- A Survey on Privacy-Preserving Ridesharing for Online Ride Hailing Services
- YU Haining, ZHANG Hongli, YU Xiangzhan, QU Jiaxing
- 2024 9(1):1-14[Abstract](5773)[PDF](3597)
- A Novel FL System Based on Consensus Motivated Blockchain
- MI Bo, WENG Yuan, HUANG Darong, LIU Yang
- 2024 9(1):15-32[Abstract](5616)[PDF](3679)
- Deep Learning Testing for Reliability: A Survey
- CHEN Ruoxi, JIN Haibo, CHEN Jinyin, ZHENG Haibin, LI Xiaohao
- 2024 9(1):33-55[Abstract](5566)[PDF](3873)
- A Privacy Protection Scheme for Drug Management Based on Content Extraction Signature
- HU Ronglei, DING Anbang, LI Li, DUAN Xiaoyi
- 2024 9(1):56-70[Abstract](5404)[PDF](3553)
- Defense of Speaker Recognition Against Adversarial Examples Based on Noise Destruction and Waveform Reconstruction
- WEI Chunyu, SUN Meng, ZHANG Xiongwei, ZOU Xia, YIN Jie
- 2024 9(1):71-83[Abstract](5364)[PDF](3758)
- Web Attack Detection Method Based on Stacking Fusion Model
- WAN Wei, SHI Xin, WEI Jinxia, LI Chang, LONG Chun
- 2024 9(1):84-94[Abstract](5498)[PDF](3247)
- An Efficient Decentralized Domain Name System Based on Consortium Management
- DENG Jinxi, HAN Yi, SU Shen, GUO Zeyu, LI Shuang, TIAN Zhihong
- 2024 9(1):95-110[Abstract](5252)[PDF](3100)
- Research on RTL Level Hardware Trojan Verification Based on Security Risk
- Zhao Jianfeng, Shi Gang
- 2024 9(1):111-122[Abstract](546)[PDF](354)
- DataCon: Open Dataset for Large-scale Multiple Fields Security Research and Competitions
- ZHENG Xiaofeng, DUAN Haixin, CHEN Zhenyu, YING Lingyun, HE Zhize, TANG Shujun, ZHENG Ennan, LIU Baojun, LU Chaoyi, SHEN Kaiwen, ZHANG Jia, CHEN Zhuo, LIN Zixiang
- 2024 9(1):123-136[Abstract](493)[PDF](393)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2024 Vol.9(1):1-9 [Abstract](12068) [[PDF](394.10 K)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2024 Vol.9(1):1-10 [Abstract](12984) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2024 Vol.9(1):37-51 [Abstract](9995) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2024 Vol.9(1):87-104 [Abstract](10538) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2024 Vol.9(1):21-36 [Abstract](10899) [[PDF](1.16 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2024 Vol.9(1):1-15 [Abstract](10012) [[PDF](935.57 K)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2024 Vol.9(1):10-20 [Abstract](10607) [[PDF](7.66 M)
|