| |
| Design, Implementation and Formal Verification of TCP Proxy in Mimic Defense Router |
| JIN Xiwen, GE Qiang, ZHANG Jin, DING Jian, JIANG Yiming, MA Hailong, YI Peng |
| Published September 18, 2023 |
| 2023,8(5):1-13 [Abstract] [View PDF(1.76 M)] |
| |
| Research on Adversarial Example Generation Method for Malicious PDF Document Classification |
| LIU Chao, LOU Chenzhe, YU Min |
| Published September 18, 2023 |
| 2023,8(5):14-26 [Abstract] [View PDF(1.77 M)] |
| |
| Research and Implementation of Blind Video Processing Method Based on Modular Component Homomorphism |
| YU Haoyang, FENG Huamin, LI Xiaodong, JIN Xin, LIU Biao |
| Published September 18, 2023 |
| 2023,8(5):27-46 [Abstract] [View PDF(9.13 M)] |
| |
| Radio Data Augmentation with GAN for Automatic Modulation Classification |
| ZHANG Fengli, ZHOU Zhiyuan, WANG Ruijin, HUANG Xin, HAN Yingjun |
| Published September 18, 2023 |
| 2023,8(5):47-60 [Abstract] [View PDF(2.82 M)] |
| |
| Face Anti-Spoofing Based on Meta-pseudo-label and Illumination-invariant Feature |
| FENG Haoyu, HU Yongjian, WANG Yufei, LIU Beibei, YU Xiangyu, ZHONG Rui |
| Published September 18, 2023 |
| 2023,8(5):61-80 [Abstract] [View PDF(3.50 M)] |
| |
| IoT Security Threat and Security Model |
| ZHENG Yaowen, WEN Hui, CHENG Kai, LI Hong, ZHU Hongsong, SUN Limin |
| Published September 18, 2023 |
| 2023,8(5):81-95 [Abstract] [View PDF(647.97 K)] |
| |
| Unknown Malicious Document Detection Based on Global Behavior Feature |
| CHEN Xiang, YI Peng, BAI Bing, HAN Weitao |
| Published September 18, 2023 |
| 2023,8(5):96-108 [Abstract] [View PDF(899.74 K)] |
| |
| Identity-based deniable authenticated encryption with equality test and its application to e-voting system |
| YAO Tianang, XIONG Hu |
| Published September 18, 2023 |
| 2023,8(5):109-122 [Abstract] [View PDF(2.31 M)] |
| |