| |
| A Steganographic System based on “Martian” Generation for Avoidance of Text Information Interception |
| ZHU Jiahao, ZHANG Yushu, LIU Zhe, ZHANG Xinpeng |
| Published September 18, 2022 |
| 2022,7(5):1-18 [Abstract] [View PDF(1.51 M)] |
| |
| An Editable and Accountable Blockchain Scheme |
| ZHAO Xiaoqi, ZHANG Zhenghao, LI Yong |
| Published September 18, 2022 |
| 2022,7(5):19-28 [Abstract] [View PDF(605.30 K)] |
| |
| Multi-scale Time-Spatial Domain Detection of Fabricated Face Video Based on 3D Convolution |
| BAO Han, FU Haocheng, CAO Yun, ZHAO Xianfeng, TANG Peng |
| Published September 18, 2022 |
| 2022,7(5):29-38 [Abstract] [View PDF(2.29 M)] |
| |
| Survey on IaaS Cloud Security |
| OUYANG Xue, XU Yanyan |
| Published September 18, 2022 |
| 2022,7(5):39-50 [Abstract] [View PDF(574.42 K)] |
| |
| A Survey: Attacks and Countermeasures of Adversarial Examples for Speech Recognition System |
| TAI Jianwei, LI Yakai, JIA Xiaoqi, HUANG Qingjia |
| Published September 18, 2022 |
| 2022,7(5):51-64 [Abstract] [View PDF(1.42 M)] |
| |
| Network Attack Path Planning Method based on Deep Reinforcement Learning |
| GAO Wenlong, ZHOU Tianyang, ZHAO Ziheng, ZHU Junhu |
| Published September 18, 2022 |
| 2022,7(5):65-78 [Abstract] [View PDF(4.78 M)] |
| |
| Safety Certification for Next Generation High-speed Railway Heterogeneous Network Handover |
| CHEN Yong, LIU Wen, ZHAN Zhixian |
| Published September 18, 2022 |
| 2022,7(5):79-90 [Abstract] [View PDF(883.53 K)] |
| |
| Blockchain-based Lightweight Anonymous Review System |
| LI Chao, WANG Jian, LIU Jiqiang |
| Published September 18, 2022 |
| 2022,7(5):91-107 [Abstract] [View PDF(1.43 M)] |
| |
| PQVPN: Design of Software VPN against Quantum Computing Attack |
| YANG Yatao, ZHAO Ruoyan, CHANG Xin, GUO Chao, XIAO Song |
| Published September 18, 2022 |
| 2022,7(5):108-119 [Abstract] [View PDF(1007.10 K)] |
| |