Volume 10,Issue 1,2025 Table of Contents

   
Other Issues:  
  

Contents

Covert Channel of Branch Predictor on Arm Processor
  YANG Yi, WU Pingfei, QIU Pengfei, WANG Chunlu, ZHAO Lutan, ZHANG Fengwei, WANG Bo, LYU Yongqiang, WANG Haixia, WANG Dongsheng
  Published January 18, 2025
  2025,10(1):1-16 [Abstract]  [View PDF(1.97 M)]
  
A Survey on Copyright Protection Technology of Deep Learning Model
  LI Peixuan, HUANG Tu, LUO Shuqing, SONG Jiaxin, LIU Gongshen
  Published January 18, 2025
  2025,10(1):17-35 [Abstract]  [View PDF(1.13 M)]
  
Identity-based Sealed Bid Auction Protocol on Consortium Blockchain
  XU Zheqing, WANG Yuhang, WANG Zhiwei, LIU Feng
  Published January 18, 2025
  2025,10(1):36-46 [Abstract]  [View PDF(698.59 K)]
  
LFDP: A Differentially Private Robustness Augmentation Method Combining Low-Frequency Information
  WANG Hao, XU Qiang, ZHANG Qinghua, LI Kaiju
  Published January 18, 2025
  2025,10(1):47-60 [Abstract]  [View PDF(2.35 M)]
  
High-Capacity Data Hiding in Encryption Domain Based on Layer-by-Layer Residual Prediction for Secret Sharing
  WEN Wenying, YANG Yuheng, ZHANG Yushu, FANG Yuming, QIU Baolin
  Published January 18, 2025
  2025,10(1):61-74 [Abstract]  [View PDF(8.37 M)]
  
A Review on Physical Adversarial Patch Attacks and Defenses Techniques
  DENG Huan, HUANG Minhuan, LI Hu, WANG Tong, KUANG Xiaohui
  Published January 18, 2025
  2025,10(1):75-90 [Abstract]  [View PDF(4.28 M)]
  
Large-scale Linear Equations Outsourcing Computing Scheme Based on Blockchain
  DING Yan, WANG Na, DU Xuehui
  Published January 18, 2025
  2025,10(1):91-104 [Abstract]  [View PDF(2.52 M)]
  
Slice-GCN: Smart Contract Vulnerability Detection Based on Program Slicing and Graph Neural Networks
  ZHANG Renlou, WU Sheng, ZHANG Hao, LIU Fangyu
  Published January 18, 2025
  2025,10(1):105-118 [Abstract]  [View PDF(1004.58 K)]
  
The 3D Model Recognition Attack Algorithm based on Generative Adversarial Networks
  LIU Jia, JIN Zhigang, JIN Shibo
  Published January 18, 2025
  2025,10(1):119-129 [Abstract]  [View PDF(2.68 M)]
  
Phishing URL Detection Method Based on Component Segmentation
  ZHONG Wenkang, WANG Tian, ZHANG Gongxuan
  Published January 18, 2025
  2025,10(1):130-142 [Abstract]  [View PDF(1.07 M)]
  
Identification and Analysis of Cryptography Algorithms based on Machine Learning
  XIA Ruiqi, LI Manman, CHEN Shaozhen
  Published January 18, 2025
  2025,10(1):143-159 [Abstract]  [View PDF(1.44 M)]
  
A Survey of VMM Security Reinforcement on Virtualization Platform
  ZHOU Qihang, JIA Xiaoqi, ZHANG Weijuan, JIANG Nan
  Published January 18, 2025
  2025,10(1):160-175 [Abstract]  [View PDF(688.09 K)]
  
A Survey of Insider Threat Analysis and Defense Solutions
  SUN Degang, LIU Meichen, LI Meimei, WANG Xu, SHI Zhixin, LIU Pengcheng, LI Nan
  Published January 18, 2025
  2025,10(1):176-193 [Abstract]  [View PDF(1.27 M)]
  
Cybersecurity Named Entity Recognition using the Pre-trained Model
  HAN Yaopeng, WANG Lu, JIANG Bo, LU Zhigang, JIANG Zhengwei, LIU Yuling
  Published January 18, 2025
  2025,10(1):194-204 [Abstract]  [View PDF(754.07 K)]