| International Journal of Network Security | ||
| 1. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
| Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang Article Full Text PDF |
||
| 2. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
| Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||
| 3. | TS-Code Efficient and Low-Cost Recovery in Storage Systems
|
|
| Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang Article Full Text PDF |
||
| 4. | Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
|
|
| Huiwen Yuan Article Full Text PDF |
||
| 5. | DV-Hop Deception Attack Model for Node Information Security in WSNs
|
|
| Kongze Li and Chunyan Ou Article Full Text PDF |
||
| 6. | Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
|
|
| Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang Article Full Text PDF |
||
| 7. | A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
|
|
| Hao Huang, Jinguo Li, Na Zhao, and Chengming Li Article Full Text PDF |
||
| 8. | Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
|
|
| Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun Article Full Text PDF |
||
| 9. | Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
|
|
| Emran Al-Buraihy, Dan Wang, and Wasim Ali Article Full Text PDF |
||
| 10. | Fused Distortion Design for Efficient H.264 Video Steganography
|
|
| Ying Liu, Shijie Xu, and Hao Xie Article Full Text PDF |
||
| 11. | An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
|
|
| Minfei Wu, Jie Gao, and Hongbing Cheng Article Full Text PDF |
||
| 12. | From Logs to Images: Log-based APT Detection via Masked Autoencoder
|
|
| Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue Article Full Text PDF |
||
| 13. | LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
|
|
| Minfei Wu, Kun Zhou, and Hongbing Cheng Article Full Text PDF |
||
| 14. | RFID Tag Ownership Transfer Protocol Based on Mms
|
|
| Dao-Wei Liu, Wei Tao, and Ling-Li Fu Article Full Text PDF |
||
| 15. | Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
|
|
| Hongbo Yu, Yue Yu, Songrui Li, and Yan Li Article Full Text PDF |
||
| 16. | Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
|
|
| Siyu Hou, Jianguo Ren, and Yonghong Xu Article Full Text PDF |
||
| 17. | Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
|
|
| Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
| 18. | Multi-domain United Transformer for Image Forgery Localization
|
|
| Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu Article Full Text PDF |
||
| 19. | A Close-Range Anonymous Authentication Protocol for Agricultural IoT
|
|
| Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao Article Full Text PDF |
||
| 20. | SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
|
|
| Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng Article Full Text PDF |
||
| 21. | A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
|
|
| Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao Article Full Text PDF |
||
| 22. | Word-level Attention Scores based Attacker for NLP Classifier
|
|
| Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu Article Full Text PDF |
||
| 23. | Location Privacy Protection Scheme Based on Secret State Computation for Randomization
|
|
| Xin Zhang, Linming Gong, and Su Pu Article Full Text PDF |
||
| 24. | Sparse Adversarial Attack Based on Salient Region Optimization
|
|
| Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu Article Full Text PDF |
||
| 25. | Block-based Complementary Embedding Reversible Data Hiding
|
|
| Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng Article Full Text PDF |
||
| 26. | Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
|
|
| Xi Chen and Zhun Wang Article Full Text PDF |
||
| 27. | Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
|
|
| Bing Qiao, Zhihua Niu, and Jie Zhang Article Full Text PDF |
||
| 28. | Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
|
|
| Ming Yan, Tongjiang Yan, and Yuhua Sun Article Full Text PDF |
||
| 29. | More Efficient Access Control Solutions for IPFE
|
|
| Yinyin Ma, Changgen Peng, and Tao Zhang Article Full Text PDF |
||
| 30. | Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
|
|
| Yu Song, Zhenshuai Zhang, and Bingkui Li Article Full Text PDF |
||
| 31. | Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
|
|
| Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie Article Full Text PDF |
||
| 32. | IRDP-Fast Repair Array Code Based on Local Redundancy
|
|
| Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang Article Full Text PDF |
||
| 33. | UAV-Assisted Authenticated Key Agreement Scheme for Precision Agricultural IoT Networks
|
|
| Wenyan Quan, Juan Qu, and Haiyan Zhou Article Full Text PDF |
||
| 34. | Application of Enhanced V-detector Algorithm in Network Intrusion Detection
|
|
| Yelin Weng and Xiwu Zhou Article Full Text PDF |
||
| 35. | Research on the Application of Differential Privacy in Defect Detection Image Classification Algorithms
|
|
| Guo Fang and Ren Yan Article Full Text PDF |
||
| 36. | A PCA-LSTM Neural Method for Network Security Posture Prediction
|
|
| Yinsheng Fu and Bin Hu Article Full Text PDF |
||
| 37. | CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption
|
|
| Shuquan Li, Kun She, and Ruojie Li Article Full Text PDF |
||
| 38. | High Capacity Reversible Data Hiding Scheme in Encrypted Images Using Interpolation and XOR Operation
|
|
| Weiwei Zhuang, Yihao Li, and Huaqi Ou Article Full Text PDF |
||
| 39. | Prediction of Network Security Situation Based on GRU and Multi-Head Attention
|
|
| Changpeng Ji, Tianjie Gao, and Wei Dai Article Full Text PDF |
||
| 40. | One-R Random Forest and Fusion Feature Selection for Japanese Data DDoS Attack Detection
|
|
| Junpeng Liu Article Full Text PDF |
||
| 41. | Wireless Key Generation Protocol for RFID System Based on Parity Check Patching Operation
|
|
| Zhen-Hui Li and Yi-Jie Li Article Full Text PDF |
||
| 42. | Research on Log Anomaly Detection of English Data System Based on Long and Short Memory Network
|
|
| Qiang Sun Article Full Text PDF |
||
| 43. | A Secured RFID Authentication Protocol in Telecare Medicine Information System
|
|
| Rong Zhu, Zhi-Yong Ji, and Wan-Rong Liu Article Full Text PDF |
||
| 44. | An Efficient and Secure RFID Grouping Proof Protocol Conforming to EPC Class-1 Generation-2 Standards
|
|
| Tao Pan, Taochun Wang, Kaizhong Zuo, and Chunhong Deng Article Full Text PDF |
||
| 45. | Three-party Authentication Protocol for Mobile RFID System Based on Mms
|
|
| Dao-wei Liu, Li He, and Mei-fang Chen Article Full Text PDF |
||
| 46. | RFID Bidirectional Authentication Protocol Based on Cross Modular Composition Operation
|
|
| Nuo-Wei Li, Wei-Ke Zou, and Qiang Liu Article Full Text PDF |
||
| 47. | Network Intrusion Detection Method Integrating Multi-Scale One Dimensional Convolutional Neural Network and BiLSTM
|
|
| Xiaojing Kong and Xiaonan Kong Article Full Text PDF |
||
| 48. | Research on the Defensive Performance of SimViT Classification Model
|
|
| Youkang Chang and Xuanpeng Ma Article Full Text PDF |
||
| 49. | Reliability Analysis of Train-to-Train (T2T) Communication Systems in Subway Tunnels Utilizing Deterministic and Stochastic Petri Nets
|
|
| Yifeng Li, Yating Wu, Xiaoyong Wang, Xi Wang, Hengkai Zhao, and Guoxin Zheng Article Full Text PDF |
||
| 50. | Homomorphic Encryption Data Fusion Technology for Wireless Sensor Networks in Smart Cities
|
|
| Yiyuan Tu and Guoqing Ding Article Full Text PDF |
||
| 51. | Analysis and Research on Utilizing Model Information to Optimize Differential Privacy in Federated Learning
|
|
| Zhaoxian Liang and Yonghong Chen Article Full Text PDF |
||
| 52. | A Multi-hop Graph Network with Logic Inference for Robust and Trustworthy Reasoning
|
|
| Chao Yang, Xifeng Ning, Hailu Sun, Dejun Yu, Pingping Li, and Yifan Zhu Article Full Text PDF |
||
| 53. | An Effective Network Intrusion Detection Systems on Diverse IoT Traffic Datasets: A Hybrid Feature Selection and Extraction Method
|
|
| Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Leizhen Wang, and Xu Zhou Article Full Text PDF |
||
| 54. | A Network Traffic Classification Method Based on Shapelet Features and Ensemble Learning
|
|
| Xin Xie, Hanxin Zheng, Si Yu, and Xingpeng Zheng Article Full Text PDF |
||