International Journal of Network Security | ||
1. | An Encrypted Speech Retrieval Method Based on Deep Hashing and Balanced Binary Tree Index
|
|
Qiu-yu Zhang and Kai Wang, Vol. 27, No. 2, 2025, pp. 223-236 Article Full Text PDF |
||
2. | Industrial Internet Security Situation Assessment Method Based on Sine-SSA-CNN
|
|
Peng-shou Xie, Hong Wang, Wei Li, Jiafeng Zhu, Xinghui Yang, and Yuxiang Ran, Vol. 27, No. 2, 2025, pp. 237-247 Article Full Text PDF |
||
3. | Research on Sports Data Security Protection Based on One-Shot Aggregation and Generation Adversarial Network
|
|
Hongyan Zheng, Lan Qi, and Fei Wu, Vol. 27, No. 2, 2025, pp. 248-255 Article Full Text PDF |
||
4. | Monitoring and Early Warning of Cosmetic Safety Public Opinion Based on an Event Extraction Model
|
|
Yong Li, Yang Yang, and Qingchuan Zhang, Vol. 27, No. 2, 2025, pp. 256-263 Article Full Text PDF |
||
5. | K-anonymous Privacy Protection Based on You Only Look Once Network and Random Forest for Sports Data Security Analysis
|
|
Jie Cao, Jie Ren, Fuyu Guan, Xueyan Li, and Nan Wang, Vol. 27, No. 2, 2025, pp. 264-273 Article Full Text PDF |
||
6. | Analysis of Hopfield Chaotic Neural Network Based Image Encryption Algorithm in Communication Security Application
|
|
Xinsheng Jin, Vol. 27, No. 2, 2025, pp. 274-284 Article Full Text PDF |
||
7. | ENC: Biometric Data Privacy Protection of Young Athletes Based on Edge Node Collaboration
|
|
Kun Huang and Shaowei Shi, Vol. 27, No. 2, 2025, pp. 285-294 Article Full Text PDF |
||
8. | Research on Data Protection and Sharing Mechanism of Junior Tennis Match Based on Blockchain and Deep Learning
|
|
Shaowei Shi and Kun Huang, Vol. 27, No. 2, 2025, pp. 295-303 Article Full Text PDF |
||
9. | Image Encryption Based on Improved Arnold Transform and DNA Encoding
|
|
Chen Zhang, Chentao Fu, and Ying Huang, Vol. 27, No. 2, 2025, pp. 304-313 Article Full Text PDF |
||
10. | Ice-snow Physical Data Privacy Protection Based on Deep Autoencoder and Federated Learning
|
|
Ning Xu, Tao Feng, and Jinhui Zheng, Vol. 27, No. 2, 2025, pp. 314-322 Article Full Text PDF |
||
11. | The Problem of Extreme Value Falling into Local Optimal Solution in Anomaly Detection in Wireless Sensor Networks
|
|
Yi Shen, Vol. 27, No. 2, 2025, pp. 323-329 Article Full Text PDF |
||
12. | Research on Information Dissemination and Monitoring of Online Public Opinion Under an Intelligent Algorithm
|
|
Huidan Zhang, Qingjuan Li, and Hongyan Shen, Vol. 27, No. 2, 2025, pp. 330-337 Article Full Text PDF |
||
13. | Detection and Identification of Abnormal Network Traffic Data Based on Traffic Features
|
|
Yongping Tang and Qingyi Zeng, Vol. 27, No. 2, 2025, pp. 338-344 Article Full Text PDF |
||
14. | Intelligent Communication Interference Decision Making System Based on Reinforcement Learning Algorithm of Artificial Intelligence
|
|
Jiebing Li, Vol. 27, No. 2, 2025, pp. 345-355 Article Full Text PDF |
||
15. | Building Extraction from Remote Sensing Images by Fusing Mask R-CNN and Attention Mechanisms
|
|
Jianpei Li and Dongxiao Sun, Vol. 27, No. 2, 2025, pp. 356-367 Article Full Text PDF |
||
16. | A Fast Multi-modal Facial Recognition Algorithm Based on Deep Residual Networks
|
|
Chunlei Zhong, Vol. 27, No. 2, 2025, pp. 368-377 Article Full Text PDF |
||
17. | Design of 3D Mapping and Encryption Techniques in Digital Image Processing
|
|
Xiaofen Wang, Yanzhen Wang, and Kaiyue Yu, Vol. 27, No. 2, 2025, pp. 378-389 Article Full Text PDF |
||
18. | Modeling of Weak Signal Detection in Communication Systems Based on Wavelet-Long and Short-Term Memory Networks
|
|
Run Wang and Qichao Liu, Vol. 27, No. 2, 2025, pp. 390-402 Article Full Text PDF |
||
19. | Database Security Model Based on Henon Mapping Chaotic System and Single Sign on Protocol
|
|
Wei Sun and Jianyu Liu, Vol. 27, No. 2, 2025, pp. 403-413 Article Full Text PDF |
||
20. | A Study of Competitive Influence Propagation Based on Heuristic Betweenness Centrality in Social Networks
|
|
Yang Li and Zhiqiang Wang, Vol. 27, No. 2, 2025, pp. 414-421 Article Full Text PDF |
||
21. | Multi-Dimensional Data Aggregation Signcryption Scheme for Mobile Crowdsensing in Smart City
|
|
Xukai Liu, Weixiang Zhou, Zehao Lin, and Shuang-Gen Liu, Vol. 27, No. 2, 2025, pp. 422-430 Article Full Text PDF |
||
22. | Review of Steganography and Cryptography: Tools for Covert Communications
|
|
Kanza Fatima, Nan-I Wu, Chi-Shiang Chan, and Min-Shiang Hwang, Vol. 27, No. 2, 2025, pp. 431-438 Article Full Text PDF |
||
23. | Subject index to volume 27 (2025)
|
|
Article Full Text PDF | ||
24. | Author index to volume 27 (2025)
|
|
Article Full Text PDF | ||
25. | Reviewer index to volume 27 (2025)
|
|
Article Full Text PDF | ||
26. | All Papers to volume 27 (2025)
|
|
Article Full Text PDF | ||