Quick Search:

Online First:

International Journal of Network Security

1. Privacy-preserving Verifiable Encrypted Image Retrieval in Secure Cloud Computing
Jiahui Tang, Qiuyu Zhang, and Shaozheng Zhang
Article Full Text PDF

2. Blockchain-based Authentication Scheme for Conditional Privacy Protection in IoV
Pengshou Xie, Cunhuan Tan, Tao Feng, Yongping Kang, Xinyu Fan, and Kai Wang
Article Full Text PDF

3. TS-Code Efficient and Low-Cost Recovery in Storage Systems
Jinhua Tang, Juan Huang, Hongzhou Yu, Jun Yang, Ningchao Bai, Jing Gong, Dan Tang, Hongliang Cai, Pan Xiong, and Junyan Zhang
Article Full Text PDF

4. Design and Application of Network Traffic Security Early Warning System Based on Multi-strategy Algorithm Optimization
Huiwen Yuan
Article Full Text PDF

5. DV-Hop Deception Attack Model for Node Information Security in WSNs
Kongze Li and Chunyan Ou
Article Full Text PDF

6. Power Ciphertext Multi-Party Secure Computing Model Based on Paillier Privacy Computing
Yongqiao Zhang, Junjun Hu, Wenjian Chen, Jie Mei, Pengfei Cheng, and Dongdong Zhang
Article Full Text PDF

7. A Multi-View Composite Graph Neural Network Based Contrastive Learning Framework for Anomaly Detection
Hao Huang, Jinguo Li, Na Zhao, and Chengming Li
Article Full Text PDF

8. Multi-objective Cloud Task Scheduling Based on Multi-Strategy Improved Sparrow Search Algorithm
Zhiyong Luo, Wenyao Teng, Hao Jiang, and Guanglu Sun
Article Full Text PDF

9. Efficient Sentiment Analysis of Social Media Data Using Dynamic Feature Extraction and Word Embeddings in a CNN Framework
Emran Al-Buraihy, Dan Wang, and Wasim Ali
Article Full Text PDF

10. Fused Distortion Design for Efficient H.264 Video Steganography
Ying Liu, Shijie Xu, and Hao Xie
Article Full Text PDF

11. An Image-based NFT Plagiarism Detection Model: A Fusion Strategy of Deep Learning and Graph Neural Networks
Minfei Wu, Jie Gao, and Hongbing Cheng
Article Full Text PDF

12. From Logs to Images: Log-based APT Detection via Masked Autoencoder
Lin Shao, Guobo Hu, Jing Yu, Liming Wang, Zhongxing Fu, Lei Yu, Jianing Wang, and Xiaochao Xue
Article Full Text PDF

13. LLM4SCD: A Novel Vulnerability Detection Scheme for Smart Contracts Based on LLM
Minfei Wu, Kun Zhou, and Hongbing Cheng
Article Full Text PDF

14. RFID Tag Ownership Transfer Protocol Based on Mms
Dao-Wei Liu, Wei Tao, and Ling-Li Fu
Article Full Text PDF

15. Real-time Rice Monitoring Method Based on BeiDou Satellite System and Encrypted Communication in Smart Sensor Networks
Hongbo Yu, Yue Yu, Songrui Li, and Yan Li
Article Full Text PDF

16. Evolutionary Game Based Tripartite Attack and Defense Model in Wireless Sensor Network
Siyu Hou, Jianguo Ren, and Yonghong Xu
Article Full Text PDF

17. Generating Natural Language Adversarial Examples By Combining Probability and Position Sensitivity
Yao Liu, Xiaolin Zhang, Yongping Wang, Jingyu Wang, Lixin Liu, and Huanxiang Zhang
Article Full Text PDF

18. Multi-domain United Transformer for Image Forgery Localization
Guang Yang, Qiu-Yu Zhang, and Kaiqi Lu
Article Full Text PDF

19. A Close-Range Anonymous Authentication Protocol for Agricultural IoT
Tao Wan, Jiangtao Mei, Lingfeng Liu, Weichuan Liao, and Yongcai Xiao
Article Full Text PDF

20. SM2-Enabled Certificateless Linkable Ring Signcryption for Privacy Protection in TMIS
Yinghui Zhang, Zehua Xiao, Jin Cao, and Dong Zheng
Article Full Text PDF

21. A Blockchain and ABAC Based Hierarchical Access Control Model for the Power Data
Qi Yuan, Meitong Zhou, Hao Yuan, Jingjing Wen, and Yue Shao
Article Full Text PDF

22. Word-level Attention Scores based Attacker for NLP Classifier
Bin Wu, Xiao-Lin Zhang, Yong-Ping Wang, Rui-Chun Gu, and Li-Xin Liu
Article Full Text PDF

23. Location Privacy Protection Scheme Based on Secret State Computation for Randomization
Xin Zhang, Linming Gong, and Su Pu
Article Full Text PDF

24. Sparse Adversarial Attack Based on Salient Region Optimization
Xiaojun Xu, Xiaolin Zhang, Yongping Wang, Ruichun Gu, and Enhui Xu
Article Full Text PDF

25. Block-based Complementary Embedding Reversible Data Hiding
Anran Yao, Fang Ren, Xuefeng Zhang, and Mengmeng Zeng
Article Full Text PDF

26. Bidirectional Authentication Protocol for RFID System Based on Modular Product Synthesis Algorithm
Xi Chen and Zhun Wang
Article Full Text PDF

27. Cryptographic Properties of Binary Sequences Derived from Power Function {n^q mod q mod 2}_(n=0)^(q-1)
Bing Qiao, Zhihua Niu, and Jie Zhang
Article Full Text PDF

28. Three Classes of Entanglement-assisted Quantum MDS Codes with Flexible Parameters by Negacyclic Codes
Ming Yan, Tongjiang Yan, and Yuhua Sun
Article Full Text PDF

29. More Efficient Access Control Solutions for IPFE
Yinyin Ma, Changgen Peng, and Tao Zhang
Article Full Text PDF

30. Federated Reinforcement Learning-based Intrusion Detection Method in Vehicular Netwoks
Yu Song, Zhenshuai Zhang, and Bingkui Li
Article Full Text PDF

31. Network Security Level Protection Evaluation Model Based on Large Language Model and Cluster Analysis
Bin Chen, Bin Li, Yuting Tang, and Xiaogang Xie
Article Full Text PDF

32. IRDP-Fast Repair Array Code Based on Local Redundancy
Juan Huang, Hongzhou Yu, Jinhua Tang, Dan Tang, Hongliang Cai, and Junyan Zhang
Article Full Text PDF

33. UAV-Assisted Authenticated Key Agreement Scheme for Precision Agricultural IoT Networks
Wenyan Quan, Juan Qu, and Haiyan Zhou
Article Full Text PDF

34. Application of Enhanced V-detector Algorithm in Network Intrusion Detection
Yelin Weng and Xiwu Zhou
Article Full Text PDF

35. Research on the Application of Differential Privacy in Defect Detection Image Classification Algorithms
Guo Fang and Ren Yan
Article Full Text PDF

36. A PCA-LSTM Neural Method for Network Security Posture Prediction
Yinsheng Fu and Bin Hu
Article Full Text PDF

37. CP-ABE Scheme Supporting Direct Revocation and Outsourcing Decryption
Shuquan Li, Kun She, and Ruojie Li
Article Full Text PDF

38. High Capacity Reversible Data Hiding Scheme in Encrypted Images Using Interpolation and XOR Operation
Weiwei Zhuang, Yihao Li, and Huaqi Ou
Article Full Text PDF

39. Prediction of Network Security Situation Based on GRU and Multi-Head Attention
Changpeng Ji, Tianjie Gao, and Wei Dai
Article Full Text PDF

40. One-R Random Forest and Fusion Feature Selection for Japanese Data DDoS Attack Detection
Junpeng Liu
Article Full Text PDF

41. Wireless Key Generation Protocol for RFID System Based on Parity Check Patching Operation
Zhen-Hui Li and Yi-Jie Li
Article Full Text PDF

42. Research on Log Anomaly Detection of English Data System Based on Long and Short Memory Network
Qiang Sun
Article Full Text PDF

43. A Secured RFID Authentication Protocol in Telecare Medicine Information System
Rong Zhu, Zhi-Yong Ji, and Wan-Rong Liu
Article Full Text PDF

44. An Efficient and Secure RFID Grouping Proof Protocol Conforming to EPC Class-1 Generation-2 Standards
Tao Pan, Taochun Wang, Kaizhong Zuo, and Chunhong Deng
Article Full Text PDF

45. Three-party Authentication Protocol for Mobile RFID System Based on Mms
Dao-wei Liu, Li He, and Mei-fang Chen
Article Full Text PDF

46. RFID Bidirectional Authentication Protocol Based on Cross Modular Composition Operation
Nuo-Wei Li, Wei-Ke Zou, and Qiang Liu
Article Full Text PDF

47. Network Intrusion Detection Method Integrating Multi-Scale One Dimensional Convolutional Neural Network and BiLSTM
Xiaojing Kong and Xiaonan Kong
Article Full Text PDF

48. Research on the Defensive Performance of SimViT Classification Model
Youkang Chang and Xuanpeng Ma
Article Full Text PDF

49. Reliability Analysis of Train-to-Train (T2T) Communication Systems in Subway Tunnels Utilizing Deterministic and Stochastic Petri Nets
Yifeng Li, Yating Wu, Xiaoyong Wang, Xi Wang, Hengkai Zhao, and Guoxin Zheng
Article Full Text PDF

50. Homomorphic Encryption Data Fusion Technology for Wireless Sensor Networks in Smart Cities
Yiyuan Tu and Guoqing Ding
Article Full Text PDF

51. Analysis and Research on Utilizing Model Information to Optimize Differential Privacy in Federated Learning
Zhaoxian Liang and Yonghong Chen
Article Full Text PDF

52. A Multi-hop Graph Network with Logic Inference for Robust and Trustworthy Reasoning
Chao Yang, Xifeng Ning, Hailu Sun, Dejun Yu, Pingping Li, and Yifan Zhu
Article Full Text PDF

53. An Effective Network Intrusion Detection Systems on Diverse IoT Traffic Datasets: A Hybrid Feature Selection and Extraction Method
Taiwo Blessing Ogunseyi, Cossi Blaise Avoussoukpo, Leizhen Wang, and Xu Zhou
Article Full Text PDF

54. A Network Traffic Classification Method Based on Shapelet Features and Ensemble Learning
Xin Xie, Hanxin Zheng, Si Yu, and Xingpeng Zheng
Article Full Text PDF