| Volume 9,Issue 3,2024 Table of Contents
Contents | | | Revocable Certificateless Proxy Re-signature Scheme in Mobile Healthcare System | | GUO Rui, LIU Yingfei, WANG Yicheng, MENG Tong | | Published May 18, 2024 | | 2024,9(3):1-18 [Abstract] [View PDF(1.39 M)] | | | | Blockchain Anonymous Key Exchange Based on SM2 Digital Signature Protocol | | HUANG Peida, LIN Chao, WU Wei, HE Debiao | | Published May 18, 2024 | | 2024,9(3):19-28 [Abstract] [View PDF(507.08 K)] | | | | Group Key Generation Method Based on XOR Reflexivity and Radio Frequency Fingerprinting | | KAI Genshen, MA Juntao, WU Gang, HU Su | | Published May 18, 2024 | | 2024,9(3):29-43 [Abstract] [View PDF(3.31 M)] | | | | Intelligent Attack Path Discovery Based on Heuristic Reward Shaping Method | | ZENG Qingwei, ZHANG Guomin, XING Changyou, SONG Lihua | | Published May 18, 2024 | | 2024,9(3):44-58 [Abstract] [View PDF(3.75 M)] | | | | A Study of Speed Test Method for Implementations of Block Cipher Algorithms on the x64 Platform | | JI Fulei, ZHANG Wentao, MAO Yingying, ZHAO Xuefeng | | Published May 18, 2024 | | 2024,9(3):59-79 [Abstract] [View PDF(692.31 K)] | | | | Automatic Verification System Based on Finger Bimodal Features | | LIU Feng, LIN Liying, HUANG Yixin | | Published May 18, 2024 | | 2024,9(3):80-93 [Abstract] [View PDF(4.74 M)] | | | | IBNAD: An Interaction-based Model for Anomaly Detection of Network Function in 5G Core Network | | ZHANG Weilu, JI Lixin, LIU Shuxin, LI Xing, PAN Fei, HU Xinxin | | Published May 18, 2024 | | 2024,9(3):94-112 [Abstract] [View PDF(14.61 M)] | | | | Design of SLT-LT Joint Code Anti-eavesdropping Scheme Based on Partial Information | | ZHANG Si, NIU Fanglin, YU Ling, ZHANG Yongxiang | | Published May 18, 2024 | | 2024,9(3):113-123 [Abstract] [View PDF(1.18 M)] | | | | Kernel Fuzzing Model Base on Intelligent Seed Generation | | WANG Mingyi, GAN Shuitao, WANG Xiaofeng, LIU Yuan | | Published May 18, 2024 | | 2024,9(3):124-137 [Abstract] [View PDF(930.71 K)] | | | | Class Information Recovery Technology for COTS C++ Binary | | YANG Jin, GONG Xiaorui, WU Wei, ZHANG Bolun | | Published May 18, 2024 | | 2024,9(3):138-156 [Abstract] [View PDF(2.48 M)] | | | | Tenda AX12 Router 0-Day Stack Overflow Vulnerability Mining Method | | ZHENG Wei, XU Qingqing, LI Qi, CHEN Xiang, SUN Jiaze | | Published May 18, 2024 | | 2024,9(3):157-175 [Abstract] [View PDF(3.72 M)] | | | | Research on Malicious Web Page Identification Method Based on Deep Learning and Feature Fusion | | YANG Shengjie, CHEN Zhaoyang, XU Yi, LIU Jiangang | | Published May 18, 2024 | | 2024,9(3):176-190 [Abstract] [View PDF(916.61 K)] | | | | Android Malware Detection Approach Based on Deep Domain Correlation of Sensitive Features | | JIANG Jianguo, LI Song, YU Min, LI Gang, LIU Chao, LI Meimei, HUANG Weiqing | | Published May 18, 2024 | | 2024,9(3):191-203 [Abstract] [View PDF(1.94 M)] | | |
|