[1] |
YANG Linfeng, HUANG Zheng, XU Yan, DING Zhijun.
Modeling and Detection of Blockchain Smart Contract Attackers Based on Petri Nets
[J]. Computer Engineering, 2025, 51(4): 15-26.
|
[2] |
WU Ruolan, CHEN Yuling, DOU Hui, ZHANG Yangwen, LONG Zhong.
Privacy Preserving Algorithm Using Federated Learning Against Attacks
[J]. Computer Engineering, 2025, 51(2): 179-187.
|
[3] |
CHEN Xianyi, DING Sizhe, WANG Kang, YAN Leiming, FU Zhangjie.
An Watermarking Framework of Active Protection Model for Secure Federated Learning
[J]. Computer Engineering, 2025, 51(1): 138-147.
|
[4] |
XIAO Chaoen, LI Zifan, ZHANG Lei, WANG Jianxin, QIAN Siyuan.
Differential Cryptanalysis Based on Transformer Model and Attention Mechanism
[J]. Computer Engineering, 2025, 51(1): 156-163.
|
[5] |
Yunhe CUI, Jianpeng ZHAO, Hongzhen YANG, Xianchao LI.
Curve Decision Fusion-Based Saturation Attack Detection Method in SDN
[J]. Computer Engineering, 2024, 50(8): 123-132.
|
[6] |
WANG Dong, WANG Hejian, XUAN Jiaxing, ZHENG Shangzhuo, CHEN Bingcong.
Blockchain Privacy-Traceable Deposit Scheme for Power-Dispatch Instructions
[J]. Computer Engineering, 2024, 50(5): 158-166.
|
[7] |
XIONG Shiqiang, HE Daojing, WANG Zhendong, DU Runmeng.
Review of Federated Learning and Its Security and Privacy Protection
[J]. Computer Engineering, 2024, 50(5): 1-15.
|
[8] |
LIANG Songlin, LIN Wei, WANG Jue, YANG Qing.
Research on Network Malicious Traffic Detection for Post-Exploitation Attack Behavior
[J]. Computer Engineering, 2024, 50(5): 128-138.
|
[9] |
Jicheng CHEN, Zijian BAO, Min LUO, Debiao HE.
A Security Remote Command Control Scheme for Industrial Internet of Things
[J]. Computer Engineering, 2024, 50(3): 28-35.
|
[10] |
Shuaiwei LIU, Zhi LI, Guomei WANG, Li ZHANG.
Adversarial Example Generation Algorithm Based on Transformer and GAN
[J]. Computer Engineering, 2024, 50(2): 180-187.
|
[11] |
Qian LI, Haiyun XIANG, Yuting ZHANG, Yun GAN, Haode LIAO.
G-MASK Facial Adversarial Attack Combining Gaussian Filtering and MASK
[J]. Computer Engineering, 2024, 50(2): 308-316.
|
[12] |
YUAN Pingyu, QIU Lin.
Web Attacks Detection Method Based on BERT with Multi-Model Fusion
[J]. Computer Engineering, 2024, 50(11): 197-206.
|
[13] |
GUO Lei, JING Shan, WEI Liang, ZHAO Chuan.
Crossfire Attack Defense Method Based on Software Defined Network
[J]. Computer Engineering, 2024, 50(10): 216-227.
|
[14] |
ZHANG Xuejun, XI Ayou, JIA Xiaohong, ZHANG Bin, LI Mei, DU Xiaogang, HUANG Haiyan.
Study on Adversarial Sample Attacks on Deep Learning Based Fingerprinting Indoor Localization
[J]. Computer Engineering, 2024, 50(10): 228-239.
|
[15] |
Xueli NI, Zhuo MA, Qun WANG.
Overview of Blockchain Mining Pool Networks and Typical Attack Modes
[J]. Computer Engineering, 2024, 50(1): 17-29.
|