Home
About
Editorial Board
Statement
Submission Guidelines
Contact us
Chinese
Search By
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
Display by issue
Display by category
Article No.
English Title
Authors
Vol. Issue No.
Copy
NO.1
20250101
Covert Channel of Branch Predictor on Arm Processor
YANG Yi, WU Pingfei, QIU Pengfei, WANG Chunlu, ZHAO Lutan, ZHANG Fengwei, WANG Bo, LYU Yongqiang, WANG Haixia, WANG Dongsheng
2025,10(1):1-16
20250102
A Survey on Copyright Protection Technology of Deep Learning Model
LI Peixuan, HUANG Tu, LUO Shuqing, SONG Jiaxin, LIU Gongshen
2025,10(1):17-35
20250103
Identity-based Sealed Bid Auction Protocol on Consortium Blockchain
XU Zheqing, WANG Yuhang, WANG Zhiwei, LIU Feng
2025,10(1):36-46
20250104
LFDP: A Differentially Private Robustness Augmentation Method Combining Low-Frequency Information
WANG Hao, XU Qiang, ZHANG Qinghua, LI Kaiju
2025,10(1):47-60
20250105
High-Capacity Data Hiding in Encryption Domain Based on Layer-by-Layer Residual Prediction for Secret Sharing
WEN Wenying, YANG Yuheng, ZHANG Yushu, FANG Yuming, QIU Baolin
2025,10(1):61-74
20250106
A Review on Physical Adversarial Patch Attacks and Defenses Techniques
DENG Huan, HUANG Minhuan, LI Hu, WANG Tong, KUANG Xiaohui
2025,10(1):75-90
20250107
Large-scale Linear Equations Outsourcing Computing Scheme Based on Blockchain
DING Yan, WANG Na, DU Xuehui
2025,10(1):91-104
20250108
Slice-GCN: Smart Contract Vulnerability Detection Based on Program Slicing and Graph Neural Networks
ZHANG Renlou, WU Sheng, ZHANG Hao, LIU Fangyu
2025,10(1):105-118
20250109
The 3D Model Recognition Attack Algorithm based on Generative Adversarial Networks
LIU Jia, JIN Zhigang, JIN Shibo
2025,10(1):119-129
20250110
Phishing URL Detection Method Based on Component Segmentation
ZHONG Wenkang, WANG Tian, ZHANG Gongxuan
2025,10(1):130-142
20250111
Identification and Analysis of Cryptography Algorithms based on Machine Learning
XIA Ruiqi, LI Manman, CHEN Shaozhen
2025,10(1):143-159
20250112
A Survey of VMM Security Reinforcement on Virtualization Platform
ZHOU Qihang, JIA Xiaoqi, ZHANG Weijuan, JIANG Nan
2025,10(1):160-175
20250113
A Survey of Insider Threat Analysis and Defense Solutions
SUN Degang, LIU Meichen, LI Meimei, WANG Xu, SHI Zhixin, LIU Pengcheng, LI Nan
2025,10(1):176-193
20250114
Cybersecurity Named Entity Recognition using the Pre-trained Model
HAN Yaopeng, WANG Lu, JIANG Bo, LU Zhigang, JIANG Zhengwei, LIU Yuling
2025,10(1):194-204
NO.2
20250201
Research on Firmware Vulnerability Discovery Technology Based on Reaching Definition Analysis
MEI Runyuan, WANG Yanhao, LI Zichuan, PENG Guojun
2025,10(2):1-16
20250202
Black-box Testing Method for Web Authentication Bypass Vulnerability Based on Response Similarity Determination
SONG Hong, MA Junlong, WANG Weiping, ZHU Yilang, WANG Jianxing
2025,10(2):17-29
20250203
Research on Dynamic Trust Evaluation Method Based on Federated Learning
SHI Ruisheng, FU Tong, LIN Ziding, LAN Lina, JIANG Ning
2025,10(2):30-47
20250204
Binary Comparison Techniques: Applications, Approaches, and Challenges
HU Mengying, WANG Xiaoke, ZHAO Lei
2025,10(2):48-66
20250205
Similarity Analysis of National Network and Operator’s Network
ZHU Jinyu, ZHANG Yu, WANG Yunan, Z HANG Hongli, FANG Binxing
2025,10(2):67-83
20250206
A Deep Learning Visualization Classification Method for Malicious Code Based on Enhanced Gray Level Co-occurrence Matrix
WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin
2025,10(2):84-102
20250207
A Rapid Identification Method for Risk Areas Affected by BGP Anomalies
LIU Zimian, QIU Han, WANG Rui, ZHU Junhu, WANG Qingxian
2025,10(2):103-115
20250208
Research on Multi-order GMM-ResNet Fusion for Speech Deepfake Detection
CAO Mingming, LEI Zhenchun, YANG Yingen, ZHOU Yong
2025,10(2):116-126
20250209
Research on Introducing Global Semantic Enhancement for Face Fraud Feature Extraction
CAI Tijian, CHEN Jun, LUO Ciyong, LIU Zunxiong, CHEN Zihan
2025,10(2):127-138
20250210
A Cyber Kill Chain Based Analysis of PLC Security
SUN Yue, YOU Jianzhou, SONG Zhanwei, HUANG Wenjun, CHEN Xi, SUN Limin
2025,10(2):139-162
20250211
DNTrans: Illicit Domain Name Transformation Generation Method Based on Transformer
WANG Bo, SHI Fan
2025,10(2):163-179
20250212
A Study on Cyber Deception-Based Moving Target Defense
ZHANG Yaqin, MA Duohe, SUN Xiaoyan, ZHOU Chuan, LIU Feng
2025,10(2):180-195
20250213
Research on Cloud Virtual Network Security
TU Bibo, SUN Ruina, YOU Ruibang, CHENG Jie, TAO Xiaojie, ZHANG Kun
2025,10(2):196-218
20250214
Survey of Privacy Attack and Defense in Federated Learning
WANG Kainan, ZHANG Yuhui, HOU Rui
2025,10(2):219-230
NO.3
20250301
Identify the Mapping of Java Method and Native Function for Android Applications Based on Simulated Execution
XU Guanhong, FU Jianming, NIE Yu, XIE Mengfei
2025,10(3):1-17
20250302
Research on Federated Density-Based Clustering Based on Secure Multi-Party Computation
SHEN Xuhong, YU Haining, WANG Xiaoyu
2025,10(3):18-34
20250303
Threat Intelligence Mining Based on Target Recognition and Topic-Guided Dialogue in Underground Markets
LUO Shuangchun, HUANG Cheng, SUN Enbo
2025,10(3):35-47
20250304
Trusted Decentralized Storage Network Based on Identity Authorization
ZHANG Jingyu, LIU Qi, PENG Hongrui, YANG Zenghui, YUAN Kaiguo, LI Xiaoyong
2025,10(3):48-60
20250305
Research on IPv6 Topology Inference Methods with Network Tomography
JIN Rui, LI Haotian, WEI Songjie
2025,10(3):61-73
20250306
A Review of Cyberspace Mimic Defense Research
LI Bingxuan, CHEN Shizhan, XU Guangquan, JIA Yungang, WANG Cong, XUE Fei, WANG Xiao, WANG Wei, LI Zhetao, LI Jianxin
2025,10(3):74-97
20250307
A Survey: Malware Detection Based on Deep Learning
YAN Pei, TAN Shunquan, HUANG Jiwu
2025,10(3):98-119
20250308
A Survey of Privacy Security for Graph Neural Networks
CHEN Jinyin, MA Minying, MA Haonan, ZHENG Haibin
2025,10(3):120-151
20250309
Blockchain-based Crowdsourcing Mechanism
ZHANG Zhujun, ZHU Dali, FAN Wei, MI Baoxin, PENG Cheng
2025,10(3):152-168
20250310
Dynamic QR Code Watermarking Algorithm for Anti-Theft Mobile Payment
LI Hongbang, CHEN Jiale, DONG Li, WANG Rangding, SUN Weiwei, ZHANG Yushu
2025,10(3):169-183
20250311
A Fast Automatic Identification Method of Massive Shortwave Radio Stations Based on Sparse Component Analysis
HUANG Weiqing, WANG Yuankun, ZHANG Qiaoyu, LI Jing, WEI Dong
2025,10(3):184-196
20250312
Cloud Data Integrity Audit Scheme That Supports Auditor Replacement and Data Dynamics
YANG Fan, YUAN Yilin, ZHANG Dengfan, LI Zichen
2025,10(3):197-208
20250313
Lateral Movement Detection Using Heterogeneous Graph Network
WANG Tian, DONG Cong, LIU Song, TIAN Tian, LU Zhigang, JIANG Bo
2025,10(3):209-219