• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search

Dynamic Decision-Driven Threat Detection Method for Data Elements in Industrial Control Networks
Wang Zepeng, Ma Chao, Zhang Zhuangzhuang, Wu Libing, Shi Xiaochuan
2024, 61(10): 2404-2416. DOI: 10.7544/issn1000-1239.202440387
Abstract PDF
A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint
Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong
2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
Abstract PDF
Sampling Based Fast Publishing Algorithm with Differential Privacy for Data Stream
Wang Xiujun, Mo Lei, Zheng Xiao, Wei Linna, Dong Jun, Liu Zhi, Guo Longkun
2024, 61(10): 2433-2447. DOI: 10.7544/issn1000-1239.202440481
Abstract PDF
Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme
Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei
2024, 61(10): 2448-2466. DOI: 10.7544/issn1000-1239.202440453
Abstract PDF
Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios
Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng
2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
Abstract PDF
Scheme of Runtime Monitoring in Confidential Computing with Dynamic Integrity Measurement
Li Wei, Feng Wei, Qin Yu, Feng Dengguo
2024, 61(10): 2482-2500. DOI: 10.7544/issn1000-1239.202440480
Abstract PDF
Auditable Healthcare Data Sharing Based on Decentralized Identity
Song Wenpeng, Zhang Liang, Ma Yuhang
2024, 61(10): 2501-2513. DOI: 10.7544/issn1000-1239.202440351
Abstract PDF
An Efficient Passwordless Authentication Scheme Based on Blockchain
Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie
2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
Abstract PDF
An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms
Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming
2024, 61(10): 2526-2539. DOI: 10.7544/issn1000-1239.202440477
Abstract PDF
A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains
Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang
2024, 61(10): 2540-2553. DOI: 10.7544/issn1000-1239.202440472
Abstract PDF
A Blockchain Data Acceleration Exchange Method for Data Element Circulation
Li Zhenyu, Ding Yong, Yi Chen, Liang Hai
2024, 61(10): 2554-2569. DOI: 10.7544/issn1000-1239.202440367
Abstract PDF
Cross-Domain Data Trading System Based on Decentralized Identity
Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong
2024, 61(10): 2570-2586. DOI: 10.7544/issn1000-1239.202440456
Abstract PDF
Intellectual Property Protection of Deep Neural Network Models Based on Watermarking Technology
Jin Biao, Lin Xiang, Xiong Jinbo, You Weijing, Li Xuan, Yao Zhiqiang
2024, 61(10): 2587-2606. DOI: 10.7544/issn1000-1239.202440413
Abstract PDF
Survey of Backdoor Attack and Defense Algorithms Based on Federated Learning
Liu Jialang, Guo Yanming, Lao Mingrui, Yu Tianyuan, Wu Yulun, Feng Yunhao, Wu Jiazhuang
2024, 61(10): 2607-2626. DOI: 10.7544/issn1000-1239.202440487
Abstract PDF
Survey of Security Attack and Defense Strategies for Artificial Intelligence Model
Qin Zhen, Zhuang Tianming, Zhu Guosong, Zhou Erqiang, Ding Yi, Geng Ji
2024, 61(10): 2627-2648. DOI: 10.7544/issn1000-1239.202440449
Abstract PDF
A Machine Unlearning Method via Feature Constraint and Adaptive Loss Balance
Yin Yuyu, Wu Guangqiang, Li Youhuizi, Wang Xinyu, Gao Honghao
2024, 61(10): 2649-2661. DOI: 10.7544/issn1000-1239.202440476
Abstract PDF