Advanced Search

    column
    Adversarial Attacks and Defenses Against Deep Learning Under the Cloud-Edge-Terminal Scenes
    Li Qian, Lin Chenhao, Yang Yulong, Shen Chao, Fang Liming
    2022, 59(10): 2109-2129. DOI: 10.7544/issn1000-1239.20220665
    Abstract FullText HTML PDF
    Survey of Data Privacy Security Based on General Data Protection Regulation
    Zhao Jingxin, Yue Xinghui, Feng Chongpeng, Zhang Jing, Li Yin, Wang Na, Ren Jiadong, Zhang Haoxing, Wu Gaofei, Zhu Xiaoyan, Zhang Yuqing
    2022, 59(10): 2130-2163. DOI: 10.7544/issn1000-1239.20220800
    Abstract FullText HTML PDF
    A Review of Adversarial Robustness Evaluation for Image Classification
    Li Zituo, Sun Jianbin, Yang Kewei, Xiong Dehui
    2022, 59(10): 2164-2189. DOI: 10.7544/issn1000-1239.20220507
    Abstract FullText HTML PDF
    Survey on Internet of Things Access Control Security
    Liu Qixu, Jin Ze, Chen Canhua, Gao Xinbo, Zheng Ningjun, Fang Yiwei, Feng Yun
    2022, 59(10): 2190-2211. DOI: 10.7544/issn1000-1239.20220510
    Abstract FullText HTML PDF
    Incentive Mechanism Based on Truth Estimation of Private Data for Blockchain-Based Mobile Crowdsensing
    Ying Chenhao, Xia Fuyuan, Li Jie, Si Xueming, Luo Yuan
    2022, 59(10): 2212-2232. DOI: 10.7544/issn1000-1239.20220493
    Abstract FullText HTML PDF
    A Multi-Factor Reverse Auction Routing Scheme for Cross-Blockchain Payment
    Zhang Qian, Cao Sheng, Zhang Xiaosong
    2022, 59(10): 2233-2246. DOI: 10.7544/issn1000-1239.20220482
    Abstract FullText HTML PDF
    Cloud Secure Auditing Scheme Supporting Key Update and Auditor Replacement
    Zhou Lei, Chen Zhenzhu, Fu Anmin, Su Mang, Yu Yan
    2022, 59(10): 2247-2260. DOI: 10.7544/issn1000-1239.20220529
    Abstract FullText HTML PDF
    Utility-Optimized Local Differential Privacy Set-Valued Data Frequency Estimation Mechanism
    Cao Yiran, Zhu Youwen, He Xingyu, Zhang Yue
    2022, 59(10): 2261-2274. DOI: 10.7544/issn1000-1239.20220504
    Abstract FullText HTML PDF
    Efficient Search for Optimal Vector Permutations of uBlock-like Structures
    Li Xiaodan, Wu Wenling, Zhang Li
    2022, 59(10): 2275-2285. DOI: 10.7544/issn1000-1239.20220485
    Abstract FullText HTML PDF
    Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets
    Zhang Lei, He Chongde, Wei Lifei
    2022, 59(10): 2286-2298. DOI: 10.7544/issn1000-1239.20220471
    Abstract FullText HTML PDF
    Finding Differential Characteristics of SM4 Algorithm Based on MILP
    Pan Yinxue, Wang Gaoli, Ni Jianqiang
    2022, 59(10): 2299-2308. DOI: 10.7544/issn1000-1239.20220486
    Abstract FullText HTML PDF
    A Multi-User Dynamic Symmetric Searchable Encryption Scheme Supporting Conjunctive Search
    Zhang Lanlan, Cao Weidong, Wang Huaichao
    2022, 59(10): 2309-2322. DOI: 10.7544/issn1000-1239.20220494
    Abstract FullText HTML PDF
    Fishing Leakage of Deep Learning Training Data via Neuron Activation Pattern Manipulation
    Pan Xudong, Zhang Mi, Yang Min
    2022, 59(10): 2323-2337. DOI: 10.7544/issn1000-1239.20220498
    Abstract FullText HTML PDF
    An Efficient Privacy Preserving 4PC Machine Learning Scheme Based on Secret Sharing
    Yan Yunxue, Ma Ming, Jiang Han
    2022, 59(10): 2338-2347. DOI: 10.7544/issn1000-1239.20220514
    Abstract FullText HTML PDF
    Data Contamination Defense Method for Intelligent Network Intrusion Detection Systems Based on Edge Examples
    Liu Guangrui, Zhang Weizhe, Li Xinjie
    2022, 59(10): 2348-2361. DOI: 10.7544/issn1000-1239.20220509
    Abstract FullText HTML PDF
    A Novel Integrity Measurement Architecture for Embedded Linux Systems
    Jia Qiaowen, Ma Haoyu, Li Yan, Wang Zheyu, Shi Wenchang
    2022, 59(10): 2362-2375. DOI: 10.7544/issn1000-1239.20220525
    Abstract FullText HTML PDF