- Angshuman Jana. Sensitive information leakage analysis of database code by abstract interpretation. IJSN, 18(2):91-105, 2023.
- Changsong Zhou, Guozi Sun, Xuan You, Yu Gu. A slice-based encryption scheme for IPFS. IJSN, 18(1):42-51, 2023.
- Yixuan Wang, Xian Guo. CPPABK: conditional privacy-preserving authentication scheme for VANETs based on the key derivation algorithm. IJSN, 18(4):199-212, 2023.
- Xiaoyu Jiang. Adaptive fault diagnosis model for high-speed railway turnout using deep convolutional neural networks. IJSN, 18(3):165-174, 2023.
- Nadia Niknami, Jie Wu 0001. MB-CIM: a multi-round budgeted competitive influence maximisation. IJSN, 18(1):30-41, 2023.
- Yudi Zhang, Yongxin Feng, Yuntao Zhao. MalGA-LSTM: a malicious code detection model based on genetic algorithm optimising LSTM trainable parameters. IJSN, 18(3):133-142, 2023.
- Rolla Subrahmanyam, N. Rukma Rekha, Y. V. Subba Rao. Multi-group key agreement protocol using secret sharing scheme. IJSN, 18(3):143-152, 2023.
- Xiaohui Hu, Huiwen Jia, Jingang Liu, Zhiqi Zhao. Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices. IJSN, 18(4):213-226, 2023.
- Hao Yan, Zheng Zhang, Yanan Liu, Shuo Qiu, Qiuling Wu. Comments on a dynamic cloud data integrity verification scheme: security analysis and improvement. IJSN, 18(2):125-132, 2023.
- Mingyue Qiu, Xueying Zhang, Xinmeng Wang. An ex-convict recognition method based on text mining. IJSN, 18(1):10-18, 2023.