Volume 9,Issue 5,2024 Table of Contents

   
Other Issues:  
  

Contents

Applications of Large Language Models Technology for Threat Intelligence: A Survey
  CUI Mengjiao, JIANG Zhengwei, CHEN Yiren, JIANG Jun, ZHANG Kai, LING Zhiting, FENG Huamin, YANG Peian
  Published September 18, 2024
  2024,9(5):1-25 [Abstract]  [View PDF(1.24 M)]
  
Challenges and Opportunities of Large Language Model Security
  FU Zhiyuan, CHEN Siyu, CHEN Junfan, HAI Xiang, SHI Yansong, LI Xiaoqi, LI Yihong, YUE Qiuling, ZHANG Yuqing
  Published September 18, 2024
  2024,9(5):26-55 [Abstract]  [View PDF(2.58 M)]
  
A Review of Jailbreak Attacks and Defenses for Large Language Models
  LIANG Siyuan, HE Yingzhe, LIU Aishan, LI Jingzhi, DAI Pengwen, CAO Xiaochun
  Published September 18, 2024
  2024,9(5):56-86 [Abstract]  [View PDF(11.32 M)]
  
A Review of Security Research in the Development Stage of Software Supply Chain Enhanced by Large Models
  LIU Jingqiang, TIAN Xing, SHU Yuqi, ZHU Xiaoxi, LIU Yuling, LIU Qixu
  Published September 18, 2024
  2024,9(5):87-109 [Abstract]  [View PDF(1.33 M)]
  
Malware Detection and Classification Based on API Block Reconstruction and Image Representation
  YANG Hongyu, ZHANG Yupei, ZHANG Liang, CHENG Xiang
  Published September 18, 2024
  2024,9(5):110-126 [Abstract]  [View PDF(4.24 M)]
  
Robust Watermarking for Protect Transformer Intellectual Property
  WANG Baowei, ZHENG Weiqian
  Published September 18, 2024
  2024,9(5):127-138 [Abstract]  [View PDF(893.69 K)]
  
A Survey on Image Visualization Approaches-based Malware Classification Techniques
  QIAN Liping, WANG Dawei
  Published September 18, 2024
  2024,9(5):139-161 [Abstract]  [View PDF(2.05 M)]
  
Android Malware Detection Based on Multi-view Representation Learning
  ZHAO Wenxiang, MENG Zhaoyi, XIONG Yan, HUANG Wenchao
  Published September 18, 2024
  2024,9(5):162-177 [Abstract]  [View PDF(1.46 M)]
  
A Certificateless Subgroup Multi-Signature Scheme
  WANG Yuhang, XU Zheqing, WANG Zhiwei, LIU Feng
  Published September 18, 2024
  2024,9(5):178-188 [Abstract]  [View PDF(558.62 K)]
  
A Survey of Ethereum Illegal Detection Methods
  LI Meng, LIANG Guangjun, YIN Jie, MA Zhuo, ZHANG Yi
  Published September 18, 2024
  2024,9(5):189-216 [Abstract]  [View PDF(2.01 M)]
  
Robust Image Encryption Based on Improved Logistic Chaos and Cross-Chaos Diffusion
  GUO Yuan, JIA Debao, WANG Chong, ZHAI Ping
  Published September 18, 2024
  2024,9(5):217-228 [Abstract]  [View PDF(14.98 M)]
  
Malicious Domain Names Detection Methods Analysis: A Survey
  WANG Qing, HAN Dongxu, LU Zhigang, JIANG Bo, DONG Cong, LIU Junrong, SHI Wenchang, LIU Yuling
  Published September 18, 2024
  2024,9(5):229-249 [Abstract]  [View PDF(832.75 K)]