Home
About
Editorial Board
Statement
Submission Guidelines
Contact us
Chinese
Search By
2024
2023
2022
2021
2020
2019
2018
2017
2016
Display by issue
Display by category
Article No.
English Title
Authors
Vol. Issue No.
Copy
NO.1
20240101
A Survey on Privacy-Preserving Ridesharing for Online Ride Hailing Services
YU Haining, ZHANG Hongli, YU Xiangzhan, QU Jiaxing
2024,9(1):1-14
20240102
A Novel FL System Based on Consensus Motivated Blockchain
MI Bo, WENG Yuan, HUANG Darong, LIU Yang
2024,9(1):15-32
20240103
Deep Learning Testing for Reliability: A Survey
CHEN Ruoxi, JIN Haibo, CHEN Jinyin, ZHENG Haibin, LI Xiaohao
2024,9(1):33-55
20240104
A Privacy Protection Scheme for Drug Management Based on Content Extraction Signature
HU Ronglei, DING Anbang, LI Li, DUAN Xiaoyi
2024,9(1):56-70
20240105
Defense of Speaker Recognition Against Adversarial Examples Based on Noise Destruction and Waveform Reconstruction
WEI Chunyu, SUN Meng, ZHANG Xiongwei, ZOU Xia, YIN Jie
2024,9(1):71-83
20240106
Web Attack Detection Method Based on Stacking Fusion Model
WAN Wei, SHI Xin, WEI Jinxia, LI Chang, LONG Chun
2024,9(1):84-94
20240107
An Efficient Decentralized Domain Name System Based on Consortium Management
DENG Jinxi, HAN Yi, SU Shen, GUO Zeyu, LI Shuang, TIAN Zhihong
2024,9(1):95-110
20240108
Research on RTL Level Hardware Trojan Verification Based on Security Risk
Zhao Jianfeng, Shi Gang
2024,9(1):111-122
20240109
DataCon: Open Dataset for Large-scale Multiple Fields Security Research and Competitions
ZHENG Xiaofeng, DUAN Haixin, CHEN Zhenyu, YING Lingyun, HE Zhize, TANG Shujun, ZHENG Ennan, LIU Baojun, LU Chaoyi, SHEN Kaiwen, ZHANG Jia, CHEN Zhuo, LIN Zixiang
2024,9(1):123-136
20240110
Malware Detection Method Based on Ensemble Learning Technology
LI Fang, ZHU Ziyuan, YAN Chao, MENG Dan
2024,9(1):137-155
NO.2
20240201
Research on Privacy Protection Technology of IoV
LI Ruiqin, HU Xiaoya, ZHANG Juyuan, WANG Licheng
2024,9(2):1-18
20240202
Knowledge Acquisition and Decision Making in Incomplete Rumor Information System based on Rough Set
WANG Biao, WEI Hongquan, WANG Kai, LIU Shuxin, JIANG Haocong
2024,9(2):19-35
20240203
Interactive-Gaming Guided Modeling and Detection for Network Traffic Anomaly Detection
ZHANG Wenzhe, YANG Dong, WEI Songjie
2024,9(2):36-46
20240204
CON-MVX: A Multi-Variant Execution System Based on Container Technology
LIU Zijing, ZHANG Zheng, XI Ruicheng, ZHU Pengzhe, WU Jiangxing
2024,9(2):47-58
20240205
Initialization and Mutation Mechanism in Genetic-Algorithm-Based Power Analysis
XU Yijun, LI Yuan, TANG Minghuan, DING Yaoling, WANG An
2024,9(2):59-68
20240206
Efficient Speech Biological Hashing Secure Retrieval Algorithm Based on Double Hash Index
HUANG Yibo, CHEN Dehuai, ZHANG Qiuyu
2024,9(2):69-83
20240207
SM2-based Identity-based Authentication Key Exchange Protocol
WANG Xiaohu, LIN Chao, WU Wei
2024,9(2):84-95
20240208
Study on Tweakable Enciphering Schemes Against Simon’s Quantum Algorithm
MAO Shuping, WANG Peng, HU Lei
2024,9(2):96-105
20240209
An Efficient and Verifiable Secure Truth Discovery in Mobile Crowdsensing
WANG Taochun, ZHANG Chenlu, CAI Songjian, CHEN Fulong, SHEN Huimin, XIE Dong
2024,9(2):106-121
20240210
A Survey on Neural Machine Reading Comprehension Model
LUO Dan, ZHANG Peng, MA Lu, WANG Bin, WANG Lihong
2024,9(2):122-139
NO.3
20240301
Revocable Certificateless Proxy Re-signature Scheme in Mobile Healthcare System
GUO Rui, LIU Yingfei, WANG Yicheng, MENG Tong
2024,9(3):1-18
20240302
Blockchain Anonymous Key Exchange Based on SM2 Digital Signature Protocol
HUANG Peida, LIN Chao, WU Wei, HE Debiao
2024,9(3):19-28
20240303
Group Key Generation Method Based on XOR Reflexivity and Radio Frequency Fingerprinting
KAI Genshen, MA Juntao, WU Gang, HU Su
2024,9(3):29-43
20240304
Intelligent Attack Path Discovery Based on Heuristic Reward Shaping Method
ZENG Qingwei, ZHANG Guomin, XING Changyou, SONG Lihua
2024,9(3):44-58
20240305
A Study of Speed Test Method for Implementations of Block Cipher Algorithms on the x64 Platform
JI Fulei, ZHANG Wentao, MAO Yingying, ZHAO Xuefeng
2024,9(3):59-79
20240306
Automatic Verification System Based on Finger Bimodal Features
LIU Feng, LIN Liying, HUANG Yixin
2024,9(3):80-93
20240307
IBNAD: An Interaction-based Model for Anomaly Detection of Network Function in 5G Core Network
ZHANG Weilu, JI Lixin, LIU Shuxin, LI Xing, PAN Fei, HU Xinxin
2024,9(3):94-112
20240308
Design of SLT-LT Joint Code Anti-eavesdropping Scheme Based on Partial Information
ZHANG Si, NIU Fanglin, YU Ling, ZHANG Yongxiang
2024,9(3):113-123
20240309
Kernel Fuzzing Model Base on Intelligent Seed Generation
WANG Mingyi, GAN Shuitao, WANG Xiaofeng, LIU Yuan
2024,9(3):124-137
20240310
Class Information Recovery Technology for COTS C++ Binary
YANG Jin, GONG Xiaorui, WU Wei, ZHANG Bolun
2024,9(3):138-156
20240311
Tenda AX12 Router 0-Day Stack Overflow Vulnerability Mining Method
ZHENG Wei, XU Qingqing, LI Qi, CHEN Xiang, SUN Jiaze
2024,9(3):157-175
20240312
Research on Malicious Web Page Identification Method Based on Deep Learning and Feature Fusion
YANG Shengjie, CHEN Zhaoyang, XU Yi, LIU Jiangang
2024,9(3):176-190
20240313
Android Malware Detection Approach Based on Deep Domain Correlation of Sensitive Features
JIANG Jianguo, LI Song, YU Min, LI Gang, LIU Chao, LI Meimei, HUANG Weiqing
2024,9(3):191-203
NO.4
20240401
Blockchain Fraud Behaviors Detection Technology: A Survey
LI Guang, CHEN Zitian, BIAN Jing, ZHOU Jieying, WU Weigang
2024,9(4):1-30
20240402
Research on Internal Keyword Guessing Attack in Public Key Searchable Encryption
WEI Zhongkai, ZHANG Xi, LIU Jinlu, QIN Jing
2024,9(4):31-46
20240403
A Survey on Defense against Deep Neural Network Backdoor Attack
JIANG Qinhui, LI Mohan, SUN Yanbin
2024,9(4):47-63
20240404
Practical Dynamic Binary Analysis Framework via Integrating Hypervisor with the Operating System
PAN Jiaye, SHA Letian
2024,9(4):64-78
20240405
Shortest Path Queries on Structured Encrypted Graph
PAN Yingying, CHEN Lanxiang
2024,9(4):79-94
20240406
Research on Active Network Topology Perception and Analysis for Ethereum
BAI Xiaodong, LIU Daidong, WEI Songjie
2024,9(4):95-106
20240407
Evaluations of Cache Side Channels Attacks and Defends
WANG Zhanpeng, ZHU Ziyuan, WANG Limin
2024,9(4):107-124
20240408
The Passive Forensics of Deep Video Inpainting
XIONG Yimao, DING Xiangling, GU Qing, YANG Gaobo, ZHAO Xianfeng
2024,9(4):125-138
20240409
A HEVC Information Hiding Algorithm Based on Motion Vector Modification Minimizing the Distortion between Blocks
TANG Xiaojing, MA Yi, YU Jianchang, ZHANG Hong, ZHAO Xianfeng
2024,9(4):139-149
20240410
A Survey on Estimation of JPEG Quantization Step
CHENG Xin, WANG Jinwei, WANG Hao, LUO Xiangyang, LI Xiaolong, ZHU Guopu, MA Bin
2024,9(4):150-162
20240411
A Survey on Optimizing Intrusion Detection and Response Based on Game Theory
ZHANG Hangsheng, LIU Jiqiang, LIANG Jie, LIU Haitao, LI Ting, GENG Liru, LIU Yinlong
2024,9(4):163-179
20240412
A Survey on Verifiable Computation with Privacy Protection
LI Shimin, WANG Xin, XUE Rui
2024,9(4):180-203
20240413
Cloud Asset Security Analysis based on Hierarchical Graph Neural Network
ZHANG Yilian, ZHOU Diqing, XU Liwen, YE Tianpeng, LIN Xiang
2024,9(4):204-213
NO.5
20240501
Applications of Large Language Models Technology for Threat Intelligence: A Survey
CUI Mengjiao, JIANG Zhengwei, CHEN Yiren, JIANG Jun, ZHANG Kai, LING Zhiting, FENG Huamin, YANG Peian
2024,9(5):1-25
20240502
Challenges and Opportunities of Large Language Model Security
FU Zhiyuan, CHEN Siyu, CHEN Junfan, HAI Xiang, SHI Yansong, LI Xiaoqi, LI Yihong, YUE Qiuling, ZHANG Yuqing
2024,9(5):26-55
20240503
A Review of Jailbreak Attacks and Defenses for Large Language Models
LIANG Siyuan, HE Yingzhe, LIU Aishan, LI Jingzhi, DAI Pengwen, CAO Xiaochun
2024,9(5):56-86
20240504
A Review of Security Research in the Development Stage of Software Supply Chain Enhanced by Large Models
LIU Jingqiang, TIAN Xing, SHU Yuqi, ZHU Xiaoxi, LIU Yuling, LIU Qixu
2024,9(5):87-109
20240505
Malware Detection and Classification Based on API Block Reconstruction and Image Representation
YANG Hongyu, ZHANG Yupei, ZHANG Liang, CHENG Xiang
2024,9(5):110-126
20240506
Robust Watermarking for Protect Transformer Intellectual Property
WANG Baowei, ZHENG Weiqian
2024,9(5):127-138
20240507
A Survey on Image Visualization Approaches-based Malware Classification Techniques
QIAN Liping, WANG Dawei
2024,9(5):139-161
20240508
Android Malware Detection Based on Multi-view Representation Learning
ZHAO Wenxiang, MENG Zhaoyi, XIONG Yan, HUANG Wenchao
2024,9(5):162-177
20240509
A Certificateless Subgroup Multi-Signature Scheme
WANG Yuhang, XU Zheqing, WANG Zhiwei, LIU Feng
2024,9(5):178-188
20240510
A Survey of Ethereum Illegal Detection Methods
LI Meng, LIANG Guangjun, YIN Jie, MA Zhuo, ZHANG Yi
2024,9(5):189-216
20240511
Robust Image Encryption Based on Improved Logistic Chaos and Cross-Chaos Diffusion
GUO Yuan, JIA Debao, WANG Chong, ZHAI Ping
2024,9(5):217-228
20240512
Malicious Domain Names Detection Methods Analysis: A Survey
WANG Qing, HAN Dongxu, LU Zhigang, JIANG Bo, DONG Cong, LIU Junrong, SHI Wenchang, LIU Yuling
2024,9(5):229-249