- Covert Channel of Branch Predictor on Arm Processor
- YANG Yi, WU Pingfei, QIU Pengfei, WANG Chunlu, ZHAO Lutan, ZHANG Fengwei, WANG Bo, LYU Yongqiang, WANG Haixia, WANG Dongsheng
- 2025 10(1):1-16[Abstract](623)[PDF](274)
- A Survey on Copyright Protection Technology of Deep Learning Model
- LI Peixuan, HUANG Tu, LUO Shuqing, SONG Jiaxin, LIU Gongshen
- 2025 10(1):17-35[Abstract](992)[PDF](281)
- Identity-based Sealed Bid Auction Protocol on Consortium Blockchain
- XU Zheqing, WANG Yuhang, WANG Zhiwei, LIU Feng
- 2025 10(1):36-46[Abstract](616)[PDF](231)
- LFDP: A Differentially Private Robustness Augmentation Method Combining Low-Frequency Information
- WANG Hao, XU Qiang, ZHANG Qinghua, LI Kaiju
- 2025 10(1):47-60[Abstract](749)[PDF](239)
- High-Capacity Data Hiding in Encryption Domain Based on Layer-by-Layer Residual Prediction for Secret Sharing
- WEN Wenying, YANG Yuheng, ZHANG Yushu, FANG Yuming, QIU Baolin
- 2025 10(1):61-74[Abstract](442)[PDF](240)
- A Review on Physical Adversarial Patch Attacks and Defenses Techniques
- DENG Huan, HUANG Minhuan, LI Hu, WANG Tong, KUANG Xiaohui
- 2025 10(1):75-90[Abstract](1182)[PDF](286)
- Large-scale Linear Equations Outsourcing Computing Scheme Based on Blockchain
- DING Yan, WANG Na, DU Xuehui
- 2025 10(1):91-104[Abstract](476)[PDF](258)
- Slice-GCN: Smart Contract Vulnerability Detection Based on Program Slicing and Graph Neural Networks
- ZHANG Renlou, WU Sheng, ZHANG Hao, LIU Fangyu
- 2025 10(1):105-118[Abstract](456)[PDF](166)
- The 3D Model Recognition Attack Algorithm based on Generative Adversarial Networks
- LIU Jia, JIN Zhigang, JIN Shibo
- 2025 10(1):119-129[Abstract](371)[PDF](177)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(1):1-10 [Abstract](19775) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(1):37-51 [Abstract](14758) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(1):87-104 [Abstract](15241) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(1):1-9 [Abstract](18697) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(1):21-36 [Abstract](16407) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(1):10-20 [Abstract](15567) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(1):1-15 [Abstract](14690) [[PDF](935.57 K)
|