[1] |
Haiyong WANG, Mengning JI.
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
[J]. Chinese Journal of Network and Information Security, 2023, 9(6): 34-45.
|
[2] |
Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO.
Survey on adversarial attacks and defense of face forgery and detection
[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 1-15.
|
[3] |
Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU.
Privacy leakage risk assessment for reversible neural network
[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 29-39.
|
[4] |
Wenqian XIAO, Gaobo YANG, Dewang WANG, Ming XIA.
Reversible data hiding in encrypted images based on additive homomorphic encryption and multi-MSB embedding
[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 121-133.
|
[5] |
Ziyang ZHOU, Yun TAN, Jiaohua QIN, Xuyu XIANG.
JPEG reversible data hiding method based on optimal DCT frequency embedding
[J]. Chinese Journal of Network and Information Security, 2023, 9(4): 166-177.
|
[6] |
Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG.
Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services
[J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80.
|
[7] |
Zhe SUN, Hong NING, Lihua YIN, Binxing FANG.
Preliminary study on the construction of a data privacy protection course based on a teaching-in-practice range
[J]. Chinese Journal of Network and Information Security, 2023, 9(1): 178-188.
|
[8] |
Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG.
Two-party cooperative blind signature based on SM2
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51.
|
[9] |
Min XIAO, Tao YAO, Yuanni LIU, Yonghong HUANG.
Dynamic and efficient vehicular cloud management scheme with privacy protection
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 70-83.
|
[10] |
Chenxin LU, Bing CHEN, Ning DING, Liquan CHEN, Ge WU.
Identity-based anonymous cloud auditing scheme with compact tags
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 156-168.
|
[11] |
Shengzhi MING, Jianming ZHU, Zhiyuan SUI, Xian ZHANG.
Online medical privacy protection strategy under information value-added mechanism
[J]. Chinese Journal of Network and Information Security, 2022, 8(6): 169-177.
|
[12] |
Xian ZHANG, Jianming ZHU, Zhiyuan SUI, Shengzhi MING.
Analysis on anonymity and regulation of digital currency transactions based on game theory
[J]. Chinese Journal of Network and Information Security, 2022, 8(5): 150-157.
|
[13] |
Feng LIU, Jie YANG, Jiayin QI.
Survey on blockchain privacy protection techniques in cryptography
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44.
|
[14] |
Lin JIN, Youliang TIAN.
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain
[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76.
|
[15] |
Jinghan WANG, Hui ZHU, Helin LI, Hui LI, Xiaopeng YANG.
Reversible data hiding scheme based on enhanced image smoothness
[J]. Chinese Journal of Network and Information Security, 2022, 8(3): 66-75.
|