Home
About
Editorial Board
Statement
Submission Guidelines
Contact us
Chinese
Search By
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
Display by issue
Display by category
Article No.
English Title
Authors
Vol. Issue No.
Copy
NO.1
20250101
Covert Channel of Branch Predictor on Arm Processor
YANG Yi, WU Pingfei, QIU Pengfei, WANG Chunlu, ZHAO Lutan, ZHANG Fengwei, WANG Bo, LYU Yongqiang, WANG Haixia, WANG Dongsheng
2025,10(1):1-16
20250102
A Survey on Copyright Protection Technology of Deep Learning Model
LI Peixuan, HUANG Tu, LUO Shuqing, SONG Jiaxin, LIU Gongshen
2025,10(1):17-35
20250103
Identity-based Sealed Bid Auction Protocol on Consortium Blockchain
XU Zheqing, WANG Yuhang, WANG Zhiwei, LIU Feng
2025,10(1):36-46
20250104
LFDP: A Differentially Private Robustness Augmentation Method Combining Low-Frequency Information
WANG Hao, XU Qiang, ZHANG Qinghua, LI Kaiju
2025,10(1):47-60
20250105
High-Capacity Data Hiding in Encryption Domain Based on Layer-by-Layer Residual Prediction for Secret Sharing
WEN Wenying, YANG Yuheng, ZHANG Yushu, FANG Yuming, QIU Baolin
2025,10(1):61-74
20250106
A Review on Physical Adversarial Patch Attacks and Defenses Techniques
DENG Huan, HUANG Minhuan, LI Hu, WANG Tong, KUANG Xiaohui
2025,10(1):75-90
20250107
Large-scale Linear Equations Outsourcing Computing Scheme Based on Blockchain
DING Yan, WANG Na, DU Xuehui
2025,10(1):91-104
20250108
Slice-GCN: Smart Contract Vulnerability Detection Based on Program Slicing and Graph Neural Networks
ZHANG Renlou, WU Sheng, ZHANG Hao, LIU Fangyu
2025,10(1):105-118
20250109
The 3D Model Recognition Attack Algorithm based on Generative Adversarial Networks
LIU Jia, JIN Zhigang, JIN Shibo
2025,10(1):119-129
20250110
Phishing URL Detection Method Based on Component Segmentation
ZHONG Wenkang, WANG Tian, ZHANG Gongxuan
2025,10(1):130-142
20250111
Identification and Analysis of Cryptography Algorithms based on Machine Learning
XIA Ruiqi, LI Manman, CHEN Shaozhen
2025,10(1):143-159
20250112
A Survey of VMM Security Reinforcement on Virtualization Platform
ZHOU Qihang, JIA Xiaoqi, ZHANG Weijuan, JIANG Nan
2025,10(1):160-175
20250113
A Survey of Insider Threat Analysis and Defense Solutions
SUN Degang, LIU Meichen, LI Meimei, WANG Xu, SHI Zhixin, LIU Pengcheng, LI Nan
2025,10(1):176-193
20250114
Cybersecurity Named Entity Recognition using the Pre-trained Model
HAN Yaopeng, WANG Lu, JIANG Bo, LU Zhigang, JIANG Zhengwei, LIU Yuling
2025,10(1):194-204
NO.2
20250201
Research on Firmware Vulnerability Discovery Technology Based on Reaching Definition Analysis
MEI Runyuan, WANG Yanhao, LI Zichuan, PENG Guojun
2025,10(2):1-16
20250202
Black-box Testing Method for Web Authentication Bypass Vulnerability Based on Response Similarity Determination
SONG Hong, MA Junlong, WANG Weiping, ZHU Yilang, WANG Jianxing
2025,10(2):17-29
20250203
Research on Dynamic Trust Evaluation Method Based on Federated Learning
SHI Ruisheng, FU Tong, LIN Ziding, LAN Lina, JIANG Ning
2025,10(2):30-47
20250204
Binary Comparison Techniques: Applications, Approaches, and Challenges
HU Mengying, WANG Xiaoke, ZHAO Lei
2025,10(2):48-66
20250205
Similarity Analysis of National Network and Operator’s Network
ZHU Jinyu, ZHANG Yu, WANG Yunan, Z HANG Hongli, FANG Binxing
2025,10(2):67-83
20250206
A Deep Learning Visualization Classification Method for Malicious Code Based on Enhanced Gray Level Co-occurrence Matrix
WANG Jinwei, CHEN Zhengjia, XIE Xue, LUO Xiangyang, MA Bin
2025,10(2):84-102
20250207
A Rapid Identification Method for Risk Areas Affected by BGP Anomalies
LIU Zimian, QIU Han, WANG Rui, ZHU Junhu, WANG Qingxian
2025,10(2):103-115
20250208
Research on Multi-order GMM-ResNet Fusion for Speech Deepfake Detection
CAO Mingming, LEI Zhenchun, YANG Yingen, ZHOU Yong
2025,10(2):116-126
20250209
Research on Introducing Global Semantic Enhancement for Face Fraud Feature Extraction
CAI Tijian, CHEN Jun, LUO Ciyong, LIU Zunxiong, CHEN Zihan
2025,10(2):127-138
20250210
A Cyber Kill Chain Based Analysis of PLC Security
SUN Yue, YOU Jianzhou, SONG Zhanwei, HUANG Wenjun, CHEN Xi, SUN Limin
2025,10(2):139-162
20250211
DNTrans: Illicit Domain Name Transformation Generation Method Based on Transformer
WANG Bo, SHI Fan
2025,10(2):163-179
20250212
A Study on Cyber Deception-Based Moving Target Defense
ZHANG Yaqin, MA Duohe, SUN Xiaoyan, ZHOU Chuan, LIU Feng
2025,10(2):180-195
20250213
Research on Cloud Virtual Network Security
TU Bibo, SUN Ruina, YOU Ruibang, CHENG Jie, TAO Xiaojie, ZHANG Kun
2025,10(2):196-218
20250214
Survey of Privacy Attack and Defense in Federated Learning
WANG Kainan, ZHANG Yuhui, HOU Rui
2025,10(2):219-230