- Haiou Yang, Youliang Tian. Verifiable Secret Sharing Based On Micali-Rabin's Random Vector Representations Technique. I. J. Network Security, 22(5):809-814, 2020.
- Jinyue Bian, Quan Qian. Binary Executable Files Homology Detection with Genetic Algorithm. I. J. Network Security, 22(5):782-792, 2020.
- Hui Tian 0002, Zhao-Hua Zhu, Chin-Chen Chang 0001, Yongfeng Huang, Tian Wang 0001, Yonghong Chen, Yiqiao Cai. StegoNote: Steganography in Guitar Music Using Note Modulation. I. J. Network Security, 22(1):68-79, 2020.
- Tianhong Yang. Mobile Payment Security in the Context of Big Data: Certificateless Public Key Cryptography. I. J. Network Security, 22(4):621-626, 2020.
- You-Jian Yu, Guang-Fu Wang, Jie Zhao. FI-SIFT Algorithm for Exposing Image Copy-Move Forgery with Reflection Attacks. I. J. Network Security, 22(2):183-190, 2020.
- Ming-Sang Chang, Chih Ping Yen. LinkedIn Social Media Forensics on Windows 10. I. J. Network Security, 22(2):321-330, 2020.
- Cai-xue Zhou. Security Analysis of a Certi cateless Public Provable Data Possession Scheme with Privacy Preserving for Cloud-Based Smart Grid Data Management System. I. J. Network Security, 22(4):584-588, 2020.
- Ming-Sang Chang, Chih Ping Yen. Evidence Gathering of Facebook Messenger on Android. I. J. Network Security, 22(5):828-837, 2020.
- Shidong Zhang, Tongjiang Yan, Yuhua Sun, Lianhai Wang. Linear Complexity of Two Classes of Binary Interleaved Sequences with Low Autocorrelation. I. J. Network Security, 22(1):150-154, 2020.
- Yuanquan Shi, Hong Shen. Anomaly Detection for Network Flow Using Immune Network and Density Peak. I. J. Network Security, 22(2):337-346, 2020.