搜索attack共有 79 个结果
搜索结果较多,本次只显示前50个结果。请尝试使用其他搜索词以获得更精确的结果。
1
Algorithm for detecting malicious model updates of federated learning based on β-VAE
Accepted Paper
2024年第8期 :
doi:10.19734/j.issn.1001-3695.2023.11.0553
2
Review of research on blockchain privacy protection technologies
Accepted Paper
2024年第8期 :
doi:10.19734/j.issn.1001-3695.2023.12.0603
3
Joint adversarial training method based on learnable attack step size
Accepted Paper
2024年第6期 :
doi:10.19734/j.issn.1001-3695.2023.09.0431
4
Covert attacks and honeypot defense on video surveillance systems
2024年第5期 : 1301-1307
doi:10.19734/j.issn.1001-3695.2023.09.0409
5
Defense method on poisoning attack based on clients in federated learning
2024年第4期 : 1171-1176
doi:10.19734/j.issn.1001-3695.2023.07.0340
6
Review of cross-site scripting attack detection and defence techniques
2024年第3期 : 652-662
doi:10.19734/j.issn.1001-3695.2023.06.0286
7
Flexible modal face presentation attack detection based on atrous single stream vision Transformer network
2024年第3期 : 916-922
doi:10.19734/j.issn.1001-3695.2023.07.0319
8
Two-party privacy set intersection protocol based on ideal lattice
2023年第12期 : 3795-3799
doi:10.19734/j.issn.1001-3695.2023.03.0140
9
High-performance lookups of OpenFlow-compliant virtual flow tables against malicious attacks
2023年第11期 : 3416-3424
doi:10.19734/j.issn.1001-3695.2023.03.0109
10
Robust network flow watermarking algorithm based on dynamic interval compression
2023年第10期 : 3144-3148,3154
doi:10.19734/j.issn.1001-3695.2023.01.0039
11
Data poisoning defense based on sample distribution characteristics
2023年第9期 : 2845-2850
doi:10.19734/j.issn.1001-3695.2023.01.0025
12
MPECA: efficient cryptographic algorithm for multiple platforms
2023年第8期 : 2481-2486,2492
doi:10.19734/j.issn.1001-3695.2022.12.0825
13
Provably secure post-quantum two-party password authenticated key agreement protocol
2023年第4期 : 1208-1213,1219
doi:10.19734/j.issn.1001-3695.2022.07.0377
14
Anti-collusion attack network sharding algorithm for blockchain
2023年第1期 : 28-32,41
doi:10.19734/j.issn.1001-3695.2022.06.0323
15
Quantum key distribution protocol based on high-dimensional entangled states
2023年第1期 : 268-271,277
doi:10.19734/j.issn.1001-3695.2022.05.0293
16
Research on attack-defense game based on reinforcement learning for wireless sensor network intrusion detection
2022年第12期 : 3786-3790
doi:10.19734/j.issn.1001-3695.2022.04.0208
17
Overview of research on privacy protection of Internet of Vehicles
2022年第10期 : 2891-2906
doi:10.19734/j.issn.1001-3695.2022.02.0091
18
Dynamic event-triggered fault detection for networked systems in finite-frequency domain
2022年第9期 : 2757-2762,2767
doi:10.19734/j.issn.1001-3695.2022.02.0081
19
LFA detection method based on MS-KNN algorithm in SDN
2022年第9期 : 2832-2836
doi:10.19734/j.issn.1001-3695.2022.01.0058
20
Distributed denial of service attack detection based on programming protocol-independent packet processors
2022年第7期 : 2149-2155
doi:10.19734/j.issn.1001-3695.2021.12.0661
21
Verification algorithm of effective change region of attack-defense model based on game-strategies
2022年第7期 : 2156-2161
doi:10.19734/j.issn.1001-3695.2021.12.0680
22
Proxy signcryption scheme based on multivariate cryptosystem
2022年第7期 : 2167-2171
doi:10.19734/j.issn.1001-3695.2021.12.0662
23
Defense method for senseless noise attack in pedestrian re-identification system
2022年第7期 : 2172-2177
doi:10.19734/j.issn.1001-3695.2021.11.0659
24
Synchronous motion compensation spread spectrum steganography video watermarking against collusion attacks
2022年第6期 : 1838-1844
doi:10.19734/j.issn.1001-3695.2021.10.0597
25
Block cyclic DNA image encryption algorithm based on chaotic map
2022年第6期 : 1865-1871
doi:10.19734/j.issn.1001-3695.2021.10.0434
26
New method of automatic threshold masking
2022年第5期 : 1546-1550,1556
doi:10.19734/j.issn.1001-3695.2021.10.0470
27
Signature and authentication method based on message hash chain
2022年第4期 : 1183-1189
doi:10.19734/j.issn.1001-3695.2021.08.0381
28
Targeted adversarial attack method for image retrieval based on feature weighted aggregation
2021年第12期 : 3760-3764
doi:10.19734/j.issn.1001-3695.2021.03.0113
29
Security-enhanced data access control for multi-authority cloud storage in industrial Internet
2021年第12期 : 3765-3770
doi:10.19734/j.issn.1001-3695.2021.02.0112
30
Security analysis and countermeasures for software implementation of SM2 algorithm
2021年第9期 : 2811-2815
doi:10.19734/j.issn.1001-3695.2021.02.0030
31
Security password authentication scheme based on smart card from lattices
2021年第9期 : 2831-2836
doi:10.19734/j.issn.1001-3695.2020.11.0555
32
Research on adversarial image perturbation algorithm for personal information protection
2021年第8期 : 2543-2548,2555
doi:10.19734/j.issn.1001-3695.2020.12.0418
33
Countermeasure of reaction attack on QC-MDPC code based PKC
2021年第7期 : 2162-2168
doi:10.19734/j.issn.1001-3695.2020.09.0378
34
Security analysis of compound chaotic sequence-based image encryption algorithm
2021年第6期 : 1849-1854,1864
doi:10.19734/j.issn.1001-3695.2020.09.0257
35
Two secure certificateless authenticated tripartite key agreement protocols
2021年第4期 : 1165-1170
doi:10.19734/j.issn.1001-3695.2019.12.0706
36
Research on attack path prediction method based on T_NAG model
2021年第3期 : 886-892
doi:10.19734/j.issn.1001-3695.2019.11.0701
37
Location privacy protection method against edge attacks and semantic attacks
2021年第2期 : 559-563
doi:10.19734/j.issn.1001-3695.2019.10.0681
38
Attacker portrait construction based on large data and graph community clustering algorithms
2021年第1期 : 232-236
doi:10.19734/j.issn.1001-3695.2019.09.0621
39
Privilege escalation attacks detection for Android App based on Pi calculus
2020年第12期 : 3699-3703
doi:10.19734/j.issn.1001-3695.2019.08.0562
40
Design of secure lightweight S-box for software and hardware implementation
2020年第12期 : 3717-3721
doi:10.19734/j.issn.1001-3695.2019.08.0567
41
Novel wireless sensor network interference attack detection technology
2020年第12期 : 3757-3759
doi:10.19734/j.issn.1001-3695.2019.09.0553
42
Survey of generation,attack and defense of adversarial examples
2020年第11期 : 3201-3205,3212
doi:10.19734/j.issn.1001-3695.2019.07.0252
43
Active defense strategy selection for anti-APT attack based on non-zero-sum stochastic game
2020年第10期 : 3071-3076,3111
doi:10.19734/j.issn.1001-3695.2019.05.0237
44
Filtration method of SQL injection attacks based on LD algorithm
2020年第9期 : 2793-2796
doi:10.19734/j.issn.1001-3695.2019.04.0153
45
Artificial immune based bitcoin fast transaction anomaly detection model
2020年第9期 : 2815-2818
doi:10.19734/j.issn.1001-3695.2019.05.0127
46
Using multi-channel features and least square decision to perform face anti-spoofing
2020年第9期 : 2847-2850
doi:10.19734/j.issn.1001-3695.2019.06.0163
47
Quantitative vulnerability assessment method for industrial control system based on fuzzy attack-defense tree and entropy weight method
2020年第8期 : 2409-2412,2416
doi:10.19734/j.issn.1001-3695.2019.03.0088
48
Research on classification system of capability evaluation of facial network attack
2020年第8期 : 2449-2454
doi:10.19734/j.issn.1001-3695.2019.01.0075
49
Second-order threshold implementation of GIFT cryptographic algorithm and security evaluation
2020年第8期 : 2455-2459
doi:10.19734/j.issn.1001-3695.2019.01.0068
50
Attack-defense game models for multi-attack oriented wireless sensor network
2020年第8期 : 2491-2495
doi:10.19734/j.issn.1001-3695.2018.11.0944
搜索结果较多,本次只显示前50个结果。请尝试使用其他搜索词以获得更精确的结果。