[1] |
Xin ZHANG,Weizhong QIANG,Yueming WU,Deqing ZOU,Hai JIN.
Mining behavior pattern of mobile malware with convolutional neural network
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 35-44.
|
[2] |
Gang XIONG,Yuwei GE,Yanjie CHU,Weiquan CAO.
Model of cyberspace threat early warning based on cross-domain and collaboration
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 88-96.
|
[3] |
Qi WU,Hongchang CHEN.
Low failure recovery cost controller placement strategy in software defined networks
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 97-104.
|
[4] |
Jian JIA,Linfeng LIU,Jiagao WU.
Charging pile recommendation method for idle electric taxis based on recurrent neural network
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 152-163.
|
[5] |
Fan CHAO,Zhi YANG,Xuehui DU,Yan SUN.
Android malware detection method based on deep neural network
[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 67-79.
|
[6] |
Yang SUN,Chunjie CAO,Junxiao LAI,Tianjiao YU.
AntiGPS spoofing method for UAV based on LSTM-KF model
[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 80-88.
|
[7] |
Xuelei ZHAO,Xinsheng JI,Shuxin LIU,Yu ZHAO.
Link prediction methods based on generalized common neighbor in directed network
[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 89-100.
|
[8] |
Bo XIE,Guowei SHEN,Chun GUO,Yan ZHOU,Miao YU.
Cyber security entity recognition method based on residual dilation convolution neural network
[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 126-138.
|
[9] |
Sijia DU,Haining YU,Hongli ZHANG.
Survey of text classification methods based on deep learning
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 1-13.
|
[10] |
Xu ZHANG,Xin MA.
Lightweight mobile Ad Hoc network authentication scheme based on blockchain
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 14-22.
|
[11] |
Fuxiang YUAN,Fenlin LIU,Chong LIU,Yan LIU,Xiangyang LUO.
MLAR:large-scale network alias resolution for IP geolocation
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 77-94.
|
[12] |
Pei WANG,Yan JIA,Aiping LI,Qianyue JIANG.
De-anonymiation method for networks based on DeepLink
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 104-108.
|
[13] |
Yu ZHANG,Xixiang LYU,Yucong ZOU,Yige LI.
Differentially private sequence generative adversarial networks for data privacy masking
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 109-119.
|
[14] |
Zhirong ZHU,Jiayu LYU,Guohua YE,Zhiqiang YAO.
Improvement of lightweight threshold group signature scheme
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 120-129.
|
[15] |
Renwan BI,Qianxin CHEN,Jinbo XIONG,Ximeng LIU.
Design method of secure computing protocol for deep neural network
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 130-139.
|