| International Journal of Network Security | ||
| 1. | An Encrypted Speech Retrieval Method Based on Deep Hashing and Balanced Binary Tree Index
|
|
| Qiu-yu Zhang and Kai Wang, Vol. 27, No. 2, 2025, pp. 223-236 Article Full Text PDF |
||
| 2. | Industrial Internet Security Situation Assessment Method Based on Sine-SSA-CNN
|
|
| Peng-shou Xie, Hong Wang, Wei Li, Jiafeng Zhu, Xinghui Yang, and Yuxiang Ran, Vol. 27, No. 2, 2025, pp. 237-247 Article Full Text PDF |
||
| 3. | Research on Sports Data Security Protection Based on One-Shot Aggregation and Generation Adversarial Network
|
|
| Hongyan Zheng, Lan Qi, and Fei Wu, Vol. 27, No. 2, 2025, pp. 248-255 Article Full Text PDF |
||
| 4. | Monitoring and Early Warning of Cosmetic Safety Public Opinion Based on an Event Extraction Model
|
|
| Yong Li, Yang Yang, and Qingchuan Zhang, Vol. 27, No. 2, 2025, pp. 256-263 Article Full Text PDF |
||
| 5. | K-anonymous Privacy Protection Based on You Only Look Once Network and Random Forest for Sports Data Security Analysis
|
|
| Jie Cao, Jie Ren, Fuyu Guan, Xueyan Li, and Nan Wang, Vol. 27, No. 2, 2025, pp. 264-273 Article Full Text PDF |
||
| 6. | Analysis of Hopfield Chaotic Neural Network Based Image Encryption Algorithm in Communication Security Application
|
|
| Xinsheng Jin, Vol. 27, No. 2, 2025, pp. 274-284 Article Full Text PDF |
||
| 7. | ENC: Biometric Data Privacy Protection of Young Athletes Based on Edge Node Collaboration
|
|
| Kun Huang and Shaowei Shi, Vol. 27, No. 2, 2025, pp. 285-294 Article Full Text PDF |
||
| 8. | Research on Data Protection and Sharing Mechanism of Junior Tennis Match Based on Blockchain and Deep Learning
|
|
| Shaowei Shi and Kun Huang, Vol. 27, No. 2, 2025, pp. 295-303 Article Full Text PDF |
||
| 9. | Image Encryption Based on Improved Arnold Transform and DNA Encoding
|
|
| Chen Zhang, Chentao Fu, and Ying Huang, Vol. 27, No. 2, 2025, pp. 304-313 Article Full Text PDF |
||
| 10. | Ice-snow Physical Data Privacy Protection Based on Deep Autoencoder and Federated Learning
|
|
| Ning Xu, Tao Feng, and Jinhui Zheng, Vol. 27, No. 2, 2025, pp. 314-322 Article Full Text PDF |
||
| 11. | The Problem of Extreme Value Falling into Local Optimal Solution in Anomaly Detection in Wireless Sensor Networks
|
|
| Yi Shen, Vol. 27, No. 2, 2025, pp. 323-329 Article Full Text PDF |
||
| 12. | Research on Information Dissemination and Monitoring of Online Public Opinion Under an Intelligent Algorithm
|
|
| Huidan Zhang, Qingjuan Li, and Hongyan Shen, Vol. 27, No. 2, 2025, pp. 330-337 Article Full Text PDF |
||
| 13. | Detection and Identification of Abnormal Network Traffic Data Based on Traffic Features
|
|
| Yongping Tang and Qingyi Zeng, Vol. 27, No. 2, 2025, pp. 338-344 Article Full Text PDF |
||
| 14. | Intelligent Communication Interference Decision Making System Based on Reinforcement Learning Algorithm of Artificial Intelligence
|
|
| Jiebing Li, Vol. 27, No. 2, 2025, pp. 345-355 Article Full Text PDF |
||
| 15. | Building Extraction from Remote Sensing Images by Fusing Mask R-CNN and Attention Mechanisms
|
|
| Jianpei Li and Dongxiao Sun, Vol. 27, No. 2, 2025, pp. 356-367 Article Full Text PDF |
||
| 16. | A Fast Multi-modal Facial Recognition Algorithm Based on Deep Residual Networks
|
|
| Chunlei Zhong, Vol. 27, No. 2, 2025, pp. 368-377 Article Full Text PDF |
||
| 17. | Design of 3D Mapping and Encryption Techniques in Digital Image Processing
|
|
| Xiaofen Wang, Yanzhen Wang, and Kaiyue Yu, Vol. 27, No. 2, 2025, pp. 378-389 Article Full Text PDF |
||
| 18. | Modeling of Weak Signal Detection in Communication Systems Based on Wavelet-Long and Short-Term Memory Networks
|
|
| Run Wang and Qichao Liu, Vol. 27, No. 2, 2025, pp. 390-402 Article Full Text PDF |
||
| 19. | Database Security Model Based on Henon Mapping Chaotic System and Single Sign on Protocol
|
|
| Wei Sun and Jianyu Liu, Vol. 27, No. 2, 2025, pp. 403-413 Article Full Text PDF |
||
| 20. | A Study of Competitive Influence Propagation Based on Heuristic Betweenness Centrality in Social Networks
|
|
| Yang Li and Zhiqiang Wang, Vol. 27, No. 2, 2025, pp. 414-421 Article Full Text PDF |
||
| 21. | Multi-Dimensional Data Aggregation Signcryption Scheme for Mobile Crowdsensing in Smart City
|
|
| Xukai Liu, Weixiang Zhou, Zehao Lin, and Shuang-Gen Liu, Vol. 27, No. 2, 2025, pp. 422-430 Article Full Text PDF |
||
| 22. | Review of Steganography and Cryptography: Tools for Covert Communications
|
|
| Kanza Fatima, Nan-I Wu, Chi-Shiang Chan, and Min-Shiang Hwang, Vol. 27, No. 2, 2025, pp. 431-438 Article Full Text PDF |
||
| 23. | Subject index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 24. | Author index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 25. | Reviewer index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 26. | All Papers to volume 27 (2025)
|
|
| Article Full Text PDF | ||