Home
About
Editorial Board
Statement
Submission Guidelines
Contact us
Chinese
Search By
2026年
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
Display by issue
Display by category
Article No.
English Title
Authors
Vol. Issue No.
Copy
NO.1
20260101
Design of Message Authentication Protocol for Vehicle Heterogeneous Network Nodes
XU Guosheng, LI Yijing, WANG Zihan, WANG Chenyu
2026,11(1):1-8
20260102
Single-Parameter Backdoor Attack Based on Model Manipulation
DUAN Qiuyu, HOU Linshan, HUA Zhongyun, LIAO Qing, ZHANG Yushu, ZHANG Yu
2026,11(1):9-21
20260103
Trusted Compilation of Smart Contract Intermediate Language Based on the CompCert Memory Model
XU Ying, ZHANG Yafeng, XU Jinghang, KANG Yuexin, XIA Qing, YUAN Feng, ZUO Chun, LI Yucheng
2026,11(1):22-36
20260104
WebShell Detection Method Based on Dynamic Word Embeddings and Graph Convolution
ZHAI Jiangtao, WANG Tao, ZHOU Qiao, DONG Yi, WANG Zihao
2026,11(1):37-47
20260105
C2BR-VDS: A Black Box Real-time Verification Scheme for Streaming Data for on Chain and off Chain Hybrid Storage
LIN Wei, SUN Yi, YANG Jiashuo, LI Yujie
2026,11(1):48-61
20260106
Fail-Stop Attribute-Based Group Signature Scheme with CCA Anonymity in Standard Model
LIAO Dongxu, CHENG Xiaogang
2026,11(1):62-78
20260107
State-of-the-Art Survey of Network Intrusion Detection Technology based on Deep Learning
SU Shubin, XIAO Limin, LI Shupan, HUANG Xingwang, XIE Shutong, WU Bo
2026,11(1):79-101
20260108
Research on Mechanism of Human-Machine Collaborative Vulnerability Mining
LIN Zhechao, LU Shuaibing, NIE Yuanping, ZHANG Jia, DUAN Haixin, LI Xiang, KUANG Xiaohui
2026,11(1):102-114
20260109
Negative Database Generation Algorithm based on DES Algorithm and Integer Factorization
ZHAO Dongdong, LIU Zhihui, LIAO Lei, XIANG Jianwen, JIANG Hao
2026,11(1):115-135
20260110
Network Protocol Fuzzing Based on Sequence-to-Sequence Model
CHEN Qian, HONG Zheng, GU Jinbang, ZHANG Guomin, QIN Sujuan
2026,11(1):136-154
20260111
IoT-EDF: Unikernel-based Task Scheduling Method for the Internet of Things
DONG Bonan, YANG Qiusong, LI Mingshu
2026,11(1):155-170
20260112
A Survey on Large Language Model's Security Risks and Defense Methods
JIA Chengyu, CHEN Jinyin, XU Gan, ZHANG Ao, ZHANG He, JIN Haibo, CHEN Ruoxi, ZHENG Haibin
2026,11(1):171-214
20260113
Multi-Domain Fake News Detection Fusing Knowledge Information
WANG Xi, HAN Jizhong
2026,11(1):215-226
20260114
Revisiting Construction of Online Cipher in Hash-ECB-Hash Structure
LIU Gang, WANG Peng, WEI Rong, YE Dingfeng
2026,11(1):227-242
20260115
HiveAttacker: A Two-stage Security Detecting Approach for Apache Hive
LI Wenchao, LI Feng, BO Defang, ZHOU Jianhua, HUO Wei
2026,11(1):243-256
20260116
Hardware Trojan Detection Through Structural and Behavioral Feature Analysis of FPGA Netlist
LI Yiwei, SU Hao, LU Yiqing, WU Lingjuan, HU Wei
2026,11(1):257-268
20260117
Network Intrusion Detection Model based on Meta-Learning and Feature Enhancement
JIANG Zhangtao, LI Xin, XUE Di, PENG Yijie
2026,11(1):269-279
20260118
A Survey of Static Analysis Techniques of Binary Code
CHENG Kai, SONG Zhanwei, LIU Mingdong, YU Nan, ZHU Hongsong, SUN Limin
2026,11(1):280-297
20260119
Survey on the Integration of Safety and Security in Industrial Control Systems
LIU Puzhuo, MA Yetong, LV Shichao, FANG Dongliang, ZHU Hongsong, SUN Limin
2026,11(1):298-314
20260120
A Novel Hardware Trojan Detection Method based on the Controllability Flow Analysis of the Netlist
ZHANG Ning, LV Zhiqiang, ZHANG Yanlin, HUANG Weiqing
2026,11(1):315-331