Volume 9,Issue 4,2024 Table of Contents

   
Other Issues:  
  

Contents

Blockchain Fraud Behaviors Detection Technology: A Survey
  LI Guang, CHEN Zitian, BIAN Jing, ZHOU Jieying, WU Weigang
  Published July 18, 2024
  2024,9(4):1-30 [Abstract]  [View PDF(1.52 M)]
  
Research on Internal Keyword Guessing Attack in Public Key Searchable Encryption
  WEI Zhongkai, ZHANG Xi, LIU Jinlu, QIN Jing
  Published July 18, 2024
  2024,9(4):31-46 [Abstract]  [View PDF(925.86 K)]
  
A Survey on Defense against Deep Neural Network Backdoor Attack
  JIANG Qinhui, LI Mohan, SUN Yanbin
  Published July 18, 2024
  2024,9(4):47-63 [Abstract]  [View PDF(1.20 M)]
  
Practical Dynamic Binary Analysis Framework via Integrating Hypervisor with the Operating System
  PAN Jiaye, SHA Letian
  Published July 18, 2024
  2024,9(4):64-78 [Abstract]  [View PDF(909.55 K)]
  
Shortest Path Queries on Structured Encrypted Graph
  PAN Yingying, CHEN Lanxiang
  Published July 18, 2024
  2024,9(4):79-94 [Abstract]  [View PDF(1009.64 K)]
  
Research on Active Network Topology Perception and Analysis for Ethereum
  BAI Xiaodong, LIU Daidong, WEI Songjie
  Published July 18, 2024
  2024,9(4):95-106 [Abstract]  [View PDF(1.32 M)]
  
Evaluations of Cache Side Channels Attacks and Defends
  WANG Zhanpeng, ZHU Ziyuan, WANG Limin
  Published July 18, 2024
  2024,9(4):107-124 [Abstract]  [View PDF(1.44 M)]
  
The Passive Forensics of Deep Video Inpainting
  XIONG Yimao, DING Xiangling, GU Qing, YANG Gaobo, ZHAO Xianfeng
  Published July 18, 2024
  2024,9(4):125-138 [Abstract]  [View PDF(14.89 M)]
  
A HEVC Information Hiding Algorithm Based on Motion Vector Modification Minimizing the Distortion between Blocks
  TANG Xiaojing, MA Yi, YU Jianchang, ZHANG Hong, ZHAO Xianfeng
  Published July 18, 2024
  2024,9(4):139-149 [Abstract]  [View PDF(5.82 M)]
  
A Survey on Estimation of JPEG Quantization Step
  CHENG Xin, WANG Jinwei, WANG Hao, LUO Xiangyang, LI Xiaolong, ZHU Guopu, MA Bin
  Published July 18, 2024
  2024,9(4):150-162 [Abstract]  [View PDF(2.18 M)]
  
A Survey on Optimizing Intrusion Detection and Response Based on Game Theory
  ZHANG Hangsheng, LIU Jiqiang, LIANG Jie, LIU Haitao, LI Ting, GENG Liru, LIU Yinlong
  Published July 18, 2024
  2024,9(4):163-179 [Abstract]  [View PDF(1.24 M)]
  
A Survey on Verifiable Computation with Privacy Protection
  LI Shimin, WANG Xin, XUE Rui
  Published July 18, 2024
  2024,9(4):180-203 [Abstract]  [View PDF(945.86 K)]
  
Cloud Asset Security Analysis based on Hierarchical Graph Neural Network
  ZHANG Yilian, ZHOU Diqing, XU Liwen, YE Tianpeng, LIN Xiang
  Published July 18, 2024
  2024,9(4):204-213 [Abstract]  [View PDF(1.62 M)]