[1] |
Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN.
Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149.
|
[2] |
Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN.
Encrypted traffic classification method based on convolutional neural network
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 84-91.
|
[3] |
Dengyong ZHANG, Huang WEN, Feng LI, Peng CAO, Lingyun XIANG, Gaobo YANG, Xiangling DING.
Image inpainting forensics method based on dual branch network
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 110-122.
|
[4] |
Jiaying LIN, Wenbo ZHOU, Weiming ZHANG, Nenghai YU.
Lip forgery detection via spatial-frequency domain combination
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 146-155.
|
[5] |
Jinyin CHEN, Changan WU, Haibin ZHENG.
Novel defense based on softmax activation transformation
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 48-63.
|
[6] |
Baolin QIU, Ping YI.
Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation
[J]. Chinese Journal of Network and Information Security, 2022, 8(2): 88-99.
|
[7] |
Lijuan LI, Man LI, Hongjun BI, Huachun ZHOU.
Multi-type low-rate DDoS attack detection method based on hybrid deep learning
[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 73-85.
|
[8] |
Zhongyuan QIN, Zhaoxiang HE, Tao LI, Liquan CHEN.
Adversarial example defense algorithm for MNIST based on image reconstruction
[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 86-94.
|
[9] |
Deqing ZOU, Xiang LI, Minhuan HUANG, Xiang SONG, Hao LI, Weiming LI.
Intelligent vulnerability detection system based on graph structured source code slice
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 113-122.
|
[10] |
Zhenglong WANG, Baowen ZHANG.
Survey of generative adversarial network
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 68-85.
|
[11] |
Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG.
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 154-163.
|
[12] |
Qingyin TAN, Yingming ZENG, Ye HAN, Yijing LIU, Zheli LIU.
Survey on backdoor attacks targeted on neural network
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 46-58.
|
[13] |
Luhui YANG,Huiwen BAI,Guangjie LIU,Yuewei DAI.
Lightweight malicious domain name detection model based on separable convolution
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 112-120.
|
[14] |
Ximeng LIU,Lehui XIE,Yaopeng WANG,Xuru LI.
Adversarial attacks and defenses in deep learning
[J]. Chinese Journal of Network and Information Security, 2020, 6(5): 36-53.
|
[15] |
Sijia DU,Haining YU,Hongli ZHANG.
Survey of text classification methods based on deep learning
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 1-13.
|