Research on the integrated logistics supply chain management model of foreign trade processing products.
Int. J. Manuf. Technol. Manag., 2025
Optimizing encrypted control algorithms for real-time secure control.
J. Frankl. Inst., 2024
Comprehensively enhancing the security of control with combined homomorphic encryption.
J. Inf. Secur. Appl., 2024
The Study of Multi-type Computing Power Trading Mechanism in Computing Power Network Based on Blockchain and Combinatorial Double Auction.
Proceedings of the 2024 4th International Conference on Artificial Intelligence, 2024
The Prediction of Serial Number in OpenSSL's X.509 Certificate.
Secur. Commun. Networks, 2019
The entropy source of pseudo random number generators: from low entropy to high entropy.
Proceedings of the 2019 IEEE International Conference on Intelligence and Security Informatics, 2019
Electronic Evidence Service Research in Cloud Computing Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Email Visualization Correlation Analysis Forensics Research.
Proceedings of the 4th IEEE International Conference on Cyber Security and Cloud Computing, 2017
BotTokenizer: Exploring Network Tokens of HTTP-Based Botnet Using Malicious Network Traces.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
3DLoc: Three Dimensional Wireless Localization Toolkit.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Representative Sampling for Text Classification Using Support Vector Machines.
Proceedings of the Advances in Information Retrieval, 2003