- Measurement and Analysis of Service Status for Key Domain Authoritative Nameservers in China
- NIE Leyao, LI Chenglong, DONG Cong, SONG Guanglei, ZHANG Hui, FAN Linna, YANG Jiahai
- 2025 10(6):1-14[Abstract](292)[PDF](75)
- Robust Collaborative Hierarchical Federated Learning for UAV Clusters
- LIANG Mengqing, WANG Jian, JIANG Wenbin, WANG Xuewei, LIU Jiqiang
- 2025 10(6):15-33[Abstract](284)[PDF](75)
- Trustworthiness Evaluation Approach for Security Virtual Network Function
- LIU Hao, WANG Chong, TIAN Zhihong, WU Zhonghai
- 2025 10(6):34-46[Abstract](242)[PDF](65)
- Secure Named Entity Recognition Inference Method Based on Secret Sharing
- TONG Yan, HUA Zhongyun, LIAO Qing, ZHANG Yushu
- 2025 10(6):47-59[Abstract](238)[PDF](67)
- A Searchable Encryption Scheme based on SM9 for Resisting Internal Keyword Guessing Attacks
- XU Jiawang, WANG Huaqun
- 2025 10(6):60-70[Abstract](237)[PDF](71)
- SBA-ST: A Subgraph Backdoor Attacking Method Using Smaller Triggers to Evade Randomized Smoothing Defense
- WU Xiaojie, LIU Qiang, WANG Yuheng, FU Zhangjie
- 2025 10(6):71-85[Abstract](254)[PDF](71)
- A ViT-based Algorithm for Localized Image Copy Detection
- ZHU Chen, CHEN Yuxun, CHEN Yukun, WANG Zonghui
- 2025 10(6):86-96[Abstract](235)[PDF](74)
- Image Tampering Localization Algorithm Based on Dynamic Masking Rate and Knowledge Distillation
- LI Sili, LIAO Guiying, TAN Shunquan, HUANG Jiwu, LI Bin
- 2025 10(6):97-108[Abstract](177)[PDF](59)
- Classification Methods of Internet Information Services
- WANG Yuhang, GUO Tao, HU Jingyuan, ZHANG Xiaodan, HAN Jizhong
- 2025 10(6):109-121[Abstract](215)[PDF](57)
See more articles>>
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(6):37-51 [Abstract](19679) [[PDF](1.64 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(6):1-9 [Abstract](24397) [[PDF](394.10 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(6):87-104 [Abstract](21529) [[PDF](1.06 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(6):1-10 [Abstract](25073) [[PDF](479.57 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(6):21-36 [Abstract](21717) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(6):10-20 [Abstract](20738) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(6):1-15 [Abstract](20084) [[PDF](935.57 K)
|