- Xiaohan Wan, Hao Lin, Mingqiang Wang, Wenting Shen. Hierarchical Threshold Multi-Key Fully Homomorphic Encryption. Inf. Sec. Techn. Report, 89:103919, 2025.
- Xiaohong Zhang, Shijun Xiang, Hongbin Huang. Hiding speech in music files. Inf. Sec. Techn. Report, 89:103951, 2025.
- Lianpeng Li, Saifei Liu. MSD-CDRL: A generic fusion detection framework for logic covert attack towards cyber-physical system security. Inf. Sec. Techn. Report, 89:103947, 2025.
- Sandip Y. Bobade, Ravindra S. Apare, Ravindra H. Borhade, Parikshit N. Mahalle. Intelligent detection framework for IoT-botnet detection: DBN-RNN with improved feature set. Inf. Sec. Techn. Report, 89:103961, 2025.
- Guodong Zhang, Tianyu Yao, Jiawei Qin, Yitao Li, Qiao Ma, Donghong Sun. CodeSAGE: A multi-feature fusion vulnerability detection approach using code attribute graphs and attention mechanisms. Inf. Sec. Techn. Report, 89:103973, 2025.
- Liang Xi, Dong He, Han Liu. PRAAD: Pseudo representation adversarial learning for unsupervised anomaly detection. Inf. Sec. Techn. Report, 89:103968, 2025.
- Hongsong Chen, Zimei Tao, Zhiheng Wang, Xinrui Liu. Merkle multi-branch hash tree-based dynamic data integrity auditing for B5G network cloud storage. Inf. Sec. Techn. Report, 89:103981, 2025.
- Gueltoum Bendiab, Houda Haiouni, Isidoros Moulas, Stavros Shiaeles. Deepfakes in digital media forensics: Generation, AI-based detection and challenges. Inf. Sec. Techn. Report, 88:103935, 2025.
- Hassan Yakout El-Arsh, Amr Abdelaziz, Ahmed S. Elliethy, Hussein A. Aly 0002, T. Aaron Gulliver. Information-theoretic bounds for steganography in visual multimedia. Inf. Sec. Techn. Report, 89:103966, 2025.
- Avi Shaked, Nan Messe. BridgeSec: Facilitating effective communication between security engineering and systems engineering. Inf. Sec. Techn. Report, 89:103954, 2025.