| Volume 10,Issue 3,2025 Table of Contents
Contents | | | Identify the Mapping of Java Method and Native Function for Android Applications Based on Simulated Execution | | XU Guanhong, FU Jianming, NIE Yu, XIE Mengfei | | Published May 18, 2025 | | 2025,10(3):1-17 [Abstract] [View PDF(1019.81 K)] | | | | Research on Federated Density-Based Clustering Based on Secure Multi-Party Computation | | SHEN Xuhong, YU Haining, WANG Xiaoyu | | Published May 18, 2025 | | 2025,10(3):18-34 [Abstract] [View PDF(749.61 K)] | | | | Threat Intelligence Mining Based on Target Recognition and Topic-Guided Dialogue in Underground Markets | | LUO Shuangchun, HUANG Cheng, SUN Enbo | | Published May 18, 2025 | | 2025,10(3):35-47 [Abstract] [View PDF(845.53 K)] | | | | Trusted Decentralized Storage Network Based on Identity Authorization | | ZHANG Jingyu, LIU Qi, PENG Hongrui, YANG Zenghui, YUAN Kaiguo, LI Xiaoyong | | Published May 18, 2025 | | 2025,10(3):48-60 [Abstract] [View PDF(719.86 K)] | | | | Research on IPv6 Topology Inference Methods with Network Tomography | | JIN Rui, LI Haotian, WEI Songjie | | Published May 18, 2025 | | 2025,10(3):61-73 [Abstract] [View PDF(3.03 M)] | | | | A Review of Cyberspace Mimic Defense Research | | LI Bingxuan, CHEN Shizhan, XU Guangquan, JIA Yungang, WANG Cong, XUE Fei, WANG Xiao, WANG Wei, LI Zhetao, LI Jianxin | | Published May 18, 2025 | | 2025,10(3):74-97 [Abstract] [View PDF(791.29 K)] | | | | A Survey: Malware Detection Based on Deep Learning | | YAN Pei, TAN Shunquan, HUANG Jiwu | | Published May 18, 2025 | | 2025,10(3):98-119 [Abstract] [View PDF(5.25 M)] | | | | A Survey of Privacy Security for Graph Neural Networks | | CHEN Jinyin, MA Minying, MA Haonan, ZHENG Haibin | | Published May 18, 2025 | | 2025,10(3):120-151 [Abstract] [View PDF(6.66 M)] | | | | Blockchain-based Crowdsourcing Mechanism | | ZHANG Zhujun, ZHU Dali, FAN Wei, MI Baoxin, PENG Cheng | | Published May 18, 2025 | | 2025,10(3):152-168 [Abstract] [View PDF(3.73 M)] | | | | Dynamic QR Code Watermarking Algorithm for Anti-Theft Mobile Payment | | LI Hongbang, CHEN Jiale, DONG Li, WANG Rangding, SUN Weiwei, ZHANG Yushu | | Published May 18, 2025 | | 2025,10(3):169-183 [Abstract] [View PDF(6.74 M)] | | | | A Fast Automatic Identification Method of Massive Shortwave Radio Stations Based on Sparse Component Analysis | | HUANG Weiqing, WANG Yuankun, ZHANG Qiaoyu, LI Jing, WEI Dong | | Published May 18, 2025 | | 2025,10(3):184-196 [Abstract] [View PDF(1.55 M)] | | | | Cloud Data Integrity Audit Scheme That Supports Auditor Replacement and Data Dynamics | | YANG Fan, YUAN Yilin, ZHANG Dengfan, LI Zichen | | Published May 18, 2025 | | 2025,10(3):197-208 [Abstract] [View PDF(2.93 M)] | | | | Lateral Movement Detection Using Heterogeneous Graph Network | | WANG Tian, DONG Cong, LIU Song, TIAN Tian, LU Zhigang, JIANG Bo | | Published May 18, 2025 | | 2025,10(3):209-219 [Abstract] [View PDF(836.57 K)] | | |
|