[1] |
XU Yinxiang, CHEN Qidong, SUN Jun.
Text Adversarial Attack Method Applying Based on Improved Quantum Behaved Particle Swarm Optimization
[J]. Computer Engineering and Applications, 2022, 58(9): 175-180.
|
[2] |
WANG Zhiyong, XING Kai, DENG Hongwu, LI Yaming, HU Xuan.
Adversarial Attack Against ResNeXt Based on Few-Shot Learning and Causal Intervention
[J]. Computer Engineering and Applications, 2022, 58(7): 68-76.
|
[3] |
WANG Jing, WANG Kai, YAN Yingjian.
Research on Side Channel Attack Technology Based on Conditional Generation Against Network
[J]. Computer Engineering and Applications, 2022, 58(6): 110-117.
|
[4] |
LI Fujuan, WANG Qun.
Research on Cyber Ranges and Its Key Technologies
[J]. Computer Engineering and Applications, 2022, 58(5): 12-22.
|
[5] |
PEI Junling, CHEN Lusheng.
Improvement of Preimage Attack on 4-Round Keccak-256 by Solving Algebraic Systems
[J]. Computer Engineering and Applications, 2022, 58(5): 119-123.
|
[6] |
LIU Zizhou, CHENG Xiaorong, WANG Zhibo.
Research and Analysis of Block Withholding Attack for Blockchain
[J]. Computer Engineering and Applications, 2022, 58(4): 118-125.
|
[7] |
LI Peiyang, LI Xuan, CHEN Junjie, CHEN Yongle.
Adversarial Sample Generation for Evading Botnet Traffic Detection
[J]. Computer Engineering and Applications, 2022, 58(4): 126-133.
|
[8] |
LIU Shuangyin, LEI Moyixi, WANG Lu, SUN Chuanheng, XU Longqin, CAO Liang, FENG Dachun, ZHENG Jianhua, LI Jingbin.
Survey of Blockchain Key Technologies and Existing Problems
[J]. Computer Engineering and Applications, 2022, 58(3): 66-82.
|
[9] |
LI Zhiming, TANG Yongzhong.
Template Attack of AES Algorithm Based on Euclidean Distance
[J]. Computer Engineering and Applications, 2022, 58(2): 110-115.
|
[10] |
GAO Chungang, WANG Yongjie, XIONG Xinli.
MTD Enhanced Cyber Deception Defense System
[J]. Computer Engineering and Applications, 2022, 58(15): 124-132.
|
[11] |
LI Kezi, XU Yang, ZHANG Sicong, YAN Jiale.
Survey on Adversarial Example Attack and Defense Technology for Automatic Speech Recognition
[J]. Computer Engineering and Applications, 2022, 58(14): 1-15.
|
[12] |
LIN Yongbo, LING Jie.
XSS Attack Detection Method Based on Residual Network and GRU
[J]. Computer Engineering and Applications, 2022, 58(10): 101-107.
|
[13] |
HE Zhangqing, XIANG Lian, WANG Chen, WU Tiezhou.
Lightweight Authentication and Session Key Exchange Protocol Based on BST-PUF
[J]. Computer Engineering and Applications, 2022, 58(1): 122-127.
|
[14] |
HU Geng, CAI Yanguang.
Research of DNN Adversarial Attack on COVID-19 CT Image Dataset
[J]. Computer Engineering and Applications, 2022, 58(1): 152-157.
|
[15] |
ZHAI Zhengli, LI Penghui, FENG Shu.
Research Overview of Adversarial Attacks on Graphs
[J]. Computer Engineering and Applications, 2021, 57(7): 14-21.
|