10.11959/j.issn.2096-109x.2023034
- By:
- Publication type:
- Article
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 60, doi. 10.11959/j.issn.2096-109x.2023038
- By:
- Publication type:
- Article
EN-Bypass: a security assessment method on e-mail user interface notification.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 90, doi. 10.11959/j.issn.2096-109x.2023041
- By:
- Publication type:
- Article
Privacy-enhanced federated learning scheme based on generative adversarial networks.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 113, doi. 10.11959/j.issn.2096-109x.2023043
- By:
- Publication type:
- Article
Technology and practice of intelligent governance for financial data security.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 174, doi. 10.11959/j.issn.2096-109x.2023048
- By:
- Publication type:
- Article
Research on credit card transaction security supervision based on PU learning.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 73, doi. 10.11959/j.issn.2096-109x.2023039
- By:
- Publication type:
- Article
Forgery face detection method based on multi-domain temporal features mining.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 123, doi. 10.11959/j.issn.2096-109x.2023044
- By:
- Publication type:
- Article
Insider threat detection based on operational attention and data augmentation.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 102, doi. 10.11959/j.issn.2096-109x.2023042
- By:
- Publication type:
- Article
Identification on the structures of block ciphers using machine learning.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 79, doi. 10.11959/j.issn.2096-109x.2023040
- By:
- Publication type:
- Article
New hash function based on C-MD structure and chaotic neural network.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 1, doi. 10.11959/j.issn.2096-109x.2023033
- By:
- Publication type:
- Article
Image double fragile watermarking algorithm based on block neighborhood.
- Published in:
- Chinese Journal of Network & Information Security, 2023, v. 9, n. 3, p. 38, doi. 10.11959/j.issn.2096-109x.2023036
- By:
- Publication type:
- Article