| International Journal of Network Security | ||
| 1. | False Image Detection of Civil Engineering Based on Non-uniform Fast Fourier Transform and Enhanced Super-resolution Generative Adversarial Network
|
|
| Yuehua Si, Vol. 27, No. 5, 2025, pp. 865-874 Article Full Text PDF |
||
| 2. | A Block-based High Capacity Reversible Data Hiding Scheme in Interpolation Domain Using Two-layer Embedding
|
|
| Xiaofeng Chen, Liqin Zheng, Zhihua Lin, Xiaojin Wu, Yu Lin, and Zhiyun Huang, Vol. 27, No. 5, 2025, pp. 875-887 Article Full Text PDF |
||
| 3. | Fine-Grained Multi-Level Security Access Control Models in Industrial OT Networks
|
|
| Pengshou Xie, Linge Qi, Yongping Kang, Tao Feng, Pengfei Li, and Jialin He, Vol. 27, No. 5, 2025, pp. 888-898 Article Full Text PDF |
||
| 4. | FedDPRec: A Federated Learning-based News Recommendation Model with Local Differential Privacy
|
|
| Yan Yan, TianQi Hu, and Jie Yang, Vol. 27, No. 5, 2025, pp. 899-913 Article Full Text PDF |
||
| 5. | Formal Analysis and Improvement of SSL Protocol Based on DDMP Framework
|
|
| Lei Yu and Shou-ren Liu, Vol. 27, No. 5, 2025, pp. 914-918 Article Full Text PDF |
||
| 6. | Network Intrusion Detection Based on Improved WOA Algorithm and LSTM
|
|
| Xianjun Wang, Vol. 27, No. 5, 2025, pp. 919-929 Article Full Text PDF |
||
| 7. | A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
|
|
| Liping Qiao, Xueting Jia, and Fanjin Zeng, Vol. 27, No. 5, 2025, pp. 930-938 Article Full Text PDF |
||
| 8. | PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
|
|
| Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao, Vol. 27, No. 5, 2025, pp. 939-948 Article Full Text PDF |
||
| 9. | Data Recovery Techniques and Data Integrity Verification Methods in Digital Forensics
|
|
| Xiaoyan Luo, Vol. 27, No. 5, 2025, pp. 949-959 Article Full Text PDF |
||
| 10. | A Speech Steganography Privacy Protection Scheme Based on Secret Sharing
|
|
| Changxiang Zhao, Jianping Cai, Ximeng Liu, Qi Zhong, and Zuobin Ying, Vol. 27, No. 5, 2025, pp. 960-971 Article Full Text PDF |
||
| 11. | KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
|
|
| Hongling Jiang, Jinzhi Lin, and Haiyan Kang, Vol. 27, No. 5, 2025, pp. 972-984 Article Full Text PDF |
||
| 12. | Privacy-preserving Approach for Personalized Trajectories Based on Higher-order Markov Predictions
|
|
| Pengshou Xie, Yinchang Pan, Yongping Kang, Wanjun Shao, Cunhuan Tan, and Jialin He, Vol. 27, No. 5, 2025, pp. 985-994 Article Full Text PDF |
||
| 13. | Detection and Classification of Packed Malware Based on Target Detection Networks
|
|
| Yuntao Zhao, Yongnan Chen, and Wei Liu, Vol. 27, No. 5, 2025, pp. 995-1006 Article Full Text PDF |
||
| 14. | A Novel Off-Chain Transaction Framework for Channel Cooperation
|
|
| Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang, Vol. 27, No. 5, 2025, pp. 1007-1018 Article Full Text PDF |
||
| 15. | Anonymous Credential Protocol Based on SM2 Digital Signature
|
|
| Chenxiang Zhang and Weiji Yang, Vol. 27, No. 5, 2025, pp. 1019-1030 Article Full Text PDF |
||
| 16. | CCA Secure Revocable Identity-based Proxy Re-encryption
|
|
| Qiaodan Tan, Vol. 27, No. 5, 2025, pp. 1031-1044 Article Full Text PDF |
||
| 17. | Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
|
|
| Ai-Fen Lu and Yong-Ping Xiong, Vol. 27, No. 5, 2025, pp. 1045-1051 Article Full Text PDF |
||
| 18. | Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
|
|
| Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu, Vol. 27, No. 5, 2025, pp. 1052-1065 Article Full Text PDF |
||
| 19. | Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
|
|
| Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan, Vol. 27, No. 5, 2025, pp. 1066-1073 Article Full Text PDF |
||
| 20. | Monocular Depth Estimation Using Geometric Perception Fusion
|
|
| Chunhua Wang, Ying Gao, and Zhenyu Wang, Vol. 27, No. 5, 2025, pp. 1074-1082 Article Full Text PDF |
||
| 21. | Application of IPFS Decentralized Blockchain Model in Internet of Things Privacy Maintenance
|
|
| Weidong Zhang, Jiurong Ding, and Wenjun Su, Vol. 27, No. 5, 2025, pp. 1083-1092 Article Full Text PDF |
||
| 22. | Research on Zero Trust Architecture Based on Blockchain Technologies
|
|
| Min-Shiang Hwang, Hou-Wen Li, Yu-Chi Tseng, and Nan-I Wu, Vol. 27, No. 5, 2025, pp. 1093-1104 Article Full Text PDF |
||
| 23. | Subject index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 24. | Author index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 25. | Reviewer index to volume 27 (2025)
|
|
| Article Full Text PDF | ||
| 26. | All Papers to volume 27 (2025)
|
|
| Article Full Text PDF | ||