Quick Search:

Online First:

International Journal of Network Security

1. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF

2. A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li
Article Full Text PDF

3. Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
Emran Al-Buraihy, Dan Wang, and Wasim Ali
Article Full Text PDF

4. Fused Distortion Design for Efficient H.264 Video Steganography
Ying Liu, Shijie Xu, and Hao Xie
Article Full Text PDF

5. An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
Minfei Wu, Jie Gao, and Hongbing Cheng
Article Full Text PDF

6. From Logs to Images: Log-based APT Detection via Masked Autoencoder
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue
Article Full Text PDF

7. LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
Minfei Wu, Kun Zhou, and Hongbing Cheng
Article Full Text PDF

8. Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
Siyu Hou, Jianguo Ren, and Yonghong Xu
Article Full Text PDF

9. Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

10. Multi-domain United Transformer for Image Forgery Localization
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu
Article Full Text PDF

11. Block-based Complementary Embedding Reversible Data Hiding
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng
Article Full Text PDF

12. Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
Bing Qiao, Zhihua Niu, and Jie Zhang
Article Full Text PDF

13. More Efficient Access Control Solutions for IPFE
Yinyin Ma, Changgen Peng, and Tao Zhang
Article Full Text PDF

14. IRDP-Fast Repair Array Code Based on Local Redundancy
Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang
Article Full Text PDF

15. Research on the Application of Differential Privacy in Defect Detection Image Classification Algorithms
Guo Fang and Ren Yan
Article Full Text PDF

16. CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption
Shuquan Li, Kun She, and Ruojie Li
Article Full Text PDF

17. One-R Random Forest and Fusion Feature Selection for Japanese Data DDoS Attack Detection
Junpeng Liu
Article Full Text PDF

18. Wireless Key Generation Protocol for RFID System Based on Parity Check Patching Operation
Zhen-Hui Li and Yi-Jie Li
Article Full Text PDF

19. A Secured RFID Authentication Protocol in Telecare Medicine Information System
Rong Zhu, Zhi-Yong Ji, and Wan-Rong Liu
Article Full Text PDF

20. An Efficient and Secure RFID Grouping Proof Protocol Conforming to EPC Class-1 Generation-2 Standards
Tao Pan, Taochun Wang, Kaizhong Zuo, and Chunhong Deng
Article Full Text PDF

21. Three-party Authentication Protocol for Mobile RFID System Based on Mms
Dao-wei Liu, Li He, and Mei-fang Chen
Article Full Text PDF

22. RFID Bidirectional Authentication Protocol Based on Cross Modular Composition Operation
Nuo-Wei Li, Wei-Ke Zou, and Qiang Liu
Article Full Text PDF

23. Network Intrusion Detection Method Integrating Multi-Scale One Dimensional Convolutional Neural Network and BiLSTM
Xiaojing Kong and Xiaonan Kong
Article Full Text PDF

24. Research on the Defensive Performance of SimViT Classification Model
Youkang Chang and Xuanpeng Ma
Article Full Text PDF

25. Reliability Analysis of Train-to-Train (T2T) Communication Systems in Subway Tunnels Utilizing Deterministic and Stochastic Petri Nets
Yifeng Li, Yating Wu, Xiaoyong Wang, Xi Wang, Hengkai Zhao, and Guoxin Zheng
Article Full Text PDF

26. Analysis and Research on Utilizing Model Information to Optimize Differential Privacy in Federated Learning
Zhaoxian Liang and Yonghong Chen
Article Full Text PDF

27. A Multi-hop Graph Network with Logic Inference for Robust and Trustworthy Reasoning
Chao Yang, Xifeng Ning, Hailu Sun, Dejun Yu, Pingping Li, and Yifan Zhu
Article Full Text PDF

28. A Network Traffic Classification Method Based on Shapelet Features and Ensemble Learning
Xin Xie, Hanxin Zheng, Si Yu, and Xingpeng Zheng
Article Full Text PDF