網(wǎng)絡(luò)與信息安全學(xué)報(bào)2022年(第8卷)總目次
視 角
期 頁(yè)碼
隱私計(jì)算的學(xué)術(shù)內(nèi)涵與研究趨勢(shì)...................李鳳華,李暉,牛犇,邱衛(wèi)東 6 [2022078](1)
綜 述
基于攻防博弈的網(wǎng)絡(luò)防御決策方法研究綜述......................................劉小虎,張恒巍,馬軍強(qiáng),張玉臣,譚晶磊 1 [2021089](1)
深度學(xué)習(xí)模型的版權(quán)保護(hù)研究綜述...................王馨雅,華光,江昊,張海劍 2 [2022015](1)
工業(yè)控制系統(tǒng)關(guān)鍵組件安全風(fēng)險(xiǎn)綜述......................................唐士杰,袁方,李俊,丁勇,王會(huì)勇 3 [2022030](1)
可解釋的知識(shí)圖譜推理方法綜述......................................夏毅,蘭明敬,陳曉慧,羅軍勇,周剛,何鵬 5 [2022063](1)
專(zhuān) 欄
基于誘捕的軟件異常檢測(cè)綜述...................傅建明,劉暢,解夢(mèng)飛,羅陳可 1 [2022003](15)
基于流譜理論的SSL/TLS協(xié)議攻擊檢測(cè)方法......................................郭世澤,張帆,宋卓學(xué),趙子鳴,趙新杰,王小娟,羅向陽(yáng) 1 [2022004](30)
融合注意力機(jī)制和BSRU的工業(yè)互聯(lián)網(wǎng)安全態(tài)勢(shì)預(yù)測(cè)方法......................................胡向東,田正國(guó) 1 [2021092](41)
面向項(xiàng)目版本差異性的漏洞識(shí)別技術(shù)研究......................................黃誠(chéng),孫明旭,段仁語(yǔ),吳蘇晟,陳斌 1 [2021094](52)
基于半局部結(jié)構(gòu)的異常連邊識(shí)別算法...................石灝苒,吉立新,劉樹(shù)新,王庚潤(rùn) 1 [2021040](63)
基于混合深度學(xué)習(xí)的多類(lèi)型低速率DDoS攻擊檢測(cè)方法......................................李麗娟,李曼,畢紅軍,周華春 1 [2022001](73)
網(wǎng)絡(luò)空間擬態(tài)防御發(fā)展綜述:從擬態(tài)概念到“擬態(tài)+”生態(tài)......................................馬海龍,王亮,胡濤,江逸茗,曲彥澤 2 [2022018](15)
基于證據(jù)理論物聯(lián)網(wǎng)安全態(tài)勢(shì)感知方法研究...................李劍,董廷魯,李劼 2 [2022022](39)
基于softmax激活變換的對(duì)抗防御方法...................陳晉音,吳長(zhǎng)安,鄭海斌 2 [2022016](48)
基于以太坊狀態(tài)數(shù)據(jù)庫(kù)的攻擊與防御方案...................高鎮(zhèn),張東彬,田瀟 2 [2022013](64)
基于API調(diào)用管理的SDN應(yīng)用層DDoS攻擊防御機(jī)制......................................王洋,湯光明,王碩,楚江 2 [2022017](73)
基于多維特征圖知識(shí)蒸餾的對(duì)抗樣本防御方法...................邱寶琳,易平 2 [2022012](88)
NFT圖像隱寫(xiě)...................王子馳,馮國(guó)瑞,張新鵬 3 [2022029](18)
基于空域與頻域關(guān)系建模的篡改文本圖像檢測(cè)......................................王裕鑫,張博強(qiáng),謝洪濤,張勇東 3 [2022035](29)
基于加權(quán)最小二乘的社交網(wǎng)絡(luò)用戶(hù)定位方法...................時(shí)文旗,羅向陽(yáng),郭家山 3 [2022031](41)
安全性可控的生成式文本隱寫(xiě)算法...................梅佳蒙,任延珍,王麗娜 3 [2022039](53)
增強(qiáng)圖像平滑度的可逆信息隱藏方案......................................王婧晗,朱輝,李鶴麟,李暉,楊曉鵬 3 [2022040](66)
用于失配隱寫(xiě)分析的對(duì)抗子領(lǐng)域自適應(yīng)網(wǎng)絡(luò)...................章蕾,王宏霞 3 [2022028](76)
基于區(qū)塊鏈的高透明度PKI認(rèn)證協(xié)議...................陳立全,李瀟,楊哲懿,錢(qián)思杰 4 [2022052](1)
基于形式化方法的智能合約驗(yàn)證研究綜述......................................張文博,陳思敏,魏立斐,宋巍,黃冬梅 4 [2022041](12)
區(qū)塊鏈密碼學(xué)隱私保護(hù)技術(shù)綜述...................劉峰,楊杰,齊佳音 4 [2022054](29)
元宇宙中區(qū)塊鏈的應(yīng)用與展望...................宋曉玲,劉勇,董景楠,黃勇飛 4 [2022045](45)
基于區(qū)塊鏈的多權(quán)限屬性隱藏電子病歷共享方案...................金琳,田有亮 4 [2022044](66)
基于正常交易掩蓋下的區(qū)塊鏈隱蔽通信方案......................................姜鵬坤,張問(wèn)銀,王九如,黃善云,宋萬(wàn)水 4 [2022043](77)
基于GRU的智能手機(jī)多場(chǎng)景步態(tài)認(rèn)證......................................姜奇,馮茹,張瑞杰,王金花,陳婷,魏福山 5 [2022060](26)
基于GNN雙源學(xué)習(xí)的訪問(wèn)控制關(guān)系預(yù)測(cè)方法......................................單棣斌,杜學(xué)繪,王文娟,劉敖迪,王娜 5 [2022062](40)
動(dòng)態(tài)聚合權(quán)重的隱私保護(hù)聯(lián)邦學(xué)習(xí)框架...................應(yīng)作斌,方一晨,張怡文 5 [2022069](56)
基于鴿群的魯棒強(qiáng)化學(xué)習(xí)算法...................張明英,華冰,張宇光,李海東,鄭墨泓 5 [2022064](66)
基于區(qū)塊鏈與國(guó)密SM9的抗惡意KGC無(wú)證書(shū)簽名方案......................................唐飛,甘寧,陽(yáng)祥貴,王金洋 6 [2022073](9)
基于國(guó)密算法的車(chē)載以太網(wǎng)控制器身份認(rèn)證方法...................郭輝,羅勇,郭曉潞 6 [2022079](20)
低功耗嵌入式平臺(tái)的SM2國(guó)密算法優(yōu)化實(shí)現(xiàn)......................................劉贛秦,李暉,朱輝,黃煜坤,劉興東 6 [2022080](29)
基于SM2的兩方協(xié)作盲簽名協(xié)議...................白雪,秦寶東,郭瑞,鄭東 6 [2022081](39)
集群網(wǎng)絡(luò)密鑰管理方案研究綜述...................劉軍,袁霖,馮志尚 6 [2022082](52)
學(xué)術(shù)論文
基于圖像重構(gòu)的MNIST對(duì)抗樣本防御算法......................................秦中元,賀兆祥,李濤,陳立全 1 [2021095](86)
面向5G mMTC的網(wǎng)絡(luò)切片安全研究...................徐子鈞,劉建偉,李耕 1 [2022006](95)
基于細(xì)粒度嵌入空間預(yù)留的密文域圖像可逆信息隱藏方法......................................李錦偉,張曉雅,姚遠(yuǎn)志,俞能海 1 [2022008](106)
智能化的安卓手勢(shì)密碼取證關(guān)鍵技術(shù)......................................裘佳浩,邱衛(wèi)東,王楊德,查言,謝宇明,李巖 1 [2022005](118)
基于信譽(yù)管理模型的礦工類(lèi)型鑒別機(jī)制設(shè)計(jì)...................余佳仁,田有亮,林暉 1 [2022002](128)
支持多數(shù)不規(guī)則用戶(hù)的隱私保護(hù)聯(lián)邦學(xué)習(xí)框架......................................陳前昕,畢仁萬(wàn),林劼,金彪,熊金波 1 [2022011](139)
基于網(wǎng)絡(luò)防御知識(shí)圖譜的0day攻擊路徑預(yù)測(cè)方法......................................孫澄,胡浩,楊英杰,張紅旗 1 [2021101](151)
面向智能汽車(chē)的信息安全漏洞評(píng)分模型......................................于海洋,陳秀真,馬進(jìn),周志洪,侯書(shū)凝 1 [2021096](167)
面向商用活體檢測(cè)平臺(tái)的魯棒性評(píng)估......................................王鵬程,鄭海斌,鄒健飛,龐玲,李虎,陳晉音 1 [2022010](180)
基于原子混淆的通用側(cè)信道漏洞修補(bǔ)方法......................................鄒德清,張盼,劉偉,陳維杰,陸弈帆 2 [2022014](100)
云環(huán)境下基于屬性策略隱藏的可搜索加密方案......................................周藝華,扈新宇,李美奇,楊宇光 2 [2022019](112)
基于SM2聯(lián)合簽名的電子發(fā)票公開(kāi)驗(yàn)證方案......................................羅玙榕,曹進(jìn),李暉,趙興文,尚超 2 [2022020](122)
元宇宙發(fā)展演變及安全風(fēng)險(xiǎn)研究...................王海龍,李陽(yáng)春,李欲曉 2 [2022023](132)
基于標(biāo)簽傳播的兩階段社區(qū)檢測(cè)算法......................................孫學(xué)良,王巍,黃俊恒,辛國(guó)棟,王佰玲 2 [2021099](139)
基于DSR和BGRU模型的聊天文本證據(jù)分類(lèi)方法......................................張宇,李炳龍,李學(xué)娟,張和禹 2 [2022007](150)
基于混合分析的Java反序列化利用鏈挖掘方法...................武永興,陳力波,姜開(kāi)達(dá) 2 [2022009](160)
基于FANP的云用戶(hù)行為信任評(píng)估優(yōu)化機(jī)制......................................張藝,田立勤,毋澤南,武文星 2 [2021100](175)
容器云中基于信號(hào)博弈的容器遷移與蜜罐部署策略......................................李凌書(shū),鄔江興,曾威,劉文彥 3 [2021042] (87)
保護(hù)隱私的有理數(shù)科學(xué)計(jì)算...................劉旭紅,孫晨 3 [2022038] (97)
面向圖像識(shí)別的卷積神經(jīng)網(wǎng)絡(luò)魯棒性研究進(jìn)展...................林點(diǎn),潘理,易平 3 [2022037](111)
基于聯(lián)盟鏈的跨域認(rèn)證方案...................牛建林,任志宇,杜學(xué)繪 3 [2022036](123)
基于合成語(yǔ)音的計(jì)算安全隱寫(xiě)方法...................李夢(mèng)涵,陳可江,張衛(wèi)明,俞能海 3 [2022025](134)
基于信任值的車(chē)聯(lián)網(wǎng)分層共識(shí)優(yōu)化協(xié)議......................................翟寶琴,王健,韓磊,劉吉強(qiáng),何嘉豪,劉天皓 3 [2021097](142)
5G移動(dòng)邊緣計(jì)算場(chǎng)景下的快速切換認(rèn)證方案......................................張偉成,衛(wèi)紅權(quán),劉樹(shù)新,普黎明 3 [2022034](154)
基于SEIPQR模型的工控蠕蟲(chóng)防御策略...................潘 潔,葉蘭,趙賀,張?chǎng)卫?3 [2022032](169)
云計(jì)算多授權(quán)中心CP-ABE代理重加密方案...................劉尚,郭銀章 3 [2022033](176)
基于期望收益率攻擊圖的網(wǎng)絡(luò)風(fēng)險(xiǎn)評(píng)估研究......................................劉文甫,龐建民,周鑫,李男,岳峰 4 [2022047](87)
基于博弈論抗共謀攻擊的全局隨機(jī)化共識(shí)算法...................張寶,田有亮,高勝 4 [2022048](98)
載體獨(dú)立的深度光照水印算法...................陳浩,王鋒,張衛(wèi)明,俞能海 4 [2022056](110)
面向高速網(wǎng)絡(luò)流量的加密混淆型WebShell檢測(cè)......................................曹藝懷,陳偉,張帆,吳禮發(fā) 4 [2022055](119)
基于節(jié)點(diǎn)匹配度的動(dòng)態(tài)網(wǎng)絡(luò)鏈路預(yù)測(cè)方法......................................李聰,季新生,劉樹(shù)新,李勁松,李海濤 4 [2022053](131)
基于動(dòng)態(tài)瀏覽器指紋的鏈接檢測(cè)技術(shù)研究...................高凡,王健,劉吉強(qiáng) 4 [2022049](144)
車(chē)聯(lián)網(wǎng)中基于攻防博弈的蜜罐防御及傳輸策略......................................易杰,曹騰飛,郜帥,黃建強(qiáng) 4 [2022050](157)
基于改進(jìn)Transformer的社交媒體謠言檢測(cè)......................................鄭洪浩,郝一諾,于洪濤,李邵梅,吳翼騰 4 [2022042](168)
面向網(wǎng)絡(luò)安全資源池的智能服務(wù)鏈系統(tǒng)設(shè)計(jì)與分析......................................王澤南,李佳浩,檀朝紅,皮德常 4 [2022051](175)
支持受損數(shù)據(jù)定位與恢復(fù)的動(dòng)態(tài)群用戶(hù)可證明存儲(chǔ)......................................姜濤,徐航,王良民,馬建峰 5 [2022071](75)
新的基于雙混沌系統(tǒng)和壓縮感知的圖像加密算法...................楊宇光,曹?chē)?guó)棟 5 [2022058](88)
面向物聯(lián)網(wǎng)設(shè)備固件的硬編碼漏洞檢測(cè)方法......................................穆超,王鑫,楊明,張恒,陳振婭,吳曉明 5 [2022070](98)
基于字節(jié)碼的以太坊智能合約分類(lèi)方法...................林 丹,林凱欣,吳嘉婧,鄭子彬 5 [2022046](111)
面向進(jìn)程多變體軟件系統(tǒng)的攻擊面定性建模分析......................................邢??担瑥堝P,隋然,曲晟,季新生 5 [2022059](121)
基于SAT方法進(jìn)一步加速差分特征的搜索...................許崢 5 [2022066](129)
基于BRLWE的物聯(lián)網(wǎng)后量子加密技術(shù)研究......................................高藝恬,陳立全,屠天揚(yáng),高原,陳芊葉 5 [2022024](140)
數(shù)字貨幣交易匿名性與監(jiān)管的博弈分析......................................張嫻,朱建明,隋智源,明盛智 5 [2022068](150)
CAT-RFE:點(diǎn)擊欺詐的集成檢測(cè)框架......................................盧翼翔,耿光剛,延志偉,朱效民,張新常 5 [2022065](158)
基于通道間相關(guān)性的圖像重著色檢測(cè)......................................陳諾,祁樹(shù)仁,張玉書(shū),薛明富,花忠云 5 [2022057](167)
新的基于鼠標(biāo)行為的持續(xù)身份認(rèn)證方法...................易聰,胡軍 5 [2022067](179)
具有隱私保護(hù)的動(dòng)態(tài)高效車(chē)載云管理方案......................................肖敏,姚濤,劉媛妮,黃永洪 6 [2022083](70)
基于卷積神經(jīng)網(wǎng)絡(luò)的加密流量分類(lèi)方法...................謝絨娜,馬鑄鴻,李宗俞,田野 6 [2022077](84)
國(guó)家自然科學(xué)基金委員會(huì)網(wǎng)絡(luò)安全現(xiàn)狀與展望......................................李東,郝艷妮,彭升輝,訾瑞杰,劉西蒙 6 [2022076](92)
基于剪枝技術(shù)和魯棒蒸餾融合的輕量對(duì)抗攻擊防御方法......................................王濱,李思敏,錢(qián)亞冠,張君,李超豪,朱晨鳴,張鴻飛 6 [2022074](102)
基于雙分支網(wǎng)絡(luò)的圖像修復(fù)取證方法......................................章登勇,文凰,李峰,曹鵬,向凌云,楊高波,丁湘陵 6 [2022084](110)
基于符號(hào)執(zhí)行和-scope復(fù)雜度的代碼混淆度量方法......................................肖玉強(qiáng),郭云飛,王亞文 6 [2022085](123)
基于ROP/JOP gadgets性質(zhì)的軟件多樣化評(píng)估方法......................................遲宇寧,郭云飛,王亞文,扈紅超 6 [2022086](135)
空域頻域相結(jié)合的唇型篡改檢測(cè)方法...................林佳瀅,周文柏,張衛(wèi)明,俞能海 6 [2022075](146)
具有緊湊標(biāo)簽的基于身份匿名云審計(jì)方案......................................盧晨昕,陳兵,丁寧,陳立全,吳戈 6 [2022087](156)
信息增值機(jī)制下在線醫(yī)療隱私保護(hù)策略...................明盛智,朱建明,隋智源,張嫻 6 [2022072](169)
教育與教學(xué)
網(wǎng)絡(luò)空間安全專(zhuān)業(yè)課程思政教學(xué)探索與實(shí)踐——以東南大學(xué)“網(wǎng)絡(luò)空間安全新進(jìn)展”課程為例...................李古月,胡愛(ài)群 2 [2022021](183)
本科“機(jī)器學(xué)習(xí)”課程教學(xué)改革初探...................韋 南,殷麗華,寧洪,方濱興 4 [2022026](182)
Chinese Journal of Network and Information Security Contents List Vol.8 (2022)
No. Page
Perspective
Academic connotation and research trends of privacy computing......................................,,,6 [2022078](1)
Comprehensive Reviews
Research review of network defense decision-making methods based on attack and defense game......................................,,,Yuchen,1 [2021089](1)
Survey on intellectual property protection for deep learning model......................................,,,2 [2022015](1)
Review on security risks of key components in industrial control system......................................,,,,3 [2022030](1)
Survey on explainable knowledge graph reasoning methods......................................,,,,,5 [2022063](1)
Topics
Survey of software anomaly detection based on deception......................................,,,1 [2022003](15)
Detection of SSL/TLS protocol attacks based on flow spectrum theory...................,,...................,,,,1 [2022004](30)
Methods of security situation prediction for industrial internet fused attention mechanism and BSRU......................................,1 [2021092](41)
Vulnerability identification technology research based on project version difference......................................,,,,1 [2021094](52)
Abnormal link detection algorithm based on semi-local structure......................................,,,1 [2021040](63)
Multi-typelow-rate DDoS attack detection method based on hybrid deep learning......................................,,,1 [2022001](73)
Survey on the development of mimic defense in cyberspace: from mimic concept to “mimic+” ecology...................,,,,2 [2022018](15)
Research on IoT security situation awareness method based on evidence theory......................................,,2 [2022022](39)
Novel defense based on softmax activation transformation......................................,,2 [2022016](48)
Defense scheme for the world state based attack in Ethereum......................................,,2 [2022013](64)
Defense mechanism of SDN application layer against DDoS attack based on API call management......................................,,,2 [2022017](73)
Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation...................,2 [2022012](88)
Steganography in NFT images...................,,3 [2022029](18)
Tampered text detection via RGB and frequency relationship modeling......................................,,,3 [2022035](29)
Social network user geolocating method based on weighted least squares......................................,,3 [2022031](41)
Generation-based linguistic steganography with controllable security......................................,,3 [2022039](53)
Reversible data hiding scheme based on enhanced image smoothness......................................,,,,3 [2022040](66)
Adversarial subdomain adaptation network for mismatched steganalysis......................................,3 [2022028](76)
Blockchain-based high transparent PKI authentication protocol......................................,,,4 [2022052](1)
State-of-the-art survey of smart contract verification based on formal methods......................................,,,,4 [2022041](12)
Survey on blockchain privacy protection techniques in cryptography...................,,4 [2022054](29)
Application and prospect of blockchain in Metaverse......................................,,,4 [2022045](45)
Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain......................................,4 [2022044](66)
Blockchain covert communication scheme based on the cover of normal transactions......................................,,,,4 [2022043] (77)
GRU-based multi-scenario gait authentication for smartphones......................................,,,,,5 [2022060] (26)
Access control relationship prediction method based on GNN dual source learning......................................,,,,5 [2022062] (40)
Privacy-preserving federated learning framework with dynamic weight aggregation......................................,,5 [2022069] (56)
Robust reinforcement learning algorithm based on pigeon-inspired optimization......................................,,,,5 [2022064] (66)
Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9...................,,,6 [2022073] (9)
Automotive ethernet controller authentication method based on national cryptographic algorithms......................................,,6 [2022079] (20)
Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform...................,,,,6 [2022080] (29)
Two-party cooperative blind signature based on SM2......................................,,,6 [2022081] (39)
Survey of key management schemes for cluster networks...................,,6 [2022082] (52)
Papers
Adversarial example defense algorithm for MNIST based on image reconstruction......................................,,,1 [2021095] (86)
Research on network slicing security for 5G mMTC...................,,1 [2022006] (95)
Reversible data hiding in encrypted images based on fine-grained embedding room reservation......................................,,,1 [2022008](106)
Intellectualized forensic technique for Android pattern locks......................................,,,,,1 [2022005](118)
Design of miner type identification mechanism based on reputation management model......................................,,1 [2022002](128)
Privacy-preserving federated learning framework with irregular-majority users......................................,,,,1 [2022011](139)
Prediction method of 0day attack path based on cyber defense knowledge graph......................................,,,1 [2021101](151)
Information security vulnerability scoring model for intelligent vehicles......................................,,,,1 [2021096](167)
Robustness evaluation of commercial liveness detection platform......................................,,,,,1 [2022010](180)
Universal patching method for side-channel vulnerabilities based on atomic obfuscation......................................,,,,2 [2022014](100)
Searchable encryption scheme based on attribute policy hiding in a cloud environment......................................,,,2 [2022019](112)
Electronic invoice public verification scheme based on SM2 coalition signature algorithm......................................,,,,2 [2022020](122)
Research on evolution and security risk of Metaverse...................,,2 [2022023](132)
Two-stage community detection algorithm based on label propagation......................................,,,,2 [2021099](139)
Evidence classification method of chat text based on DSR and BGRU model......................................,,,2 [2022007](150)
Java deserialization gadget chain discovery method based on hybrid analysis......................................,,2 [2022009](160)
Trust evaluation optimization mechanism for cloud user behavior based on FANP......................................,,,2 [2021100](175)
Strategy of container migration and honeypot deployment based on signal game in cloud environment......................................,,,3 [2021042] (87)
Private-preserving scientific computation of the rational numbers...................,3 [2022038] (97)
Research on the robustness of convolutional neural networks in image recognition......................................,,3 [2022037](111)
Cross-domain authentication scheme based on consortium blockchain......................................,,3 [2022036](123)
Computationally secure steganography based on speech synthesis......................................3 [2022025](134)
Hierarchical proxy consensus optimization for IoV based on blockchain and trust value......................................,,,,,3 [2021097](142)
Fast handover authentication scheme in 5G mobile edge computing scenarios......................................,,,3 [2022034](154)
Defense strategy of industrial control worm based on SEIPQR model......................................,,,3 [2022032](169)
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing......................................,3 [2022033](176)
Research on network risk assessment based on attack graph of expected benefits-rate......................................,,,,4 [2022047](87)
Global randomized consensus algorithm resist collusion attack based on game theory......................................,,4 [2022048](98)
Carrier-independent deep optical watermarking algorithm......................................,,,4 [2022056](110)
Encrypted and obfuscation WebShell detection for high-speed network traffic......................................,,,4 [2022055](119)
Link prediction method for dynamic networks based on matching degree of nodes......................................,,,,4 [2022053](131)
Research on link detection technology based on dynamic browser fingerprint......................................,,4 [2022049](144)
Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks......................................,,,4 [2022050](157)
Rumor detection in social media based on eahanced Transformer......................................,,,,4 [2022042](168)
Design and analysis of intelligent service chain system for network security resource pool......................................,,,4 [2022051](175)
Proof of storage with corruption identification and recovery for dynamic group users......................................,,,5 [2022071] (75)
New image encryption algorithm based on double chaotic system and compressive sensing......................................,5 [2022058] (88)
Hardcoded vulnerability detection approach for IoT device firmware......................................,,,,,5 [2022070] (98)
Bytecode-based approach for Ethereum smart contract classification5 [2022046](111)
Qualitative modeling and analysis of attack surface for process multi-variant execution software system......................................,,,,5 [2022059](121)
Further accelerating the search of differential characteristics based on the SAT method...................5 [2022066](129)
Post-quantum encryption technology based on BRLWE for internet of things......................................,,,,5 [2022024](140)
Analysis on anonymity and regulation of digital currency transactions based on game theory......................................,,,5 [2022068](150)
CAT-RFE: ensemble detection framework for click fraud......................................,,,,5 [2022065](158)
Image recoloring detection based on inter-channel correlation......................................,,,,5 [2022057](167)
Novel continuous identity authentication method based on mouse behavior...................,5 [2022067](179)
Dynamic and efficient vehicular cloud management scheme with privacy protection......................................,,,6 [2022083] (70)
Encrypted traffic classification method based on convolutional neural network......................................,,,6 [2022077] (84)
Network security of the National Natural Science Foundation of China: today and prospects......................................,,,,6 [2022076] (92)
Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation......................................,,,,,,6 [2022074](102)
Image inpainting forensics method based on dual branch network...................,,,,,,6 [2022084](110)
Metrics for code obfuscation based on symbolic execution and-scope complexity......................................,,6 [2022085](123)
Software diversity evaluation method based on the properties of ROP/JOP gadgets......................................,,,6 [2022086](135)
Lip forgery detection via spatial-frequency domain combination......................................,,,6 [2022075](146)
Identity-based anonymous cloud auditing scheme with compact tags......................................,,,,6 [2022087](156)
Online medical privacy protection strategy under information value-added mechanism......................................,,,6 [2022072](169)
Education and teaching
Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty...................,2 [2022021](183)
Preliminary study on the reform of machine learning teaching......................................,,,4 [2022026](182)