[1] |
ZHAI Zhengli, LI Penghui, FENG Shu.
Research Overview of Adversarial Attacks on Graphs
[J]. Computer Engineering and Applications, 2021, 57(7): 14-21.
|
[2] |
SHEN Xuan, WANG Xinmei, HE Jun, SUN Zhiyuan.
Revised Impossible Differential Attack on Reduced 6-Round Robin
[J]. Computer Engineering and Applications, 2021, 57(5): 95-99.
|
[3] |
LI Fuqiang, GAO Lisai, ZHENG Baozhou, GU Xiaoqing.
Event-Triggered Secure Control for Networked Systems Under Deception Attacks
[J]. Computer Engineering and Applications, 2021, 57(5): 264-270.
|
[4] |
MA Zhihao, ZHU Xiangbin.
Research on Quasi-hyperbolic Momentum Gradient for Adversarial Deep Reinforcement Learning
[J]. Computer Engineering and Applications, 2021, 57(24): 90-99.
|
[5] |
BAI Zhixu, WANG Hengjun, GUO Kexiang.
Summary of Adversarial Examples Techniques Based on Deep Neural Networks
[J]. Computer Engineering and Applications, 2021, 57(23): 61-70.
|
[6] |
GAO Jian, SUN Yi, WANG Runzheng, YUAN Deyu.
Research on Mining Detection Model of Browser Based on Machine Learning
[J]. Computer Engineering and Applications, 2021, 57(22): 125-130.
|
[7] |
JIANG Kui, QIU Yuandong, ZHENG Haocheng.
ICMPv6 DDoS Attack Detection Method Based on Information Entropy and LSTM
[J]. Computer Engineering and Applications, 2021, 57(21): 148-154.
|
[8] |
ZOU Jianwen, ZHAO Bo, LI Xiang, LIU Yifan, LI Jiayue.
tPUF-Based Security Access Scheme for IoT Devices
[J]. Computer Engineering and Applications, 2021, 57(2): 119-126.
|
[9] |
ZHANG Wu, ZHOU Xingyu, ZOU Junhua, PAN Zhisong, DUAN Yexin, CHEN Jun.
Adversarial Attack Algorithm Based on Erosion Batch Normalization
[J]. Computer Engineering and Applications, 2021, 57(16): 116-124.
|
[10] |
WANG Shuya, LIU Qiangchun, CHEN Yunfang, WANG Fujun.
Semantic Adversarial Examples Generation Method for Color Model Disturbances
[J]. Computer Engineering and Applications, 2021, 57(15): 163-170.
|
[11] |
CHEN Feihong, ZHANG Feng, CHEN Junning, WU Xiulong.
Lightweight RFID Authentication Protocol Based on RRAM PUF
[J]. Computer Engineering and Applications, 2021, 57(1): 141-149.
|
[12] |
CAI Mengchen, WANG Ping, FANG Yuan, JIANG Ming, ZHANG Liang.
Low-Cost Tag Ownership Transfer Protocol
[J]. Computer Engineering and Applications, 2020, 56(6): 105-110.
|
[13] |
YE Qisong, DAI Xuchu.
State of the Art on Adversarial Example Generation Methods for Attacking Classifier
[J]. Computer Engineering and Applications, 2020, 56(5): 34-42.
|
[14] |
WANG Lei, REN Nan, LI Baozhen.
Research on Evolutionary Game and Prevention and Control Strategy of Blockchain 51% Double Spend Attack
[J]. Computer Engineering and Applications, 2020, 56(3): 28-34.
|
[15] |
MEI Songqing, DENG Xiaoru.
Ultra-Lightweight Mobile RFID Authentication Protocol for Bit Replacement Operations
[J]. Computer Engineering and Applications, 2020, 56(3): 100-105.
|