Quick Search:

Online First:

International Journal of Network Security

1. A Full-Cycle Multi-Mode Modular Simulation Technology Based on SAR Satellite Imaging Data Stream
Liping Qiao, Xueting Jia, and Fanjin Zeng
Article Full Text PDF

2. PM-tGAN: Detecting Packed Malware Based on Transferring Generative Adversarial Network
Kaida Jiang, Futai Zou, Xin Ge, Mingyi Huang, Zichao Gong, and Fei Shao
Article Full Text PDF

3. KNNBA: A Black-box Adversarial Attack Against Machine Learning-based IoT NIDSs
Hongling Jiang, Jinzhi Lin, and Haiyan Kang
Article Full Text PDF

4. Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
Yan Cai
Article Full Text PDF

5. SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
Junheng Wang
Article Full Text PDF

6. Detection and Classification of Packed Malware Based on Target Detection Networks
Yuntao Zhao, Yongnan Chen, and Wei Liu
Article Full Text PDF

7. Tag Ownership Transfer Protocol for RFID Based on NTRU Encryption Algorithm
Ai-Fen Lu and Yong-Ping Xiong
Article Full Text PDF

8. Reversible Data Hiding Based on Chinese Remainder Theorem for Polynomials and Secret Sharing
Guangtian Fang, Feng Wang, Chenbin Zhao, Chin-Chen Chang, and Wan-Li Lyu
Article Full Text PDF

9. Automated Signature Generation and Network Malicious Code Detection Technology Based on Big Data Analysis
Yifang Chen, Zhiqing Sun, Yihan Zhang, and Yi Xuan
Article Full Text PDF

10. Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing
Article Full Text PDF

11. Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi
Article Full Text PDF

12. RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
Feng-Chun Lin and Wei-Qing Wan
Article Full Text PDF

13. Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong
Article Full Text PDF

14. A Novel Off-Chain Transaction Framework for Channel Cooperation
Wei-Jun Gao, Cheng-Yin Jiao, and Yu-Ying Zhang
Article Full Text PDF

15. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang
Article Full Text PDF

16. Anonymous Credential Protocol Based on SM2 Digital Signature
Chenxiang Zhang and Weiji Yang
Article Full Text PDF

17. Monocular Depth Estimation Using Geometric Perception Fusion
Chunhua Wang, Ying Gao, and Zhenyu Wang
Article Full Text PDF

18. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF

19. TS-Code Efficient and Low-Cost Recovery in Storage Systems
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang
Article Full Text PDF

20. Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
Huiwen Yuan
Article Full Text PDF

21. DV-Hop Deception Attack Model for Node Information Security in WSNs
Kongze Li and Chunyan Ou
Article Full Text PDF

22. Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang
Article Full Text PDF

23. CCA Secure Revocable Identity-based Proxy Re-encryption
Qiaodan Tan
Article Full Text PDF

24. Application of IPFS Decentralized Blockchain Model in Internet of Things Privacy Maintenance
Weidong Zhang, Jiurong Ding, and Wenjun Su
Article Full Text PDF

25. A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li
Article Full Text PDF

26. Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun
Article Full Text PDF

27. Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
Emran Al-Buraihy, Dan Wang, and Wasim Ali
Article Full Text PDF

28. Fused Distortion Design for Efficient H.264 Video Steganography
Ying Liu, Shijie Xu, and Hao Xie
Article Full Text PDF

29. An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
Minfei Wu, Jie Gao, and Hongbing Cheng
Article Full Text PDF

30. From Logs to Images: Log-based APT Detection via Masked Autoencoder
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue
Article Full Text PDF

31. LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
Minfei Wu, Kun Zhou, and Hongbing Cheng
Article Full Text PDF

32. Data Recovery Techniques and Data Integrity Verification Methods in Digital Forensics
Xiaoyan Luo
Article Full Text PDF

33. RFID Tag Ownership Transfer Protocol Based on Mms
Dao-Wei Liu, Wei Tao, and Ling-Li Fu
Article Full Text PDF

34. Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
Hongbo Yu, Yue Yu, Songrui Li, and Yan Li
Article Full Text PDF

35. Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
Siyu Hou, Jianguo Ren, and Yonghong Xu
Article Full Text PDF

36. Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

37. Multi-domain United Transformer for Image Forgery Localization
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu
Article Full Text PDF

38. Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
Yan Yan, Jie Yang, and Tianqi Hu
Article Full Text PDF

39. A Close-Range Anonymous Authentication Protocol for Agricultural IoT
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao
Article Full Text PDF

40. SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng
Article Full Text PDF

41. A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao
Article Full Text PDF

42. Word-level Attention Scores based Attacker for NLP Classifier
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu
Article Full Text PDF

43. Location Privacy Protection Scheme Based on Secret State Computation for Randomization
Xin Zhang, Linming Gong, and Su Pu
Article Full Text PDF

44. Sparse Adversarial Attack Based on Salient Region Optimization
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu
Article Full Text PDF

45. Block-based Complementary Embedding Reversible Data Hiding
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng
Article Full Text PDF

46. Social Internet Privacy Protection Combining K-subgraph and D-KDLD
Zhiwei Li
Article Full Text PDF

47. Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
Xi Chen and Zhun Wang
Article Full Text PDF

48. Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
Bing Qiao, Zhihua Niu, and Jie Zhang
Article Full Text PDF

49. Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
Ming Yan, Tongjiang Yan, and Yuhua Sun
Article Full Text PDF

50. MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
Longhui Hu, Yuntao Zhao, and Yongxin Feng
Article Full Text PDF

51. A Speech Steganography Privacy Protection Scheme Based on Secret Sharing
Changxiang Zhao, Jianping Cai, Ximeng Liu, Qi Zhong, and Zuobin Ying
Article Full Text PDF

52. Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

53. More Efficient Access Control Solutions for IPFE
Yinyin Ma, Changgen Peng, and Tao Zhang
Article Full Text PDF

54. Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen
Article Full Text PDF

55. Network Intrusion Detection Based on Improved WOA Algorithm and LSTM
Xianjun Wang
Article Full Text PDF

56. Emergency Response Management Model and Application Based on Distributed IPv6 Network
Xiaoting Ren
Article Full Text PDF

57. Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
Yu Song, Zhenshuai Zhang, and Bingkui Li
Article Full Text PDF

58. Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie
Article Full Text PDF

59. Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
Jianxi Zhang, Yue Liu, and Peiying Zhao
Article Full Text PDF