International Journal of Network Security | ||
1. | A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
|
|
Liping Qiao, Xueting Jia, and Fanjin Zeng Article Full Text PDF |
||
2. | PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
|
|
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao Article Full Text PDF |
||
3. | KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
|
|
Hongling Jiang, Jinzhi Lin, and Haiyan Kang Article Full Text PDF |
||
4. | Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
|
|
Yan Cai Article Full Text PDF |
||
5. | SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
|
|
Junheng Wang Article Full Text PDF |
||
6. | Detection and Classification of Packed Malware Based on Target Detection Networks
|
|
Yuntao Zhao, Yongnan Chen, and Wei Liu Article Full Text PDF |
||
7. | Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
|
|
Ai-Fen Lu and Yong-Ping Xiong Article Full Text PDF |
||
8. | Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
|
|
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu Article Full Text PDF |
||
9. | Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
|
|
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan Article Full Text PDF |
||
10. | Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
|
|
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing Article Full Text PDF |
||
11. | Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
|
|
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi Article Full Text PDF |
||
12. | RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
|
|
Feng-Chun Lin and Wei-Qing Wan Article Full Text PDF |
||
13. | Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
|
|
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong Article Full Text PDF |
||
14. | A Novel Off-Chain Transaction Framework for Channel Cooperation
|
|
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang Article Full Text PDF |
||
15. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang Article Full Text PDF |
||
16. | Anonymous Credential Protocol Based on SM2 Digital Signature
|
|
Chenxiang Zhang and Weiji Yang Article Full Text PDF |
||
17. | Monocular Depth Estimation Using Geometric Perception Fusion
|
|
Chunhua Wang, Ying Gao, and Zhenyu Wang Article Full Text PDF |
||
18. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||
19. | TS-Code Efficient and Low-Cost Recovery in Storage Systems
|
|
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang Article Full Text PDF |
||
20. | Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
|
|
Huiwen Yuan Article Full Text PDF |
||
21. | DV-Hop Deception Attack Model for Node Information Security in WSNs
|
|
Kongze Li and Chunyan Ou Article Full Text PDF |
||
22. | Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
|
|
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang Article Full Text PDF |
||
23. | CCA Secure Revocable Identity-based Proxy Re-encryption
|
|
Qiaodan Tan Article Full Text PDF |
||
24. | Application of IPFS Decentralized Blockchain Model in Internet of Things Privacy Maintenance
|
|
Weidong Zhang, Jiurong Ding, and Wenjun Su Article Full Text PDF |
||
25. | A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
|
|
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li Article Full Text PDF |
||
26. | Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
|
|
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun Article Full Text PDF |
||
27. | Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
|
|
Emran Al-Buraihy, Dan Wang, and Wasim Ali Article Full Text PDF |
||
28. | Fused Distortion Design for Efficient H.264 Video Steganography
|
|
Ying Liu, Shijie Xu, and Hao Xie Article Full Text PDF |
||
29. | An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
|
|
Minfei Wu, Jie Gao, and Hongbing Cheng Article Full Text PDF |
||
30. | From Logs to Images: Log-based APT Detection via Masked Autoencoder
|
|
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue Article Full Text PDF |
||
31. | LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
|
|
Minfei Wu, Kun Zhou, and Hongbing Cheng Article Full Text PDF |
||
32. | Data Recovery Techniques and Data Integrity Verification Methods in Digital Forensics
|
|
Xiaoyan Luo Article Full Text PDF |
||
33. | RFID Tag Ownership Transfer Protocol Based on Mms
|
|
Dao-Wei Liu, Wei Tao, and Ling-Li Fu Article Full Text PDF |
||
34. | Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
|
|
Hongbo Yu, Yue Yu, Songrui Li, and Yan Li Article Full Text PDF |
||
35. | Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
|
|
Siyu Hou, Jianguo Ren, and Yonghong Xu Article Full Text PDF |
||
36. | Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
|
|
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
37. | Multi-domain United Transformer for Image Forgery Localization
|
|
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu Article Full Text PDF |
||
38. | Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
|
|
Yan Yan, Jie Yang, and Tianqi Hu Article Full Text PDF |
||
39. | A Close-Range Anonymous Authentication Protocol for Agricultural IoT
|
|
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao Article Full Text PDF |
||
40. | SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
|
|
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng Article Full Text PDF |
||
41. | A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
|
|
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao Article Full Text PDF |
||
42. | Word-level Attention Scores based Attacker for NLP Classifier
|
|
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu Article Full Text PDF |
||
43. | Location Privacy Protection Scheme Based on Secret State Computation for Randomization
|
|
Xin Zhang, Linming Gong, and Su Pu Article Full Text PDF |
||
44. | Sparse Adversarial Attack Based on Salient Region Optimization
|
|
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu Article Full Text PDF |
||
45. | Block-based Complementary Embedding Reversible Data Hiding
|
|
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng Article Full Text PDF |
||
46. | Social Internet Privacy Protection Combining K-subgraph and D-KDLD
|
|
Zhiwei Li Article Full Text PDF |
||
47. | Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
|
|
Xi Chen and Zhun Wang Article Full Text PDF |
||
48. | Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
|
|
Bing Qiao, Zhihua Niu, and Jie Zhang Article Full Text PDF |
||
49. | Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
|
|
Ming Yan, Tongjiang Yan, and Yuhua Sun Article Full Text PDF |
||
50. | MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
|
|
Longhui Hu, Yuntao Zhao, and Yongxin Feng Article Full Text PDF |
||
51. | A Speech Steganography Privacy Protection Scheme Based on Secret Sharing
|
|
Changxiang Zhao, Jianping Cai, Ximeng Liu, Qi Zhong, and Zuobin Ying Article Full Text PDF |
||
52. | Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
|
|
Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
53. | More Efficient Access Control Solutions for IPFE
|
|
Yinyin Ma, Changgen Peng, and Tao Zhang Article Full Text PDF |
||
54. | Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
|
|
Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen Article Full Text PDF |
||
55. | Network Intrusion Detection Based on Improved WOA Algorithm and LSTM
|
|
Xianjun Wang Article Full Text PDF |
||
56. | Emergency Response Management Model and Application Based on Distributed IPv6 Network
|
|
Xiaoting Ren Article Full Text PDF |
||
57. | Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
|
|
Yu Song, Zhenshuai Zhang, and Bingkui Li Article Full Text PDF |
||
58. | Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
|
|
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie Article Full Text PDF |
||
59. | Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
|
|
Jianxi Zhang, Yue Liu, and Peiying Zhao Article Full Text PDF |
||