[1] |
Mingying ZHANG, Bing HUA, Yuguang ZHANG, Haidong LI, Mohong ZHENG.
Robust reinforcement learning algorithm based on pigeon-inspired optimization
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 66-74.
|
[2] |
Dian LIN, Li PAN, Ping YI.
Research on the robustness of convolutional neural networks in image recognition
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 111-122.
|
[3] |
Haoran SHI, Lixin JI, Shuxin LIU, Gengrun WANG.
Abnormal link detection algorithm based on semi-local structure
[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 63-72.
|
[4] |
Pengcheng WANG, Haibin ZHENG, Jianfei ZOU, Ling PANG, Hu LI, Jinyin CHEN.
Robustness evaluation of commercial liveness detection platform
[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 180-189.
|
[5] |
Zhenglong WANG, Baowen ZHANG.
Survey of generative adversarial network
[J]. Chinese Journal of Network and Information Security, 2021, 7(4): 68-85.
|
[6] |
Jinyin CHEN, Dunjie ZHANG, Guohan HUANG, Xiang LIN, Liang BAO.
Adversarial attack and defense on graph neural networks: a survey
[J]. Chinese Journal of Network and Information Security, 2021, 7(3): 1-28.
|
[7] |
Qi WU,Hongchang CHEN.
Low failure recovery cost controller placement strategy in software defined networks
[J]. Chinese Journal of Network and Information Security, 2020, 6(6): 97-104.
|
[8] |
Xu ZHANG,Xin MA.
Lightweight mobile Ad Hoc network authentication scheme based on blockchain
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 14-22.
|
[9] |
Kang HE,Yuefei ZHU,Long LIU,Bin LU,Bin LIU.
Improve the robustness of algorithm under adversarial environment by moving target defense
[J]. Chinese Journal of Network and Information Security, 2020, 6(4): 67-76.
|
[10] |
Guang SUN,Xiao-ping FAN,Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU.
Software watermarking scheme with cloud computing constraints
[J]. Chinese Journal of Network and Information Security, 2016, 2(9): 12-21.
|
[11] |
Cui-ling JIANG,Shuai HUANG,An-wen WU,Wen-xin YU,Zhou-mao KANG,Yong-qiang LI.
Robust digital watermark method based on PDF417 two-dimension code
[J]. Chinese Journal of Network and Information Security, 2016, 2(9): 72-81.
|