| Volume 9,Issue 4,2024 Table of Contents
Contents | | | Blockchain Fraud Behaviors Detection Technology: A Survey | | LI Guang, CHEN Zitian, BIAN Jing, ZHOU Jieying, WU Weigang | | Published July 18, 2024 | | 2024,9(4):1-30 [Abstract] [View PDF(1.52 M)] | | | | Research on Internal Keyword Guessing Attack in Public Key Searchable Encryption | | WEI Zhongkai, ZHANG Xi, LIU Jinlu, QIN Jing | | Published July 18, 2024 | | 2024,9(4):31-46 [Abstract] [View PDF(925.86 K)] | | | | A Survey on Defense against Deep Neural Network Backdoor Attack | | JIANG Qinhui, LI Mohan, SUN Yanbin | | Published July 18, 2024 | | 2024,9(4):47-63 [Abstract] [View PDF(1.20 M)] | | | | Practical Dynamic Binary Analysis Framework via Integrating Hypervisor with the Operating System | | PAN Jiaye, SHA Letian | | Published July 18, 2024 | | 2024,9(4):64-78 [Abstract] [View PDF(909.55 K)] | | | | Shortest Path Queries on Structured Encrypted Graph | | PAN Yingying, CHEN Lanxiang | | Published July 18, 2024 | | 2024,9(4):79-94 [Abstract] [View PDF(1009.64 K)] | | | | Research on Active Network Topology Perception and Analysis for Ethereum | | BAI Xiaodong, LIU Daidong, WEI Songjie | | Published July 18, 2024 | | 2024,9(4):95-106 [Abstract] [View PDF(1.32 M)] | | | | Evaluations of Cache Side Channels Attacks and Defends | | WANG Zhanpeng, ZHU Ziyuan, WANG Limin | | Published July 18, 2024 | | 2024,9(4):107-124 [Abstract] [View PDF(1.44 M)] | | | | The Passive Forensics of Deep Video Inpainting | | XIONG Yimao, DING Xiangling, GU Qing, YANG Gaobo, ZHAO Xianfeng | | Published July 18, 2024 | | 2024,9(4):125-138 [Abstract] [View PDF(14.89 M)] | | | | A HEVC Information Hiding Algorithm Based on Motion Vector Modification Minimizing the Distortion between Blocks | | TANG Xiaojing, MA Yi, YU Jianchang, ZHANG Hong, ZHAO Xianfeng | | Published July 18, 2024 | | 2024,9(4):139-149 [Abstract] [View PDF(5.82 M)] | | | | A Survey on Estimation of JPEG Quantization Step | | CHENG Xin, WANG Jinwei, WANG Hao, LUO Xiangyang, LI Xiaolong, ZHU Guopu, MA Bin | | Published July 18, 2024 | | 2024,9(4):150-162 [Abstract] [View PDF(2.18 M)] | | | | A Survey on Optimizing Intrusion Detection and Response Based on Game Theory | | ZHANG Hangsheng, LIU Jiqiang, LIANG Jie, LIU Haitao, LI Ting, GENG Liru, LIU Yinlong | | Published July 18, 2024 | | 2024,9(4):163-179 [Abstract] [View PDF(1.24 M)] | | | | A Survey on Verifiable Computation with Privacy Protection | | LI Shimin, WANG Xin, XUE Rui | | Published July 18, 2024 | | 2024,9(4):180-203 [Abstract] [View PDF(945.86 K)] | | | | Cloud Asset Security Analysis based on Hierarchical Graph Neural Network | | ZHANG Yilian, ZHOU Diqing, XU Liwen, YE Tianpeng, LIN Xiang | | Published July 18, 2024 | | 2024,9(4):204-213 [Abstract] [View PDF(1.62 M)] | | |
|