- Covert Channel of Branch Predictor on Arm Processor
- YANG Yi, WU Pingfei, QIU Pengfei, WANG Chunlu, ZHAO Lutan, ZHANG Fengwei, WANG Bo, LYU Yongqiang, WANG Haixia, WANG Dongsheng
- 2025 10(1):1-16[Abstract](330)[PDF](168)
- A Survey on Copyright Protection Technology of Deep Learning Model
- LI Peixuan, HUANG Tu, LUO Shuqing, SONG Jiaxin, LIU Gongshen
- 2025 10(1):17-35[Abstract](406)[PDF](179)
- Identity-based Sealed Bid Auction Protocol on Consortium Blockchain
- XU Zheqing, WANG Yuhang, WANG Zhiwei, LIU Feng
- 2025 10(1):36-46[Abstract](262)[PDF](126)
- LFDP: A Differentially Private Robustness Augmentation Method Combining Low-Frequency Information
- WANG Hao, XU Qiang, ZHANG Qinghua, LI Kaiju
- 2025 10(1):47-60[Abstract](370)[PDF](153)
- High-Capacity Data Hiding in Encryption Domain Based on Layer-by-Layer Residual Prediction for Secret Sharing
- WEN Wenying, YANG Yuheng, ZHANG Yushu, FANG Yuming, QIU Baolin
- 2025 10(1):61-74[Abstract](242)[PDF](141)
- A Review on Physical Adversarial Patch Attacks and Defenses Techniques
- DENG Huan, HUANG Minhuan, LI Hu, WANG Tong, KUANG Xiaohui
- 2025 10(1):75-90[Abstract](422)[PDF](174)
- Large-scale Linear Equations Outsourcing Computing Scheme Based on Blockchain
- DING Yan, WANG Na, DU Xuehui
- 2025 10(1):91-104[Abstract](242)[PDF](161)
- Slice-GCN: Smart Contract Vulnerability Detection Based on Program Slicing and Graph Neural Networks
- ZHANG Renlou, WU Sheng, ZHANG Hao, LIU Fangyu
- 2025 10(1):105-118[Abstract](249)[PDF](100)
- The 3D Model Recognition Attack Algorithm based on Generative Adversarial Networks
- LIU Jia, JIN Zhigang, JIN Shibo
- 2025 10(1):119-129[Abstract](210)[PDF](108)
See more articles>>
- Research on Cyber Mimic Defense
- WU Jiangxing
- 2025 Vol.10(1):1-10 [Abstract](19534) [[PDF](479.57 K)
- Research on Digital Forensics of Smart Devices
- JIN Bo, WU Songyang, XIONG Xiong and ZHANG Yong
- 2025 Vol.10(1):37-51 [Abstract](14586) [[PDF](1.64 M)
- Cyber Security in Blockchain: Threats and Countermeasures
- FANG Weidong, ZHANG Wuxiong, PAN Tao, CHEN Wei and YANG Yang
- 2025 Vol.10(1):87-104 [Abstract](15045) [[PDF](1.06 M)
- Cyber Ranges: state-of-the-art and research challenges
- FANG Binxing, JIA Yan, LI Aiping and ZHANG Weizhe
- 2025 Vol.10(1):1-9 [Abstract](18440) [[PDF](394.10 K)
- Survey of Insider Threat Detection
- YANG Guang, MA Jiangang, YU Aimin and MENG Dan
- 2025 Vol.10(1):21-36 [Abstract](16170) [[PDF](1.16 M)
- Network Security Visualization: A Survey
- YUAN Bin, ZOU Deqing and JIN Hai
- 2025 Vol.10(1):10-20 [Abstract](15375) [[PDF](7.66 M)
- Several Methods of Exploiting Glibc Heap
- PEI Zhongyu, ZHANG Chao and DUAN Haixin
- 2025 Vol.10(1):1-15 [Abstract](14481) [[PDF](935.57 K)
|