-
1
Privacy policy compliance detection and analysis based on knowledge graph
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
2
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
3
Cross-stream attention enhanced central difference convolutional network for CG image detection
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
4
Review of communication optimization methods in federated learning
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
5
Instruction and demonstration-based secure service attribute generation mechanism for textual data
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
6
Robust identification method of website fingerprinting against disturbance
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
7
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
8
Self-adaptive fuzzing optimization method based on distribution divergence
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
9
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
10
Detecting privacy compliance of mobile applications from the perspective of the "minimum necessary" principle
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
11
Security protection method based on mimic defense and Paillier encryption for smart IoT terminals
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article -
12
Adversarial detection based on feature invariant in license plate recognition systems
Published 2024-12-01“…网络与信息安全学报…”
Get full text
Article