| |
| Design of Message Authentication Protocol for Vehicle Heterogeneous Network Nodes |
| | XU Guosheng, LI Yijing, WANG Zihan, WANG Chenyu |
| | Published January 18, 2026 |
| | 2026,11(1):1-8 [Abstract] [View PDF(571.02 K)] |
| | |
| Single-Parameter Backdoor Attack Based on Model Manipulation |
| | DUAN Qiuyu, HOU Linshan, HUA Zhongyun, LIAO Qing, ZHANG Yushu, ZHANG Yu |
| | Published January 18, 2026 |
| | 2026,11(1):9-21 [Abstract] [View PDF(2.60 M)] |
| | |
| Trusted Compilation of Smart Contract Intermediate Language Based on the CompCert Memory Model |
| | XU Ying, ZHANG Yafeng, XU Jinghang, KANG Yuexin, XIA Qing, YUAN Feng, ZUO Chun, LI Yucheng |
| | Published January 18, 2026 |
| | 2026,11(1):22-36 [Abstract] [View PDF(4.16 M)] |
| | |
| WebShell Detection Method Based on Dynamic Word Embeddings and Graph Convolution |
| | ZHAI Jiangtao, WANG Tao, ZHOU Qiao, DONG Yi, WANG Zihao |
| | Published January 18, 2026 |
| | 2026,11(1):37-47 [Abstract] [View PDF(2.26 M)] |
| | |
| C2BR-VDS: A Black Box Real-time Verification Scheme for Streaming Data for on Chain and off Chain Hybrid Storage |
| | LIN Wei, SUN Yi, YANG Jiashuo, LI Yujie |
| | Published January 18, 2026 |
| | 2026,11(1):48-61 [Abstract] [View PDF(988.12 K)] |
| | |
| Fail-Stop Attribute-Based Group Signature Scheme with CCA Anonymity in Standard Model |
| | LIAO Dongxu, CHENG Xiaogang |
| | Published January 18, 2026 |
| | 2026,11(1):62-78 [Abstract] [View PDF(612.35 K)] |
| | |
| State-of-the-Art Survey of Network Intrusion Detection Technology based on Deep Learning |
| | SU Shubin, XIAO Limin, LI Shupan, HUANG Xingwang, XIE Shutong, WU Bo |
| | Published January 18, 2026 |
| | 2026,11(1):79-101 [Abstract] [View PDF(1.08 M)] |
| | |
| Research on Mechanism of Human-Machine Collaborative Vulnerability Mining |
| | LIN Zhechao, LU Shuaibing, NIE Yuanping, ZHANG Jia, DUAN Haixin, LI Xiang, KUANG Xiaohui |
| | Published January 18, 2026 |
| | 2026,11(1):102-114 [Abstract] [View PDF(2.52 M)] |
| | |
| Negative Database Generation Algorithm based on DES Algorithm and Integer Factorization |
| | ZHAO Dongdong, LIU Zhihui, LIAO Lei, XIANG Jianwen, JIANG Hao |
| | Published January 18, 2026 |
| | 2026,11(1):115-135 [Abstract] [View PDF(1.36 M)] |
| | |
| Network Protocol Fuzzing Based on Sequence-to-Sequence Model |
| | CHEN Qian, HONG Zheng, GU Jinbang, ZHANG Guomin, QIN Sujuan |
| | Published January 18, 2026 |
| | 2026,11(1):136-154 [Abstract] [View PDF(3.14 M)] |
| | |
| IoT-EDF: Unikernel-based Task Scheduling Method for the Internet of Things |
| | DONG Bonan, YANG Qiusong, LI Mingshu |
| | Published January 18, 2026 |
| | 2026,11(1):155-170 [Abstract] [View PDF(888.56 K)] |
| | |
| A Survey on Large Language Model's Security Risks and Defense Methods |
| | JIA Chengyu, CHEN Jinyin, XU Gan, ZHANG Ao, ZHANG He, JIN Haibo, CHEN Ruoxi, ZHENG Haibin |
| | Published January 18, 2026 |
| | 2026,11(1):171-214 [Abstract] [View PDF(3.09 M)] |
| | |
| Multi-Domain Fake News Detection Fusing Knowledge Information |
| | WANG Xi, HAN Jizhong |
| | Published January 18, 2026 |
| | 2026,11(1):215-226 [Abstract] [View PDF(4.75 M)] |
| | |
| Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure |
| | LIU Gang, WANG Peng, WEI Rong, YE Dingfeng |
| | Published January 18, 2026 |
| | 2026,11(1):227-242 [Abstract] [View PDF(867.76 K)] |
| | |
| HiveAttacker: A Two-stage Security Detecting Approach for Apache Hive |
| | LI Wenchao, LI Feng, BO Defang, ZHOU Jianhua, HUO Wei |
| | Published January 18, 2026 |
| | 2026,11(1):243-256 [Abstract] [View PDF(775.47 K)] |
| | |
| Hardware Trojan Detection Through Structural and Behavioral Feature Analysis of FPGA Netlist |
| | LI Yiwei, SU Hao, LU Yiqing, WU Lingjuan, HU Wei |
| | Published January 18, 2026 |
| | 2026,11(1):257-268 [Abstract] [View PDF(1.10 M)] |
| | |
| Network Intrusion Detection Model based on Meta-Learning and Feature Enhancement |
| | JIANG Zhangtao, LI Xin, XUE Di, PENG Yijie |
| | Published January 18, 2026 |
| | 2026,11(1):269-279 [Abstract] [View PDF(754.89 K)] |
| | |
| A Survey of Static Analysis Techniques of Binary Code |
| | CHENG Kai, SONG Zhanwei, LIU Mingdong, YU Nan, ZHU Hongsong, SUN Limin |
| | Published January 18, 2026 |
| | 2026,11(1):280-297 [Abstract] [View PDF(566.64 K)] |
| | |
| Survey on the Integration of Safety and Security in Industrial Control Systems |
| | LIU Puzhuo, MA Yetong, LV Shichao, FANG Dongliang, ZHU Hongsong, SUN Limin |
| | Published January 18, 2026 |
| | 2026,11(1):298-314 [Abstract] [View PDF(617.72 K)] |
| | |
| A Novel Hardware Trojan Detection Method based on the Controllability Flow Analysis of the Netlist |
| | ZHANG Ning, LV Zhiqiang, ZHANG Yanlin, HUANG Weiqing |
| | Published January 18, 2026 |
| | 2026,11(1):315-331 [Abstract] [View PDF(3.04 M)] |
| | |