International Journal of Network Security | ||
1. | Research on E-book Security Tracking Schemes
|
|
Cheng-Ying Lin, Chia-Chun Wu, and Min-Shiang Hwang, Vol. 23, No. 4, 2021, pp. 549-557 Article Full Text PDF |
||
2. | A Practical and Efficient Two-Part Edwards Curve Digital Signature for Mobile Networks
|
|
Mingrui Zhang, Bo Yang, Hongxia Hou, Meijuan Huang, and Yanwei Zhou, Vol. 23, No. 4, 2021, pp. 558-568 Article Full Text PDF |
||
3. | An Improved CNN Approach for Network Intrusion Detection System
|
|
Jianwei Hu, Chenshuo Liu, and Yanpeng Cui, Vol. 23, No. 4, 2021, pp. 569-575 Article Full Text PDF |
||
4. | Research on Dynamic Social Network Anonymity Technology for Protecting Community Structure
|
|
Na Li, Xiao-Lin Zhang, Yong-Ping Wang, Jian Li, and Li-Xin Liu, Vol. 23, No. 4, 2021, pp. 576-587 Article Full Text PDF |
||
5. | Decentralizing Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy
|
|
Leyou Zhang, Juan Ren, Li Kang, and Baocang Wang, Vol. 23, No. 4, 2021, pp. 588-603 Article Full Text PDF |
||
6. | Fast Scalar Multiplication Algorithms Based on 5P+Q of Elliptic Curve over GF(3^m)
|
|
Shuang-Gen Liu, Xiang Wang, Yao-Wei Liu, and Dong-Juan Li, Vol. 23, No. 4, 2021, pp. 604-611 Article Full Text PDF |
||
7. | Large-Scale Social Network Privacy Protection Method for Protecting K-Core
|
|
Jian Li, Xiaolin Zhang, Jiao Liu, Lu Gao, Huanxiang Zhang, and Yueyang Feng, Vol. 23, No. 4, 2021, pp. 612-622 Article Full Text PDF |
||
8. | Unsupervised Data Anomaly Detection Based on PCA-oritened Deep Auto-encoder Network
|
|
Rui Yang and Dong Ye, Vol. 23, No. 4, 2021, pp. 623-630 Article Full Text PDF |
||
9. | Digital Copyright Protection System for Oil and Gas Knowledge Achievements Based on Blockchain
|
|
Tao Feng, Renyi Yang, and Renbin Gong, Vol. 23, No. 4, 2021, pp. 631-641 Article Full Text PDF |
||
10. | Dynamic Pseudonym Semantic-location Privacy Protection Based on Continuous Query for Road Network
|
|
Yonglu Wang, Kaizhong Zuo, Rui Liu, and Jun Zhao, Vol. 23, No. 4, 2021, pp. 642-649 Article Full Text PDF |
||
11. | AccountVerif: A General Framework of Verifying Accountability Protocols
|
|
Cheng Su, Wenchao Huang, Fuyou Miao, and Yan Xiong, Vol. 23, No. 4, 2021, pp. 650-662 Article Full Text PDF |
||
12. | A Practical Method to Attack Deep Learning based Host Intrusion Detection Systems
|
|
Sicong Zhang, Xiaoyao Xie, and Yang Xu, Vol. 23, No. 4, 2021, pp. 663-676 Article Full Text PDF |
||
13. | A Confidential Information Hiding Scheme for 3D Model Based on Contour Analysis
|
|
Shuai Ren, Aoxiong Fan, Lei Shi, Xuemei Lei, and Zhuoyi Dan, Vol. 23, No. 4, 2021, pp. 677-684 Article Full Text PDF |
||
14. | A Survey on Membership Inference Attacks Against Machine Learning
|
|
Yang Bai, Ting Chen, and Mingyu Fan, Vol. 23, No. 4, 2021, pp. 685-697 Article Full Text PDF |
||
15. | A BP Neural Network-oriented Henon Hyperchaotic System for Image Encryption
|
|
Desheng Liu, Fuqiang Wang, and Hui Wang, Vol. 23, No. 4, 2021, pp. 698-705 Article Full Text PDF |
||
16. | Campus Wireless Network Coverage and Analysis of its Security Based on Big Data
|
|
Yang Chen, Yingyun Wang, and Fenfei Gu, Vol. 23, No. 4, 2021, pp. 706-711 Article Full Text PDF |
||
17. | Research on Network Intrusion Recognition Based on an Intelligent Algorithm
|
|
Shuo Wang, Vol. 23, No. 4, 2021, pp. 712-717 Article Full Text PDF |
||
18. | Anomaly Detection Based on Discriminative Generative Adversarial Network
|
|
Benjamin Appiah, Zhiguang Qin, Obed Tettey Nartey, Brighter Agemang, Ansuura JohnBosco Aristotle Kanpogninge , Vol. 23, No. 4, 2021, pp. 718-724 Article Full Text PDF |
||
19. | A Novel Reversible Data-Hiding Method Using Adaptive Rhombus Prediction and Pixel Selection
|
|
Son Thai Nguyen, Vol. 23, No. 4, 2021, pp. 725-733 Article Full Text PDF |
||
20. | Analysis of Two Secure Three-Party Computation Protocols for Triangle Area
|
|
Lihua Liu and Jie Cao, Vol. 23, No. 4, 2021, pp. 734-737 Article Full Text PDF |
||