- Research on Security and User Privacy Protection Methods for Wireless Sensing Models
- JIANG Yu, SHI Qi, CONG Yang, HU Aiqun
- 2025 10(5):1-16[Abstract](48)[PDF](28)
- Formal Verification of Cache Side-channels and Attack Detection Based on Model Checking
- ZHANG Shixuan, WANG Haixia, QIU Pengfei, LYU Yongqiang, YIN Lingfeng, WANG Hongpeng, WANG Dongsheng
- 2025 10(5):17-33[Abstract](53)[PDF](29)
- A Dynamic Security Perimeter Protection Mechanism for 5G Network
- ZHANG Ying, ZHANG Xu, WANG Dongbin, CAI Changjun, LU Yueming
- 2025 10(5):34-50[Abstract](51)[PDF](27)
- Correlation Technology between Cyber Pollution Behaviors and Subjects under Encrypted Traffic
- CUI Tianyu, HOU Chengshang, LIU Chang, SHI Junzheng, GOU Gaopeng, XIONG Gang
- 2025 10(5):51-63[Abstract](60)[PDF](32)
- Adversarial Patch Steganography Enhancement through Localized Style Fusion
- XIE Xilong, GUO Tong, XIAO Limin, HAN Meng, XU Xiangrong, DONG Jin, WANG Liang
- 2025 10(5):64-76[Abstract](54)[PDF](28)
- Natural Physical Adversarial Attack Method for UAV Visual Recognition System
- ZHANG Heng, HUANG Nongsen, DING Jiasong, HANG Qin
- 2025 10(5):77-91[Abstract](44)[PDF](29)
- A Forensic Restoration Image Model Based on GAN Network for Image Caption Guidance
- WANG Jinwei, ZHANG Zihe, LUO Xiangyang, MA Bin
- 2025 10(5):92-106[Abstract](62)[PDF](32)
- An Anomaly Detection Method Based on Dual Auto -Encoder with Residual Attention Mechanism
- WU Xiaojie, LIU Qiang
- 2025 10(5):107-117[Abstract](39)[PDF](23)
- Single-Step Adversarial Training with Learnable Initialization Based on Subspace
- HU Jun, ZHAN Chengxi
- 2025 10(5):118-128[Abstract](48)[PDF](24)
See more articles>>
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(5):1-9 [Abstract](22682) [[PDF](394.10 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(5):37-51 [Abstract](18363) [[PDF](1.64 M)
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(5):1-10 [Abstract](23290) [[PDF](479.57 K)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(5):87-104 [Abstract](20128) [[PDF](1.06 M)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(5):21-36 [Abstract](20097) [[PDF](1.16 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(5):1-15 [Abstract](18928) [[PDF](935.57 K)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(5):10-20 [Abstract](19345) [[PDF](7.66 M)
|