搜索security共有 108 个结果
搜索结果较多,本次只显示前50个结果。请尝试使用其他搜索词以获得更精确的结果。
1
Review of research on blockchain privacy protection technologies
Accepted Paper
2024年第8期 :
doi:10.19734/j.issn.1001-3695.2023.12.0603
2
Covert attacks and honeypot defense on video surveillance systems
2024年第5期 : 1301-1307
doi:10.19734/j.issn.1001-3695.2023.09.0409
3
Overview of security standard for Internet of Vehicles
2024年第4期 : 970-980
doi:10.19734/j.issn.1001-3695.2023.07.0346
4
TRGATLog:log anomaly detection method based on log time relation graph attention network
2024年第4期 : 1034-1040
doi:10.19734/j.issn.1001-3695.2023.07.0365
5
Multi-party joint prediction for QoS of industrial Internet manufacturing services considering data security
2023年第11期 : 3358-3362,3367
doi:10.19734/j.issn.1001-3695.2023.03.0081
6
Security access control algorithm based on multi-strategy access tree for VANET
2023年第11期 : 3394-3401
doi:10.19734/j.issn.1001-3695.2023.03.0125
7
Security authentication protocol for Internet of Vehicles based on blockchain
2023年第10期 : 2908-2915,2921
doi:10.19734/j.issn.1001-3695.2023.02.0077
8
Tamarin-based security analysis of MQTT protocol
2023年第10期 : 3132-3137,3143
doi:10.19734/j.issn.1001-3695.2023.02.0038
9
Safe transmission scheme of physical layer for intelligent reflecting surface assisted unmanned aerial vehicle
2023年第9期 : 2798-2802
doi:10.19734/j.issn.1001-3695.2022.12.0827
10
Optimization for active reconfigurable intelligent surface-assisted secure wireless communication based on deep reinforcement learning
2023年第9期 : 2808-2814
doi:10.19734/j.issn.1001-3695.2023.01.0026
11
Research on heterogeneous reconfigurable computing system of SM4 national security algorithm
2023年第9期 : 2826-2831
doi:10.19734/j.issn.1001-3695.2022.12.0832
12
Data poisoning defense based on sample distribution characteristics
2023年第9期 : 2845-2850
doi:10.19734/j.issn.1001-3695.2023.01.0025
13
Survey of network protocol fuzzing
2023年第8期 : 2241-2249
doi:10.19734/j.issn.1001-3695.2022.12.0794
14
Formal learning approach for safe and reachable dynamical systems
2023年第8期 : 2411-2416
doi:10.19734/j.issn.1001-3695.2022.12.0822
15
Multi-keyword public key searchable encryption scheme with keyword revocation
2023年第7期 : 2179-2183,2191
doi:10.19734/j.issn.1001-3695.2022.10.0522
16
BPVis: visualization system for security situation awareness of blockchain network based on DPoS
2023年第6期 : 1641-1647
doi:10.19734/j.issn.1001-3695.2022.11.0548
17
Cooperative multi-agent TD3 algorithm under security constraints
2023年第6期 : 1692-1696,1701
doi:10.19734/j.issn.1001-3695.2022.08.0549
18
Detection method of Android virtualization program based on heterogeneous information network
2023年第6期 : 1764-1770
doi:10.19734/j.issn.1001-3695.2022.09.0545
19
Malware propagation model based on cloud-edge joint defense
2023年第6期 : 1837-1844
doi:10.19734/j.issn.1001-3695.2022.11.0523
20
Network slice security deployment method based on improved BN model
2023年第5期 : 1480-1485
doi:10.19734/j.issn.1001-3695.2022.10.0496
21
Dynamic strong forward secure signature scheme based on Shamir
2023年第5期 : 1522-1527,1534
doi:10.19734/j.issn.1001-3695.2022.08.0473
22
Research on computer-aided formal modeling for security protocol code
2023年第4期 : 1189-1193,1202
doi:10.19734/j.issn.1001-3695.2022.08.0446
23
Research on honeypot based on endogenous safety and security architecture
2023年第4期 : 1194-1202
doi:10.19734/j.issn.1001-3695.2022.08.0438
24
Provably secure post-quantum two-party password authenticated key agreement protocol
2023年第4期 : 1208-1213,1219
doi:10.19734/j.issn.1001-3695.2022.07.0377
25
Certificateless multivariate blind signcryption scheme
2023年第4期 : 1214-1219
doi:10.19734/j.issn.1001-3695.2022.07.0379
26
Cross-modality person re-identification using local supervision
2023年第4期 : 1226-1232
doi:10.19734/j.issn.1001-3695.2022.07.0390
27
Design of mobile RFID high-efficiency authentication protocol
2023年第2期 : 595-600
doi:10.19734/j.issn.1001-3695.2022.04.0264
28
Quantum key distribution protocol based on high-dimensional entangled states
2023年第1期 : 268-271,277
doi:10.19734/j.issn.1001-3695.2022.05.0293
29
Review of data aggregation research based on privacy protection of Internet of Vehicles
2022年第12期 : 3546-3554
doi:10.19734/j.issn.1001-3695.2022.03.0197
30
Police cloud security data fusion technology based on one-dimensional convolutional neural network and improved D-S theory of evidence
2022年第12期 : 3765-3769,3802
doi:10.19734/j.issn.1001-3695.2022.04.0201
31
Image compression and encryption algorithm based on fractal coding and LIC chaotic system
2022年第12期 : 3770-3775
doi:10.19734/j.issn.1001-3695.2022.04.0203
32
Survey on federated learning security defense and privacy protection technology
2022年第11期 : 3220-3231
doi:10.19734/j.issn.1001-3695.2022.03.0164
33
ABAC access control scheme based on MQTT protocol in smart grid
2022年第11期 : 3436-3443
doi:10.19734/j.issn.1001-3695.2022.03.0156
34
Research on spatial network authentication strategy based on CFL
2022年第11期 : 3455-3460
doi:10.19734/j.issn.1001-3695.2022.04.0177
35
Efficient blind signature scheme on ideal lattice
2022年第11期 : 3461-3464
doi:10.19734/j.issn.1001-3695.2022.04.0196
36
Summary of analysis and solution of multi-variate execution false alarm
2022年第10期 : 2907-2915
doi:10.19734/j.issn.1001-3695.2022.02.0093
37
Security enhanced lightweight anonymous authentication scheme for smart grid
2022年第10期 : 3124-3129,3135
doi:10.19734/j.issn.1001-3695.2022.03.0118
38
Research on security model of vehicle network communication based on SecOC
2022年第8期 : 2474-2478
doi:10.19734/j.issn.1001-3695.2021.12.0703
39
Verification algorithm of effective change region of attack-defense model based on game-strategies
2022年第7期 : 2156-2161
doi:10.19734/j.issn.1001-3695.2021.12.0680
40
Random phase discretization analysis of twin-field quantum key distribution protocol
2022年第6期 : 1856-1859
doi:10.19734/j.issn.1001-3695.2021.10.0612
41
Classified and hierarchical attribute access control method based on smart contract
2022年第5期 : 1313-1318
doi:10.19734/j.issn.1001-3695.2021.10.0458
42
Security supervision scheme of shared charging pile based on blockchain
2022年第5期 : 1319-1323,1348
doi:10.19734/j.issn.1001-3695.2021.10.0425
43
Multi executor decision algorithm and scheduling algorithm based on differential distance feedback
2022年第5期 : 1437-1443
doi:10.19734/j.issn.1001-3695.2021.10.0462
44
Signature and authentication method based on message hash chain
2022年第4期 : 1183-1189
doi:10.19734/j.issn.1001-3695.2021.08.0381
45
Influence function based method on cross-domain few-shot person Re-ID problem
2022年第4期 : 1242-1246
doi:10.19734/j.issn.1001-3695.2021.07.0331
46
Biometric identity-based access control for wireless body area networks
2022年第2期 : 577-581,586
doi:10.19734/j.issn.1001-3695.2021.07.0277
47
Survey on security and privacy protection in different scenarios of federated learning
2021年第12期 : 3527-3534
doi:10.19734/j.issn.1001-3695.2021.03.0157
48
Executors diversity metric for multi-variant systems
2021年第12期 : 3744-3751
doi:10.19734/j.issn.1001-3695.2021.06.0196
49
Security-enhanced data access control for multi-authority cloud storage in industrial Internet
2021年第12期 : 3765-3770
doi:10.19734/j.issn.1001-3695.2021.02.0112
50
Review of blockchain-based federated learning
2021年第11期 : 3222-3230
doi:10.19734/j.issn.1001-3695.2021.04.0094
搜索结果较多,本次只显示前50个结果。请尝试使用其他搜索词以获得更精确的结果。