Volume 6,Issue 3,2021 Table of Contents

   
Other Issues:  
  

Contents

Membership Inference Attacks in Black-box Machine Learning Models
  LIU Gaoyang, LI Yutong, WAN Borui, WANG Chen, PENG Kai
  Published June 18, 2021
  2021,6(3):1-15 [Abstract]  [View PDF(1.46 M)]
  
Intrusion Detection Method based on Double-Layer Heterogeneous Ensemble Learner
  LING Yue, LIU Yuling, JIANG Bo, LI Ning, LU Zhigang, LIU Baoxu
  Published June 18, 2021
  2021,6(3):16-28 [Abstract]  [View PDF(2.32 M)]
  
Research on Network Embedding Features for Software Defect Prediction
  LIU Jingwen, JIN Wuxia, QU Yu, JIN Yangxu, FAN Ming
  Published June 18, 2021
  2021,6(3):29-53 [Abstract]  [View PDF(6.59 M)]
  
A Survey of Research on Malicious Document Detection
  YU Min, JIANG Jianguo, LI Gang, LIU Chao, HUANG Weiqing, SONG Nan
  Published June 18, 2021
  2021,6(3):54-76 [Abstract]  [View PDF(1.20 M)]
  
Construction of APT Attack Semantic Rules Based on ATT&CK
  PAN Yafeng, ZHOU Tianyang, ZHU Junhu, ZENG Ziyi
  Published June 18, 2021
  2021,6(3):77-90 [Abstract]  [View PDF(1.41 M)]
  
A Survey on the Randomness of the Blockchain Consensus Mechanisms
  LEI Yuanna, XU Haixia, LI Peili, ZHANG Shuhui
  Published June 18, 2021
  2021,6(3):91-105 [Abstract]  [View PDF(1.42 M)]
  
A novel lightweight protocol of secure proxy
  LV Yinghao, CHEN Jiageng
  Published June 18, 2021
  2021,6(3):106-124 [Abstract]  [View PDF(3.41 M)]
  
Application Research of Slicing Technology of Binary Executables in Malware Detection
  MEI Rui, YAN Han-Bing, SHEN Yuan, HAN Zhi-Hui
  Published June 18, 2021
  2021,6(3):125-140 [Abstract]  [View PDF(1.09 M)]
  
Research Progress on Security Defect Detection of IoT Firmware
  ZHANG Chi, SITU Lingyun, WANG Linzhang
  Published June 18, 2021
  2021,6(3):141-158 [Abstract]  [View PDF(485.41 K)]
  
Research progress of blockchain privacy protection and supervision technology
  LI Peili, XU Haixia, MA Tianjun
  Published June 18, 2021
  2021,6(3):159-168 [Abstract]  [View PDF(2.48 M)]
  
Survey of Security Technologies for IoT Edge Stream Processing Based on Trusted Execution Environment
  JIANG Chao, LI Yufeng, CAO Chenhong, LI Jiangtao
  Published June 18, 2021
  2021,6(3):169-186 [Abstract]  [View PDF(774.75 K)]
  
A Method of Protecting Tenants’ Secret Keys against Insider Attacks
  HE Yun, JIA Xiaoqi, LIU Peng, ZHANG Weijuan
  Published June 18, 2021
  2021,6(3):187-201 [Abstract]  [View PDF(911.60 K)]
  
Research on Attack Path Discovery Algorithm Based on Multi-Heuristic Information Fusion
  HU Tairan, ZANG Yichao, CAO Rongrong, WANG Qingxian, WANG Xiaofan
  Published June 18, 2021
  2021,6(3):202-211 [Abstract]  [View PDF(1.38 M)]
  
Chinese Text Recognition in Electromagnetic Emission Reconstructed Images
  LV Zhiqiang, ZHANG Lei, XIA Yuqi, ZHANG Ning
  Published June 18, 2021
  2021,6(3):212-226 [Abstract]  [View PDF(3.10 M)]
  
Survey of Mobile Edge Computing Resource Allocation
  LIANG Guangjun, WANG Qun, XIN Jianfang, LI Meng, XU Wei
  Published June 18, 2021
  2021,6(3):227-256 [Abstract]  [View PDF(7.45 M)]