Quick Search:

Volume: 28, No: 1 (January 1, 2026)

International Journal of Network Security

1. A Location Semantic Sensing Model Based on Markov Process for IoV
Pengshou Xie, Xinyu Fan, Yongping Kang, Tao Feng, Cunhuan Tan, and Jiahuan Lei, Vol. 28, No. 1, 2026, pp. 1-010
Article Full Text PDF

2. Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
Huiwen Yuan, Vol. 28, No. 1, 2026, pp. 11-020
Article Full Text PDF

3. A Close-Range Anonymous Authentication Protocol for Agricultural IoT
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao, Vol. 28, No. 1, 2026, pp. 21-032
Article Full Text PDF

4. SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng, Vol. 28, No. 1, 2026, pp. 33-044
Article Full Text PDF

5. A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao, Vol. 28, No. 1, 2026, pp. 45-053
Article Full Text PDF

6. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang, Vol. 28, No. 1, 2026, pp. 54-067
Article Full Text PDF

7. Word-level Attention Scores based Attacker for NLP Classifier
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu, Vol. 28, No. 1, 2026, pp. 68-079
Article Full Text PDF

8. Location Privacy Protection Scheme Based on Secret State Computation for Randomization
Xin Zhang, Linming Gong, and Su Pu, Vol. 28, No. 1, 2026, pp. 80-088
Article Full Text PDF

9. Sparse Adversarial Attack Based on Salient Region Optimization
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu, Vol. 28, No. 1, 2026, pp. 89-100
Article Full Text PDF

10. Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
Xi Chen and Zhun Wang, Vol. 28, No. 1, 2026, pp. 101-108
Article Full Text PDF

11. Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
Yu Song, Zhenshuai Zhang, and Bingkui Li, Vol. 28, No. 1, 2026, pp. 109-117
Article Full Text PDF

12. High Capacity Reversible Data Hiding Scheme in Encrypted Images Using Interpolation and XOR Operation
Weiwei Zhuang, Yihao Li, and Huaqi Ou, Vol. 28, No. 1, 2026, pp. 118-126
Article Full Text PDF

13. DV-Hop Deception Attack Model for Node Information Security in WSNs
Kongze Li and Chunyan Ou, Vol. 28, No. 1, 2026, pp. 127-136
Article Full Text PDF

14. Homomorphic Encryption Data Fusion Technology for Wireless Sensor Networks in Smart Cities
Yiyuan Tu and Guoqing Ding, Vol. 28, No. 1, 2026, pp. 137-146
Article Full Text PDF

15. TS-Code Efficient and Low-Cost Recovery in Storage Systems
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang, Vol. 28, No. 1, 2026, pp. 147-157
Article Full Text PDF

16. Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang, Vol. 28, No. 1, 2026, pp. 158-166
Article Full Text PDF

17. Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun, Vol. 28, No. 1, 2026, pp. 167-180
Article Full Text PDF

18. RFID Tag Ownership Transfer Protocol Based on Mms
Dao-Wei Liu, Wei Tao, and Ling-Li Fu, Vol. 28, No. 1, 2026, pp. 181-188
Article Full Text PDF

19. Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie, Vol. 28, No. 1, 2026, pp. 189-197
Article Full Text PDF

20. A PCA-LSTM Neural Method for Network Security Posture Prediction
Yinsheng Fu and Bin Hu, Vol. 28, No. 1, 2026, pp. 198-206
Article Full Text PDF

21. Prediction of Network Security Situation Based on GRU and Multi-Head Attention
Changpeng Ji, Tianjie Gao, and Wei Dai, Vol. 28, No. 1, 2026, pp. 207-214
Article Full Text PDF

22. An Effective Network Intrusion Detection Systems on Diverse IoT Traffic Datasets: A Hybrid Feature Selection and Extraction Method
Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Leizhen Wang, and Xu Zhou, Vol. 28, No. 1, 2026, pp. 215-226
Article Full Text PDF

23. Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
Ming Yan, Tongjiang Yan, and Yuhua Sun, Vol. 28, No. 1, 2026, pp. 227-234
Article Full Text PDF

24. UAV-Assisted Authenticated Key Agreement Scheme for Precision Agricultural IoT Networks
Wenyan Quan, Juan Qu, and Haiyan Zhou, Vol. 28, No. 1, 2026, pp. 235-247
Article Full Text PDF

25. Research on Log Anomaly Detection of English Data System Based on Long and Short Memory Network
Qiang Sun, Vol. 28, No. 1, 2026, pp. 248-257
Article Full Text PDF

26. Subject index to volume 28 (2026)
Article Full Text PDF

27. Author index to volume 28 (2026)
Article Full Text PDF

28. Reviewer index to volume 28 (2026)
Article Full Text PDF

29. All Papers to volume 28 (2026)
Article Full Text PDF