| Volume 10,Issue 4,2025 Table of Contents
Contents | | | Research on High-Speed Generation Method of Physical Layer Key Based on Dual Carrier | | JIANG Yu, WANG Yuchun, HU Aiqun | | Published July 18, 2025 | | 2025,10(4):1-19 [Abstract] [View PDF(1.63 M)] | | | | A Review of Research on Smart Home Rule Interaction Vulnerability Detection | | WANG Jingyao, CHEN Zemao, WANG Tingting | | Published July 18, 2025 | | 2025,10(4):20-39 [Abstract] [View PDF(941.96 K)] | | | | SDLDP: A Local Differential Private Framework for Multi-level Sensitive Data | | CHEN Yaqing, YE Yutong, ZHANG Min, SHU Bowen | | Published July 18, 2025 | | 2025,10(4):40-53 [Abstract] [View PDF(1.05 M)] | | | | A Method for Calculating Behavioral Risk in Network Systems Based on Lie Group | | XIAO Yuming, ZHAO Xiaolin, LIU Zhenyan, SONG Ce, CHANG Yue | | Published July 18, 2025 | | 2025,10(4):54-65 [Abstract] [View PDF(1.30 M)] | | | | Network Intrusion Detection with Deep Neural Network for Supervised Learning of Discrete Hash | | XUE Yin, WEI Songjie | | Published July 18, 2025 | | 2025,10(4):66-76 [Abstract] [View PDF(2.18 M)] | | | | Extended Mirror Theory and Its Applications in Message Authentication Codes | | ZHANG Ping, QIN Jiaqi | | Published July 18, 2025 | | 2025,10(4):77-90 [Abstract] [View PDF(644.62 K)] | | | | Robust Image Perturbation Based on Multi-Forgery Model Adversarial Optimization | | MU Wenpeng, WANG Jinwei, CHEN Beijin, NIE Lina, MO Haolan, XU Fei | | Published July 18, 2025 | | 2025,10(4):91-103 [Abstract] [View PDF(6.35 M)] | | | | Research on Verification Method of Processor Prediction Vulnerabilities Based on Model Checking | | YE Qingyu, KE Qian, WANG Haixia, QIU Pengfei, LIU Chang, WANG Dongsheng | | Published July 18, 2025 | | 2025,10(4):104-119 [Abstract] [View PDF(872.94 K)] | | | | Human-Cyber-Physical Collaborative Countermeasure Models for Critical Infrastructure Security | | ZHU Peidong, KANG Wenjie, LIU Liang, ZHANG Rui, XUN Peng | | Published July 18, 2025 | | 2025,10(4):120-137 [Abstract] [View PDF(5.73 M)] | | | | An Overview of the Current Research on Embedded Device Firmware Security Analysis | | MA Xiaocheng, WANG Yunchao, YU Hongyang, WEI Qiang | | Published July 18, 2025 | | 2025,10(4):138-158 [Abstract] [View PDF(3.46 M)] | | | | A Traffic Anomaly Detection Method Based on NNOA and EWOA | | CHEN Hong, LU Jianbo, JIN Haibo, WU Cong, CHENG Mingjia | | Published July 18, 2025 | | 2025,10(4):159-175 [Abstract] [View PDF(1.66 M)] | | | | APT Attack Activity Prediction Method for Iot Systems | | CHENG Xiang, KUANG Miaomiao, ZHANG Jiale, CHEN Weitong, LI Yun, YANG Hongyu | | Published July 18, 2025 | | 2025,10(4):176-189 [Abstract] [View PDF(2.00 M)] | | | | A Survey on Adversarial Attacks and Defenses in Text Domain | | LIANG Yuhang, LIN Zheng, WANG Lei, HE Yuanye, WANG Weiping | | Published July 18, 2025 | | 2025,10(4):190-208 [Abstract] [View PDF(662.78 K)] | | | | TouchAuth: An Implicit Continuous User Identity Authentication Mechanism based on Touch Screen Behavior | | MA Luping, ZHU Dali, ZHANG Shunliang, MA Yuchen, Feng Weimiao, PENG Shumin, ZHANG Zhujun | | Published July 18, 2025 | | 2025,10(4):209-223 [Abstract] [View PDF(2.71 M)] | | | | Blind Recognition of Scrambled Convolutional Code Based on Calculating Shift Equivalent Codeword Entropy Rate | | WANG Zhongfang, HUANG Weiqing, ZHAI Liuqun, HU Keke, WEI Dong | | Published July 18, 2025 | | 2025,10(4):224-238 [Abstract] [View PDF(810.72 K)] | | |
|