Volume 10,Issue 2,2025 Table of Contents

   
Other Issues:  
  

Contents

Research on Firmware Vulnerability Discovery Technology Based on Reaching Definition Analysis
  MEI Runyuan, WANG Yanhao, LI Zichuan, PENG Guojun
  Published March 18, 2025
  2025,10(2):1-16 [Abstract]  [View PDF(3.66 M)]
  
Black-box Testing Method for Web Authentication Bypass Vulnerability Based on Response Similarity Determination
  SONG Hong, MA Junlong, WANG Weiping, ZHU Yilang, WANG Jianxing
  Published March 18, 2025
  2025,10(2):17-29 [Abstract]  [View PDF(1.43 M)]
  
Research on Dynamic Trust Evaluation Method Based on Federated Learning
  SHI Ruisheng, FU Tong, LIN Ziding, LAN Lina, JIANG Ning
  Published March 18, 2025
  2025,10(2):30-47 [Abstract]  [View PDF(1.03 M)]
  
Binary Comparison Techniques: Applications, Approaches, and Challenges
  HU Mengying, WANG Xiaoke, ZHAO Lei
  Published March 18, 2025
  2025,10(2):48-66 [Abstract]  [View PDF(741.50 K)]
  
Similarity Analysis of National Network and Operator’s Network
  ZHU Jinyu, ZHANG Yu, WANG Yunan, Z HANG Hongli, FANG Binxing
  Published March 18, 2025
  2025,10(2):67-83 [Abstract]  [View PDF(2.51 M)]
  
A Deep Learning Visualization Classification Method for Malicious Code Based on Enhanced Gray Level Co-occurrence Matrix
  WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin
  Published March 18, 2025
  2025,10(2):84-102 [Abstract]  [View PDF(1.86 M)]
  
A Rapid Identification Method for Risk Areas Affected by BGP Anomalies
  LIU Zimian, QIU Han, WANG Rui, ZHU Junhu, WANG Qingxian
  Published March 18, 2025
  2025,10(2):103-115 [Abstract]  [View PDF(1.86 M)]
  
Research on Multi-order GMM-ResNet Fusion for Speech Deepfake Detection
  CAO Mingming, LEI Zhenchun, YANG Yingen, ZHOU Yong
  Published March 18, 2025
  2025,10(2):116-126 [Abstract]  [View PDF(561.24 K)]
  
Research on Introducing Global Semantic Enhancement for Face Fraud Feature Extraction
  CAI Tijian, CHEN Jun, LUO Ciyong, LIU Zunxiong, CHEN Zihan
  Published March 18, 2025
  2025,10(2):127-138 [Abstract]  [View PDF(3.06 M)]
  
A Cyber Kill Chain Based Analysis of PLC Security
  SUN Yue, YOU Jianzhou, SONG Zhanwei, HUANG Wenjun, CHEN Xi, SUN Limin
  Published March 18, 2025
  2025,10(2):139-162 [Abstract]  [View PDF(9.56 M)]
  
DNTrans: Illicit Domain Name Transformation Generation Method Based on Transformer
  WANG Bo, SHI Fan
  Published March 18, 2025
  2025,10(2):163-179 [Abstract]  [View PDF(8.17 M)]
  
A Study on Cyber Deception-Based Moving Target Defense
  ZHANG Yaqin, MA Duohe, SUN Xiaoyan, ZHOU Chuan, LIU Feng
  Published March 18, 2025
  2025,10(2):180-195 [Abstract]  [View PDF(2.16 M)]
  
Research on Cloud Virtual Network Security
  TU Bibo, SUN Ruina, YOU Ruibang, CHENG Jie, TAO Xiaojie, ZHANG Kun
  Published March 18, 2025
  2025,10(2):196-218 [Abstract]  [View PDF(1.18 M)]
  
Survey of Privacy Attack and Defense in Federated Learning
  WANG Kainan, ZHANG Yuhui, HOU Rui
  Published March 18, 2025
  2025,10(2):219-230 [Abstract]  [View PDF(498.91 K)]