[1] |
Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA.
New hash function based on C-MD structure and chaotic neural network
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 1-15.
|
[2] |
Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN.
Insider threat detection based on operational attention and data augmentation
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112.
|
[3] |
Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG.
Privacy-enhanced federated learning scheme based on generative adversarial networks
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122.
|
[4] |
Wanze CHEN, Liqing HUANG, Jiazhen CHEN, Feng YE, Tianqiang HUANG, Haifeng LUO.
Gender forgery of faces by fusing wavelet shortcut connection generative adversarial network
[J]. Chinese Journal of Network and Information Security, 2023, 9(3): 150-160.
|
[5] |
Zhao CAI, Tao JING, Shuang REN.
Survey on Ethereum phishing detection technology
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32.
|
[6] |
Heli WANG, Qiao YAN.
Selfish mining detection scheme based on the characters of transactions
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114.
|
[7] |
Zezhou HOU, Jiongjiong REN, Shaozhen CHEN.
Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163.
|
[8] |
Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG.
Traditional guidance mechanism based deep robust watermarking
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183.
|
[9] |
Jin CAO, Xiaoping SHI, Ruhui MA, Hui LI.
Fusion of satellite-ground and inter-satellite AKA protocols for double-layer satellite networks
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 18-31.
|
[10] |
Guozhen SHI, Kunyang LI, Yao LIU, Yongjian YANG.
Encrypted traffic identification method based on deep residual capsule network with attention mechanism
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 32-41.
|
[11] |
Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU.
Dual-stack host discovery method based on SSDP and DNS-SD protocol
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 56-66.
|
[12] |
Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG.
Intrinsic assurance: a systematic approach towards extensible cybersecurity
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102.
|
[13] |
Jun LIU, Lin YUAN, Zhishang FENG.
Survey of key management schemes for cluster networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69.
|
[14] |
Rongna XIE, Zhuhong MA, Zongyu LI, Ye TIAN.
Encrypted traffic classification method based on convolutional neural network
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 84-91.
|
[15] |
Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU.
Network security of the National Natural Science Foundation of China: today and prospects
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101.
|