Abstract is missing.
- Non-targeted Adversarial Attacks on Object Detection ModelsJian-Xun Mi, Xiangjin Zhao, Yongtao Chen, Xiao Cheng, Peng Tian, Xiaohong Lv, Jiayong Zhong. 3-12 [doi]
- Block Cipher Algorithms Identification Scheme Based on KFDARongna Xie, Xiaoyu Chen, Xinru Zhang, Guang Yang, Guozhen Shi. 13-24 [doi]
- Network Traffic Intrusion Detection Strategy Based on E-GraphSAGE and LSTMHaizhou Bao, Minhao Chen, Yiming Huo, Guorong Yu, Lei Nie, Peng Li, Yuxuan Wang. 25-37 [doi]
- A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart GridHao Huang, Wentao Chen, Weidong Fang, Wei Chen 0036, Wai-Hung Ip, Kai-Leung Yung. 38-48 [doi]
- Reversible Data Hiding Based on Octree Partitioning and Arithmetic Coding in Encrypted Three-Dimensional Mesh ModelsXiaochun Wu, Jiawang Zhang, Qi Yao, Wanli Lyu. 49-60 [doi]
- A Differential Privacy Federated Learning Scheme with Improved Noise PerturbationChang Liu, Xiaowei He, Bin Wang, Xinru Sun, Yixuan Luo, Yiji Zeng, Xinyu Wang, Jianhang Wang, Haofei Zhao. 61-71 [doi]
- U-shaped Vertical Split Learning with Local Differential Privacy for Privacy PreservingLiang Wang, Hao Chen, Lina Zuo, Haibo Liu. 72-81 [doi]
- An Intrusion Detection Method for Industrial Internet Fusing Multi-Scale TCN and Transformer NetworkZhihua Liu, Shenquan Liu, Jian Zhang. 82-96 [doi]
- CSQF-BA: Efficient Container Query Technology for Cloud Security Query Framework with Bat AlgorithmChao-Hsien Hsieh, Fengya Xu, Dehong Kong, Qingqing Yang, Yue Ma. 97-109 [doi]
- Full Database Reconstruction: Leakage-Abuse Attacks Based on Expected DistributionsRuizhong Du, Xijie She, Mingyue Li, Ziyuan Wang. 110-121 [doi]
- FedURL: A BERT-based Federated Malicious URL Detection FrameworkSongyang Wu, Bochen Shen, Hao Zheng, Wenqi Sun, Qi Sun, Shuang Wang. 122-131 [doi]
- Show Criminals' True Color: Chinese Variant Toxic Text Restoration Based on Pointer-Generator NetworkLi Wen, Pengfei Xue, Yi Shen, Wanmeng Ding, Min Zhang. 132-145 [doi]
- Adversarial Attacks on Network Intrusion Detection Systems Based on Federated LearningZiyuan Yang, Haipeng Qu, Ying Hua, Xiaoshuai Zhang, Xijun Lin. 146-157 [doi]
- An EWMA-Based Mitigation Scheme Against Interest Flooding Attacks in Named Data NetworksZhihao Shi, Yaozong Xu, Maode Ma, Yanan Zhang. 158-167 [doi]
- CAKGC: A Clustering Method of Cybercrime Assets Knowledge Graph Based on Feature FusionBotao Zhang, Fan Shi, Chengxi Xu, Pengfei Xue, Jiankun Sun. 168-185 [doi]
- Multi-texture Fusion Attack: A Robust Adversarial Camouflage in Physical WorldYisheng Li, Xuekang Peng, Zhichao Lian. 186-198 [doi]
- When Blockchain Meets Asynchronous Federated LearningRui Jing, Wei Chen 0036, Xiaoxin Wu, Zehua Wang, Zijian Tian, Fan Zhang. 199-207 [doi]
- A High-Dimensional Data Trust Publishing Method Based on Attention Mechanism and Differential PrivacyTaiqiang Li, Zhen Zhang, Heng Qian, Qiuyue Wang, Guanqun Su, Lingzhen Meng. 208-219 [doi]
- PTGroup: An Automated Penetration Testing Framework Using LLMs and Multiple Prompt ChainsLei Wu, Xiaofeng Zhong, Jingju Liu, Xiang Wang. 220-232 [doi]
- Spammer Group Detection Approach Based on Deep Reinforcement LearningChenghang Huo, Jindong Cui, Ru Ma, Yunfei Luo, Fuzhi Zhang. 233-244 [doi]
- A Dual Auditing Scheme of Cross-Chain Data Shared Among the Blockchain NetworkChenting Li, Dan Li 0018, YuQian Zhou. 245-256 [doi]
- DM-CIFA: Detection and Mitigation of Collusion Interesting Flooding Attacks in NDNsYanan Zhang, Jingru Xing, Yaozong Xu, Maode Ma, Cong Wang 0004. 257-266 [doi]
- Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal InconsistenciesZhongjie Mi, Xinghao Jiang, Tanfeng Sun, Ke Xu 0003, Qiang Xu, Laijin Meng. 267-280 [doi]
- Anonymous and Efficient Authentication Scheme for Privacy-Preserving Federated Cross LearningZeshuai Li, Xiaoyan Liang. 281-293 [doi]
- Real-Time Detection for GPS Spoofing of Quad-Rotor Helicopter Based on Data FusionJialiang Wang, Liuyang Nie, Zhaojun Gu, Huan Zhao. 294-305 [doi]
- The Micro-scale Adversarial Detection Algorithm for Overlapping Communities Based on Genetic AlgorithmsShaojie Ji, Yan Liu, Xiaoyu Guo, Mengmeng Jia. 306-315 [doi]
- Steganalysis of VoIP Streams via Bidirectional Correlation Extract NetworkShenHong Cao, Kaixi Wang, Yanbin Fan. 316-327 [doi]
- MixPrompt: Enhancing Generalizability and Adversarial Robustness for Vision-Language Models via Prompt FusionHao Fan, Zhaoyang Ma, Yong Li, Rui Tian, Yunli Chen, Chenlong Gao. 328-339 [doi]
- UB-CRAF: A User Behavior-Driven Co-resident Risk Assessment Framework for Dynamically Migrating VMs in CloudsKuiye Ding, Xin Yang, Jintao Chen, Chao Liu, Songyao Hou, Wenyuan Yang. 340-351 [doi]
- DAS-Gen: Continual Signature Generation for Evolving Malicious TrafficGang Yang, Bo Wu, Weifeng Mou, Linna Fan, Xuan Shen, Jun He. 352-362 [doi]
- Root Cause Analysis of Anomaly in Smart Homes Through Device Interaction GraphJian Ge, Jianwu Rui, Hengtai Ma, Bin Li, Yeping He. 363-374 [doi]
- A Pixel Distribution Complexity Classification Enhanced Convolutional Neural Network Predictor for Reversible Data HidingBin Ma 0003, Hongtao Duan 0005, Ruihe Ma, Chunpeng Wang, Xiaolong Li 0001. 375-385 [doi]
- Domain-Knowledge Enhanced GANs for High-Quality Trajectory GenerationJia Jia, Linghui Li, Pengfei Qiu, Binsi Cai, Xu Kang, Ximing Li 0005, Xiaoyong Li 0003. 386-396 [doi]
- Model Construction and Empirical Research on Cross-Platform Propagation of DisinformationJian Chen, Ming Jiang, Fuyun He. 397-408 [doi]
- EPTLENet: Replay Attack Detection with Efficient Parameter Transfer Learning Based on ERes2NetQing Qian, Yi-Lin Kuang, Yi Yue. 409-421 [doi]
- Constructing Adversarial Network Attacks in Realistic Network EnvironmentsHanwen Li, Shanshan Wang, Yadi Han, Changlin Liu, Zhenxiang Chen. 422-435 [doi]
- An Adaptive VM Allocation Approach for Mitigating Co-resident Attack in Cloud Based on Improved NSGA-IIXin Yang, Jintao Chen, Kuiye Ding, Chao Liu, Jiashen Liu, Songyao Hou. 436-448 [doi]
- A Dual Channel Attention Mechanism-Based Intrusion Detection Model for Advanced Metering InfrastructureZhenkun Guo, Yeshen He, Yifan Fan, Xueliang Wang, Meiming Fu, Yiying Zhang. 449-457 [doi]
- Attribute-Based Encryption Method for Data Privacy Security ProtectionZiqian Li, Yeshen He, Yiying Zhang, Siwei Li, Cong Wang, Xiankun Zhang. 458-467 [doi]
- Intrusion Detection in Power Cyber-Physical Systems Using Denoising Autoencoder and EQL v2 Loss FunctionYiying Zhang, Yanping Dong, Ke Liu, Xiankun Zhang, Xianfan Sun, Siwei Li. 468-478 [doi]
- An Intrusion Detection Model of Incorporating Deep Residual Shrinking Networks for Power Internet of ThingsHao Ma, Ting Li, Meiming Fu, Xueliang Wang, Yeshen He, Yiying Zhang 0004. 479-490 [doi]