Quick Search:

Volume: 27, No: 5 (September 1, 2025)

International Journal of Network Security

1. False Image Detection of Civil Engineering Based on Non-uniform Fast Fourier Transform and Enhanced Super-resolution Generative Adversarial Network
Yuehua Si, Vol. 27, No. 5, 2025, pp. 865-874
Article Full Text PDF

2. A Block-based High Capacity Reversible Data Hiding Scheme in Interpolation Domain Using Two-layer Embedding
Xiaofeng Chen, Liqin Zheng, Zhihua Lin, Xiaojin Wu, Yu Lin, and Zhiyun Huang, Vol. 27, No. 5, 2025, pp. 875-887
Article Full Text PDF

3. Fine-Grained Multi-Level Security Access Control Models in Industrial OT Networks
Pengshou Xie, Linge Qi, Yongping Kang, Tao Feng, Pengfei Li, and Jialin He, Vol. 27, No. 5, 2025, pp. 888-898
Article Full Text PDF

4. FedDPRec: A Federated Learning-based News Recommendation Model with Local Differential Privacy
Yan Yan, TianQi Hu, and Jie Yang, Vol. 27, No. 5, 2025, pp. 899-913
Article Full Text PDF

5. Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
Lei Yu and Shou-ren Liu, Vol. 27, No. 5, 2025, pp. 914-918
Article Full Text PDF

6. Network Intrusion Detection Based on Improved WOA Algorithm and LSTM
Xianjun Wang, Vol. 27, No. 5, 2025, pp. 919-929
Article Full Text PDF

7. A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
Liping Qiao, Xueting Jia, and Fanjin Zeng, Vol. 27, No. 5, 2025, pp. 930-938
Article Full Text PDF

8. PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao, Vol. 27, No. 5, 2025, pp. 939-948
Article Full Text PDF

9. Data Recovery Techniques and Data Integrity Verification Methods in Digital Forensics
Xiaoyan Luo, Vol. 27, No. 5, 2025, pp. 949-959
Article Full Text PDF

10. A Speech Steganography Privacy Protection Scheme Based on Secret Sharing
Changxiang Zhao, Jianping Cai, Ximeng Liu, Qi Zhong, and Zuobin Ying, Vol. 27, No. 5, 2025, pp. 960-971
Article Full Text PDF

11. KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
Hongling Jiang, Jinzhi Lin, and Haiyan Kang, Vol. 27, No. 5, 2025, pp. 972-984
Article Full Text PDF

12. Privacy-preserving Approach for Personalized Trajectories Based on Higher-order Markov Predictions
Pengshou Xie, Yinchang Pan, Yongping Kang, Wanjun Shao, Cunhuan Tan, and Jialin He, Vol. 27, No. 5, 2025, pp. 985-994
Article Full Text PDF

13. Detection and Classification of Packed Malware Based on Target Detection Networks
Yuntao Zhao, Yongnan Chen, and Wei Liu, Vol. 27, No. 5, 2025, pp. 995-1006
Article Full Text PDF

14. A Novel Off-Chain Transaction Framework for Channel Cooperation
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang, Vol. 27, No. 5, 2025, pp. 1007-1018
Article Full Text PDF

15. Anonymous Credential Protocol Based on SM2 Digital Signature
Chenxiang Zhang and Weiji Yang, Vol. 27, No. 5, 2025, pp. 1019-1030
Article Full Text PDF

16. CCA Secure Revocable Identity-based Proxy Re-encryption
Qiaodan Tan, Vol. 27, No. 5, 2025, pp. 1031-1044
Article Full Text PDF

17. Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
Ai-Fen Lu and Yong-Ping Xiong, Vol. 27, No. 5, 2025, pp. 1045-1051
Article Full Text PDF

18. Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu, Vol. 27, No. 5, 2025, pp. 1052-1065
Article Full Text PDF

19. Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan, Vol. 27, No. 5, 2025, pp. 1066-1073
Article Full Text PDF

20. Monocular Depth Estimation Using Geometric Perception Fusion
Chunhua Wang, Ying Gao, and Zhenyu Wang, Vol. 27, No. 5, 2025, pp. 1074-1082
Article Full Text PDF

21. Application of IPFS Decentralized Blockchain Model in Internet of Things Privacy Maintenance
Weidong Zhang, Jiurong Ding, and Wenjun Su, Vol. 27, No. 5, 2025, pp. 1083-1092
Article Full Text PDF

22. Research on Zero Trust Architecture Based on Blockchain Technologies
Min-Shiang Hwang, Hou-Wen Li, Yu-Chi Tseng, and Nan-I Wu, Vol. 27, No. 5, 2025, pp. 1093-1104
Article Full Text PDF

23. Subject index to volume 27 (2025)
Article Full Text PDF

24. Author index to volume 27 (2025)
Article Full Text PDF

25. Reviewer index to volume 27 (2025)
Article Full Text PDF

26. All Papers to volume 27 (2025)
Article Full Text PDF