| |
| Covert Channel of Branch Predictor on Arm Processor |
| YANG Yi, WU Pingfei, QIU Pengfei, WANG Chunlu, ZHAO Lutan, ZHANG Fengwei, WANG Bo, LYU Yongqiang, WANG Haixia, WANG Dongsheng |
| Published January 18, 2025 |
| 2025,10(1):1-16 [Abstract] [View PDF(1.97 M)] |
| |
| A Survey on Copyright Protection Technology of Deep Learning Model |
| LI Peixuan, HUANG Tu, LUO Shuqing, SONG Jiaxin, LIU Gongshen |
| Published January 18, 2025 |
| 2025,10(1):17-35 [Abstract] [View PDF(1.13 M)] |
| |
| Identity-based Sealed Bid Auction Protocol on Consortium Blockchain |
| XU Zheqing, WANG Yuhang, WANG Zhiwei, LIU Feng |
| Published January 18, 2025 |
| 2025,10(1):36-46 [Abstract] [View PDF(698.59 K)] |
| |
| LFDP: A Differentially Private Robustness Augmentation Method Combining Low-Frequency Information |
| WANG Hao, XU Qiang, ZHANG Qinghua, LI Kaiju |
| Published January 18, 2025 |
| 2025,10(1):47-60 [Abstract] [View PDF(2.35 M)] |
| |
| High-Capacity Data Hiding in Encryption Domain Based on Layer-by-Layer Residual Prediction for Secret Sharing |
| WEN Wenying, YANG Yuheng, ZHANG Yushu, FANG Yuming, QIU Baolin |
| Published January 18, 2025 |
| 2025,10(1):61-74 [Abstract] [View PDF(8.37 M)] |
| |
| A Review on Physical Adversarial Patch Attacks and Defenses Techniques |
| DENG Huan, HUANG Minhuan, LI Hu, WANG Tong, KUANG Xiaohui |
| Published January 18, 2025 |
| 2025,10(1):75-90 [Abstract] [View PDF(4.28 M)] |
| |
| Large-scale Linear Equations Outsourcing Computing Scheme Based on Blockchain |
| DING Yan, WANG Na, DU Xuehui |
| Published January 18, 2025 |
| 2025,10(1):91-104 [Abstract] [View PDF(2.52 M)] |
| |
| Slice-GCN: Smart Contract Vulnerability Detection Based on Program Slicing and Graph Neural Networks |
| ZHANG Renlou, WU Sheng, ZHANG Hao, LIU Fangyu |
| Published January 18, 2025 |
| 2025,10(1):105-118 [Abstract] [View PDF(1004.58 K)] |
| |
| The 3D Model Recognition Attack Algorithm based on Generative Adversarial Networks |
| LIU Jia, JIN Zhigang, JIN Shibo |
| Published January 18, 2025 |
| 2025,10(1):119-129 [Abstract] [View PDF(2.68 M)] |
| |
| Phishing URL Detection Method Based on Component Segmentation |
| ZHONG Wenkang, WANG Tian, ZHANG Gongxuan |
| Published January 18, 2025 |
| 2025,10(1):130-142 [Abstract] [View PDF(1.07 M)] |
| |
| Identification and Analysis of Cryptography Algorithms based on Machine Learning |
| XIA Ruiqi, LI Manman, CHEN Shaozhen |
| Published January 18, 2025 |
| 2025,10(1):143-159 [Abstract] [View PDF(1.44 M)] |
| |
| A Survey of VMM Security Reinforcement on Virtualization Platform |
| ZHOU Qihang, JIA Xiaoqi, ZHANG Weijuan, JIANG Nan |
| Published January 18, 2025 |
| 2025,10(1):160-175 [Abstract] [View PDF(688.09 K)] |
| |
| A Survey of Insider Threat Analysis and Defense Solutions |
| SUN Degang, LIU Meichen, LI Meimei, WANG Xu, SHI Zhixin, LIU Pengcheng, LI Nan |
| Published January 18, 2025 |
| 2025,10(1):176-193 [Abstract] [View PDF(1.27 M)] |
| |
| Cybersecurity Named Entity Recognition using the Pre-trained Model |
| HAN Yaopeng, WANG Lu, JIANG Bo, LU Zhigang, JIANG Zhengwei, LIU Yuling |
| Published January 18, 2025 |
| 2025,10(1):194-204 [Abstract] [View PDF(754.07 K)] |
| |