Quick Search:

Online First:

International Journal of Network Security

1. Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
Yan Cai
Article Full Text PDF

2. SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
Junheng Wang
Article Full Text PDF

3. Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing
Article Full Text PDF

4. Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi
Article Full Text PDF

5. RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
Feng-Chun Lin and Wei-Qing Wan
Article Full Text PDF

6. Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong
Article Full Text PDF

7. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang
Article Full Text PDF

8. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF

9. TS-Code Efficient and Low-Cost Recovery in Storage Systems
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang
Article Full Text PDF

10. Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
Huiwen Yuan
Article Full Text PDF

11. DV-Hop Deception Attack Model for Node Information Security in WSNs
Kongze Li and Chunyan Ou
Article Full Text PDF

12. Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang
Article Full Text PDF

13. A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li
Article Full Text PDF

14. Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun
Article Full Text PDF

15. Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
Emran Al-Buraihy, Dan Wang, and Wasim Ali
Article Full Text PDF

16. Fused Distortion Design for Efficient H.264 Video Steganography
Ying Liu, Shijie Xu, and Hao Xie
Article Full Text PDF

17. An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
Minfei Wu, Jie Gao, and Hongbing Cheng
Article Full Text PDF

18. From Logs to Images: Log-based APT Detection via Masked Autoencoder
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue
Article Full Text PDF

19. LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
Minfei Wu, Kun Zhou, and Hongbing Cheng
Article Full Text PDF

20. RFID Tag Ownership Transfer Protocol Based on Mms
Dao-Wei Liu, Wei Tao, and Ling-Li Fu
Article Full Text PDF

21. Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
Hongbo Yu, Yue Yu, Songrui Li, and Yan Li
Article Full Text PDF

22. Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
Siyu Hou, Jianguo Ren, and Yonghong Xu
Article Full Text PDF

23. Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

24. Multi-domain United Transformer for Image Forgery Localization
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu
Article Full Text PDF

25. Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
Yan Yan, Jie Yang, and Tianqi Hu
Article Full Text PDF

26. A Close-Range Anonymous Authentication Protocol for Agricultural IoT
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao
Article Full Text PDF

27. SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng
Article Full Text PDF

28. A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao
Article Full Text PDF

29. Word-level Attention Scores based Attacker for NLP Classifier
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu
Article Full Text PDF

30. Location Privacy Protection Scheme Based on Secret State Computation for Randomization
Xin Zhang, Linming Gong, and Su Pu
Article Full Text PDF

31. Sparse Adversarial Attack Based on Salient Region Optimization
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu
Article Full Text PDF

32. Block-based Complementary Embedding Reversible Data Hiding
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng
Article Full Text PDF

33. Social Internet Privacy Protection Combining K-subgraph and D-KDLD
Zhiwei Li
Article Full Text PDF

34. Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
Xi Chen and Zhun Wang
Article Full Text PDF

35. Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
Bing Qiao, Zhihua Niu, and Jie Zhang
Article Full Text PDF

36. Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
Ming Yan, Tongjiang Yan, and Yuhua Sun
Article Full Text PDF

37. MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
Longhui Hu, Yuntao Zhao, and Yongxin Feng
Article Full Text PDF

38. Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

39. More Efficient Access Control Solutions for IPFE
Yinyin Ma, Changgen Peng, and Tao Zhang
Article Full Text PDF

40. Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen
Article Full Text PDF

41. Emergency Response Management Model and Application Based on Distributed IPv6 Network
Xiaoting Ren
Article Full Text PDF

42. Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
Yu Song, Zhenshuai Zhang, and Bingkui Li
Article Full Text PDF

43. Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie
Article Full Text PDF

44. Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
Jianxi Zhang, Yue Liu, and Peiying Zhao
Article Full Text PDF

45. Markov-Blockchain-based Trust Metrics and Supervision Scheme for Industrial OT Networks and Systems
Pengshou Xie, Xinghui Yang, Tao Feng, Yongping Kang, Yuxiang Ran, and Yapeng Liu
Article Full Text PDF

46. IRDP-Fast Repair Array Code Based on Local Redundancy
Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang
Article Full Text PDF

47. Digital Image Chaos Encryption Combining TLBO and GA
Xinxin Wang and Xiaoming Zhao
Article Full Text PDF

48. UAV-Assisted Authenticated Key Agreement Scheme for Precision Agricultural IoT Networks
Wenyan Quan, Juan Qu, and Haiyan Zhou
Article Full Text PDF