Volume 5,Issue 6,2020 Table of Contents

Other Issues:  


Blind forensics of adversarial images generated by C&W algorithm
  DENG Kang, LUO Shenghai, PENG Anjie, ZENG Hui and HUANG Xiaofang
  Published December 18, 2020
  2020,5(6):1-10 [Abstract]  [View PDF(2.35 M)]
Fingerprint construction and identity recognition of Wireless signal based on information gain
  HUANG Weiqing, YANG Zhaoyang, WEI Dong, ZHANG Meng, WANG Wen and YE Bin
  Published December 18, 2020
  2020,5(6):11-26 [Abstract]  [View PDF(1.94 M)]
Research on privacy protection in privacy data verification scenarios
  SHI Kan and CHEN Jie
  Published December 18, 2020
  2020,5(6):27-39 [Abstract]  [View PDF(435.78 K)]
Multi-Channel Fusion Leakage Detection
  CAO Yuchen and ZHOU Yongbin
  Published December 18, 2020
  2020,5(6):40-52 [Abstract]  [View PDF(2.42 M)]
Deep Speech Forgery Based on Parameter Transformation and Threat Assessment to Voiceprint Authentication
  MIAO Xiaokong, SUN Meng, ZHANG Xiongwei, LI Jiakang and ZHANG Xingyu
  Published December 18, 2020
  2020,5(6):53-59 [Abstract]  [View PDF(943.40 K)]
Implementing High-performance X25519/448 Key Agreement Scheme in General Purpose GPUs
  DONG Jiankuo, ZHENG Fangyu and LIN Jingqiang
  Published December 18, 2020
  2020,5(6):60-74 [Abstract]  [View PDF(2.36 M)]
QR Code Based Patch Attacks in Physical World
  QIAN Yaguan, LIU Xinwei, GU Zhaoquan, WANG Bin, PAN Jun and ZHANG Ximin
  Published December 18, 2020
  2020,5(6):75-86 [Abstract]  [View PDF(3.07 M)]
Efficient Range Proofs from Post-Quantum Assumptions
  TENG Yuying, XIE Xiang and DENG Yi
  Published December 18, 2020
  2020,5(6):87-102 [Abstract]  [View PDF(753.60 K)]