| |
| A Research on Attack-path Prediction Method for APT Organization |
| CHEN Weixiang, REN Yitong, XIAO Yanjun, HOU Rui, TIAN Zhihong |
| Published January 18, 2023 |
| 2023,8(1):1-13 [Abstract] [View PDF(2.83 M)] |
| |
| KMBox: Linux Kernel-based Heterogeneous Redundant Execution System Designed for Processes |
| MA Bolin, ZHANG Zheng, SHAO Yuwen, LI Bingzheng, PAN Chuanxing, JIANG Peng, WU Jiangxing |
| Published January 18, 2023 |
| 2023,8(1):14-25 [Abstract] [View PDF(924.51 K)] |
| |
| Robust Enhancement Method of Depth Model Based on Texture Feature Constraint |
| YANG Zhongguo, ZHANG Juan, WANG Lijun |
| Published January 18, 2023 |
| 2023,8(1):26-39 [Abstract] [View PDF(4.05 M)] |
| |
| Research on Medical Data Access Control and Security Sharing in Public Health Events |
| HAN Gang, WANG Jiaqian, LUO wei, LV Yingze |
| Published January 18, 2023 |
| 2023,8(1):40-54 [Abstract] [View PDF(2.57 M)] |
| |
| Zero-knowledge Authentication and Management Architecture of Verifiable Certificate of Digital Identity Based on Smart Contracts of Blockchain |
| SONG Zhiming, YU Yimin, WANG Guiwen, CHEN Taowei |
| Published January 18, 2023 |
| 2023,8(1):55-77 [Abstract] [View PDF(3.97 M)] |
| |
| Feedback-driven Fuzzing Technology Based on Partial Simulation of IoT Devices |
| LU Haoliang, ZOU Yanyan, PENG Yue, TAN Lingxiao, ZHANG Yu, LIU Longquan, HUO Wei |
| Published January 18, 2023 |
| 2023,8(1):78-92 [Abstract] [View PDF(1.92 M)] |
| |
| Medical Information Attribute Encryption Access Control Scheme Based on Blockchain |
| ZHENG Lijuan, LIU Jiaqi, TAO Yanan, ZHANG Rui, ZHANG Yu, WU Penggang, YOU Junkao |
| Published January 18, 2023 |
| 2023,8(1):93-107 [Abstract] [View PDF(1.28 M)] |
| |
| A Public-key Encryption with Keyword Search Scheme from SM9 |
| PU Lang, LIN Chao, WU Wei, HE Debiao |
| Published January 18, 2023 |
| 2023,8(1):108-118 [Abstract] [View PDF(538.50 K)] |
| |
| Defense Against Physical Attacks on Object Detection Based on Entropy and Random Erasing |
| GAO Hongchao, ZHOU Guangzhi, DAI Jiao, LI Zhaoxing, HAN Jizhong |
| Published January 18, 2023 |
| 2023,8(1):119-130 [Abstract] [View PDF(5.69 M)] |
| |
| Attribute-based Searchable Encryption Scheme Supporting Multiple Keywords Based on Blockchain |
| NIU Shufen, HAN Song, XIE Yaya, WANG Caifen |
| Published January 18, 2023 |
| 2023,8(1):131-143 [Abstract] [View PDF(1.50 M)] |
| |
| A High Performance Tor Web Content Monitoring System Based on Distributed Crawlers |
| ZHENG Xianchun, WANG Rui, YAN Haonan, ZHAO Xingwen, LI Hui, LI Fenghua |
| Published January 18, 2023 |
| 2023,8(1):144-153 [Abstract] [View PDF(2.54 M)] |
| |
| A Dynamic Revocation Strategy of Cloud Security User Attributes for Large Attribute Domain Version Control |
| DANG Xianling, GUO Yinzhang |
| Published January 18, 2023 |
| 2023,8(1):154-164 [Abstract] [View PDF(2.26 M)] |
| |