| |
| Blind forensics of adversarial images generated by C&W algorithm |
| | DENG Kang, LUO Shenghai, PENG Anjie, ZENG Hui and HUANG Xiaofang |
| | Published December 18, 2020 |
| | 2020,5(6):1-10 [Abstract] [View PDF(2.35 M)] |
| | |
| Fingerprint construction and identity recognition of Wireless signal based on information gain |
| | HUANG Weiqing, YANG Zhaoyang, WEI Dong, ZHANG Meng, WANG Wen and YE Bin |
| | Published December 18, 2020 |
| | 2020,5(6):11-26 [Abstract] [View PDF(1.94 M)] |
| | |
| Research on privacy protection in privacy data verification scenarios |
| | SHI Kan and CHEN Jie |
| | Published December 18, 2020 |
| | 2020,5(6):27-39 [Abstract] [View PDF(435.78 K)] |
| | |
| Multi-Channel Fusion Leakage Detection |
| | CAO Yuchen and ZHOU Yongbin |
| | Published December 18, 2020 |
| | 2020,5(6):40-52 [Abstract] [View PDF(2.42 M)] |
| | |
| Deep Speech Forgery Based on Parameter Transformation and Threat Assessment to Voiceprint Authentication |
| | MIAO Xiaokong, SUN Meng, ZHANG Xiongwei, LI Jiakang and ZHANG Xingyu |
| | Published December 18, 2020 |
| | 2020,5(6):53-59 [Abstract] [View PDF(943.40 K)] |
| | |
| Implementing High-performance X25519/448 Key Agreement Scheme in General Purpose GPUs |
| | DONG Jiankuo, ZHENG Fangyu and LIN Jingqiang |
| | Published December 18, 2020 |
| | 2020,5(6):60-74 [Abstract] [View PDF(2.36 M)] |
| | |
| QR Code Based Patch Attacks in Physical World |
| | QIAN Yaguan, LIU Xinwei, GU Zhaoquan, WANG Bin, PAN Jun and ZHANG Ximin |
| | Published December 18, 2020 |
| | 2020,5(6):75-86 [Abstract] [View PDF(3.07 M)] |
| | |
| Efficient Range Proofs from Post-Quantum Assumptions |
| | TENG Yuying, XIE Xiang and DENG Yi |
| | Published December 18, 2020 |
| | 2020,5(6):87-102 [Abstract] [View PDF(753.60 K)] |
| | |