- Zheng Li 0023, Yang Zhang 0016. Advancing membership inference attacks: The present and the future. Secur. Saf., 4:2024017, 2025.
- Xiayu Xiang, Changchang Ma, Liyi Zeng, Wenying Feng 0003, Yushun Xie, Zhaoquan Gu. Uncovering multi-step attacks with threat knowledge graph reasoning. Secur. Saf., 4:2024019, 2025.
- Zhaoquan Gu, Guandong Xu, Ning Hu. Preface: Security and safety in network simulation and evaluation. Secur. Saf., 4:2025004, 2025.
- Chengrui Hu, Zheng Li 0023, Siyuan Wu, Bowen Shu, Min Zhang 0043, Hao Li. Trajectory-user linking via supervised encoding. Secur. Saf., 4:2024018, 2025.
- Ping Chen, Jin Wei, Zhuyang Yu, Jiwei Chen. Key-area cyberspace mimic defense against data-oriented attacks. Secur. Saf., 4:2024015, 2025.
- Cheng Hong. Recent advances of privacy-preserving machine learning based on (Fully) Homomorphic Encryption. Secur. Saf., 4:2024012, 2025.
- Axin Wu, Dengguo Feng, Min Zhang 0043, Jialin Chi, Yinghui Zhang 0002. Efficient verifiable searchable encryption with search and access pattern privacy. Secur. Saf., 4:2024022, 2025.
- Wentao Huang, Han Wu, ZeYu Li, Xiaqing Xie, Qingfeng Zhang, Xuebin Wang, Jiapeng Zhao, Jinqiao Shi. K8s-enhanced lightweight simulation method for the Tor network. Secur. Saf., 4:2024024, 2025.
- Yang Hong, Jun Wu 0001, Xinping Guan. A survey of joint security-safety for function, information and human in industry 5.0. Secur. Saf., 4:2024014, 2025.
- Shiliang Ao, Binxing Fang, Xinguang Xiao, Hongli Zhang 0001. Threat ripple model: A model to characterize business-oriented attacks based on business dependencies. Secur. Saf., 4:2025003, 2025.