| Volume 6,Issue 3,2021 Table of Contents
Contents | | | Membership Inference Attacks in Black-box Machine Learning Models | | LIU Gaoyang, LI Yutong, WAN Borui, WANG Chen, PENG Kai | | Published June 18, 2021 | | 2021,6(3):1-15 [Abstract] [View PDF(1.46 M)] | | | | Intrusion Detection Method based on Double-Layer Heterogeneous Ensemble Learner | | LING Yue, LIU Yuling, JIANG Bo, LI Ning, LU Zhigang, LIU Baoxu | | Published June 18, 2021 | | 2021,6(3):16-28 [Abstract] [View PDF(2.32 M)] | | | | Research on Network Embedding Features for Software Defect Prediction | | LIU Jingwen, JIN Wuxia, QU Yu, JIN Yangxu, FAN Ming | | Published June 18, 2021 | | 2021,6(3):29-53 [Abstract] [View PDF(6.59 M)] | | | | A Survey of Research on Malicious Document Detection | | YU Min, JIANG Jianguo, LI Gang, LIU Chao, HUANG Weiqing, SONG Nan | | Published June 18, 2021 | | 2021,6(3):54-76 [Abstract] [View PDF(1.20 M)] | | | | Construction of APT Attack Semantic Rules Based on ATT&CK | | PAN Yafeng, ZHOU Tianyang, ZHU Junhu, ZENG Ziyi | | Published June 18, 2021 | | 2021,6(3):77-90 [Abstract] [View PDF(1.41 M)] | | | | A Survey on the Randomness of the Blockchain Consensus Mechanisms | | LEI Yuanna, XU Haixia, LI Peili, ZHANG Shuhui | | Published June 18, 2021 | | 2021,6(3):91-105 [Abstract] [View PDF(1.42 M)] | | | | A novel lightweight protocol of secure proxy | | LV Yinghao, CHEN Jiageng | | Published June 18, 2021 | | 2021,6(3):106-124 [Abstract] [View PDF(3.41 M)] | | | | Application Research of Slicing Technology of Binary Executables in Malware Detection | | MEI Rui, YAN Han-Bing, SHEN Yuan, HAN Zhi-Hui | | Published June 18, 2021 | | 2021,6(3):125-140 [Abstract] [View PDF(1.09 M)] | | | | Research Progress on Security Defect Detection of IoT Firmware | | ZHANG Chi, SITU Lingyun, WANG Linzhang | | Published June 18, 2021 | | 2021,6(3):141-158 [Abstract] [View PDF(485.41 K)] | | | | Research progress of blockchain privacy protection and supervision technology | | LI Peili, XU Haixia, MA Tianjun | | Published June 18, 2021 | | 2021,6(3):159-168 [Abstract] [View PDF(2.48 M)] | | | | Survey of Security Technologies for IoT Edge Stream Processing Based on Trusted Execution Environment | | JIANG Chao, LI Yufeng, CAO Chenhong, LI Jiangtao | | Published June 18, 2021 | | 2021,6(3):169-186 [Abstract] [View PDF(774.75 K)] | | | | A Method of Protecting Tenants’ Secret Keys against Insider Attacks | | HE Yun, JIA Xiaoqi, LIU Peng, ZHANG Weijuan | | Published June 18, 2021 | | 2021,6(3):187-201 [Abstract] [View PDF(911.60 K)] | | | | Research on Attack Path Discovery Algorithm Based on Multi-Heuristic Information Fusion | | HU Tairan, ZANG Yichao, CAO Rongrong, WANG Qingxian, WANG Xiaofan | | Published June 18, 2021 | | 2021,6(3):202-211 [Abstract] [View PDF(1.38 M)] | | | | Chinese Text Recognition in Electromagnetic Emission Reconstructed Images | | LV Zhiqiang, ZHANG Lei, XIA Yuqi, ZHANG Ning | | Published June 18, 2021 | | 2021,6(3):212-226 [Abstract] [View PDF(3.10 M)] | | | | Survey of Mobile Edge Computing Resource Allocation | | LIANG Guangjun, WANG Qun, XIN Jianfang, LI Meng, XU Wei | | Published June 18, 2021 | | 2021,6(3):227-256 [Abstract] [View PDF(7.45 M)] | | |
|