| |
| Research on Security and User Privacy Protection Methods for Wireless Sensing Models |
| | JIANG Yu, SHI Qi, CONG Yang, HU Aiqun |
| | Published September 18, 2025 |
| | 2025,10(5):1-16 [Abstract] [View PDF(2.01 M)] |
| | |
| Formal Verification of Cache Side-channels and Attack Detection Based on Model Checking |
| | ZHANG Shixuan, WANG Haixia, QIU Pengfei, LYU Yongqiang, YIN Lingfeng, WANG Hongpeng, WANG Dongsheng |
| | Published September 18, 2025 |
| | 2025,10(5):17-33 [Abstract] [View PDF(1.06 M)] |
| | |
| A Dynamic Security Perimeter Protection Mechanism for 5G Network |
| | ZHANG Ying, ZHANG Xu, WANG Dongbin, CAI Changjun, LU Yueming |
| | Published September 18, 2025 |
| | 2025,10(5):34-50 [Abstract] [View PDF(3.29 M)] |
| | |
| Correlation Technology between Cyber Pollution Behaviors and Subjects under Encrypted Traffic |
| | CUI Tianyu, HOU Chengshang, LIU Chang, SHI Junzheng, GOU Gaopeng, XIONG Gang |
| | Published September 18, 2025 |
| | 2025,10(5):51-63 [Abstract] [View PDF(1.78 M)] |
| | |
| Adversarial Patch Steganography Enhancement through Localized Style Fusion |
| | XIE Xilong, GUO Tong, XIAO Limin, HAN Meng, XU Xiangrong, DONG Jin, WANG Liang |
| | Published September 18, 2025 |
| | 2025,10(5):64-76 [Abstract] [View PDF(6.10 M)] |
| | |
| Natural Physical Adversarial Attack Method for UAV Visual Recognition System |
| | ZHANG Heng, HUANG Nongsen, DING Jiasong, HANG Qin |
| | Published September 18, 2025 |
| | 2025,10(5):77-91 [Abstract] [View PDF(18.91 M)] |
| | |
| A Forensic Restoration Image Model Based on GAN Network for Image Caption Guidance |
| | WANG Jinwei, ZHANG Zihe, LUO Xiangyang, MA Bin |
| | Published September 18, 2025 |
| | 2025,10(5):92-106 [Abstract] [View PDF(13.97 M)] |
| | |
| An Anomaly Detection Method Based on Dual Auto -Encoder with Residual Attention Mechanism |
| | WU Xiaojie, LIU Qiang |
| | Published September 18, 2025 |
| | 2025,10(5):107-117 [Abstract] [View PDF(679.02 K)] |
| | |
| Single-Step Adversarial Training with Learnable Initialization Based on Subspace |
| | HU Jun, ZHAN Chengxi |
| | Published September 18, 2025 |
| | 2025,10(5):118-128 [Abstract] [View PDF(669.66 K)] |
| | |
| Blockchain-based Electronic Health Record Data Sharing Scheme with Integrity Verification |
| | LI Yahong, LI Qiang, LI Zhewei, WANG Caifen, YANG Xiaodong |
| | Published September 18, 2025 |
| | 2025,10(5):129-139 [Abstract] [View PDF(757.54 K)] |
| | |
| IoT Anomaly Detection based on Spatiotemporal Graph Attention Network |
| | SU Xianshi, YANG Liping, MA Runze, JIANG Tongbang, QU Tiange, LIU Hongbo |
| | Published September 18, 2025 |
| | 2025,10(5):140-153 [Abstract] [View PDF(1.57 M)] |
| | |
| Code Vulnerability Detection Technology Based on Graph Contrastive Learning |
| | XIA Pengcheng, ZENG Fanping, LIU Tong |
| | Published September 18, 2025 |
| | 2025,10(5):154-167 [Abstract] [View PDF(1.12 M)] |
| | |
| A New Sight of Differential Cryptanalysis using DDT |
| | LIU Hui, YANG Li |
| | Published September 18, 2025 |
| | 2025,10(5):168-182 [Abstract] [View PDF(801.78 K)] |
| | |
| A Non-Trapdoor Dynamic Pseudo-Accumulator Construction and its Application |
| | GUAN Cheng, XUE Rui, YUN Kaili |
| | Published September 18, 2025 |
| | 2025,10(5):183-193 [Abstract] [View PDF(1.01 M)] |
| | |
| Modulation Recognition Algorithm Based on Time-Frequency Structure Differences of Modulation Parameters and Hierarchical Neural Network |
| | WANG Zhongfang, QIU Zhaohua, YU Chengliang, WEI Dong, HUANG Weiqing |
| | Published September 18, 2025 |
| | 2025,10(5):194-211 [Abstract] [View PDF(2.12 M)] |
| | |