Volume 11,Issue 1,2026 Table of Contents

   
Other Issues:  
  

Contents

Design of Message Authentication Protocol for Vehicle Heterogeneous Network Nodes
  XU Guosheng, LI Yijing, WANG Zihan, WANG Chenyu
  Published January 18, 2026
  2026,11(1):1-8 [Abstract]  [View PDF(571.02 K)]
  
Single-Parameter Backdoor Attack Based on Model Manipulation
  DUAN Qiuyu, HOU Linshan, HUA Zhongyun, LIAO Qing, ZHANG Yushu, ZHANG Yu
  Published January 18, 2026
  2026,11(1):9-21 [Abstract]  [View PDF(2.60 M)]
  
Trusted Compilation of Smart Contract Intermediate Language Based on the CompCert Memory Model
  XU Ying, ZHANG Yafeng, XU Jinghang, KANG Yuexin, XIA Qing, YUAN Feng, ZUO Chun, LI Yucheng
  Published January 18, 2026
  2026,11(1):22-36 [Abstract]  [View PDF(4.16 M)]
  
WebShell Detection Method Based on Dynamic Word Embeddings and Graph Convolution
  ZHAI Jiangtao, WANG Tao, ZHOU Qiao, DONG Yi, WANG Zihao
  Published January 18, 2026
  2026,11(1):37-47 [Abstract]  [View PDF(2.26 M)]
  
C2BR-VDS: A Black Box Real-time Verification Scheme for Streaming Data for on Chain and off Chain Hybrid Storage
  LIN Wei, SUN Yi, YANG Jiashuo, LI Yujie
  Published January 18, 2026
  2026,11(1):48-61 [Abstract]  [View PDF(988.12 K)]
  
Fail-Stop Attribute-Based Group Signature Scheme with CCA Anonymity in Standard Model
  LIAO Dongxu, CHENG Xiaogang
  Published January 18, 2026
  2026,11(1):62-78 [Abstract]  [View PDF(612.35 K)]
  
State-of-the-Art Survey of Network Intrusion Detection Technology based on Deep Learning
  SU Shubin, XIAO Limin, LI Shupan, HUANG Xingwang, XIE Shutong, WU Bo
  Published January 18, 2026
  2026,11(1):79-101 [Abstract]  [View PDF(1.08 M)]
  
Research on Mechanism of Human-Machine Collaborative Vulnerability Mining
  LIN Zhechao, LU Shuaibing, NIE Yuanping, ZHANG Jia, DUAN Haixin, LI Xiang, KUANG Xiaohui
  Published January 18, 2026
  2026,11(1):102-114 [Abstract]  [View PDF(2.52 M)]
  
Negative Database Generation Algorithm based on DES Algorithm and Integer Factorization
  ZHAO Dongdong, LIU Zhihui, LIAO Lei, XIANG Jianwen, JIANG Hao
  Published January 18, 2026
  2026,11(1):115-135 [Abstract]  [View PDF(1.36 M)]
  
Network Protocol Fuzzing Based on Sequence-to-Sequence Model
  CHEN Qian, HONG Zheng, GU Jinbang, ZHANG Guomin, QIN Sujuan
  Published January 18, 2026
  2026,11(1):136-154 [Abstract]  [View PDF(3.14 M)]
  
IoT-EDF: Unikernel-based Task Scheduling Method for the Internet of Things
  DONG Bonan, YANG Qiusong, LI Mingshu
  Published January 18, 2026
  2026,11(1):155-170 [Abstract]  [View PDF(888.56 K)]
  
A Survey on Large Language Model's Security Risks and Defense Methods
  JIA Chengyu, CHEN Jinyin, XU Gan, ZHANG Ao, ZHANG He, JIN Haibo, CHEN Ruoxi, ZHENG Haibin
  Published January 18, 2026
  2026,11(1):171-214 [Abstract]  [View PDF(3.09 M)]
  
Multi-Domain Fake News Detection Fusing Knowledge Information
  WANG Xi, HAN Jizhong
  Published January 18, 2026
  2026,11(1):215-226 [Abstract]  [View PDF(4.75 M)]
  
Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure
  LIU Gang, WANG Peng, WEI Rong, YE Dingfeng
  Published January 18, 2026
  2026,11(1):227-242 [Abstract]  [View PDF(867.76 K)]
  
HiveAttacker: A Two-stage Security Detecting Approach for Apache Hive
  LI Wenchao, LI Feng, BO Defang, ZHOU Jianhua, HUO Wei
  Published January 18, 2026
  2026,11(1):243-256 [Abstract]  [View PDF(775.47 K)]
  
Hardware Trojan Detection Through Structural and Behavioral Feature Analysis of FPGA Netlist
  LI Yiwei, SU Hao, LU Yiqing, WU Lingjuan, HU Wei
  Published January 18, 2026
  2026,11(1):257-268 [Abstract]  [View PDF(1.10 M)]
  
Network Intrusion Detection Model based on Meta-Learning and Feature Enhancement
  JIANG Zhangtao, LI Xin, XUE Di, PENG Yijie
  Published January 18, 2026
  2026,11(1):269-279 [Abstract]  [View PDF(754.89 K)]
  
A Survey of Static Analysis Techniques of Binary Code
  CHENG Kai, SONG Zhanwei, LIU Mingdong, YU Nan, ZHU Hongsong, SUN Limin
  Published January 18, 2026
  2026,11(1):280-297 [Abstract]  [View PDF(566.64 K)]
  
Survey on the Integration of Safety and Security in Industrial Control Systems
  LIU Puzhuo, MA Yetong, LV Shichao, FANG Dongliang, ZHU Hongsong, SUN Limin
  Published January 18, 2026
  2026,11(1):298-314 [Abstract]  [View PDF(617.72 K)]
  
A Novel Hardware Trojan Detection Method based on the Controllability Flow Analysis of the Netlist
  ZHANG Ning, LV Zhiqiang, ZHANG Yanlin, HUANG Weiqing
  Published January 18, 2026
  2026,11(1):315-331 [Abstract]  [View PDF(3.04 M)]