| Volume 10,Issue 2,2025 Table of Contents
Contents | | | Research on Firmware Vulnerability Discovery Technology Based on Reaching Definition Analysis | | MEI Runyuan, WANG Yanhao, LI Zichuan, PENG Guojun | | Published March 18, 2025 | | 2025,10(2):1-16 [Abstract] [View PDF(3.66 M)] | | | | Black-box Testing Method for Web Authentication Bypass Vulnerability Based on Response Similarity Determination | | SONG Hong, MA Junlong, WANG Weiping, ZHU Yilang, WANG Jianxing | | Published March 18, 2025 | | 2025,10(2):17-29 [Abstract] [View PDF(1.43 M)] | | | | Research on Dynamic Trust Evaluation Method Based on Federated Learning | | SHI Ruisheng, FU Tong, LIN Ziding, LAN Lina, JIANG Ning | | Published March 18, 2025 | | 2025,10(2):30-47 [Abstract] [View PDF(1.03 M)] | | | | Binary Comparison Techniques: Applications, Approaches, and Challenges | | HU Mengying, WANG Xiaoke, ZHAO Lei | | Published March 18, 2025 | | 2025,10(2):48-66 [Abstract] [View PDF(741.50 K)] | | | | Similarity Analysis of National Network and Operator’s Network | | ZHU Jinyu, ZHANG Yu, WANG Yunan, Z HANG Hongli, FANG Binxing | | Published March 18, 2025 | | 2025,10(2):67-83 [Abstract] [View PDF(2.51 M)] | | | | A Deep Learning Visualization Classification Method for Malicious Code Based on Enhanced Gray Level Co-occurrence Matrix | | WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin | | Published March 18, 2025 | | 2025,10(2):84-102 [Abstract] [View PDF(1.86 M)] | | | | A Rapid Identification Method for Risk Areas Affected by BGP Anomalies | | LIU Zimian, QIU Han, WANG Rui, ZHU Junhu, WANG Qingxian | | Published March 18, 2025 | | 2025,10(2):103-115 [Abstract] [View PDF(1.86 M)] | | | | Research on Multi-order GMM-ResNet Fusion for Speech Deepfake Detection | | CAO Mingming, LEI Zhenchun, YANG Yingen, ZHOU Yong | | Published March 18, 2025 | | 2025,10(2):116-126 [Abstract] [View PDF(561.24 K)] | | | | Research on Introducing Global Semantic Enhancement for Face Fraud Feature Extraction | | CAI Tijian, CHEN Jun, LUO Ciyong, LIU Zunxiong, CHEN Zihan | | Published March 18, 2025 | | 2025,10(2):127-138 [Abstract] [View PDF(3.06 M)] | | | | A Cyber Kill Chain Based Analysis of PLC Security | | SUN Yue, YOU Jianzhou, SONG Zhanwei, HUANG Wenjun, CHEN Xi, SUN Limin | | Published March 18, 2025 | | 2025,10(2):139-162 [Abstract] [View PDF(9.56 M)] | | | | DNTrans: Illicit Domain Name Transformation Generation Method Based on Transformer | | WANG Bo, SHI Fan | | Published March 18, 2025 | | 2025,10(2):163-179 [Abstract] [View PDF(8.17 M)] | | | | A Study on Cyber Deception-Based Moving Target Defense | | ZHANG Yaqin, MA Duohe, SUN Xiaoyan, ZHOU Chuan, LIU Feng | | Published March 18, 2025 | | 2025,10(2):180-195 [Abstract] [View PDF(2.16 M)] | | | | Research on Cloud Virtual Network Security | | TU Bibo, SUN Ruina, YOU Ruibang, CHENG Jie, TAO Xiaojie, ZHANG Kun | | Published March 18, 2025 | | 2025,10(2):196-218 [Abstract] [View PDF(1.18 M)] | | | | Survey of Privacy Attack and Defense in Federated Learning | | WANG Kainan, ZHANG Yuhui, HOU Rui | | Published March 18, 2025 | | 2025,10(2):219-230 [Abstract] [View PDF(498.91 K)] | | |
|