[1] |
WANG Yong,SU Zhuoyi,ZHU Zhengyu.
Detection of voice transformation spoofing using the dense convolutional neural network
[J]. Journal of Xidian University, 2021, 48(4): 168-175.
|
[2] |
XIAO Yeqiu,ZHU Xinghui,ZHAO Shuangrui,REN Baoquan,SHEN Yulong.
Analysis of physical layer security performance for satellite communication systems
[J]. Journal of Xidian University, 2021, 48(3): 163-169.
|
[3] |
SHEN Lixiang,MU Dejun,CAO Guo,XIE Guangqian,SHU Fangyong.
Constructing formal verification models for hardware Trojans
[J]. Journal of Xidian University, 2021, 48(3): 146-153.
|
[4] |
LIU Huayuan,SU Yunfei,LI Ruilin,TANG Chaojing.
Structure-statebased graybox Fuzzing technique
[J]. Journal of Xidian University, 2021, 48(1): 117-123.
|
[5] |
LI Teng,CAO Shijie,YIN Siwei,WEI Dawei,MA Xindi,MA Jianfeng.
Optimal method for the generation of the attack path based on the Q-learning decision
[J]. Journal of Xidian University, 2021, 48(1): 160-167.
|
[6] |
YANG Hongyu,ZENG Renyun.
Method for assessment of network security situation with deep learning
[J]. Journal of Xidian University, 2021, 48(1): 183-190.
|
[7] |
ZHENG Xianchun,LI Hui,WANG Rui,YAN Haonan,DAI Rui,XIAO Mingchi.
Survey of anonymous network applications and simulation platforms
[J]. Journal of Xidian University, 2021, 48(1): 22-38.
|
[8] |
LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu.
Algorithm for encrypted search with forward secure updates and verification
[J]. Journal of Xidian University, 2020, 47(5): 48-56.
|
[9] |
SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang.
Covert data transmission mechanism based on dynamic label in blockchain
[J]. Journal of Xidian University, 2020, 47(5): 94-102.
|
[10] |
GAO Jianbang,YUAN Zhaohui,ZHOU Jing.
Transmission synthesis scheme for a multicast system with unknown locations of eavesdroppers
[J]. Journal of Xidian University, 2020, 47(5): 144-149.
|
[11] |
XIE Yixi,JI Lixin.
Blockchain-based bio-inspired distributed detection approach
[J]. Journal of Xidian University, 2020, 47(5): 70-76.
|
[12] |
YANG Hongyu,ZHANG Xugao.
Network security situation adaptive prediction model
[J]. Journal of Xidian University, 2020, 47(3): 14-22.
|
[13] |
WU Qiufeng,ZHANG Yuejun,WANG Pengjun,ZHANG Huihong.
Hardware obfuscation design of the RM logical camouflage gate
[J]. Journal of Xidian University, 2020, 47(2): 135-141.
|
[14] |
YANG Luhui,LIU Guangjie,ZHAI Jiangtao,LIU Weiwei,BAI Huiwen,DAI Yuewei.
Improved algorithm for detection of the malicious domain name based on the convolutional neural network
[J]. Journal of Xidian University, 2020, 47(1): 37-43.
|
[15] |
HUANG Yuming,MA Jianfeng,LIU Zhiquan,WEI Kaimin,FENG Bingwen.
Security risk scenarios and solutions in automatic program repair
[J]. Journal of Xidian University, 2019, 46(6): 147-154.
|