• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Adversarial Attacks and Defenses Against Deep Learning Under the Cloud-Edge-Terminal Scenes
Li Qian, Lin Chenhao, Yang Yulong, Shen Chao, Fang Liming
2022, 59(10): 2109-2129. DOI: 10.7544/issn1000-1239.20220665
Abstract PDF
Survey of Data Privacy Security Based on General Data Protection Regulation
Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing
2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
Abstract PDF
A Review of Adversarial Robustness Evaluation for Image Classification
Li Zituo, Sun Jianbin, Yang Kewei, Xiong Dehui
2022, 59(10): 2164-2189. DOI: 10.7544/issn1000-1239.20220507
Abstract PDF
Survey on Internet of Things Access Control Security
Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun
2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510
Abstract PDF
Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing
Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan
2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493
Abstract PDF
A Multi-Factor Reverse Auction Routing Scheme for Cross-Blockchain Payment
Zhang Qian, Cao Sheng, Zhang Xiaosong
2022, 59(10): 2233-2246. DOI: 10.7544/issn1000-1239.20220482
Abstract PDF
Cloud Secure Auditing Scheme Supporting Key Update and Auditor Replacement
Zhou Lei, Chen Zhenzhu, Fu Anmin, Su Mang, Yu Yan
2022, 59(10): 2247-2260. DOI: 10.7544/issn1000-1239.20220529
Abstract PDF
Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism
Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue
2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504
Abstract PDF
Efficient Search for Optimal Vector Permutations of uBlock-like Structures
Li Xiaodan, Wu Wenling, Zhang Li
2022, 59(10): 2275-2285. DOI: 10.7544/issn1000-1239.20220485
Abstract PDF
Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets
Zhang Lei, He Chongde, Wei Lifei
2022, 59(10): 2286-2298. DOI: 10.7544/issn1000-1239.20220471
Abstract PDF
Finding Differential Characteristics of SM4 Algorithm Based on MILP
Pan Yinxue, Wang Gaoli, Ni Jianqiang
2022, 59(10): 2299-2308. DOI: 10.7544/issn1000-1239.20220486
Abstract PDF
A Multi-User Dynamic Symmetric Searchable Encryption Scheme Supporting Conjunctive Search
Zhang Lanlan, Cao Weidong, Wang Huaichao
2022, 59(10): 2309-2322. DOI: 10.7544/issn1000-1239.20220494
Abstract PDF
Fishing Leakage of Deep Learning Training Data via Neuron Activation Pattern Manipulation
Pan Xudong, Zhang Mi, Yang Min
2022, 59(10): 2323-2337. DOI: 10.7544/issn1000-1239.20220498
Abstract PDF
An Efficient Privacy Preserving 4PC Machine Learning Scheme Based on Secret Sharing
Yan Yunxue, Ma Ming, Jiang Han
2022, 59(10): 2338-2347. DOI: 10.7544/issn1000-1239.20220514
Abstract PDF
Data Contamination Defense Method for Intelligent Network Intrusion Detection Systems Based on Edge Examples
Liu Guangrui, Zhang Weizhe, Li Xinjie
2022, 59(10): 2348-2361. DOI: 10.7544/issn1000-1239.20220509
Abstract PDF
A Novel Integrity Measurement Architecture for Embedded Linux Systems
Jia Qiaowen, Ma Haoyu, Li Yan, Wang Zheyu, Shi Wenchang
2022, 59(10): 2362-2375. DOI: 10.7544/issn1000-1239.20220525
Abstract PDF