| International Journal of Network Security | ||
| 1. | A Protocol Reversal Algorithm Based on Byte Change Rate and Information Entropy
|
|
| Chao Hong, Peng Xiao, Zhongwei Li, Yiwei Yang, Zhenhong Zhang, Aidong Xu, Hailin Wang, Pandeng Li, Jun Yin, and Changhe Su Article Full Text PDF |
||
| 2. | A Multi-level Access Control Strategy for Data Security Based on Ordered Binary Decision
|
|
| Yunchao Shi, Chen Zhuang, Tianyang Yu, Guolin Yang, and Qianhong Gan Article Full Text PDF |
||
| 3. | Decentralized Multi-Keyword Search with Verifiable Data Sharing System for Industrial Internet of Things
|
|
| Runze Tian and Leyou Zhang Article Full Text PDF |
||
| 4. | Cybersecurity Risk Assessment Framework for Smart Cities Using Big Data Analytics
|
|
| Suxu Tang and Qinhong Qian Article Full Text PDF |
||
| 5. | Real-time Vehicle Location Privacy Protection Based on Actual Vehicles
|
|
| Yu Song, Lanyun Zhang, Long Deng, Bingkui Li, and Guoqing Wang Article Full Text PDF |
||
| 6. | Lizz: Bitcoin-Compatible, Conditional and Flexible Multi-Party Payment Channel
|
|
| Leiyang Wei, Zhicheng Xu, Yiqiao Song, and Hongbing Cheng Article Full Text PDF |
||
| 7. | Research on Optimization Algorithm Based on Self-combination Cross Function
|
|
| Xin Zhou and Gang Xiong Article Full Text PDF |
||
| 8. | Achieving Efficient and Privacy-Preserving Online Medical Primary Diagnosis
|
|
| Chen Feng, Linming Gong, and Runmeng Du Article Full Text PDF |
||
| 9. | Network Covert Timing Channels Detection Based on the LZW Encoding Technique
|
|
| Zhuozhen Guo and Yonghong Chen Article Full Text PDF |
||
| 10. | Heap Spray Attack Detection Based on Deep Learning and Visualization
|
|
| Jiqiang Zhai, Tao Xu, Hong Miao, Zuming Qi, and Hailu Yang Article Full Text PDF |
||
| 11. | A Novel Privacy-Preserving Medical Data Sharing Scheme Based on SPHINCS+ and Kyber
|
|
| Shuanggen Liu, Meng Zhao, Zhenyu Wang, Liuming Lin, HeYan, and Gang Han Article Full Text PDF |
||
| 12. | An Attribute-based Encryption with Silent Revocation for Cloud Storage
|
|
| Lukai Qin, Shuanggen Liu, Xiaoqing Liu, and Jindong Yu Article Full Text PDF |
||
| 13. | A Provable Algorithm for Proving Coexistence of Ultra-lightweight RFID Tag Groups
|
|
| Zhen-Hui Li and Yi-Jie Li Article Full Text PDF |
||
| 14. | Tamper-resistant Digital Twin Technology Facilitates the Inheritance of Red Gene -- The Case of Bengbu Sun Jia Wei Zi Old Site
|
|
| Jian Zhou, Yang Chen, and Tianyu Wang Article Full Text PDF |
||
| 15. | Image Copy-Move Forgery Detection and Location via Dual-Branch Enhanced Transformer
|
|
| Kaiqi Lu and Qiuyu Zhang Article Full Text PDF |
||
| 16. | A Privacy-preserving Medical Image Retrieval with Access Control Verification Mechanism
|
|
| Ruihua Xu, Qiuyu Zhang, and Zhaoheng Chen Article Full Text PDF |
||
| 17. | Multi-Label Image Retrieval Scheme for Privacy-Preserving Based on Secure Multi-party Computation
|
|
| Zhao-Heng Chen, Qiu-Yu Zhang, and Rui-Hua Xu Article Full Text PDF |
||
| 18. | LaSeCure: Lattice Encryption with OTP Rotation for Post-Quantum Cloud Security
|
|
| Gabriel Assamah, Alimatu-Saadia Yussif, Benjamin Appiah, Daniel Commey, Emmanuel Derry, and Regina Esi Turkson Article Full Text PDF |
||
| 19. | Enhancing Drone Detection with FHS-DETR: A Lightweight Model Leveraging HiLo Attention
|
|
| Haoan Chen and Hui Li Article Full Text PDF |
||
| 20. | A Hybrid Watermarking Scheme for Protecting Intellectual Property of Deep Neural Networks
|
|
| Liang-Qin Bao and Qiu-Yu Zhang Article Full Text PDF |
||
| 21. | An Adaptive Weighted Federated Learning Algorithm Based on ShapDiv
|
|
| Tianzhu Jia and Yuhong Zhao Article Full Text PDF |
||
| 22. | Distributed Key Management Protocol with Multi-Identity Mapping and Task Decoupling
|
|
| Yapeng Liu, Pengshou Xie, Tao Feng, Yongping Kang, and Jiayi Cui Article Full Text PDF |
||
| 23. | An Inconspicuous Backdoor Attack Based on the Principle of Singular Value Decomposition
|
|
| Hui Xia and Weiji Yang Article Full Text PDF |
||
| 24. | Identity Authentication Scheme Based on Zero-Knowledge Proof for Internet of Vehicles
|
|
| Kai Wang, Pengshou Xie, Ye Lu, Yongping Kang, and Ziliang Wei Article Full Text PDF |
||
| 25. | Network Data Security Protection Framework And Implementation Based On Fusion Model
|
|
| Chao Wang, Tian-Yu Ren, Miao Zhang, Xiao-Kun Bai, and Zhong-Jun Chi Article Full Text PDF |
||
| 26. | Efficient Consortium Blockchain-assisted MultiKeyword Attribute-based Fine-grained Searchable Encryption Scheme
|
|
| Yuancheng Li, Xinxiu Li, Rongxin Lai, and Qingle Wang Article Full Text PDF |
||
| 27. | Distributed Energy Storage Data Sharing Based On Privacy Protection Using Secure Multiparty Computation
|
|
| Yuancheng Li, Xinhui Yu, and Xingxing Yu Article Full Text PDF |
||
| 28. | Multi-Family Malicious Domain Name Detection Based on Prototype Learning and Decoupling Attention
|
|
| Qing Zhang and Wen-Chuan Zhang Article Full Text PDF |
||
| 29. | A Lightweight Dual-Branch CNN with Depthwise Separable Convolutions and Resource-Aware Adaptation for In-Vehicle Network Intrusion Detection
|
|
| Shengcai Zhang, Haoyue Wang, and Dezhi An Article Full Text PDF |
||
| 30. | Network Security Attack Path Reasoning and Intelligent Defense Decision-Making System Construction Based on Knowledge Graph
|
|
| Feifei Li and Hai Liu Article Full Text PDF |
||
| 31. | Attackable Space Hypothesis-Driven Trap Defense Network
|
|
| Shufeng Zhang and Hui Xia Article Full Text PDF |
||
| 32. | AdapNoise: Frequency-Domain Adaptive Defense for Face Recognition Against Black-Box Attacks
|
|
| Guoyin Ren, Xinsong Wang, Dong Li, Xinyi Liu, and Qi Liu Article Full Text PDF |
||
| 33. | InfAG-GAN: Infrared Adversarial Examples Generation Method Based on Generative Adversarial Network
|
|
| En-Hui Xu, Yong-Ping Wang, Jin-Cai Xu, Bai-Qi Xiao, Xiao-Lin Zhang, and Zhi-Feng Xiao Article Full Text PDF |
||
| 34. | Distributed w-Event Data Publishing Based on Differential Privacy in V2G Networks
|
|
| Yuancheng Li, Peidong Yin, Xiong Liu, and Rong Huang Article Full Text PDF |
||
| 35. | Strong Robust Image Steganography Model Based on Adversarial Examples
|
|
| Dianjing Li and Qiuyu Zhang Article Full Text PDF |
||
| 36. | Security of Corporate Financial Sharing Information System Based on Big Data Audit Thinking
|
|
| Chuchu Lu Article Full Text PDF |
||
| 37. | TextSpoofer: Text Adversarial Attack Based on Hard-label Black Box
|
|
| Xiao-Lin Zhang, Bin Wu, Yong-Ping Wang, Yan-Lei Wei, En-Hui Xu, and Zhi-Feng Xiao Article Full Text PDF |
||
| 38. | Sparse Encrypted Image Steganography Technology Combining TPN and STGN Model
|
|
| Qianying Guo and Qiufeng Wang Article Full Text PDF |
||