| |
| A Steganographic System based on “Martian” Generation for Avoidance of Text Information Interception |
| | ZHU Jiahao, ZHANG Yushu, LIU Zhe, ZHANG Xinpeng |
| | Published September 18, 2022 |
| | 2022,7(5):1-18 [Abstract] [View PDF(1.51 M)] |
| | |
| An Editable and Accountable Blockchain Scheme |
| | ZHAO Xiaoqi, ZHANG Zhenghao, LI Yong |
| | Published September 18, 2022 |
| | 2022,7(5):19-28 [Abstract] [View PDF(605.30 K)] |
| | |
| Multi-scale Time-Spatial Domain Detection of Fabricated Face Video Based on 3D Convolution |
| | BAO Han, FU Haocheng, CAO Yun, ZHAO Xianfeng, TANG Peng |
| | Published September 18, 2022 |
| | 2022,7(5):29-38 [Abstract] [View PDF(2.29 M)] |
| | |
| Survey on IaaS Cloud Security |
| | OUYANG Xue, XU Yanyan |
| | Published September 18, 2022 |
| | 2022,7(5):39-50 [Abstract] [View PDF(574.42 K)] |
| | |
| A Survey: Attacks and Countermeasures of Adversarial Examples for Speech Recognition System |
| | TAI Jianwei, LI Yakai, JIA Xiaoqi, HUANG Qingjia |
| | Published September 18, 2022 |
| | 2022,7(5):51-64 [Abstract] [View PDF(1.42 M)] |
| | |
| Network Attack Path Planning Method based on Deep Reinforcement Learning |
| | GAO Wenlong, ZHOU Tianyang, ZHAO Ziheng, ZHU Junhu |
| | Published September 18, 2022 |
| | 2022,7(5):65-78 [Abstract] [View PDF(4.78 M)] |
| | |
| Safety Certification for Next Generation High-speed Railway Heterogeneous Network Handover |
| | CHEN Yong, LIU Wen, ZHAN Zhixian |
| | Published September 18, 2022 |
| | 2022,7(5):79-90 [Abstract] [View PDF(883.53 K)] |
| | |
| Blockchain-based Lightweight Anonymous Review System |
| | LI Chao, WANG Jian, LIU Jiqiang |
| | Published September 18, 2022 |
| | 2022,7(5):91-107 [Abstract] [View PDF(1.43 M)] |
| | |
| PQVPN: Design of Software VPN against Quantum Computing Attack |
| | YANG Yatao, ZHAO Ruoyan, CHANG Xin, GUO Chao, XIAO Song |
| | Published September 18, 2022 |
| | 2022,7(5):108-119 [Abstract] [View PDF(1007.10 K)] |
| | |