Quick Search:

Volume: 27, No: 3 (May 1, 2025)

International Journal of Network Security

1. Blockchain-based Verifiable Multi-Keyword Searchable Encryption Scheme with De-Duplication Support
Tao Feng, Zhen Qiu, Junli Fang, Yi Wu, and Rong Ma, Vol. 27, No. 3, 2025, pp. 439-451
Article Full Text PDF

2. Lightweight Two-factor Authentication Protocol for IoT Based on PUF and Wireless Fingerprint Localization
Jiafeng Zhu, Pengshou Xie, Yongpin Kang, Tao Feng, Xiaoye Li, and Wanjun Shao, Vol. 27, No. 3, 2025, pp. 452-464
Article Full Text PDF

3. A Blockchain Transaction Data Storage and Access Scheme Based on Searchable Encryption and IPFS
Pengshou Xie, Wanjun Shao, Yongping Kang, Xiaoye Li, Jiafeng Zhu, and Yinchang Pan, Vol. 27, No. 3, 2025, pp. 465-475
Article Full Text PDF

4. A Hybrid Deep Learning Approach for Software Just-in-Time Defects Prediction
Yingting Yu, Mingliang Chen, Chuanhan Zeng, Guoqiang Xie, Benren Pan, Liu Cui, Heyang Sun and Yuancheng Li, Vol. 27, No. 3, 2025, pp. 476-486
Article Full Text PDF

5. International Trade Trend Prediction under Global Value Chain Background with Neural Network
Qunying Zou and Defu Zhao, Vol. 27, No. 3, 2025, pp. 487-496
Article Full Text PDF

6. Security Vulnerability Protection in the Communication Network: A Legal Perspective
Jingwei Li and Peng Qi, Vol. 27, No. 3, 2025, pp. 497-503
Article Full Text PDF

7. A Secure Protocol for the Absolute Difference of Two Matrices
Juanjuan Zhang, Minghui Wang, Xiulian Ma, and Shundong Li, Vol. 27, No. 3, 2025, pp. 504-509
Article Full Text PDF

8. Intrusion Detection Method for Wireless Sensor Network Based on Residual Convolutional Neural Networks Under Cloud Computing Environment and Its Application in Management
Zhihao Song, Vol. 27, No. 3, 2025, pp. 510-519
Article Full Text PDF

9. A Threshold Signature Scheme Based on Lattice for Improved Security in the Age of Quantum Computing
Jing Lan Zhang and Yan Ren, Vol. 27, No. 3, 2025, pp. 520-526
Article Full Text PDF

10. Secure Network Image Transmission Algorithm Based on Half Tensor Product Compression Perception and Hybrid Cloud
Yuanyuan Dong, Vol. 27, No. 3, 2025, pp. 527-539
Article Full Text PDF

11. Research on Algorithm Model-based Network Defense Technology under Invisible Backdoor Attacks
Bing Zheng and Lei Du, Vol. 27, No. 3, 2025, pp. 540-547
Article Full Text PDF

12. New Construction of New Self-dual Linear Error-correcting Codes by Pseudo-random Sequences
Yuqing Yan, Vol. 27, No. 3, 2025, pp. 548-555
Article Full Text PDF

13. Collaborative Network Security Protection System Design in Cloud Computing Environment
Fang Li, Vol. 27, No. 3, 2025, pp. 556-565
Article Full Text PDF

14. Network Intrusion Detection Combining Laplacian Eigenmaps and Enhanced Density Peak Clustering Algorithms
Aihua Nian and Peng Zhang, Vol. 27, No. 3, 2025, pp. 566-575
Article Full Text PDF

15. Network Active Defense Model Based on Deep Residuals and Support Vector Machines
Yi Shen and Jianwei Chen, Vol. 27, No. 3, 2025, pp. 576-585
Article Full Text PDF

16. Improved Image Compression Using Bi-branch Transformer-CNN Feature Extractor Network
Weimei Wu, Jianhua Hu, and Wenying Zeng, Vol. 27, No. 3, 2025, pp. 586-593
Article Full Text PDF

17. Research on Low Overhead Fast Repair Array Code Algorithm
Pan Xiong, Tieyuan Hong, Yuheng Wang, Dan Tang, Hongliang Cai, and Junyan Zhang, Vol. 27, No. 3, 2025, pp. 594-604
Article Full Text PDF

18. Blockchain-Assisted Multi-Party Charging Data Sharing Based on Permission Matrix
Jing Guo, Wei Liang, Zhimin Gu, Wei Huang, Yunxiao Sun, and Yan Li, Vol. 27, No. 3, 2025, pp. 605-615
Article Full Text PDF

19. A Secret Image Sharing Scheme with High Embedding Capacity and Detection Rate
Yixuan Du, Yanhai Zhang, and Jinmei Fan, Vol. 27, No. 3, 2025, pp. 616-623
Article Full Text PDF

20. Research on Monitoring and Early Warning of Sudden Online Public Opinion Topic by a Model Algorithm
Haixiang He and Yejing Bao, Vol. 27, No. 3, 2025, pp. 624-630
Article Full Text PDF

21. Research on Secure Blockchain Digital Resume Storage Systems
Min-Shiang Hwang, Yung-Ling Chang, and Nan-I Wu, Vol. 27, No. 3, 2025, pp. 631-638
Article Full Text PDF

22. Research on Secure Payment in the Process of Currency Transactions in Digital Economy Through Blockchain Technology
Qianyi Luo and Renjun Li, Vol. 27, No. 3, 2025, pp. 639-646
Article Full Text PDF

23. Subject index to volume 27 (2025)
Article Full Text PDF

24. Author index to volume 27 (2025)
Article Full Text PDF

25. Reviewer index to volume 27 (2025)
Article Full Text PDF

26. All Papers to volume 27 (2025)
Article Full Text PDF