International Journal of Network Security | ||
1. | Risk Assessment and Prediction of Aging Industry Projects Based on Wireless Communication Network Technology
|
|
Yan Cai Article Full Text PDF |
||
2. | SCENet: Self-Supervised Contrastive Enhancement Network for Novel Family Malicious Domain Detection
|
|
Junheng Wang Article Full Text PDF |
||
3. | Exploration of Facial Forgery Detection Technology Based on ResNet50 Model
|
|
Xuedong Wu, Bin Liu, Pengji He, Hui He, Rong'an Ou and Yijiang Xing Article Full Text PDF |
||
4. | Reversible Data Hiding in Encrypted Binary Images Based on Improved Prediction Methods
|
|
Fang Ren, Meng-Meng Zeng, Zi-Fan Wang, and Xuan Shi Article Full Text PDF |
||
5. | RFID Group Tag Coexistence Proof Protocol Based on Commutation Synthesis Operation
|
|
Feng-Chun Lin and Wei-Qing Wan Article Full Text PDF |
||
6. | Revocable Group Signature Scheme for UC-based Blockchain Healthcare Data Sharing
|
|
Tao Feng, Changhui Li, Buzhen He, and Renbin Gong Article Full Text PDF |
||
7. | Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
|
|
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang Article Full Text PDF |
||
8. | Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
|
|
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang Article Full Text PDF |
||
9. | TS-Code Efficient and Low-Cost Recovery in Storage Systems
|
|
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang Article Full Text PDF |
||
10. | Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
|
|
Huiwen Yuan Article Full Text PDF |
||
11. | DV-Hop Deception Attack Model for Node Information Security in WSNs
|
|
Kongze Li and Chunyan Ou Article Full Text PDF |
||
12. | Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
|
|
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang Article Full Text PDF |
||
13. | A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
|
|
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li Article Full Text PDF |
||
14. | Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
|
|
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun Article Full Text PDF |
||
15. | Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
|
|
Emran Al-Buraihy, Dan Wang, and Wasim Ali Article Full Text PDF |
||
16. | Fused Distortion Design for Efficient H.264 Video Steganography
|
|
Ying Liu, Shijie Xu, and Hao Xie Article Full Text PDF |
||
17. | An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
|
|
Minfei Wu, Jie Gao, and Hongbing Cheng Article Full Text PDF |
||
18. | From Logs to Images: Log-based APT Detection via Masked Autoencoder
|
|
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue Article Full Text PDF |
||
19. | LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
|
|
Minfei Wu, Kun Zhou, and Hongbing Cheng Article Full Text PDF |
||
20. | RFID Tag Ownership Transfer Protocol Based on Mms
|
|
Dao-Wei Liu, Wei Tao, and Ling-Li Fu Article Full Text PDF |
||
21. | Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
|
|
Hongbo Yu, Yue Yu, Songrui Li, and Yan Li Article Full Text PDF |
||
22. | Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
|
|
Siyu Hou, Jianguo Ren, and Yonghong Xu Article Full Text PDF |
||
23. | Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
|
|
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
24. | Multi-domain United Transformer for Image Forgery Localization
|
|
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu Article Full Text PDF |
||
25. | Fed-LSSTAN: Location Semantics and Spatio-Temporal Attention Network for Next Point of Interest Recommendation based on Federated Learning and Differential Privacy
|
|
Yan Yan, Jie Yang, and Tianqi Hu Article Full Text PDF |
||
26. | A Close-Range Anonymous Authentication Protocol for Agricultural IoT
|
|
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao Article Full Text PDF |
||
27. | SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
|
|
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng Article Full Text PDF |
||
28. | A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
|
|
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao Article Full Text PDF |
||
29. | Word-level Attention Scores based Attacker for NLP Classifier
|
|
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu Article Full Text PDF |
||
30. | Location Privacy Protection Scheme Based on Secret State Computation for Randomization
|
|
Xin Zhang, Linming Gong, and Su Pu Article Full Text PDF |
||
31. | Sparse Adversarial Attack Based on Salient Region Optimization
|
|
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu Article Full Text PDF |
||
32. | Block-based Complementary Embedding Reversible Data Hiding
|
|
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng Article Full Text PDF |
||
33. | Social Internet Privacy Protection Combining K-subgraph and D-KDLD
|
|
Zhiwei Li Article Full Text PDF |
||
34. | Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
|
|
Xi Chen and Zhun Wang Article Full Text PDF |
||
35. | Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
|
|
Bing Qiao, Zhihua Niu, and Jie Zhang Article Full Text PDF |
||
36. | Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
|
|
Ming Yan, Tongjiang Yan, and Yuhua Sun Article Full Text PDF |
||
37. | MalELECTRA: A Malware Semantic Detection Method Integrated with the ELECTRA Model and Multi-Angle Adaptive Weights
|
|
Longhui Hu, Yuntao Zhao, and Yongxin Feng Article Full Text PDF |
||
38. | Generating Universal Targeted Perturbations for Boosting Transferability of Adversarial Examples
|
|
Yongping Wang, Zhenhao Yan, Xiaolin Zhang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang Article Full Text PDF |
||
39. | More Efficient Access Control Solutions for IPFE
|
|
Yinyin Ma, Changgen Peng, and Tao Zhang Article Full Text PDF |
||
40. | Verifiable Forward and Backward Private Searchable Encryption with Search Pattern Privacy
|
|
Hongjie Lv, Wei Liu, Jiayi Song, and Ke Chen Article Full Text PDF |
||
41. | Emergency Response Management Model and Application Based on Distributed IPv6 Network
|
|
Xiaoting Ren Article Full Text PDF |
||
42. | Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
|
|
Yu Song, Zhenshuai Zhang, and Bingkui Li Article Full Text PDF |
||
43. | Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
|
|
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie Article Full Text PDF |
||
44. | Internet of Things Data Security Sharing Based on Blockchain Technology and Credit Scoring Algorithm
|
|
Jianxi Zhang, Yue Liu, and Peiying Zhao Article Full Text PDF |
||
45. | Markov-Blockchain-based Trust Metrics and Supervision Scheme for Industrial OT Networks and Systems
|
|
Pengshou Xie, Xinghui Yang, Tao Feng, Yongping Kang, Yuxiang Ran, and Yapeng Liu Article Full Text PDF |
||
46. | IRDP-Fast Repair Array Code Based on Local Redundancy
|
|
Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang Article Full Text PDF |
||
47. | Digital Image Chaos Encryption Combining TLBO and GA
|
|
Xinxin Wang and Xiaoming Zhao Article Full Text PDF |
||
48. | UAV-Assisted Authenticated Key Agreement Scheme for Precision Agricultural IoT Networks
|
|
Wenyan Quan, Juan Qu, and Haiyan Zhou Article Full Text PDF |
||