Home
About
Editorial Board
Statement
Submission Guidelines
Contact us
Chinese
Search By
2022
2021
2020
2019
2018
2017
2016
Display by issue
Display by category
Article No.
English Title
Authors
Vol. Issue No.
Copy
NO.1
20220101
Survey of Cyber Threat Intelligence Mining Based on Open Source Information Platform
CUI Lin, YANG Libin, HE Qinglin, WANG Menghan, MA Jianfeng
2022,7(1):1-26
20220102
Security Requirements and Evaluation Framework for Internet Information Service Content
WANG Yuhang, GUO Tao, ZHANG Xiaodan, MENG Dan, HANG Jizhong, ZHOU Xi
2022,7(1):27-39
20220103
A Survey of Recent Advances in Data-Driven Event Prediction Research
LI Zhipeng, YANG Yangzhao, LIAO Yong, YU Nenghai, WU Zhe, XIE Haiyong, SHI Jun, ZENG Xi
2022,7(1):40-55
20220104
Attack and Improvement of an Authentication Scheme Based on Reversible Data Hiding
WANG Hong, HUANG Fangjun
2022,7(1):56-65
20220105
Attack Deep Learning on Graphs: A Survey
REN Yizhi, LI Zelong, YUAN Lifeng, ZHANG Zhen, ZHU Yani, WU Guohua
2022,7(1):66-83
20220106
Anomaly Subgraph Identification Algorithm based on Non-peer Relationship in Directed Network
SHI Haoran, JI Lixin, LIU Shuxin, Zhang Yiming
2022,7(1):84-99
20220107
Reviews on the Attack and Defense Methods of Voice Adversarial Examples
WEI Chunyu, SUN Meng, ZOU Xia, ZHANG Xiongwei
2022,7(1):100-113
20220108
Security Data Prefetching Scheme Based on Boundary Detection
LIN Changqing, TIAN Xin, HOU Rui, MENG Dan
2022,7(1):114-125
20220109
A Review of Speech Adversarial Attack and Defense Methods
XU Dongwei, FANG Ruochen, JIANG Bin, XUAN Qi
2022,7(1):126-144
20220110
Defense of Traffic Classifiers based on Convolutional Networks against Adversarial Examples
WANG Bin, GUO Yankai, QIAN Yaguan, WANG Jiamin, WANG Xing, GU Zhaoquan
2022,7(1):145-156
NO.2
20220201
An AAC Steganographic Algorithm Based on Joint Distortion
CAI Sen, REN Yanzhen, WANG Lina
2022,7(2):1-15
20220202
Effectiveness and Performance Analysis of Moving Target Defense System: MTTF and Job Completion Time Perspectives
CHEN Zhi, CHANG Xiaolin, YANG Runkai, HAN Zhen
2022,7(2):16-29
20220203
GPU Virtualization Technology and Security Issues: A Survey
Wu Zailong, Wang Liming, Xu Zhen, Li hongjia, Yang Jing
2022,7(2):30-58
20220204
A Survey for Security of IoT Wireless Protocols
ZHANG Weikang, ZENG Fanping, TAO Yufan, LI Xiangyang
2022,7(2):59-71
20220205
An Anonymous Network Deception Method Based on Container Fingerprint Modification for SaaS Applications
LI Lingshu, WU Jiangxing, LIU Wenyan
2022,7(2):72-86
20220206
Bionic Control Mechanism Based Research of Endogenous Immune Architecture for Information System
LI Tao, HU Aiqun, FANG Lanting
2022,7(2):87-100
20220207
A Comprehensive Survey of Security Situational Awareness on Industrial Control Systems
ZHOU Ming, LV Shichao, YOU Jianzhou, ZHU Hongsong, SHI Zhiqiang, SUN Limin
2022,7(2):101-119
20220208
A Malware Detection Method Based on Hybrid Feature for Mobile Terminals
Yao Ye, Qian Liang, Zhu Yian, Zhang Lixiang, Jia Yao, Du Jiawei, Niu Juntao
2022,7(2):120-138
20220209
The Trusted Traceability System of Agricultural Internet of Things Based on Blockchain
CHEN Jinwen, LUO Decun, TANG Chengjun, TANG Chenjun, DING Yong
2022,7(2):139-149
20220210
Smart Contract with Fully Homomorphic Encryption under Edge Computing Mode
YANG Yatao, LIN Tianxiang, CHEN Jianyuan, ZENG Ping, LIU Peihe
2022,7(2):150-162
20220211
ITTDAF: Decentralized Authorization Framework That Does Not Rely on The Transmission of Parent Permission Information
LUO Qifeng, SHI Ruisheng
2022,7(2):163-173
NO.3
20220301
A Survey of Backdoor Attack in Deep Learning
DU Wei, LIU Gongshen
2022,7(3):1-16
20220302
Industrial Control Flow Anomaly Detection Method Based on Fusion Markov Model
MA Biao, HU Mengna, ZHANG Zhonghao, ZHOU Zhengyin, JIA Juncheng, YANG Rongju
2022,7(3):17-32
20220303
Tightly-secure Ring Signature Construction
QIU Tian, TANG Guofeng, LIN Dongdai
2022,7(3):33-42
20220304
Dynamically Updatable Attribute Based Proxy Re-encryption Scheme in Cloud
YANG Geng, GUO Rui, ZHUANG Chaoyuan, WANG Xutao
2022,7(3):43-55
20220305
A Survey on Blind Detection of Tampered Digital Images
ZHANG Yixuan, ZHAO Xianfeng, CAO Yun
2022,7(3):56-90
20220306
A Time-delayed Covert Channel Attack and Its Countermeasures for N-Variant Systems
ZENG Wei, HU Hongchao, HUO Shumin, ZHOU Dacheng
2022,7(3):91-106
20220307
HiMAC:A Hierarchical Security Protocol for Message Authentication and Encryption
ZHANG Yongtang
2022,7(3):107-118
20220308
Research Advances of Diversity Facing the Active Defense
TONG Qing, GUO Yunfei, HUO Shumin, WANG Yawen
2022,7(3):119-133
20220309
Blockchain-Enabled Anonymous Searchable Encryption Scheme in the Group Communication
WANG Zerui, ZHENG Dong, GUO Rui, ZHU Tianze
2022,7(3):134-148
20220310
An Adversarial Enhancement Method for Radio Signal Classification
XUAN Qi, CUI Hui, XU Xinjie, CHEN Zhuangzhi, ZHENG Shilian, WANG Wei, YANG Xiaoniu
2022,7(3):149-158
NO.4
20220401
Differentially Private Data Sharing and Publishing in Machine Learning: Techniques, Applications, and Challenges
HU Aoting, HU Aiqun, HU Yun, LI Guyue, HAN Jinguang
2022,7(4):1-16
20220402
Survey on Security Researches of Processor's Microarchitecture
YIN Jiawei, LI Menghao, HUO Wei
2022,7(4):17-31
20220403
Network Security Situation Assessment Based on Deep Weighted Feature Learning
YANG Hongyu, ZHANG Zixin, ZHANG Liang
2022,7(4):32-43
20220404
Countering Android Application Repackaging Attacks via Exception Exploitation
ZHOU Libo, LIANG Bin, YOU Wei, HUANG Jianjun, SHI Wenchang
2022,7(4):44-54
20220405
SiCsFuzzer: A Sparse-instrumentation-based Fuzzing Platform for Closed Source Software
LIU Liyan, LI Feng, ZOU Yanyan, ZHOU Jianhua, PIAO Aihua, LIU Feng, HUO Wei
2022,7(4):55-70
20220406
Identifying Alias Relationship between Built-in Objects of Script Engine Based on the Discovery of Data Structure Signatures
ZHANG Yiwei, YOU Wei, LIANG Bing, WAN Xinyu, GUO Suyue
2022,7(4):71-89
20220407
Malicious Traffic Classification Based on Indefinite Length Convolutional Neural Network
YANG Xuan, WU Jiangxing, ZHAO Bo
2022,7(4):90-99
20220408
Vulnerability Detection In Source Code Using Statice Analysis
LIU Jiayong, HAN Jiaxuan, HUANG Cheng
2022,7(4):100-113
20220409
Design and Implementation of Integrated Multi-Variant Execution Supported by Compiler
LI Bingzheng, ZHANG Zheng, MA Bolin, XING Fukang, WU Jiangxing
2022,7(4):114-123
20220410
Fingerprint extraction of Ethernet card based on adaptive filtering algorithm
HU Yuanyuan, HU Aiqun, LI Sheng, LIU Jiaqi, LI Bing
2022,7(4):124-136