[1] |
Xiao CHEN, Yan CHANG, Danchen WANG, Shibin ZHANG.
Low-cost adversarial example defense algorithm based on example preprocessing
[J]. Journal of Computer Applications, 2024, 44(9): 2756-2762.
|
[2] |
Jiepo FANG, Chongben TAO.
Hybrid internet of vehicles intrusion detection system for zero-day attacks
[J]. Journal of Computer Applications, 2024, 44(9): 2763-2769.
|
[3] |
Ying YANG, Xiaoyan HAO, Dan YU, Yao MA, Yongle CHEN.
Graph data generation approach for graph neural network model extraction attacks
[J]. Journal of Computer Applications, 2024, 44(8): 2483-2492.
|
[4] |
Zhongdai WU, Dezhi HAN, Haibao JIANG, Cheng FENG, Bing HAN, Chongqing CHEN.
Review of marine ship communication cybersecurity
[J]. Journal of Computer Applications, 2024, 44(7): 2123-2136.
|
[5] |
Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG.
Review on security threats and defense measures in federated learning
[J]. Journal of Computer Applications, 2024, 44(6): 1663-1672.
|
[6] |
Jinfu WU, Yi LIU.
Fast adversarial training method based on random noise and adaptive step size
[J]. Journal of Computer Applications, 2024, 44(6): 1807-1815.
|
[7] |
Zihao YAO, Yuanming LI, Ziqiang MA, Yang LI, Lianggen WEI.
Multi-object cache side-channel attack detection model based on machine learning
[J]. Journal of Computer Applications, 2024, 44(6): 1862-1871.
|
[8] |
Wei LUO, Jinquan LIU, Zheng ZHANG.
Dual vertical federated learning framework incorporating secret sharing technology
[J]. Journal of Computer Applications, 2024, 44(6): 1872-1879.
|
[9] |
Honglei YAO, Jiqiang LIU, Endong TONG, Wenjia NIU.
Network security risk assessment method for CTCS based on α-cut triangular fuzzy number and attack tree
[J]. Journal of Computer Applications, 2024, 44(4): 1018-1026.
|
[10] |
Haihan WANG, Yan ZHU.
Offensive speech detection with irony mechanism
[J]. Journal of Computer Applications, 2024, 44(4): 1065-1071.
|
[11] |
Haoran WANG, Dan YU, Yuli YANG, Yao MA, Yongle CHEN.
Domain transfer intrusion detection method for unknown attacks on industrial control systems
[J]. Journal of Computer Applications, 2024, 44(4): 1158-1165.
|
[12] |
Jie WANG, Hua MENG.
Image classification algorithm based on overall topological structure of point cloud
[J]. Journal of Computer Applications, 2024, 44(4): 1107-1113.
|
[13] |
Keshuo SUN, Haiying GAO, Yang SONG.
Multi-authority attribute-based encryption scheme for private blockchain over public blockchain
[J]. Journal of Computer Applications, 2024, 44(12): 3699-3708.
|
[14] |
Gaimei GAO, Mingbo DUAN, Yaling XUN, Chunxia LIU, Weichao DANG.
SM9-based attribute-based searchable encryption scheme with cryptographic reverse firewall
[J]. Journal of Computer Applications, 2024, 44(11): 3495-3502.
|
[15] |
Xuebin CHEN, Changsheng QU.
Overview of backdoor attacks and defense in federated learning
[J]. Journal of Computer Applications, 2024, 44(11): 3459-3469.
|