Quick Search:

Volume: 27, No: 2 (March 1, 2025)

International Journal of Network Security

1. An Encrypted Speech Retrieval Method Based on Deep Hashing and Balanced Binary Tree Index
Qiu-yu Zhang and Kai Wang, Vol. 27, No. 2, 2025, pp. 223-236
Article Full Text PDF

2. Industrial Internet Security Situation Assessment Method Based on Sine-SSA-CNN
Peng-shou Xie, Hong Wang, Wei Li, Jiafeng Zhu, Xinghui Yang, and Yuxiang Ran, Vol. 27, No. 2, 2025, pp. 237-247
Article Full Text PDF

3. Research on Sports Data Security Protection Based on One-Shot Aggregation and Generation Adversarial Network
Hongyan Zheng, Lan Qi, and Fei Wu, Vol. 27, No. 2, 2025, pp. 248-255
Article Full Text PDF

4. Monitoring and Early Warning of Cosmetic Safety Public Opinion Based on an Event Extraction Model
Yong Li, Yang Yang, and Qingchuan Zhang, Vol. 27, No. 2, 2025, pp. 256-263
Article Full Text PDF

5. K-anonymous Privacy Protection Based on You Only Look Once Network and Random Forest for Sports Data Security Analysis
Jie Cao, Jie Ren, Fuyu Guan, Xueyan Li, and Nan Wang, Vol. 27, No. 2, 2025, pp. 264-273
Article Full Text PDF

6. Analysis of Hopfield Chaotic Neural Network Based Image Encryption Algorithm in Communication Security Application
Xinsheng Jin, Vol. 27, No. 2, 2025, pp. 274-284
Article Full Text PDF

7. ENC: Biometric Data Privacy Protection of Young Athletes Based on Edge Node Collaboration
Kun Huang and Shaowei Shi, Vol. 27, No. 2, 2025, pp. 285-294
Article Full Text PDF

8. Research on Data Protection and Sharing Mechanism of Junior Tennis Match Based on Blockchain and Deep Learning
Shaowei Shi and Kun Huang, Vol. 27, No. 2, 2025, pp. 295-303
Article Full Text PDF

9. Image Encryption Based on Improved Arnold Transform and DNA Encoding
Chen Zhang, Chentao Fu, and Ying Huang, Vol. 27, No. 2, 2025, pp. 304-313
Article Full Text PDF

10. Ice-snow Physical Data Privacy Protection Based on Deep Autoencoder and Federated Learning
Ning Xu, Tao Feng, and Jinhui Zheng, Vol. 27, No. 2, 2025, pp. 314-322
Article Full Text PDF

11. The Problem of Extreme Value Falling into Local Optimal Solution in Anomaly Detection in Wireless Sensor Networks
Yi Shen, Vol. 27, No. 2, 2025, pp. 323-329
Article Full Text PDF

12. Research on Information Dissemination and Monitoring of Online Public Opinion Under an Intelligent Algorithm
Huidan Zhang, Qingjuan Li, and Hongyan Shen, Vol. 27, No. 2, 2025, pp. 330-337
Article Full Text PDF

13. Detection and Identification of Abnormal Network Traffic Data Based on Traffic Features
Yongping Tang and Qingyi Zeng, Vol. 27, No. 2, 2025, pp. 338-344
Article Full Text PDF

14. Intelligent Communication Interference Decision Making System Based on Reinforcement Learning Algorithm of Artificial Intelligence
Jiebing Li, Vol. 27, No. 2, 2025, pp. 345-355
Article Full Text PDF

15. Building Extraction from Remote Sensing Images by Fusing Mask R-CNN and Attention Mechanisms
Jianpei Li and Dongxiao Sun, Vol. 27, No. 2, 2025, pp. 356-367
Article Full Text PDF

16. A Fast Multi-modal Facial Recognition Algorithm Based on Deep Residual Networks
Chunlei Zhong, Vol. 27, No. 2, 2025, pp. 368-377
Article Full Text PDF

17. Design of 3D Mapping and Encryption Techniques in Digital Image Processing
Xiaofen Wang, Yanzhen Wang, and Kaiyue Yu, Vol. 27, No. 2, 2025, pp. 378-389
Article Full Text PDF

18. Modeling of Weak Signal Detection in Communication Systems Based on Wavelet-Long and Short-Term Memory Networks
Run Wang and Qichao Liu, Vol. 27, No. 2, 2025, pp. 390-402
Article Full Text PDF

19. Database Security Model Based on Henon Mapping Chaotic System and Single Sign on Protocol
Wei Sun and Jianyu Liu, Vol. 27, No. 2, 2025, pp. 403-413
Article Full Text PDF

20. A Study of Competitive Influence Propagation Based on Heuristic Betweenness Centrality in Social Networks
Yang Li and Zhiqiang Wang, Vol. 27, No. 2, 2025, pp. 414-421
Article Full Text PDF

21. Multi-Dimensional Data Aggregation Signcryption Scheme for Mobile Crowdsensing in Smart City
Xukai Liu, Weixiang Zhou, Zehao Lin, and Shuang-Gen Liu, Vol. 27, No. 2, 2025, pp. 422-430
Article Full Text PDF

22. Review of Steganography and Cryptography: Tools for Covert Communications
Kanza Fatima, Nan-I Wu, Chi-Shiang Chan, and Min-Shiang Hwang, Vol. 27, No. 2, 2025, pp. 431-438
Article Full Text PDF

23. Subject index to volume 27 (2025)
Article Full Text PDF

24. Author index to volume 27 (2025)
Article Full Text PDF

25. Reviewer index to volume 27 (2025)
Article Full Text PDF

26. All Papers to volume 27 (2025)
Article Full Text PDF