Quick Search:

Online First:

International Journal of Network Security

1. A Protocol Reversal Algorithm Based on Byte Change Rate and Information Entropy
Chao Hong, Peng Xiao, Zhongwei Li, Yiwei Yang, Zhenhong Zhang, Aidong Xu, Hailin Wang, Pandeng Li, Jun Yin, and Changhe Su
Article Full Text PDF

2. A Multi-level Access Control Strategy for Data Security Based on Ordered Binary Decision
Yunchao Shi, Chen Zhuang, Tianyang Yu, Guolin Yang, and Qianhong Gan
Article Full Text PDF

3. Decentralized Multi-Keyword Search with Verifiable Data Sharing System for Industrial Internet of Things
Runze Tian and Leyou Zhang
Article Full Text PDF

4. Cybersecurity Risk Assessment Framework for Smart Cities Using Big Data Analytics
Suxu Tang and Qinhong Qian
Article Full Text PDF

5. Real-time Vehicle Location Privacy Protection Based on Actual Vehicles
Yu Song, Lanyun Zhang, Long Deng, Bingkui Li, and Guoqing Wang
Article Full Text PDF

6. Lizz: Bitcoin-Compatible, Conditional and Flexible Multi-Party Payment Channel
Leiyang Wei, Zhicheng Xu, Yiqiao Song, and Hongbing Cheng
Article Full Text PDF

7. Research on Optimization Algorithm Based on Self-combination Cross Function
Xin Zhou and Gang Xiong
Article Full Text PDF

8. Achieving Efficient and Privacy-Preserving Online Medical Primary Diagnosis
Chen Feng, Linming Gong, and Runmeng Du
Article Full Text PDF

9. Network Covert Timing Channels Detection Based on the LZW Encoding Technique
Zhuozhen Guo and Yonghong Chen
Article Full Text PDF

10. Heap Spray Attack Detection Based on Deep Learning and Visualization
Jiqiang Zhai, Tao Xu, Hong Miao, Zuming Qi, and Hailu Yang
Article Full Text PDF

11. A Novel Privacy-Preserving Medical Data Sharing Scheme Based on SPHINCS+ and Kyber
Shuanggen Liu, Meng Zhao, Zhenyu Wang, Liuming Lin, HeYan, and Gang Han
Article Full Text PDF

12. An Attribute-based Encryption with Silent Revocation for Cloud Storage
Lukai Qin, Shuanggen Liu, Xiaoqing Liu, and Jindong Yu
Article Full Text PDF

13. A Provable Algorithm for Proving Coexistence of Ultra-lightweight RFID Tag Groups
Zhen-Hui Li and Yi-Jie Li
Article Full Text PDF

14. Tamper-resistant Digital Twin Technology Facilitates the Inheritance of Red Gene -- The Case of Bengbu Sun Jia Wei Zi Old Site
Jian Zhou, Yang Chen, and Tianyu Wang
Article Full Text PDF

15. Image Copy-Move Forgery Detection and Location via Dual-Branch Enhanced Transformer
Kaiqi Lu and Qiuyu Zhang
Article Full Text PDF

16. A Privacy-preserving Medical Image Retrieval with Access Control Verification Mechanism
Ruihua Xu, Qiuyu Zhang, and Zhaoheng Chen
Article Full Text PDF

17. Multi-Label Image Retrieval Scheme for Privacy-Preserving Based on Secure Multi-party Computation
Zhao-Heng Chen, Qiu-Yu Zhang, and Rui-Hua Xu
Article Full Text PDF

18. LaSeCure: Lattice Encryption with OTP Rotation for Post-Quantum Cloud Security
Gabriel Assamah, Alimatu-Saadia Yussif, Benjamin Appiah, Daniel Commey, Emmanuel Derry, and Regina Esi Turkson
Article Full Text PDF

19. Enhancing Drone Detection with FHS-DETR: A Lightweight Model Leveraging HiLo Attention
Haoan Chen and Hui Li
Article Full Text PDF

20. A Hybrid Watermarking Scheme for Protecting Intellectual Property of Deep Neural Networks
Liang-Qin Bao and Qiu-Yu Zhang
Article Full Text PDF

21. An Adaptive Weighted Federated Learning Algorithm Based on ShapDiv
Tianzhu Jia and Yuhong Zhao
Article Full Text PDF

22. Distributed Key Management Protocol with Multi-Identity Mapping and Task Decoupling
Yapeng Liu, Pengshou Xie, Tao Feng, Yongping Kang, and Jiayi Cui
Article Full Text PDF

23. An Inconspicuous Backdoor Attack Based on the Principle of Singular Value Decomposition
Hui Xia and Weiji Yang
Article Full Text PDF

24. Identity Authentication Scheme Based on Zero-Knowledge Proof for Internet of Vehicles
Kai Wang, Pengshou Xie, Ye Lu, Yongping Kang, and Ziliang Wei
Article Full Text PDF

25. Network Data Security Protection Framework And Implementation Based On Fusion Model
Chao Wang, Tian-Yu Ren, Miao Zhang, Xiao-Kun Bai, and Zhong-Jun Chi
Article Full Text PDF

26. Efficient Consortium Blockchain-assisted MultiKeyword Attribute-based Fine-grained Searchable Encryption Scheme
Yuancheng Li, Xinxiu Li, Rongxin Lai, and Qingle Wang
Article Full Text PDF

27. Distributed Energy Storage Data Sharing Based On Privacy Protection Using Secure Multiparty Computation
Yuancheng Li, Xinhui Yu, and Xingxing Yu
Article Full Text PDF

28. Multi-Family Malicious Domain Name Detection Based on Prototype Learning and Decoupling Attention
Qing Zhang and Wen-Chuan Zhang
Article Full Text PDF

29. A Lightweight Dual-Branch CNN with Depthwise Separable Convolutions and Resource-Aware Adaptation for In-Vehicle Network Intrusion Detection
Shengcai Zhang, Haoyue Wang, and Dezhi An
Article Full Text PDF

30. Network Security Attack Path Reasoning and Intelligent Defense Decision-Making System Construction Based on Knowledge Graph
Feifei Li and Hai Liu
Article Full Text PDF

31. Attackable Space Hypothesis-Driven Trap Defense Network
Shufeng Zhang and Hui Xia
Article Full Text PDF

32. AdapNoise: Frequency-Domain Adaptive Defense for Face Recognition Against Black-Box Attacks
Guoyin Ren, Xinsong Wang, Dong Li, Xinyi Liu, and Qi Liu
Article Full Text PDF

33. InfAG-GAN: Infrared Adversarial Examples Generation Method Based on Generative Adversarial Network
En-Hui Xu, Yong-Ping Wang, Jin-Cai Xu, Bai-Qi Xiao, Xiao-Lin Zhang, and Zhi-Feng Xiao
Article Full Text PDF

34. Distributed w-Event Data Publishing Based on Differential Privacy in V2G Networks
Yuancheng Li, Peidong Yin, Xiong Liu, and Rong Huang
Article Full Text PDF

35. Strong Robust Image Steganography Model Based on Adversarial Examples
Dianjing Li and Qiuyu Zhang
Article Full Text PDF

36. Security of Corporate Financial Sharing Information System Based on Big Data Audit Thinking
Chuchu Lu
Article Full Text PDF

37. TextSpoofer: Text Adversarial Attack Based on Hard-label Black Box
Xiao-Lin Zhang, Bin Wu, Yong-Ping Wang, Yan-Lei Wei, En-Hui Xu, and Zhi-Feng Xiao
Article Full Text PDF

38. Sparse Encrypted Image Steganography Technology Combining TPN and STGN Model
Qianying Guo and Qiufeng Wang
Article Full Text PDF