| |
| Survey of Cyber Threat Intelligence Mining Based on Open Source Information Platform |
| | CUI Lin, YANG Libin, HE Qinglin, WANG Menghan, MA Jianfeng |
| | Published January 18, 2022 |
| | 2022,7(1):1-26 [Abstract] [View PDF(668.08 K)] |
| | |
| Security Requirements and Evaluation Framework for Internet Information Service Content |
| | WANG Yuhang, GUO Tao, ZHANG Xiaodan, MENG Dan, HANG Jizhong, ZHOU Xi |
| | Published January 18, 2022 |
| | 2022,7(1):27-39 [Abstract] [View PDF(638.15 K)] |
| | |
| A Survey of Recent Advances in Data-Driven Event Prediction Research |
| | LI Zhipeng, YANG Yangzhao, LIAO Yong, YU Nenghai, WU Zhe, XIE Haiyong, SHI Jun, ZENG Xi |
| | Published January 18, 2022 |
| | 2022,7(1):40-55 [Abstract] [View PDF(812.92 K)] |
| | |
| Attack and Improvement of an Authentication Scheme Based on Reversible Data Hiding |
| | WANG Hong, HUANG Fangjun |
| | Published January 18, 2022 |
| | 2022,7(1):56-65 [Abstract] [View PDF(800.05 K)] |
| | |
| Attack Deep Learning on Graphs: A Survey |
| | REN Yizhi, LI Zelong, YUAN Lifeng, ZHANG Zhen, ZHU Yani, WU Guohua |
| | Published January 18, 2022 |
| | 2022,7(1):66-83 [Abstract] [View PDF(806.24 K)] |
| | |
| Anomaly Subgraph Identification Algorithm based on Non-peer Relationship in Directed Network |
| | SHI Haoran, JI Lixin, LIU Shuxin, Zhang Yiming |
| | Published January 18, 2022 |
| | 2022,7(1):84-99 [Abstract] [View PDF(1.00 M)] |
| | |
| Reviews on the Attack and Defense Methods of Voice Adversarial Examples |
| | WEI Chunyu, SUN Meng, ZOU Xia, ZHANG Xiongwei |
| | Published January 18, 2022 |
| | 2022,7(1):100-113 [Abstract] [View PDF(788.91 K)] |
| | |
| Security Data Prefetching Scheme Based on Boundary Detection |
| | LIN Changqing, TIAN Xin, HOU Rui, MENG Dan |
| | Published January 18, 2022 |
| | 2022,7(1):114-125 [Abstract] [View PDF(1.21 M)] |
| | |
| A Review of Speech Adversarial Attack and Defense Methods |
| | XU Dongwei, FANG Ruochen, JIANG Bin, XUAN Qi |
| | Published January 18, 2022 |
| | 2022,7(1):126-144 [Abstract] [View PDF(1.11 M)] |
| | |
| Defense of Traffic Classifiers based on Convolutional Networks against Adversarial Examples |
| | WANG Bin, GUO Yankai, QIAN Yaguan, WANG Jiamin, WANG Xing, GU Zhaoquan |
| | Published January 18, 2022 |
| | 2022,7(1):145-156 [Abstract] [View PDF(1.34 M)] |
| | |