| |
| Survey of Cyber Threat Intelligence Mining Based on Open Source Information Platform |
| CUI Lin, YANG Libin, HE Qinglin, WANG Menghan, MA Jianfeng |
| Published January 18, 2022 |
| 2022,7(1):1-26 [Abstract] [View PDF(668.08 K)] |
| |
| Security Requirements and Evaluation Framework for Internet Information Service Content |
| WANG Yuhang, GUO Tao, ZHANG Xiaodan, MENG Dan, HANG Jizhong, ZHOU Xi |
| Published January 18, 2022 |
| 2022,7(1):27-39 [Abstract] [View PDF(638.15 K)] |
| |
| A Survey of Recent Advances in Data-Driven Event Prediction Research |
| LI Zhipeng, YANG Yangzhao, LIAO Yong, YU Nenghai, WU Zhe, XIE Haiyong, SHI Jun, ZENG Xi |
| Published January 18, 2022 |
| 2022,7(1):40-55 [Abstract] [View PDF(812.92 K)] |
| |
| Attack and Improvement of an Authentication Scheme Based on Reversible Data Hiding |
| WANG Hong, HUANG Fangjun |
| Published January 18, 2022 |
| 2022,7(1):56-65 [Abstract] [View PDF(800.05 K)] |
| |
| Attack Deep Learning on Graphs: A Survey |
| REN Yizhi, LI Zelong, YUAN Lifeng, ZHANG Zhen, ZHU Yani, WU Guohua |
| Published January 18, 2022 |
| 2022,7(1):66-83 [Abstract] [View PDF(806.24 K)] |
| |
| Anomaly Subgraph Identification Algorithm based on Non-peer Relationship in Directed Network |
| SHI Haoran, JI Lixin, LIU Shuxin, Zhang Yiming |
| Published January 18, 2022 |
| 2022,7(1):84-99 [Abstract] [View PDF(1.00 M)] |
| |
| Reviews on the Attack and Defense Methods of Voice Adversarial Examples |
| WEI Chunyu, SUN Meng, ZOU Xia, ZHANG Xiongwei |
| Published January 18, 2022 |
| 2022,7(1):100-113 [Abstract] [View PDF(788.91 K)] |
| |
| Security Data Prefetching Scheme Based on Boundary Detection |
| LIN Changqing, TIAN Xin, HOU Rui, MENG Dan |
| Published January 18, 2022 |
| 2022,7(1):114-125 [Abstract] [View PDF(1.21 M)] |
| |
| A Review of Speech Adversarial Attack and Defense Methods |
| XU Dongwei, FANG Ruochen, JIANG Bin, XUAN Qi |
| Published January 18, 2022 |
| 2022,7(1):126-144 [Abstract] [View PDF(1.11 M)] |
| |
| Defense of Traffic Classifiers based on Convolutional Networks against Adversarial Examples |
| WANG Bin, GUO Yankai, QIAN Yaguan, WANG Jiamin, WANG Xing, GU Zhaoquan |
| Published January 18, 2022 |
| 2022,7(1):145-156 [Abstract] [View PDF(1.34 M)] |
| |