[1] |
Bao ZHANG, Youliang TIAN, Sheng GAO.
Global randomized consensus algorithm resist collusion attack based on game theory
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 98-109.
|
[2] |
Jie YI, Tengfei CAO, Shuai GAO, Jianqiang HUANG.
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 157-167.
|
[3] |
Wenqi SHI, Xiangyang LUO, Jiashan GUO.
Social network user geolocating method based on weighted least squares
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 41-52.
|
[4] |
Rongna XIE, Xiaonan FAN, Lin YUAN, Zichen GUO, Jiayu ZHU, Guozhen SHI.
Research on extended access control mechanism in online social network
[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 123-131.
|
[5] |
Zhongyuan JIANG, Xianyu CHEN, Jianfeng MA.
Survey of community privacy in social network
[J]. Chinese Journal of Network and Information Security, 2021, 7(2): 10-21.
|
[6] |
Xin ZHANG,Weizhong QIANG,Yueming WU,Deqing ZOU,Hai JIN.
Mining behavior pattern of mobile malware with convolutional neural network
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 35-44.
|
[7] |
Pei WANG,Yan JIA,Aiping LI,Qianyue JIANG.
De-anonymiation method for networks based on DeepLink
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 104-108.
|
[8] |
Qiang QU,Hongtao YU,Ruiyang HUANG.
Attention-based approach of detecting spam in social networks
[J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61.
|
[9] |
Qiang QU, Hongtao YU, Ruiyang HUANG.
Research progress of abnormal user detection technology in social network
[J]. Chinese Journal of Network and Information Security, 2018, 4(3): 13-23.
|
[10] |
Xinglan ZHANG,Wei ZHENG.
Research on security multi-party computing based on game theory
[J]. Chinese Journal of Network and Information Security, 2018, 4(1): 52-56.
|
[11] |
Meng-hui LI,You-liang TIAN,Jin-ming FENG.
Constant-round fair rational secret sharing scheme
[J]. Chinese Journal of Network and Information Security, 2017, 3(1): 61-67.
|
[12] |
Tian-zhu CHEN,Yun-chuan GUO,Ben NIU,Feng-hua LI.
Research progress of access control model and policy in online social networks
[J]. Chinese Journal of Network and Information Security, 2016, 2(8): 1-9.
|
[13] |
Jian-qiong HE,You-liang TIAN,Kai ZHOU.
Provably secure social network privacy-preserving scheme
[J]. Chinese Journal of Network and Information Security, 2016, 2(8): 62-67.
|
[14] |
Rui-xin YAO,Hui LI,Jin CAO.
Overview of privacy preserving in social network
[J]. Chinese Journal of Network and Information Security, 2016, 2(4): 33-43.
|
[15] |
Zheng YAN,Chen-zi WU,Wei FENG,Zi-long WANG.
Survey of trustworthy pervasive social networking
[J]. Chinese Journal of Network and Information Security, 2016, 2(2): 30-40.
|