| |
| Blind forensics of adversarial images generated by C&W algorithm |
| DENG Kang, LUO Shenghai, PENG Anjie, ZENG Hui and HUANG Xiaofang |
| Published December 18, 2020 |
| 2020,5(6):1-10 [Abstract] [View PDF(2.35 M)] |
| |
| Fingerprint construction and identity recognition of Wireless signal based on information gain |
| HUANG Weiqing, YANG Zhaoyang, WEI Dong, ZHANG Meng, WANG Wen and YE Bin |
| Published December 18, 2020 |
| 2020,5(6):11-26 [Abstract] [View PDF(1.94 M)] |
| |
| Research on privacy protection in privacy data verification scenarios |
| SHI Kan and CHEN Jie |
| Published December 18, 2020 |
| 2020,5(6):27-39 [Abstract] [View PDF(435.78 K)] |
| |
| Multi-Channel Fusion Leakage Detection |
| CAO Yuchen and ZHOU Yongbin |
| Published December 18, 2020 |
| 2020,5(6):40-52 [Abstract] [View PDF(2.42 M)] |
| |
| Deep Speech Forgery Based on Parameter Transformation and Threat Assessment to Voiceprint Authentication |
| MIAO Xiaokong, SUN Meng, ZHANG Xiongwei, LI Jiakang and ZHANG Xingyu |
| Published December 18, 2020 |
| 2020,5(6):53-59 [Abstract] [View PDF(943.40 K)] |
| |
| Implementing High-performance X25519/448 Key Agreement Scheme in General Purpose GPUs |
| DONG Jiankuo, ZHENG Fangyu and LIN Jingqiang |
| Published December 18, 2020 |
| 2020,5(6):60-74 [Abstract] [View PDF(2.36 M)] |
| |
| QR Code Based Patch Attacks in Physical World |
| QIAN Yaguan, LIU Xinwei, GU Zhaoquan, WANG Bin, PAN Jun and ZHANG Ximin |
| Published December 18, 2020 |
| 2020,5(6):75-86 [Abstract] [View PDF(3.07 M)] |
| |
| Efficient Range Proofs from Post-Quantum Assumptions |
| TENG Yuying, XIE Xiang and DENG Yi |
| Published December 18, 2020 |
| 2020,5(6):87-102 [Abstract] [View PDF(753.60 K)] |
| |