亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        網(wǎng)絡(luò)與信息安全學(xué)報(bào)2022年(第8卷)總目次

        2022-02-11 06:33:08
        關(guān)鍵詞:方法

        網(wǎng)絡(luò)與信息安全學(xué)報(bào)2022年(第8卷)總目次

        視 角

        期 頁碼

        隱私計(jì)算的學(xué)術(shù)內(nèi)涵與研究趨勢...................李鳳華,李暉,牛犇,邱衛(wèi)東 6 [2022078](1)

        綜 述

        基于攻防博弈的網(wǎng)絡(luò)防御決策方法研究綜述......................................劉小虎,張恒巍,馬軍強(qiáng),張玉臣,譚晶磊 1 [2021089](1)

        深度學(xué)習(xí)模型的版權(quán)保護(hù)研究綜述...................王馨雅,華光,江昊,張海劍 2 [2022015](1)

        工業(yè)控制系統(tǒng)關(guān)鍵組件安全風(fēng)險(xiǎn)綜述......................................唐士杰,袁方,李俊,丁勇,王會(huì)勇 3 [2022030](1)

        可解釋的知識(shí)圖譜推理方法綜述......................................夏毅,蘭明敬,陳曉慧,羅軍勇,周剛,何鵬 5 [2022063](1)

        專 欄

        基于誘捕的軟件異常檢測綜述...................傅建明,劉暢,解夢飛,羅陳可 1 [2022003](15)

        基于流譜理論的SSL/TLS協(xié)議攻擊檢測方法......................................郭世澤,張帆,宋卓學(xué),趙子鳴,趙新杰,王小娟,羅向陽 1 [2022004](30)

        融合注意力機(jī)制和BSRU的工業(yè)互聯(lián)網(wǎng)安全態(tài)勢預(yù)測方法......................................胡向東,田正國 1 [2021092](41)

        面向項(xiàng)目版本差異性的漏洞識(shí)別技術(shù)研究......................................黃誠,孫明旭,段仁語,吳蘇晟,陳斌 1 [2021094](52)

        基于半局部結(jié)構(gòu)的異常連邊識(shí)別算法...................石灝苒,吉立新,劉樹新,王庚潤 1 [2021040](63)

        基于混合深度學(xué)習(xí)的多類型低速率DDoS攻擊檢測方法......................................李麗娟,李曼,畢紅軍,周華春 1 [2022001](73)

        網(wǎng)絡(luò)空間擬態(tài)防御發(fā)展綜述:從擬態(tài)概念到“擬態(tài)+”生態(tài)......................................馬海龍,王亮,胡濤,江逸茗,曲彥澤 2 [2022018](15)

        基于證據(jù)理論物聯(lián)網(wǎng)安全態(tài)勢感知方法研究...................李劍,董廷魯,李劼 2 [2022022](39)

        基于softmax激活變換的對抗防御方法...................陳晉音,吳長安,鄭海斌 2 [2022016](48)

        基于以太坊狀態(tài)數(shù)據(jù)庫的攻擊與防御方案...................高鎮(zhèn),張東彬,田瀟 2 [2022013](64)

        基于API調(diào)用管理的SDN應(yīng)用層DDoS攻擊防御機(jī)制......................................王洋,湯光明,王碩,楚江 2 [2022017](73)

        基于多維特征圖知識(shí)蒸餾的對抗樣本防御方法...................邱寶琳,易平 2 [2022012](88)

        NFT圖像隱寫...................王子馳,馮國瑞,張新鵬 3 [2022029](18)

        基于空域與頻域關(guān)系建模的篡改文本圖像檢測......................................王裕鑫,張博強(qiáng),謝洪濤,張勇東 3 [2022035](29)

        基于加權(quán)最小二乘的社交網(wǎng)絡(luò)用戶定位方法...................時(shí)文旗,羅向陽,郭家山 3 [2022031](41)

        安全性可控的生成式文本隱寫算法...................梅佳蒙,任延珍,王麗娜 3 [2022039](53)

        增強(qiáng)圖像平滑度的可逆信息隱藏方案......................................王婧晗,朱輝,李鶴麟,李暉,楊曉鵬 3 [2022040](66)

        用于失配隱寫分析的對抗子領(lǐng)域自適應(yīng)網(wǎng)絡(luò)...................章蕾,王宏霞 3 [2022028](76)

        基于區(qū)塊鏈的高透明度PKI認(rèn)證協(xié)議...................陳立全,李瀟,楊哲懿,錢思杰 4 [2022052](1)

        基于形式化方法的智能合約驗(yàn)證研究綜述......................................張文博,陳思敏,魏立斐,宋巍,黃冬梅 4 [2022041](12)

        區(qū)塊鏈密碼學(xué)隱私保護(hù)技術(shù)綜述...................劉峰,楊杰,齊佳音 4 [2022054](29)

        元宇宙中區(qū)塊鏈的應(yīng)用與展望...................宋曉玲,劉勇,董景楠,黃勇飛 4 [2022045](45)

        基于區(qū)塊鏈的多權(quán)限屬性隱藏電子病歷共享方案...................金琳,田有亮 4 [2022044](66)

        基于正常交易掩蓋下的區(qū)塊鏈隱蔽通信方案......................................姜鵬坤,張問銀,王九如,黃善云,宋萬水 4 [2022043](77)

        基于GRU的智能手機(jī)多場景步態(tài)認(rèn)證......................................姜奇,馮茹,張瑞杰,王金花,陳婷,魏福山 5 [2022060](26)

        基于GNN雙源學(xué)習(xí)的訪問控制關(guān)系預(yù)測方法......................................單棣斌,杜學(xué)繪,王文娟,劉敖迪,王娜 5 [2022062](40)

        動(dòng)態(tài)聚合權(quán)重的隱私保護(hù)聯(lián)邦學(xué)習(xí)框架...................應(yīng)作斌,方一晨,張怡文 5 [2022069](56)

        基于鴿群的魯棒強(qiáng)化學(xué)習(xí)算法...................張明英,華冰,張宇光,李海東,鄭墨泓 5 [2022064](66)

        基于區(qū)塊鏈與國密SM9的抗惡意KGC無證書簽名方案......................................唐飛,甘寧,陽祥貴,王金洋 6 [2022073](9)

        基于國密算法的車載以太網(wǎng)控制器身份認(rèn)證方法...................郭輝,羅勇,郭曉潞 6 [2022079](20)

        低功耗嵌入式平臺(tái)的SM2國密算法優(yōu)化實(shí)現(xiàn)......................................劉贛秦,李暉,朱輝,黃煜坤,劉興東 6 [2022080](29)

        基于SM2的兩方協(xié)作盲簽名協(xié)議...................白雪,秦寶東,郭瑞,鄭東 6 [2022081](39)

        集群網(wǎng)絡(luò)密鑰管理方案研究綜述...................劉軍,袁霖,馮志尚 6 [2022082](52)

        學(xué)術(shù)論文

        基于圖像重構(gòu)的MNIST對抗樣本防御算法......................................秦中元,賀兆祥,李濤,陳立全 1 [2021095](86)

        面向5G mMTC的網(wǎng)絡(luò)切片安全研究...................徐子鈞,劉建偉,李耕 1 [2022006](95)

        基于細(xì)粒度嵌入空間預(yù)留的密文域圖像可逆信息隱藏方法......................................李錦偉,張曉雅,姚遠(yuǎn)志,俞能海 1 [2022008](106)

        智能化的安卓手勢密碼取證關(guān)鍵技術(shù)......................................裘佳浩,邱衛(wèi)東,王楊德,查言,謝宇明,李巖 1 [2022005](118)

        基于信譽(yù)管理模型的礦工類型鑒別機(jī)制設(shè)計(jì)...................余佳仁,田有亮,林暉 1 [2022002](128)

        支持多數(shù)不規(guī)則用戶的隱私保護(hù)聯(lián)邦學(xué)習(xí)框架......................................陳前昕,畢仁萬,林劼,金彪,熊金波 1 [2022011](139)

        基于網(wǎng)絡(luò)防御知識(shí)圖譜的0day攻擊路徑預(yù)測方法......................................孫澄,胡浩,楊英杰,張紅旗 1 [2021101](151)

        面向智能汽車的信息安全漏洞評分模型......................................于海洋,陳秀真,馬進(jìn),周志洪,侯書凝 1 [2021096](167)

        面向商用活體檢測平臺(tái)的魯棒性評估......................................王鵬程,鄭海斌,鄒健飛,龐玲,李虎,陳晉音 1 [2022010](180)

        基于原子混淆的通用側(cè)信道漏洞修補(bǔ)方法......................................鄒德清,張盼,劉偉,陳維杰,陸弈帆 2 [2022014](100)

        云環(huán)境下基于屬性策略隱藏的可搜索加密方案......................................周藝華,扈新宇,李美奇,楊宇光 2 [2022019](112)

        基于SM2聯(lián)合簽名的電子發(fā)票公開驗(yàn)證方案......................................羅玙榕,曹進(jìn),李暉,趙興文,尚超 2 [2022020](122)

        元宇宙發(fā)展演變及安全風(fēng)險(xiǎn)研究...................王海龍,李陽春,李欲曉 2 [2022023](132)

        基于標(biāo)簽傳播的兩階段社區(qū)檢測算法......................................孫學(xué)良,王巍,黃俊恒,辛國棟,王佰玲 2 [2021099](139)

        基于DSR和BGRU模型的聊天文本證據(jù)分類方法......................................張宇,李炳龍,李學(xué)娟,張和禹 2 [2022007](150)

        基于混合分析的Java反序列化利用鏈挖掘方法...................武永興,陳力波,姜開達(dá) 2 [2022009](160)

        基于FANP的云用戶行為信任評估優(yōu)化機(jī)制......................................張藝,田立勤,毋澤南,武文星 2 [2021100](175)

        容器云中基于信號(hào)博弈的容器遷移與蜜罐部署策略......................................李凌書,鄔江興,曾威,劉文彥 3 [2021042] (87)

        保護(hù)隱私的有理數(shù)科學(xué)計(jì)算...................劉旭紅,孫晨 3 [2022038] (97)

        面向圖像識(shí)別的卷積神經(jīng)網(wǎng)絡(luò)魯棒性研究進(jìn)展...................林點(diǎn),潘理,易平 3 [2022037](111)

        基于聯(lián)盟鏈的跨域認(rèn)證方案...................牛建林,任志宇,杜學(xué)繪 3 [2022036](123)

        基于合成語音的計(jì)算安全隱寫方法...................李夢涵,陳可江,張衛(wèi)明,俞能海 3 [2022025](134)

        基于信任值的車聯(lián)網(wǎng)分層共識(shí)優(yōu)化協(xié)議......................................翟寶琴,王健,韓磊,劉吉強(qiáng),何嘉豪,劉天皓 3 [2021097](142)

        5G移動(dòng)邊緣計(jì)算場景下的快速切換認(rèn)證方案......................................張偉成,衛(wèi)紅權(quán),劉樹新,普黎明 3 [2022034](154)

        基于SEIPQR模型的工控蠕蟲防御策略...................潘 潔,葉蘭,趙賀,張鑫磊 3 [2022032](169)

        云計(jì)算多授權(quán)中心CP-ABE代理重加密方案...................劉尚,郭銀章 3 [2022033](176)

        基于期望收益率攻擊圖的網(wǎng)絡(luò)風(fēng)險(xiǎn)評估研究......................................劉文甫,龐建民,周鑫,李男,岳峰 4 [2022047](87)

        基于博弈論抗共謀攻擊的全局隨機(jī)化共識(shí)算法...................張寶,田有亮,高勝 4 [2022048](98)

        載體獨(dú)立的深度光照水印算法...................陳浩,王鋒,張衛(wèi)明,俞能海 4 [2022056](110)

        面向高速網(wǎng)絡(luò)流量的加密混淆型WebShell檢測......................................曹藝懷,陳偉,張帆,吳禮發(fā) 4 [2022055](119)

        基于節(jié)點(diǎn)匹配度的動(dòng)態(tài)網(wǎng)絡(luò)鏈路預(yù)測方法......................................李聰,季新生,劉樹新,李勁松,李海濤 4 [2022053](131)

        基于動(dòng)態(tài)瀏覽器指紋的鏈接檢測技術(shù)研究...................高凡,王健,劉吉強(qiáng) 4 [2022049](144)

        車聯(lián)網(wǎng)中基于攻防博弈的蜜罐防御及傳輸策略......................................易杰,曹騰飛,郜帥,黃建強(qiáng) 4 [2022050](157)

        基于改進(jìn)Transformer的社交媒體謠言檢測......................................鄭洪浩,郝一諾,于洪濤,李邵梅,吳翼騰 4 [2022042](168)

        面向網(wǎng)絡(luò)安全資源池的智能服務(wù)鏈系統(tǒng)設(shè)計(jì)與分析......................................王澤南,李佳浩,檀朝紅,皮德常 4 [2022051](175)

        支持受損數(shù)據(jù)定位與恢復(fù)的動(dòng)態(tài)群用戶可證明存儲(chǔ)......................................姜濤,徐航,王良民,馬建峰 5 [2022071](75)

        新的基于雙混沌系統(tǒng)和壓縮感知的圖像加密算法...................楊宇光,曹國棟 5 [2022058](88)

        面向物聯(lián)網(wǎng)設(shè)備固件的硬編碼漏洞檢測方法......................................穆超,王鑫,楊明,張恒,陳振婭,吳曉明 5 [2022070](98)

        基于字節(jié)碼的以太坊智能合約分類方法...................林 丹,林凱欣,吳嘉婧,鄭子彬 5 [2022046](111)

        面向進(jìn)程多變體軟件系統(tǒng)的攻擊面定性建模分析......................................邢???,張錚,隋然,曲晟,季新生 5 [2022059](121)

        基于SAT方法進(jìn)一步加速差分特征的搜索...................許崢 5 [2022066](129)

        基于BRLWE的物聯(lián)網(wǎng)后量子加密技術(shù)研究......................................高藝恬,陳立全,屠天揚(yáng),高原,陳芊葉 5 [2022024](140)

        數(shù)字貨幣交易匿名性與監(jiān)管的博弈分析......................................張嫻,朱建明,隋智源,明盛智 5 [2022068](150)

        CAT-RFE:點(diǎn)擊欺詐的集成檢測框架......................................盧翼翔,耿光剛,延志偉,朱效民,張新常 5 [2022065](158)

        基于通道間相關(guān)性的圖像重著色檢測......................................陳諾,祁樹仁,張玉書,薛明富,花忠云 5 [2022057](167)

        新的基于鼠標(biāo)行為的持續(xù)身份認(rèn)證方法...................易聰,胡軍 5 [2022067](179)

        具有隱私保護(hù)的動(dòng)態(tài)高效車載云管理方案......................................肖敏,姚濤,劉媛妮,黃永洪 6 [2022083](70)

        基于卷積神經(jīng)網(wǎng)絡(luò)的加密流量分類方法...................謝絨娜,馬鑄鴻,李宗俞,田野 6 [2022077](84)

        國家自然科學(xué)基金委員會(huì)網(wǎng)絡(luò)安全現(xiàn)狀與展望......................................李東,郝艷妮,彭升輝,訾瑞杰,劉西蒙 6 [2022076](92)

        基于剪枝技術(shù)和魯棒蒸餾融合的輕量對抗攻擊防御方法......................................王濱,李思敏,錢亞冠,張君,李超豪,朱晨鳴,張鴻飛 6 [2022074](102)

        基于雙分支網(wǎng)絡(luò)的圖像修復(fù)取證方法......................................章登勇,文凰,李峰,曹鵬,向凌云,楊高波,丁湘陵 6 [2022084](110)

        基于符號(hào)執(zhí)行和-scope復(fù)雜度的代碼混淆度量方法......................................肖玉強(qiáng),郭云飛,王亞文 6 [2022085](123)

        基于ROP/JOP gadgets性質(zhì)的軟件多樣化評估方法......................................遲宇寧,郭云飛,王亞文,扈紅超 6 [2022086](135)

        空域頻域相結(jié)合的唇型篡改檢測方法...................林佳瀅,周文柏,張衛(wèi)明,俞能海 6 [2022075](146)

        具有緊湊標(biāo)簽的基于身份匿名云審計(jì)方案......................................盧晨昕,陳兵,丁寧,陳立全,吳戈 6 [2022087](156)

        信息增值機(jī)制下在線醫(yī)療隱私保護(hù)策略...................明盛智,朱建明,隋智源,張嫻 6 [2022072](169)

        教育與教學(xué)

        網(wǎng)絡(luò)空間安全專業(yè)課程思政教學(xué)探索與實(shí)踐——以東南大學(xué)“網(wǎng)絡(luò)空間安全新進(jìn)展”課程為例...................李古月,胡愛群 2 [2022021](183)

        本科“機(jī)器學(xué)習(xí)”課程教學(xué)改革初探...................韋 南,殷麗華,寧洪,方濱興 4 [2022026](182)

        Chinese Journal of Network and Information Security Contents List Vol.8 (2022)

        No. Page

        Perspective

        Academic connotation and research trends of privacy computing......................................,,,6 [2022078](1)

        Comprehensive Reviews

        Research review of network defense decision-making methods based on attack and defense game......................................,,,Yuchen,1 [2021089](1)

        Survey on intellectual property protection for deep learning model......................................,,,2 [2022015](1)

        Review on security risks of key components in industrial control system......................................,,,,3 [2022030](1)

        Survey on explainable knowledge graph reasoning methods......................................,,,,,5 [2022063](1)

        Topics

        Survey of software anomaly detection based on deception......................................,,,1 [2022003](15)

        Detection of SSL/TLS protocol attacks based on flow spectrum theory...................,,...................,,,,1 [2022004](30)

        Methods of security situation prediction for industrial internet fused attention mechanism and BSRU......................................,1 [2021092](41)

        Vulnerability identification technology research based on project version difference......................................,,,,1 [2021094](52)

        Abnormal link detection algorithm based on semi-local structure......................................,,,1 [2021040](63)

        Multi-typelow-rate DDoS attack detection method based on hybrid deep learning......................................,,,1 [2022001](73)

        Survey on the development of mimic defense in cyberspace: from mimic concept to “mimic+” ecology...................,,,,2 [2022018](15)

        Research on IoT security situation awareness method based on evidence theory......................................,,2 [2022022](39)

        Novel defense based on softmax activation transformation......................................,,2 [2022016](48)

        Defense scheme for the world state based attack in Ethereum......................................,,2 [2022013](64)

        Defense mechanism of SDN application layer against DDoS attack based on API call management......................................,,,2 [2022017](73)

        Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation...................,2 [2022012](88)

        Steganography in NFT images...................,,3 [2022029](18)

        Tampered text detection via RGB and frequency relationship modeling......................................,,,3 [2022035](29)

        Social network user geolocating method based on weighted least squares......................................,,3 [2022031](41)

        Generation-based linguistic steganography with controllable security......................................,,3 [2022039](53)

        Reversible data hiding scheme based on enhanced image smoothness......................................,,,,3 [2022040](66)

        Adversarial subdomain adaptation network for mismatched steganalysis......................................,3 [2022028](76)

        Blockchain-based high transparent PKI authentication protocol......................................,,,4 [2022052](1)

        State-of-the-art survey of smart contract verification based on formal methods......................................,,,,4 [2022041](12)

        Survey on blockchain privacy protection techniques in cryptography...................,,4 [2022054](29)

        Application and prospect of blockchain in Metaverse......................................,,,4 [2022045](45)

        Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain......................................,4 [2022044](66)

        Blockchain covert communication scheme based on the cover of normal transactions......................................,,,,4 [2022043] (77)

        GRU-based multi-scenario gait authentication for smartphones......................................,,,,,5 [2022060] (26)

        Access control relationship prediction method based on GNN dual source learning......................................,,,,5 [2022062] (40)

        Privacy-preserving federated learning framework with dynamic weight aggregation......................................,,5 [2022069] (56)

        Robust reinforcement learning algorithm based on pigeon-inspired optimization......................................,,,,5 [2022064] (66)

        Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9...................,,,6 [2022073] (9)

        Automotive ethernet controller authentication method based on national cryptographic algorithms......................................,,6 [2022079] (20)

        Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform...................,,,,6 [2022080] (29)

        Two-party cooperative blind signature based on SM2......................................,,,6 [2022081] (39)

        Survey of key management schemes for cluster networks...................,,6 [2022082] (52)

        Papers

        Adversarial example defense algorithm for MNIST based on image reconstruction......................................,,,1 [2021095] (86)

        Research on network slicing security for 5G mMTC...................,,1 [2022006] (95)

        Reversible data hiding in encrypted images based on fine-grained embedding room reservation......................................,,,1 [2022008](106)

        Intellectualized forensic technique for Android pattern locks......................................,,,,,1 [2022005](118)

        Design of miner type identification mechanism based on reputation management model......................................,,1 [2022002](128)

        Privacy-preserving federated learning framework with irregular-majority users......................................,,,,1 [2022011](139)

        Prediction method of 0day attack path based on cyber defense knowledge graph......................................,,,1 [2021101](151)

        Information security vulnerability scoring model for intelligent vehicles......................................,,,,1 [2021096](167)

        Robustness evaluation of commercial liveness detection platform......................................,,,,,1 [2022010](180)

        Universal patching method for side-channel vulnerabilities based on atomic obfuscation......................................,,,,2 [2022014](100)

        Searchable encryption scheme based on attribute policy hiding in a cloud environment......................................,,,2 [2022019](112)

        Electronic invoice public verification scheme based on SM2 coalition signature algorithm......................................,,,,2 [2022020](122)

        Research on evolution and security risk of Metaverse...................,,2 [2022023](132)

        Two-stage community detection algorithm based on label propagation......................................,,,,2 [2021099](139)

        Evidence classification method of chat text based on DSR and BGRU model......................................,,,2 [2022007](150)

        Java deserialization gadget chain discovery method based on hybrid analysis......................................,,2 [2022009](160)

        Trust evaluation optimization mechanism for cloud user behavior based on FANP......................................,,,2 [2021100](175)

        Strategy of container migration and honeypot deployment based on signal game in cloud environment......................................,,,3 [2021042] (87)

        Private-preserving scientific computation of the rational numbers...................,3 [2022038] (97)

        Research on the robustness of convolutional neural networks in image recognition......................................,,3 [2022037](111)

        Cross-domain authentication scheme based on consortium blockchain......................................,,3 [2022036](123)

        Computationally secure steganography based on speech synthesis......................................3 [2022025](134)

        Hierarchical proxy consensus optimization for IoV based on blockchain and trust value......................................,,,,,3 [2021097](142)

        Fast handover authentication scheme in 5G mobile edge computing scenarios......................................,,,3 [2022034](154)

        Defense strategy of industrial control worm based on SEIPQR model......................................,,,3 [2022032](169)

        Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing......................................,3 [2022033](176)

        Research on network risk assessment based on attack graph of expected benefits-rate......................................,,,,4 [2022047](87)

        Global randomized consensus algorithm resist collusion attack based on game theory......................................,,4 [2022048](98)

        Carrier-independent deep optical watermarking algorithm......................................,,,4 [2022056](110)

        Encrypted and obfuscation WebShell detection for high-speed network traffic......................................,,,4 [2022055](119)

        Link prediction method for dynamic networks based on matching degree of nodes......................................,,,,4 [2022053](131)

        Research on link detection technology based on dynamic browser fingerprint......................................,,4 [2022049](144)

        Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks......................................,,,4 [2022050](157)

        Rumor detection in social media based on eahanced Transformer......................................,,,,4 [2022042](168)

        Design and analysis of intelligent service chain system for network security resource pool......................................,,,4 [2022051](175)

        Proof of storage with corruption identification and recovery for dynamic group users......................................,,,5 [2022071] (75)

        New image encryption algorithm based on double chaotic system and compressive sensing......................................,5 [2022058] (88)

        Hardcoded vulnerability detection approach for IoT device firmware......................................,,,,,5 [2022070] (98)

        Bytecode-based approach for Ethereum smart contract classification5 [2022046](111)

        Qualitative modeling and analysis of attack surface for process multi-variant execution software system......................................,,,,5 [2022059](121)

        Further accelerating the search of differential characteristics based on the SAT method...................5 [2022066](129)

        Post-quantum encryption technology based on BRLWE for internet of things......................................,,,,5 [2022024](140)

        Analysis on anonymity and regulation of digital currency transactions based on game theory......................................,,,5 [2022068](150)

        CAT-RFE: ensemble detection framework for click fraud......................................,,,,5 [2022065](158)

        Image recoloring detection based on inter-channel correlation......................................,,,,5 [2022057](167)

        Novel continuous identity authentication method based on mouse behavior...................,5 [2022067](179)

        Dynamic and efficient vehicular cloud management scheme with privacy protection......................................,,,6 [2022083] (70)

        Encrypted traffic classification method based on convolutional neural network......................................,,,6 [2022077] (84)

        Network security of the National Natural Science Foundation of China: today and prospects......................................,,,,6 [2022076] (92)

        Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation......................................,,,,,,6 [2022074](102)

        Image inpainting forensics method based on dual branch network...................,,,,,,6 [2022084](110)

        Metrics for code obfuscation based on symbolic execution and-scope complexity......................................,,6 [2022085](123)

        Software diversity evaluation method based on the properties of ROP/JOP gadgets......................................,,,6 [2022086](135)

        Lip forgery detection via spatial-frequency domain combination......................................,,,6 [2022075](146)

        Identity-based anonymous cloud auditing scheme with compact tags......................................,,,,6 [2022087](156)

        Online medical privacy protection strategy under information value-added mechanism......................................,,,6 [2022072](169)

        Education and teaching

        Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty...................,2 [2022021](183)

        Preliminary study on the reform of machine learning teaching......................................,,,4 [2022026](182)

        猜你喜歡
        方法
        中醫(yī)特有的急救方法
        中老年保健(2021年9期)2021-08-24 03:52:04
        高中數(shù)學(xué)教學(xué)改革的方法
        化學(xué)反應(yīng)多變幻 “虛擬”方法幫大忙
        變快的方法
        兒童繪本(2020年5期)2020-04-07 17:46:30
        學(xué)習(xí)方法
        可能是方法不對
        用對方法才能瘦
        Coco薇(2016年2期)2016-03-22 02:42:52
        最有效的簡單方法
        山東青年(2016年1期)2016-02-28 14:25:23
        四大方法 教你不再“坐以待病”!
        Coco薇(2015年1期)2015-08-13 02:47:34
        賺錢方法
        本道无码一区二区久久激情| 2019日韩中文字幕mv| 老妇女性较大毛片| 人人爽久久久噜人人看| 日本无码人妻波多野结衣| 亚洲国产一区二区三区网| 在线视频青青草猎艳自拍69| 蜜桃视频一区二区三区| 完整版免费av片| 特黄做受又粗又长又大又硬| 免费无码av片在线观看网址| 精品国产福利久久久| 熟妇与小伙子露脸对白| 亚洲精品国产av日韩专区| 亚洲大尺度无码无码专区| 人妻少妇精品无码专区二区| 狠狠躁狠狠躁东京热无码专区| 一区两区三区视频在线观看| 午夜精品久久99蜜桃| 亚洲av综合av成人小说| 国产免费丝袜调教视频| 国产aⅴ天堂亚洲国产av| 在线小黄片视频免费播放| 中文字幕精品一区久久| 亚洲av高清在线一区二区三区 | 精品国产迪丽热巴在线| 亚洲不卡在线免费视频| 女人被弄到高潮的免费视频| 草莓视频一区二区精品| 琪琪av一区二区三区| 在线观看国产白浆一区三区| 亚洲综合色婷婷七月丁香| 日韩AVAV天堂AV在线| 亚洲美女av二区在线观看| 色综合天天综合欧美综合| 99精品国产兔费观看久久99| 亚洲日韩精品AⅤ片无码富二代| 日本一区二区三区亚洲| 人妻 偷拍 无码 中文字幕| 亚洲日韩欧洲无码av夜夜摸| 911国产在线观看精品|