Volume 10,Issue 5,2025 Table of Contents

   
Other Issues:  
  

Contents

Research on Security and User Privacy Protection Methods for Wireless Sensing Models
  JIANG Yu, SHI Qi, CONG Yang, HU Aiqun
  Published September 18, 2025
  2025,10(5):1-16 [Abstract]  [View PDF(2.01 M)]
  
Formal Verification of Cache Side-channels and Attack Detection Based on Model Checking
  ZHANG Shixuan, WANG Haixia, QIU Pengfei, LYU Yongqiang, YIN Lingfeng, WANG Hongpeng, WANG Dongsheng
  Published September 18, 2025
  2025,10(5):17-33 [Abstract]  [View PDF(1.06 M)]
  
A Dynamic Security Perimeter Protection Mechanism for 5G Network
  ZHANG Ying, ZHANG Xu, WANG Dongbin, CAI Changjun, LU Yueming
  Published September 18, 2025
  2025,10(5):34-50 [Abstract]  [View PDF(3.29 M)]
  
Correlation Technology between Cyber Pollution Behaviors and Subjects under Encrypted Traffic
  CUI Tianyu, HOU Chengshang, LIU Chang, SHI Junzheng, GOU Gaopeng, XIONG Gang
  Published September 18, 2025
  2025,10(5):51-63 [Abstract]  [View PDF(1.78 M)]
  
Adversarial Patch Steganography Enhancement through Localized Style Fusion
  XIE Xilong, GUO Tong, XIAO Limin, HAN Meng, XU Xiangrong, DONG Jin, WANG Liang
  Published September 18, 2025
  2025,10(5):64-76 [Abstract]  [View PDF(6.10 M)]
  
Natural Physical Adversarial Attack Method for UAV Visual Recognition System
  ZHANG Heng, HUANG Nongsen, DING Jiasong, HANG Qin
  Published September 18, 2025
  2025,10(5):77-91 [Abstract]  [View PDF(18.91 M)]
  
A Forensic Restoration Image Model Based on GAN Network for Image Caption Guidance
  WANG Jinwei, ZHANG Zihe, LUO Xiangyang, MA Bin
  Published September 18, 2025
  2025,10(5):92-106 [Abstract]  [View PDF(13.97 M)]
  
An Anomaly Detection Method Based on Dual Auto -Encoder with Residual Attention Mechanism
  WU Xiaojie, LIU Qiang
  Published September 18, 2025
  2025,10(5):107-117 [Abstract]  [View PDF(679.02 K)]
  
Single-Step Adversarial Training with Learnable Initialization Based on Subspace
  HU Jun, ZHAN Chengxi
  Published September 18, 2025
  2025,10(5):118-128 [Abstract]  [View PDF(669.66 K)]
  
Blockchain-based Electronic Health Record Data Sharing Scheme with Integrity Verification
  LI Yahong, LI Qiang, LI Zhewei, WANG Caifen, YANG Xiaodong
  Published September 18, 2025
  2025,10(5):129-139 [Abstract]  [View PDF(757.54 K)]
  
IoT Anomaly Detection based on Spatiotemporal Graph Attention Network
  SU Xianshi, YANG Liping, MA Runze, JIANG Tongbang, QU Tiange, LIU Hongbo
  Published September 18, 2025
  2025,10(5):140-153 [Abstract]  [View PDF(1.57 M)]
  
Code Vulnerability Detection Technology Based on Graph Contrastive Learning
  XIA Pengcheng, ZENG Fanping, LIU Tong
  Published September 18, 2025
  2025,10(5):154-167 [Abstract]  [View PDF(1.12 M)]
  
A New Sight of Differential Cryptanalysis using DDT
  LIU Hui, YANG Li
  Published September 18, 2025
  2025,10(5):168-182 [Abstract]  [View PDF(801.78 K)]
  
A Non-Trapdoor Dynamic Pseudo-Accumulator Construction and its Application
  GUAN Cheng, XUE Rui, YUN Kaili
  Published September 18, 2025
  2025,10(5):183-193 [Abstract]  [View PDF(1.01 M)]
  
Modulation Recognition Algorithm Based on Time-Frequency Structure Differences of Modulation Parameters and Hierarchical Neural Network
  WANG Zhongfang, QIU Zhaohua, YU Chengliang, WEI Dong, HUANG Weiqing
  Published September 18, 2025
  2025,10(5):194-211 [Abstract]  [View PDF(2.12 M)]