International Journal of Network Security | ||
1. | False Image Detection of Civil Engineering Based on Non-uniform Fast Fourier Transform and Enhanced Super-resolution Generative Adversarial Network
|
|
Yuehua Si, Vol. 27, No. 5, 2025, pp. 865-874 Article Full Text PDF |
||
2. | A Block-based High Capacity Reversible Data Hiding Scheme in Interpolation Domain Using Two-layer Embedding
|
|
Xiaofeng Chen, Liqin Zheng, Zhihua Lin, Xiaojin Wu, Yu Lin, and Zhiyun Huang, Vol. 27, No. 5, 2025, pp. 875-887 Article Full Text PDF |
||
3. | Fine-Grained Multi-Level Security Access Control Models in Industrial OT Networks
|
|
Pengshou Xie, Linge Qi, Yongping Kang, Tao Feng, Pengfei Li, and Jialin He, Vol. 27, No. 5, 2025, pp. 888-898 Article Full Text PDF |
||
4. | FedDPRec: A Federated Learning-based News Recommendation Model with Local Differential Privacy
|
|
Yan Yan, TianQi Hu, and Jie Yang, Vol. 27, No. 5, 2025, pp. 899-913 Article Full Text PDF |
||
5. | Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
|
|
Lei Yu and Shou-ren Liu, Vol. 27, No. 5, 2025, pp. 914-918 Article Full Text PDF |
||
6. | Network Intrusion Detection Based on Improved WOA Algorithm and LSTM
|
|
Xianjun Wang, Vol. 27, No. 5, 2025, pp. 919-929 Article Full Text PDF |
||
7. | A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
|
|
Liping Qiao, Xueting Jia, and Fanjin Zeng, Vol. 27, No. 5, 2025, pp. 930-938 Article Full Text PDF |
||
8. | PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
|
|
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao, Vol. 27, No. 5, 2025, pp. 939-948 Article Full Text PDF |
||
9. | Data Recovery Techniques and Data Integrity Verification Methods in Digital Forensics
|
|
Xiaoyan Luo, Vol. 27, No. 5, 2025, pp. 949-959 Article Full Text PDF |
||
10. | A Speech Steganography Privacy Protection Scheme Based on Secret Sharing
|
|
Changxiang Zhao, Jianping Cai, Ximeng Liu, Qi Zhong, and Zuobin Ying, Vol. 27, No. 5, 2025, pp. 960-971 Article Full Text PDF |
||
11. | KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
|
|
Hongling Jiang, Jinzhi Lin, and Haiyan Kang, Vol. 27, No. 5, 2025, pp. 972-984 Article Full Text PDF |
||
12. | Privacy-preserving Approach for Personalized Trajectories Based on Higher-order Markov Predictions
|
|
Pengshou Xie, Yinchang Pan, Yongping Kang, Wanjun Shao, Cunhuan Tan, and Jialin He, Vol. 27, No. 5, 2025, pp. 985-994 Article Full Text PDF |
||
13. | Detection and Classification of Packed Malware Based on Target Detection Networks
|
|
Yuntao Zhao, Yongnan Chen, and Wei Liu, Vol. 27, No. 5, 2025, pp. 995-1006 Article Full Text PDF |
||
14. | A Novel Off-Chain Transaction Framework for Channel Cooperation
|
|
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang, Vol. 27, No. 5, 2025, pp. 1007-1018 Article Full Text PDF |
||
15. | Anonymous Credential Protocol Based on SM2 Digital Signature
|
|
Chenxiang Zhang and Weiji Yang, Vol. 27, No. 5, 2025, pp. 1019-1030 Article Full Text PDF |
||
16. | CCA Secure Revocable Identity-based Proxy Re-encryption
|
|
Qiaodan Tan, Vol. 27, No. 5, 2025, pp. 1031-1044 Article Full Text PDF |
||
17. | Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
|
|
Ai-Fen Lu and Yong-Ping Xiong, Vol. 27, No. 5, 2025, pp. 1045-1051 Article Full Text PDF |
||
18. | Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
|
|
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu, Vol. 27, No. 5, 2025, pp. 1052-1065 Article Full Text PDF |
||
19. | Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
|
|
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan, Vol. 27, No. 5, 2025, pp. 1066-1073 Article Full Text PDF |
||
20. | Monocular Depth Estimation Using Geometric Perception Fusion
|
|
Chunhua Wang, Ying Gao, and Zhenyu Wang, Vol. 27, No. 5, 2025, pp. 1074-1082 Article Full Text PDF |
||
21. | Application of IPFS Decentralized Blockchain Model in Internet of Things Privacy Maintenance
|
|
Weidong Zhang, Jiurong Ding, and Wenjun Su, Vol. 27, No. 5, 2025, pp. 1083-1092 Article Full Text PDF |
||
22. | Research on Zero Trust Architecture Based on Blockchain Technologies
|
|
Min-Shiang Hwang, Hou-Wen Li, Yu-Chi Tseng, and Nan-I Wu, Vol. 27, No. 5, 2025, pp. 1093-1104 Article Full Text PDF |
||
23. | Subject index to volume 27 (2025)
|
|
Article Full Text PDF | ||
24. | Author index to volume 27 (2025)
|
|
Article Full Text PDF | ||
25. | Reviewer index to volume 27 (2025)
|
|
Article Full Text PDF | ||
26. | All Papers to volume 27 (2025)
|
|
Article Full Text PDF | ||