| International Journal of Network Security | ||
| 1. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
| Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||
| 2. | A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
|
|
| Hao Huang, Jinguo Li, Na Zhao, and Chengming Li Article Full Text PDF |
||
| 3. | Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
|
|
| Emran Al-Buraihy, Dan Wang, and Wasim Ali Article Full Text PDF |
||
| 4. | Fused Distortion Design for Efficient H.264 Video Steganography
|
|
| Ying Liu, Shijie Xu, and Hao Xie Article Full Text PDF |
||
| 5. | An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
|
|
| Minfei Wu, Jie Gao, and Hongbing Cheng Article Full Text PDF |
||
| 6. | From Logs to Images: Log-based APT Detection via Masked Autoencoder
|
|
| Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue Article Full Text PDF |
||
| 7. | LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
|
|
| Minfei Wu, Kun Zhou, and Hongbing Cheng Article Full Text PDF |
||
| 8. | Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
|
|
| Siyu Hou, Jianguo Ren, and Yonghong Xu Article Full Text PDF |
||
| 9. | Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
|
|
| Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
| 10. | Multi-domain United Transformer for Image Forgery Localization
|
|
| Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu Article Full Text PDF |
||
| 11. | Block-based Complementary Embedding Reversible Data Hiding
|
|
| Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng Article Full Text PDF |
||
| 12. | Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
|
|
| Bing Qiao, Zhihua Niu, and Jie Zhang Article Full Text PDF |
||
| 13. | More Efficient Access Control Solutions for IPFE
|
|
| Yinyin Ma, Changgen Peng, and Tao Zhang Article Full Text PDF |
||
| 14. | IRDP-Fast Repair Array Code Based on Local Redundancy
|
|
| Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang Article Full Text PDF |
||
| 15. | Research on the Application of Differential Privacy in Defect Detection Image Classification Algorithms
|
|
| Guo Fang and Ren Yan Article Full Text PDF |
||
| 16. | CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption
|
|
| Shuquan Li, Kun She, and Ruojie Li Article Full Text PDF |
||
| 17. | One-R Random Forest and Fusion Feature Selection for Japanese Data DDoS Attack Detection
|
|
| Junpeng Liu Article Full Text PDF |
||
| 18. | Wireless Key Generation Protocol for RFID System Based on Parity Check Patching Operation
|
|
| Zhen-Hui Li and Yi-Jie Li Article Full Text PDF |
||
| 19. | A Secured RFID Authentication Protocol in Telecare Medicine Information System
|
|
| Rong Zhu, Zhi-Yong Ji, and Wan-Rong Liu Article Full Text PDF |
||
| 20. | An Efficient and Secure RFID Grouping Proof Protocol Conforming to EPC Class-1 Generation-2 Standards
|
|
| Tao Pan, Taochun Wang, Kaizhong Zuo, and Chunhong Deng Article Full Text PDF |
||
| 21. | Three-party Authentication Protocol for Mobile RFID System Based on Mms
|
|
| Dao-wei Liu, Li He, and Mei-fang Chen Article Full Text PDF |
||
| 22. | RFID Bidirectional Authentication Protocol Based on Cross Modular Composition Operation
|
|
| Nuo-Wei Li, Wei-Ke Zou, and Qiang Liu Article Full Text PDF |
||
| 23. | Network Intrusion Detection Method Integrating Multi-Scale One Dimensional Convolutional Neural Network and BiLSTM
|
|
| Xiaojing Kong and Xiaonan Kong Article Full Text PDF |
||
| 24. | Research on the Defensive Performance of SimViT Classification Model
|
|
| Youkang Chang and Xuanpeng Ma Article Full Text PDF |
||
| 25. | Reliability Analysis of Train-to-Train (T2T) Communication Systems in Subway Tunnels Utilizing Deterministic and Stochastic Petri Nets
|
|
| Yifeng Li, Yating Wu, Xiaoyong Wang, Xi Wang, Hengkai Zhao, and Guoxin Zheng Article Full Text PDF |
||
| 26. | Analysis and Research on Utilizing Model Information to Optimize Differential Privacy in Federated Learning
|
|
| Zhaoxian Liang and Yonghong Chen Article Full Text PDF |
||
| 27. | A Multi-hop Graph Network with Logic Inference for Robust and Trustworthy Reasoning
|
|
| Chao Yang, Xifeng Ning, Hailu Sun, Dejun Yu, Pingping Li, and Yifan Zhu Article Full Text PDF |
||
| 28. | A Network Traffic Classification Method Based on Shapelet Features and Ensemble Learning
|
|
| Xin Xie, Hanxin Zheng, Si Yu, and Xingpeng Zheng Article Full Text PDF |
||