Volume 10,Issue 6,2025 Table of Contents

   
Other Issues:  
  

Contents

Measurement and Analysis of Service Status for Key Domain Authoritative Nameservers in China
  NIE Leyao, LI Chenglong, DONG Cong, SONG Guanglei, ZHANG Hui, FAN Linna, YANG Jiahai
  Published November 18, 2025
  2025,10(6):1-14 [Abstract]  [View PDF(731.78 K)]
  
Robust Collaborative Hierarchical Federated Learning for UAV Clusters
  LIANG Mengqing, WANG Jian, JIANG Wenbin, WANG Xuewei, LIU Jiqiang
  Published November 18, 2025
  2025,10(6):15-33 [Abstract]  [View PDF(1.95 M)]
  
Trustworthiness Evaluation Approach for Security Virtual Network Function
  LIU Hao, WANG Chong, TIAN Zhihong, WU Zhonghai
  Published November 18, 2025
  2025,10(6):34-46 [Abstract]  [View PDF(765.83 K)]
  
Secure Named Entity Recognition Inference Method Based on Secret Sharing
  TONG Yan, HUA Zhongyun, LIAO Qing, ZHANG Yushu
  Published November 18, 2025
  2025,10(6):47-59 [Abstract]  [View PDF(678.21 K)]
  
A Searchable Encryption Scheme based on SM9 for Resisting Internal Keyword Guessing Attacks
  XU Jiawang, WANG Huaqun
  Published November 18, 2025
  2025,10(6):60-70 [Abstract]  [View PDF(634.03 K)]
  
SBA-ST: A Subgraph Backdoor Attacking Method Using Smaller Triggers to Evade Randomized Smoothing Defense
  WU Xiaojie, LIU Qiang, WANG Yuheng, FU Zhangjie
  Published November 18, 2025
  2025,10(6):71-85 [Abstract]  [View PDF(1.17 M)]
  
A ViT-based Algorithm for Localized Image Copy Detection
  ZHU Chen, CHEN Yuxun, CHEN Yukun, WANG Zonghui
  Published November 18, 2025
  2025,10(6):86-96 [Abstract]  [View PDF(4.40 M)]
  
Image Tampering Localization Algorithm Based on Dynamic Masking Rate and Knowledge Distillation
  LI Sili, LIAO Guiying, TAN Shunquan, HUANG Jiwu, LI Bin
  Published November 18, 2025
  2025,10(6):97-108 [Abstract]  [View PDF(4.55 M)]
  
Classification Methods of Internet Information Services
  WANG Yuhang, GUO Tao, HU Jingyuan, ZHANG Xiaodan, HAN Jizhong
  Published November 18, 2025
  2025,10(6):109-121 [Abstract]  [View PDF(2.06 M)]
  
Detecting Ransomware with Hardware Performance Counters
  YUAN Junyi, YANG Zhipeng, LIU Daidong, WEI Songjie
  Published November 18, 2025
  2025,10(6):122-132 [Abstract]  [View PDF(643.32 K)]
  
Implementing Quantum Circuit of ZUC Algorithm
  SUN Zhuang, HUANG Zhenyu
  Published November 18, 2025
  2025,10(6):133-149 [Abstract]  [View PDF(2.86 M)]
  
Combinatorial Optimization Construction of Password Guessing Method based on Deep Learning
  XI Zhihong, ZHOU Yongbin, LI Yong, FAN Yikang, XIE Ziping, SHI Ruixin
  Published November 18, 2025
  2025,10(6):150-162 [Abstract]  [View PDF(1.56 M)]
  
Cross-Layer Attention Injection from Pre-Trained Models for Spoof Speech Detection
  LIU Sihong, Lei Zhenchun, QIAN Guangyuan, ZHOU Yong, LIU Changhong
  Published November 18, 2025
  2025,10(6):163-177 [Abstract]  [View PDF(2.57 M)]
  
Spoofed Speech Detection in Real-World Fraudulent Communication Scenarios
  XU Zhe, CHENG Peng, BA Zhongjie, HUANG Peng, REN Kui
  Published November 18, 2025
  2025,10(6):178-196 [Abstract]  [View PDF(1.50 M)]
  
A Deepfake Speech Detection Method Based on WavLM Feature Decorrelation
  WANG Shuaibin, YI Xiaowei, LIU Changjun, SU Xiaosu, CAO Yun, LYU Meiyang
  Published November 18, 2025
  2025,10(6):197-212 [Abstract]  [View PDF(3.22 M)]