Quick Search:

Paper Preview:

International Journal of Network Security

1. A Location Semantic Sensing Model Based on Markov Process for IoV
Pengshou Xie, Xinyu Fan, Yongping Kang, Tao Feng, Cunhuan Tan, and Jiahuan Lei
Article Full Text PDF

2. Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
Huiwen Yuan
Article Full Text PDF

3. A Close-Range Anonymous Authentication Protocol for Agricultural IoT
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao
Article Full Text PDF

4. SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng
Article Full Text PDF

5. A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao
Article Full Text PDF

6. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang
Article Full Text PDF

7. Word-level Attention Scores based Attacker for NLP Classifier
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu
Article Full Text PDF

8. Location Privacy Protection Scheme Based on Secret State Computation for Randomization
Xin Zhang, Linming Gong, and Su Pu
Article Full Text PDF

9. Sparse Adversarial Attack Based on Salient Region Optimization
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu
Article Full Text PDF

10. Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
Xi Chen and Zhun Wang
Article Full Text PDF

11. Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
Yu Song, Zhenshuai Zhang, and Bingkui Li
Article Full Text PDF

12. High Capacity Reversible Data Hiding Scheme in Encrypted Images Using Interpolation and XOR Operation
Weiwei Zhuang, Yihao Li, and Huaqi Ou
Article Full Text PDF

13. DV-Hop Deception Attack Model for Node Information Security in WSNs
Kongze Li and Chunyan Ou
Article Full Text PDF

14. Homomorphic Encryption Data Fusion Technology for Wireless Sensor Networks in Smart Cities
Yiyuan Tu and Guoqing Ding
Article Full Text PDF

15. TS-Code Efficient and Low-Cost Recovery in Storage Systems
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang
Article Full Text PDF

16. Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang
Article Full Text PDF

17. Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun
Article Full Text PDF

18. RFID Tag Ownership Transfer Protocol Based on Mms
Dao-Wei Liu, Wei Tao, and Ling-Li Fu
Article Full Text PDF

19. Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie
Article Full Text PDF

20. A PCA-LSTM Neural Method for Network Security Posture Prediction
Yinsheng Fu and Bin Hu
Article Full Text PDF

21. Prediction of Network Security Situation Based on GRU and Multi-Head Attention
Changpeng Ji, Tianjie Gao, and Wei Dai
Article Full Text PDF

22. An Effective Network Intrusion Detection Systems on Diverse IoT Traffic Datasets: A Hybrid Feature Selection and Extraction Method
Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Leizhen Wang, and Xu Zhou
Article Full Text PDF