Quick Search:

Volume: 23, No: 4 (July 1, 2021)

International Journal of Network Security

1. Research on E-book Security Tracking Schemes
Cheng-Ying Lin, Chia-Chun Wu, and Min-Shiang Hwang, Vol. 23, No. 4, 2021, pp. 549-557
Article Full Text PDF

2. A Practical and Efficient Two-Part Edwards Curve Digital Signature for Mobile Networks
Mingrui Zhang, Bo Yang, Hongxia Hou, Meijuan Huang, and Yanwei Zhou, Vol. 23, No. 4, 2021, pp. 558-568
Article Full Text PDF

3. An Improved CNN Approach for Network Intrusion Detection System
Jianwei Hu, Chenshuo Liu, and Yanpeng Cui, Vol. 23, No. 4, 2021, pp. 569-575
Article Full Text PDF

4. Research on Dynamic Social Network Anonymity Technology for Protecting Community Structure
Na Li, Xiao-Lin Zhang, Yong-Ping Wang, Jian Li, and Li-Xin Liu, Vol. 23, No. 4, 2021, pp. 576-587
Article Full Text PDF

5. Decentralizing Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy
Leyou Zhang, Juan Ren, Li Kang, and Baocang Wang, Vol. 23, No. 4, 2021, pp. 588-603
Article Full Text PDF

6. Fast Scalar Multiplication Algorithms Based on 5P+Q of Elliptic Curve over GF(3^m)
Shuang-Gen Liu, Xiang Wang, Yao-Wei Liu, and Dong-Juan Li, Vol. 23, No. 4, 2021, pp. 604-611
Article Full Text PDF

7. Large-Scale Social Network Privacy Protection Method for Protecting K-Core
Jian Li, Xiaolin Zhang, Jiao Liu, Lu Gao, Huanxiang Zhang, and Yueyang Feng, Vol. 23, No. 4, 2021, pp. 612-622
Article Full Text PDF

8. Unsupervised Data Anomaly Detection Based on PCA-oritened Deep Auto-encoder Network
Rui Yang and Dong Ye, Vol. 23, No. 4, 2021, pp. 623-630
Article Full Text PDF

9. Digital Copyright Protection System for Oil and Gas Knowledge Achievements Based on Blockchain
Tao Feng, Renyi Yang, and Renbin Gong, Vol. 23, No. 4, 2021, pp. 631-641
Article Full Text PDF

10. Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road Network
Yonglu Wang, Kaizhong Zuo, Rui Liu, and Jun Zhao, Vol. 23, No. 4, 2021, pp. 642-649
Article Full Text PDF

11. AccountVerif: A General Framework of Verifying Accountability Protocols
Cheng Su, Wenchao Huang, Fuyou Miao, and Yan Xiong, Vol. 23, No. 4, 2021, pp. 650-662
Article Full Text PDF

12. A Practical Method to Attack Deep Learning based Host Intrusion Detection Systems
Sicong Zhang, Xiaoyao Xie, and Yang Xu, Vol. 23, No. 4, 2021, pp. 663-676
Article Full Text PDF

13. A Confidential Information Hiding Scheme for 3D Model Based on Contour Analysis
Shuai Ren, Aoxiong Fan, Lei Shi, Xuemei Lei, and Zhuoyi Dan, Vol. 23, No. 4, 2021, pp. 677-684
Article Full Text PDF

14. A Survey on Membership Inference Attacks Against Machine Learning
Yang Bai, Ting Chen, and Mingyu Fan, Vol. 23, No. 4, 2021, pp. 685-697
Article Full Text PDF

15. A BP Neural Network-oriented Henon Hyperchaotic System for Image Encryption
Desheng Liu, Fuqiang Wang, and Hui Wang, Vol. 23, No. 4, 2021, pp. 698-705
Article Full Text PDF

16. Campus Wireless Network Coverage and Analysis of its Security Based on Big Data
Yang Chen, Yingyun Wang, and Fenfei Gu, Vol. 23, No. 4, 2021, pp. 706-711
Article Full Text PDF

17. Research on Network Intrusion Recognition Based on an Intelligent Algorithm
Shuo Wang, Vol. 23, No. 4, 2021, pp. 712-717
Article Full Text PDF

18. Anomaly Detection Based on Discriminative Generative Adversarial Network
Benjamin Appiah, Zhiguang Qin, Obed Tettey Nartey, Brighter Agemang, Ansuura JohnBosco Aristotle Kanpogninge , Vol. 23, No. 4, 2021, pp. 718-724
Article Full Text PDF

19. A Novel Reversible Data-Hiding Method Using Adaptive Rhombus Prediction and Pixel Selection
Son Thai Nguyen, Vol. 23, No. 4, 2021, pp. 725-733
Article Full Text PDF

20. Analysis of Two Secure Three-Party Computation Protocols for Triangle Area
Lihua Liu and Jie Cao, Vol. 23, No. 4, 2021, pp. 734-737
Article Full Text PDF