Advanced Search

    column
    Research Advances on Privacy Preserving in Recommender Systems
    Zhou Jun, Dong Xiaolei, Cao Zhenfu
    2019, 56(10): 2033-2048. DOI: 10.7544/issn1000-1239.2019.20190541
    Abstract FullText HTML PDF
    Privacy and Security Issues in Machine Learning Systems: A Survey
    He Yingzhe, Hu Xingbo, He Jinwen, Meng Guozhu, Chen Kai
    2019, 56(10): 2049-2070. DOI: 10.7544/issn1000-1239.2019.20190437
    Abstract FullText HTML PDF
    Survey on Techniques, Applications and Security of Machine Learning Interpretability
    Ji Shouling, Li Jinfeng, Du Tianyu, Li Bo
    2019, 56(10): 2071-2096. DOI: 10.7544/issn1000-1239.2019.20190540
    Abstract FullText HTML PDF
    A Survey on Automated Exploit Generation
    Zhao Shangru, Li Xuejun, Fang Yue, Yu Yuanping, Huang Weihao, Chen Kai, Su Purui, Zhang Yuqing
    2019, 56(10): 2097-2111. DOI: 10.7544/issn1000-1239.2019.20190655
    Abstract FullText HTML PDF
    From Evolutionary Cryptography to Quantum Artificial Intelligent Cryptography
    Wang Baonan, Hu Feng, Zhang Huanguo, Wang Chao
    2019, 56(10): 2112-2134. DOI: 10.7544/issn1000-1239.2019.20190374
    Abstract FullText HTML PDF
    Security and Privacy Risks in Artificial Intelligence Systems
    Chen Yufei, Shen Chao, Wang Qian, Li Qi, Wang Cong, Ji Shouling, Li Kang, Guan Xiaohong
    2019, 56(10): 2135-2150. DOI: 10.7544/issn1000-1239.2019.20190415
    Abstract FullText HTML PDF
    Effective CP-ABE with Hidden Access Policy
    Wang Yue, Fan Kai
    2019, 56(10): 2151-2159. DOI: 10.7544/issn1000-1239.2019.20190343
    Abstract FullText HTML PDF
    Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation
    Gao Jiaxin, Sun Jiameng, Qin Jing
    2019, 56(10): 2160-2169. DOI: 10.7544/issn1000-1239.2019.20190323
    Abstract FullText HTML PDF
    Distributed Data Encoding Storage Scheme Supporting Updatable Encryption in Cloud
    Yan Xincheng, Chen Yue, Ba Yang, Jia Hongyong, Zhu Yu
    2019, 56(10): 2170-2182. DOI: 10.7544/issn1000-1239.2019.20190351
    Abstract FullText HTML PDF
    A Code Encrypt Technique Based on Branch Condition Obfuscation
    Geng Pu, Zhu Yuefei
    2019, 56(10): 2183-2192. DOI: 10.7544/issn1000-1239.2019.20190368
    Abstract FullText HTML PDF
    Multi-Keyword Searchable Encryption Algorithm Based on Semantic Extension
    Xu Guangwei, Shi Chunhong, Wang Wentao, Pan Qiao, Li Feng
    2019, 56(10): 2193-2206. DOI: 10.7544/issn1000-1239.2019.20190378
    Abstract FullText HTML PDF
    A Big Data Security Scheme Based on High-Performance Cryptography Implementation
    Yang Guoqiang, Ding Hangchao, Zou Jing, Jiang Han, Chen Yanqin
    2019, 56(10): 2207-2215. DOI: 10.7544/issn1000-1239.2019.20190390
    Abstract FullText HTML PDF
    Ciphertext-Only Fault Analysis of the MIBS Lightweight Cryptosystem in the Internet of Things
    Li Wei, Cao Shan, Gu Dawu, Li Jiayao, Wang Menglin, Cai Tianpei, Shi Xiujin
    2019, 56(10): 2216-2228. DOI: 10.7544/issn1000-1239.2019.20190406
    Abstract FullText HTML PDF
    Post-Quantum Privacy Preserving Smart Metering System
    Tian Yangtong, Zhang Huang, Xie Shaohao, Zhang Fangguo
    2019, 56(10): 2229-2242. DOI: 10.7544/issn1000-1239.2019.20190402
    Abstract FullText HTML PDF
    Privacy-Preserving Logistic Regression on Vertically Partitioned Data
    Song Lei, Ma Chunguang, Duan Guanghan, Yuan Qi
    2019, 56(10): 2243-2249. DOI: 10.7544/issn1000-1239.2019.20190414
    Abstract FullText HTML PDF
    Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network
    Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju
    2019, 56(10): 2250-2261. DOI: 10.7544/issn1000-1239.2019.20190386
    Abstract FullText HTML PDF
    A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis
    Liu Xuehua, Ding Liping, Liu Wenmao, Zheng Tao, Li Yanfeng, Wu Jingzheng
    2019, 56(10): 2262-2276. DOI: 10.7544/issn1000-1239.2019.20190394
    Abstract FullText HTML PDF
    A Secure and Efficient Map Update Scheme for Autonomous Vehicles
    Lai Chengzhe, Zhang Min, Zheng Dong
    2019, 56(10): 2277-2286. DOI: 10.7544/issn1000-1239.2019.20190314
    Abstract FullText HTML PDF
    An Access Control Method Using Smart Contract for Internet of Things
    Du Ruizhong, Liu Yan, Tian Junfeng
    2019, 56(10): 2287-2298. DOI: 10.7544/issn1000-1239.2019.20190416
    Abstract FullText HTML PDF