[1] |
GE Bin,CHEN Xu,CHEN Gang.
Fast hyper-chaotic image encryption algorithm using vector operation
[J]. Journal of Xidian University, 2021, 48(6): 187-196.
|
[2] |
DAI Mingjun,LI Xiaofeng,DENG Haiyan,CHEN Bin.
Private information retrieval with low encoding/decoding complexity
[J]. Journal of Xidian University, 2021, 48(6): 212-220.
|
[3] |
XIE Lixia,BAI Yu.
Information system business affecting impact evaluation method
[J]. Journal of Xidian University, 2021, 48(4): 184-191.
|
[4] |
WANG Xingxin,HU Wei,TAN Jing,ZHU Jiacheng,TANG Shibo.
Correlation fault attack on AES
[J]. Journal of Xidian University, 2021, 48(4): 192-199.
|
[5] |
SONG Cheng,JIN Tong,NI Shuiping,HE Junyi,DU Shouheng.
K-anonymous location privacy protection scheme for the mobile terminal
[J]. Journal of Xidian University, 2021, 48(3): 138-145.
|
[6] |
HE Shiyang,LI Hui,LI Fenghua.
Optimization and implementation of the SM4 on FPGA
[J]. Journal of Xidian University, 2021, 48(3): 155-162.
|
[7] |
WANG Junxiang,HUANG Lin,ZHANG Ying,NI Jiangqun,LIN Lang.
Algorithm for the detection of a low complexity contrast enhanced image source
[J]. Journal of Xidian University, 2021, 48(1): 96-106.
|
[8] |
LI Teng,CAO Shijie,YIN Siwei,WEI Dawei,MA Xindi,MA Jianfeng.
Optimal method for the generation of the attack path based on the Q-learning decision
[J]. Journal of Xidian University, 2021, 48(1): 160-167.
|
[9] |
YANG Hongyu,ZENG Renyun.
Method for assessment of network security situation with deep learning
[J]. Journal of Xidian University, 2021, 48(1): 183-190.
|
[10] |
CHE Xiaoliang,ZHOU Haonan,YANG Xiaoyuan,ZHOU Tanping,LIU Longfei,LI Ningbo.
Efficient multi-key fully homomorphic encryption scheme from RLWE
[J]. Journal of Xidian University, 2021, 48(1): 87-95.
|
[11] |
LAN Yiqin,ZHANG Fangguo,TIAN Haibo.
Using Monero to realize covert communication
[J]. Journal of Xidian University, 2020, 47(5): 19-27.
|
[12] |
SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang.
Covert data transmission mechanism based on dynamic label in blockchain
[J]. Journal of Xidian University, 2020, 47(5): 94-102.
|
[13] |
HUANG Yuming,MA Jianfeng,LIU Zhiquan,FENG Bingwen,WEI Kaimin.
Rule-based automatic program repair method
[J]. Journal of Xidian University, 2020, 47(4): 117-123.
|
[14] |
YANG Hongyu,ZHANG Xugao.
Network security situation adaptive prediction model
[J]. Journal of Xidian University, 2020, 47(3): 14-22.
|
[15] |
YANG Luhui,LIU Guangjie,ZHAI Jiangtao,LIU Weiwei,BAI Huiwen,DAI Yuewei.
Improved algorithm for detection of the malicious domain name based on the convolutional neural network
[J]. Journal of Xidian University, 2020, 47(1): 37-43.
|