[1] |
Renfeng CHEN, Hongbin ZHU.
Research on credit card transaction security supervision based on PU learning
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78.
|
[2] |
Jingyi YUAN, Zichuan LI, Guojun PENG.
EN-Bypass: a security assessment method on e-mail user interface notification
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101.
|
[3] |
Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG.
Software diversity evaluating method based on gadget feature analysis
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173.
|
[4] |
Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI.
Technology and practice of intelligent governance for financial data security
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187.
|
[5] |
Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG.
Survey on vertical federated learning: algorithm, privacy and security
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 1-20.
|
[6] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[7] |
Xiaochen SHEN, Yinhui GE, Bo CHEN, Ling YU.
Research on construction technology of artificial intelligence security knowledge graph
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 164-174.
|
[8] |
Beiyuan YU, Shanyao REN, Jianwei LIU.
Overview of blockchain assets theft attacks and defense technology
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17.
|
[9] |
Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG.
Intrinsic assurance: a systematic approach towards extensible cybersecurity
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102.
|
[10] |
Kexian LIU, Jianfeng GUAN, Wancheng ZHANG, Zhikai HE, Dijia YAN.
Multiple redundant flow fingerprint model based on time slots
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 115-129.
|
[11] |
Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU.
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38.
|
[12] |
Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG.
Two-party cooperative blind signature based on SM2
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51.
|
[13] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[14] |
Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU.
Network security of the National Natural Science Foundation of China: today and prospects
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101.
|
[15] |
Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE.
Survey on explainable knowledge graph reasoning methods
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25.
|