Home
About
Editorial Board
Statement
Submission Guidelines
Contact us
Chinese
Search By
2024
2023
2022
2021
2020
2019
2018
2017
2016
Display by issue
Display by category
Article No.
English Title
Authors
Vol. Issue No.
Copy
NO.1
20240101
A Survey on Privacy-Preserving Ridesharing for Online Ride Hailing Services
YU Haining, ZHANG Hongli, YU Xiangzhan, QU Jiaxing
2024,9(1):1-14
20240102
A Novel FL System Based on Consensus Motivated Blockchain
MI Bo, WENG Yuan, HUANG Darong, LIU Yang
2024,9(1):15-32
20240103
Deep Learning Testing for Reliability: A Survey
CHEN Ruoxi, JIN Haibo, CHEN Jinyin, ZHENG Haibin, LI Xiaohao
2024,9(1):33-55
20240104
A Privacy Protection Scheme for Drug Management Based on Content Extraction Signature
HU Ronglei, DING Anbang, LI Li, DUAN Xiaoyi
2024,9(1):56-70
20240105
Defense of Speaker Recognition Against Adversarial Examples Based on Noise Destruction and Waveform Reconstruction
WEI Chunyu, SUN Meng, ZHANG Xiongwei, ZOU Xia, YIN Jie
2024,9(1):71-83
20240106
Web Attack Detection Method Based on Stacking Fusion Model
WAN Wei, SHI Xin, WEI Jinxia, LI Chang, LONG Chun
2024,9(1):84-94
20240107
An Efficient Decentralized Domain Name System Based on Consortium Management
DENG Jinxi, HAN Yi, SU Shen, GUO Zeyu, LI Shuang, TIAN Zhihong
2024,9(1):95-110
20240108
Research on RTL Level Hardware Trojan Verification Based on Security Risk
Zhao Jianfeng, Shi Gang
2024,9(1):111-122
20240109
DataCon: Open Dataset for Large-scale Multiple Fields Security Research and Competitions
ZHENG Xiaofeng, DUAN Haixin, CHEN Zhenyu, YING Lingyun, HE Zhize, TANG Shujun, ZHENG Ennan, LIU Baojun, LU Chaoyi, SHEN Kaiwen, ZHANG Jia, CHEN Zhuo, LIN Zixiang
2024,9(1):123-136
20240110
Malware Detection Method Based on Ensemble Learning Technology
LI Fang, ZHU Ziyuan, YAN Chao, MENG Dan
2024,9(1):137-155
NO.2
20240201
Research on Privacy Protection Technology of IoV
LI Ruiqin, HU Xiaoya, ZHANG Juyuan, WANG Licheng
2024,9(2):1-18
20240202
Knowledge Acquisition and Decision Making in Incomplete Rumor Information System based on Rough Set
WANG Biao, WEI Hongquan, WANG Kai, LIU Shuxin, JIANG Haocong
2024,9(2):19-35
20240203
Interactive-Gaming Guided Modeling and Detection for Network Traffic Anomaly Detection
ZHANG Wenzhe, YANG Dong, WEI Songjie
2024,9(2):36-46
20240204
CON-MVX: A Multi-Variant Execution System Based on Container Technology
LIU Zijing, ZHANG Zheng, XI Ruicheng, ZHU Pengzhe, WU Jiangxing
2024,9(2):47-58
20240205
Initialization and Mutation Mechanism in Genetic-Algorithm-Based Power Analysis
XU Yijun, LI Yuan, TANG Minghuan, DING Yaoling, WANG An
2024,9(2):59-68
20240206
Efficient Speech Biological Hashing Secure Retrieval Algorithm Based on Double Hash Index
HUANG Yibo, CHEN Dehuai, ZHANG Qiuyu
2024,9(2):69-83
20240207
SM2-based Identity-based Authentication Key Exchange Protocol
WANG Xiaohu, LIN Chao, WU Wei
2024,9(2):84-95
20240208
Study on Tweakable Enciphering Schemes Against Simon’s Quantum Algorithm
MAO Shuping, WANG Peng, HU Lei
2024,9(2):96-105
20240209
An Efficient and Verifiable Secure Truth Discovery in Mobile Crowdsensing
WANG Taochun, ZHANG Chenlu, CAI Songjian, CHEN Fulong, SHEN Huimin, XIE Dong
2024,9(2):106-121
20240210
A Survey on Neural Machine Reading Comprehension Model
LUO Dan, ZHANG Peng, MA Lu, WANG Bin, WANG Lihong
2024,9(2):122-139