Volume 9,Issue 3,2024 Table of Contents

   
Other Issues:  
  

Contents

Revocable Certificateless Proxy Re-signature Scheme in Mobile Healthcare System
  GUO Rui, LIU Yingfei, WANG Yicheng, MENG Tong
  Published May 18, 2024
  2024,9(3):1-18 [Abstract]  [View PDF(1.39 M)]
  
Blockchain Anonymous Key Exchange Based on SM2 Digital Signature Protocol
  HUANG Peida, LIN Chao, WU Wei, HE Debiao
  Published May 18, 2024
  2024,9(3):19-28 [Abstract]  [View PDF(507.08 K)]
  
Group Key Generation Method Based on XOR Reflexivity and Radio Frequency Fingerprinting
  KAI Genshen, MA Juntao, WU Gang, HU Su
  Published May 18, 2024
  2024,9(3):29-43 [Abstract]  [View PDF(3.31 M)]
  
Intelligent Attack Path Discovery Based on Heuristic Reward Shaping Method
  ZENG Qingwei, ZHANG Guomin, XING Changyou, SONG Lihua
  Published May 18, 2024
  2024,9(3):44-58 [Abstract]  [View PDF(3.75 M)]
  
A Study of Speed Test Method for Implementations of Block Cipher Algorithms on the x64 Platform
  JI Fulei, ZHANG Wentao, MAO Yingying, ZHAO Xuefeng
  Published May 18, 2024
  2024,9(3):59-79 [Abstract]  [View PDF(692.31 K)]
  
Automatic Verification System Based on Finger Bimodal Features
  LIU Feng, LIN Liying, HUANG Yixin
  Published May 18, 2024
  2024,9(3):80-93 [Abstract]  [View PDF(4.74 M)]
  
IBNAD: An Interaction-based Model for Anomaly Detection of Network Function in 5G Core Network
  ZHANG Weilu, JI Lixin, LIU Shuxin, LI Xing, PAN Fei, HU Xinxin
  Published May 18, 2024
  2024,9(3):94-112 [Abstract]  [View PDF(14.61 M)]
  
Design of SLT-LT Joint Code Anti-eavesdropping Scheme Based on Partial Information
  ZHANG Si, NIU Fanglin, YU Ling, ZHANG Yongxiang
  Published May 18, 2024
  2024,9(3):113-123 [Abstract]  [View PDF(1.18 M)]
  
Kernel Fuzzing Model Base on Intelligent Seed Generation
  WANG Mingyi, GAN Shuitao, WANG Xiaofeng, LIU Yuan
  Published May 18, 2024
  2024,9(3):124-137 [Abstract]  [View PDF(930.71 K)]
  
Class Information Recovery Technology for COTS C++ Binary
  YANG Jin, GONG Xiaorui, WU Wei, ZHANG Bolun
  Published May 18, 2024
  2024,9(3):138-156 [Abstract]  [View PDF(2.48 M)]
  
Tenda AX12 Router 0-Day Stack Overflow Vulnerability Mining Method
  ZHENG Wei, XU Qingqing, LI Qi, CHEN Xiang, SUN Jiaze
  Published May 18, 2024
  2024,9(3):157-175 [Abstract]  [View PDF(3.72 M)]
  
Research on Malicious Web Page Identification Method Based on Deep Learning and Feature Fusion
  YANG Shengjie, CHEN Zhaoyang, XU Yi, LIU Jiangang
  Published May 18, 2024
  2024,9(3):176-190 [Abstract]  [View PDF(916.61 K)]
  
Android Malware Detection Approach Based on Deep Domain Correlation of Sensitive Features
  JIANG Jianguo, LI Song, YU Min, LI Gang, LIU Chao, LI Meimei, HUANG Weiqing
  Published May 18, 2024
  2024,9(3):191-203 [Abstract]  [View PDF(1.94 M)]