| |
| Measurement and Analysis of Service Status for Key Domain Authoritative Nameservers in China |
| | NIE Leyao, LI Chenglong, DONG Cong, SONG Guanglei, ZHANG Hui, FAN Linna, YANG Jiahai |
| | Published November 18, 2025 |
| | 2025,10(6):1-14 [Abstract] [View PDF(731.78 K)] |
| | |
| Robust Collaborative Hierarchical Federated Learning for UAV Clusters |
| | LIANG Mengqing, WANG Jian, JIANG Wenbin, WANG Xuewei, LIU Jiqiang |
| | Published November 18, 2025 |
| | 2025,10(6):15-33 [Abstract] [View PDF(1.95 M)] |
| | |
| Trustworthiness Evaluation Approach for Security Virtual Network Function |
| | LIU Hao, WANG Chong, TIAN Zhihong, WU Zhonghai |
| | Published November 18, 2025 |
| | 2025,10(6):34-46 [Abstract] [View PDF(765.83 K)] |
| | |
| Secure Named Entity Recognition Inference Method Based on Secret Sharing |
| | TONG Yan, HUA Zhongyun, LIAO Qing, ZHANG Yushu |
| | Published November 18, 2025 |
| | 2025,10(6):47-59 [Abstract] [View PDF(678.21 K)] |
| | |
| A Searchable Encryption Scheme based on SM9 for Resisting Internal Keyword Guessing Attacks |
| | XU Jiawang, WANG Huaqun |
| | Published November 18, 2025 |
| | 2025,10(6):60-70 [Abstract] [View PDF(634.03 K)] |
| | |
| SBA-ST: A Subgraph Backdoor Attacking Method Using Smaller Triggers to Evade Randomized Smoothing Defense |
| | WU Xiaojie, LIU Qiang, WANG Yuheng, FU Zhangjie |
| | Published November 18, 2025 |
| | 2025,10(6):71-85 [Abstract] [View PDF(1.17 M)] |
| | |
| A ViT-based Algorithm for Localized Image Copy Detection |
| | ZHU Chen, CHEN Yuxun, CHEN Yukun, WANG Zonghui |
| | Published November 18, 2025 |
| | 2025,10(6):86-96 [Abstract] [View PDF(4.40 M)] |
| | |
| Image Tampering Localization Algorithm Based on Dynamic Masking Rate and Knowledge Distillation |
| | LI Sili, LIAO Guiying, TAN Shunquan, HUANG Jiwu, LI Bin |
| | Published November 18, 2025 |
| | 2025,10(6):97-108 [Abstract] [View PDF(4.55 M)] |
| | |
| Classification Methods of Internet Information Services |
| | WANG Yuhang, GUO Tao, HU Jingyuan, ZHANG Xiaodan, HAN Jizhong |
| | Published November 18, 2025 |
| | 2025,10(6):109-121 [Abstract] [View PDF(2.06 M)] |
| | |
| Detecting Ransomware with Hardware Performance Counters |
| | YUAN Junyi, YANG Zhipeng, LIU Daidong, WEI Songjie |
| | Published November 18, 2025 |
| | 2025,10(6):122-132 [Abstract] [View PDF(643.32 K)] |
| | |
| Implementing Quantum Circuit of ZUC Algorithm |
| | SUN Zhuang, HUANG Zhenyu |
| | Published November 18, 2025 |
| | 2025,10(6):133-149 [Abstract] [View PDF(2.86 M)] |
| | |
| Combinatorial Optimization Construction of Password Guessing Method based on Deep Learning |
| | XI Zhihong, ZHOU Yongbin, LI Yong, FAN Yikang, XIE Ziping, SHI Ruixin |
| | Published November 18, 2025 |
| | 2025,10(6):150-162 [Abstract] [View PDF(1.56 M)] |
| | |
| Cross-Layer Attention Injection from Pre-Trained Models for Spoof Speech Detection |
| | LIU Sihong, Lei Zhenchun, QIAN Guangyuan, ZHOU Yong, LIU Changhong |
| | Published November 18, 2025 |
| | 2025,10(6):163-177 [Abstract] [View PDF(2.57 M)] |
| | |
| Spoofed Speech Detection in Real-World Fraudulent Communication Scenarios |
| | XU Zhe, CHENG Peng, BA Zhongjie, HUANG Peng, REN Kui |
| | Published November 18, 2025 |
| | 2025,10(6):178-196 [Abstract] [View PDF(1.50 M)] |
| | |
| A Deepfake Speech Detection Method Based on WavLM Feature Decorrelation |
| | WANG Shuaibin, YI Xiaowei, LIU Changjun, SU Xiaosu, CAO Yun, LYU Meiyang |
| | Published November 18, 2025 |
| | 2025,10(6):197-212 [Abstract] [View PDF(3.22 M)] |
| | |