Volume 7,Issue 3,2022 Table of Contents

Other Issues:  


A Survey of Backdoor Attack in Deep Learning
  DU Wei, LIU Gongshen
  Published June 18, 2022
  2022,7(3):1-16 [Abstract]  [View PDF(2.99 M)]
Industrial Control Flow Anomaly Detection Method Based on Fusion Markov Model
  MA Biao, HU Mengna, ZHANG Zhonghao, ZHOU Zhengyin, JIA Juncheng, YANG Rongju
  Published June 18, 2022
  2022,7(3):17-32 [Abstract]  [View PDF(1.27 M)]
Tightly-secure Ring Signature Construction
  QIU Tian, TANG Guofeng, LIN Dongdai
  Published June 18, 2022
  2022,7(3):33-42 [Abstract]  [View PDF(571.24 K)]
Dynamically Updatable Attribute Based Proxy Re-encryption Scheme in Cloud
  YANG Geng, GUO Rui, ZHUANG Chaoyuan, WANG Xutao
  Published June 18, 2022
  2022,7(3):43-55 [Abstract]  [View PDF(2.09 M)]
A Survey on Blind Detection of Tampered Digital Images
  ZHANG Yixuan, ZHAO Xianfeng, CAO Yun
  Published June 18, 2022
  2022,7(3):56-90 [Abstract]  [View PDF(5.74 M)]
A Time-delayed Covert Channel Attack and Its Countermeasures for N-Variant Systems
  ZENG Wei, HU Hongchao, HUO Shumin, ZHOU Dacheng
  Published June 18, 2022
  2022,7(3):91-106 [Abstract]  [View PDF(3.17 M)]
HiMAC:A Hierarchical Security Protocol for Message Authentication and Encryption
  ZHANG Yongtang
  Published June 18, 2022
  2022,7(3):107-118 [Abstract]  [View PDF(651.39 K)]
Research Advances of Diversity Facing the Active Defense
  TONG Qing, GUO Yunfei, HUO Shumin, WANG Yawen
  Published June 18, 2022
  2022,7(3):119-133 [Abstract]  [View PDF(750.41 K)]
Blockchain-Enabled Anonymous Searchable Encryption Scheme in the Group Communication
  WANG Zerui, ZHENG Dong, GUO Rui, ZHU Tianze
  Published June 18, 2022
  2022,7(3):134-148 [Abstract]  [View PDF(756.51 K)]
An Adversarial Enhancement Method for Radio Signal Classification
  XUAN Qi, CUI Hui, XU Xinjie, CHEN Zhuangzhi, ZHENG Shilian, WANG Wei, YANG Xiaoniu
  Published June 18, 2022
  2022,7(3):149-158 [Abstract]  [View PDF(696.13 K)]