Volume 10,Issue 4,2025 Table of Contents

   
Other Issues:  
  

Contents

Research on High-Speed Generation Method of Physical Layer Key Based on Dual Carrier
  JIANG Yu, WANG Yuchun, HU Aiqun
  Published July 18, 2025
  2025,10(4):1-19 [Abstract]  [View PDF(1.63 M)]
  
A Review of Research on Smart Home Rule Interaction Vulnerability Detection
  WANG Jingyao, CHEN Zemao, WANG Tingting
  Published July 18, 2025
  2025,10(4):20-39 [Abstract]  [View PDF(941.96 K)]
  
SDLDP: A Local Differential Private Framework for Multi-level Sensitive Data
  CHEN Yaqing, YE Yutong, ZHANG Min, SHU Bowen
  Published July 18, 2025
  2025,10(4):40-53 [Abstract]  [View PDF(1.05 M)]
  
A Method for Calculating Behavioral Risk in Network Systems Based on Lie Group
  XIAO Yuming, ZHAO Xiaolin, LIU Zhenyan, SONG Ce, CHANG Yue
  Published July 18, 2025
  2025,10(4):54-65 [Abstract]  [View PDF(1.30 M)]
  
Network Intrusion Detection with Deep Neural Network for Supervised Learning of Discrete Hash
  XUE Yin, WEI Songjie
  Published July 18, 2025
  2025,10(4):66-76 [Abstract]  [View PDF(2.18 M)]
  
Extended Mirror Theory and Its Applications in Message Authentication Codes
  ZHANG Ping, QIN Jiaqi
  Published July 18, 2025
  2025,10(4):77-90 [Abstract]  [View PDF(644.62 K)]
  
Robust Image Perturbation Based on Multi-Forgery Model Adversarial Optimization
  MU Wenpeng, WANG Jinwei, CHEN Beijin, NIE Lina, MO Haolan, XU Fei
  Published July 18, 2025
  2025,10(4):91-103 [Abstract]  [View PDF(6.35 M)]
  
Research on Verification Method of Processor Prediction Vulnerabilities Based on Model Checking
  YE Qingyu, KE Qian, WANG Haixia, QIU Pengfei, LIU Chang, WANG Dongsheng
  Published July 18, 2025
  2025,10(4):104-119 [Abstract]  [View PDF(872.94 K)]
  
Human-Cyber-Physical Collaborative Countermeasure Models for Critical Infrastructure Security
  ZHU Peidong, KANG Wenjie, LIU Liang, ZHANG Rui, XUN Peng
  Published July 18, 2025
  2025,10(4):120-137 [Abstract]  [View PDF(5.73 M)]
  
An Overview of the Current Research on Embedded Device Firmware Security Analysis
  MA Xiaocheng, WANG Yunchao, YU Hongyang, WEI Qiang
  Published July 18, 2025
  2025,10(4):138-158 [Abstract]  [View PDF(3.46 M)]
  
A Traffic Anomaly Detection Method Based on NNOA and EWOA
  CHEN Hong, LU Jianbo, JIN Haibo, WU Cong, CHENG Mingjia
  Published July 18, 2025
  2025,10(4):159-175 [Abstract]  [View PDF(1.66 M)]
  
APT Attack Activity Prediction Method for Iot Systems
  CHENG Xiang, KUANG Miaomiao, ZHANG Jiale, CHEN Weitong, LI Yun, YANG Hongyu
  Published July 18, 2025
  2025,10(4):176-189 [Abstract]  [View PDF(2.00 M)]
  
A Survey on Adversarial Attacks and Defenses in Text Domain
  LIANG Yuhang, LIN Zheng, WANG Lei, HE Yuanye, WANG Weiping
  Published July 18, 2025
  2025,10(4):190-208 [Abstract]  [View PDF(662.78 K)]
  
TouchAuth: An Implicit Continuous User Identity Authentication Mechanism based on Touch Screen Behavior
  MA Luping, ZHU Dali, ZHANG Shunliang, MA Yuchen, Feng Weimiao, PENG Shumin, ZHANG Zhujun
  Published July 18, 2025
  2025,10(4):209-223 [Abstract]  [View PDF(2.71 M)]
  
Blind Recognition of Scrambled Convolutional Code Based on Calculating Shift Equivalent Codeword Entropy Rate
  WANG Zhongfang, HUANG Weiqing, ZHAI Liuqun, HU Keke, WEI Dong
  Published July 18, 2025
  2025,10(4):224-238 [Abstract]  [View PDF(810.72 K)]