| |
| Survey on Smart Home Attack and Defense Methods |
| YAN Han, PENG Guojun, LUO Yuan, LIU Side |
| 2021,6(4):1-27 [Abstract] [View PDF(3.07 M)] |
| |
| A Survey of Adversarial Attack Techniques for Android Malware Detection |
| LI Jialin, WANG Yazhe, LUO Lvgen, WANG Yu |
| 2021,6(4):28-43 [Abstract] [View PDF(1.04 M)] |
| |
| Network Resilience and Recovery Mechanism: A Review |
| LIU Qingxia, WANG Bang |
| 2021,6(4):44-59 [Abstract] [View PDF(2.55 M)] |
| |
| A Robust Transfer Method of Neural Network based on Knowledge Distillation |
| ZHANG Wei, YI Ping |
| 2021,6(4):60-71 [Abstract] [View PDF(808.02 K)] |
| |
| A PU learning intrusion detection method for industrial control system |
| LV Sicai, ZHANG Ge, ZHANG Yaofang, LIU Hongri, WANG Zibo, WANG Bailing |
| 2021,6(4):72-89 [Abstract] [View PDF(1.86 M)] |
| |
| Lattice-Based Efficient Universal Accumulator and Zero-Knowledge Proofs of an Accumulated Value |
| Tan Zixin, Deng Yi, Ma Li |
| 2021,6(4):90-105 [Abstract] [View PDF(819.34 K)] |
| |
| Research on an Ensemble Classification Algorithm under Differential Privacy |
| JIA Junjie, QIU Wanyong, MA Huifang |
| 2021,6(4):106-118 [Abstract] [View PDF(3.32 M)] |
| |
| Subtree Type Sensitive Greybox Testing Technique of JavaScript Engines |
| WANG Congchong, GAN Shuitao, WANG Xiaofeng |
| 2021,6(4):119-131 [Abstract] [View PDF(808.39 K)] |
| |
| Blockchain-based Approach for Trustworthy Management of Edge Device in Smart City |
| SHI Pengzhan, DAI Huan, CHEN Jie, CHEN Ruyu |
| 2021,6(4):132-140 [Abstract] [View PDF(1.21 M)] |
| |
| A Comprehensive Evaluation Platform of Adversarial Attacks on Artificial Intelligence for Signal |
| XUAN Qi, ZHOU Qing, CUI Hui, GU Chuntao, XU Dongwei, ZHU Jiawei, WANG Wei, YANG Xiaoniu |
| 2021,6(4):141-148 [Abstract] [View PDF(1.40 M)] |
| |