Advanced Search

    column
    Dynamic Decision-Driven Threat Detection Method for Data Elements in Industrial Control Networks
    Wang Zepeng, Ma Chao, Zhang Zhuangzhuang, Wu Libing, Shi Xiaochuan
    2024, 61(10): 2404-2416. DOI: 10.7544/issn1000-1239.202440387
    Abstract PDF
    A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint
    Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong
    2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    Abstract PDF
    Sampling Based Fast Publishing Algorithm with Differential Privacy for Data Stream
    Wang Xiujun, Mo Lei, Zheng Xiao, Wei Linna, Dong Jun, Liu Zhi, Guo Longkun
    2024, 61(10): 2433-2447. DOI: 10.7544/issn1000-1239.202440481
    Abstract PDF
    Lightweight Multi-User Verifiable Privacy-Preserving Gene Sequence Analysis Scheme
    Hu Yunshu, Zhou Jun, Cao Zhenfu, Dong Xiaolei
    2024, 61(10): 2448-2466. DOI: 10.7544/issn1000-1239.202440453
    Abstract PDF
    Data Integrity Verification Scheme For Lightweight Devices in Cloud Storage Scenarios
    Han Bing, Wang Hao, Fang Min, Zhang Yongchao, Zhou Lu, Ge Chunpeng
    2024, 61(10): 2467-2481. DOI: 10.7544/issn1000-1239.202440489
    Abstract PDF
    Scheme of Runtime Monitoring in Confidential Computing with Dynamic Integrity Measurement
    Li Wei, Feng Wei, Qin Yu, Feng Dengguo
    2024, 61(10): 2482-2500. DOI: 10.7544/issn1000-1239.202440480
    Abstract PDF
    Auditable Healthcare Data Sharing Based on Decentralized Identity
    Song Wenpeng, Zhang Liang, Ma Yuhang
    2024, 61(10): 2501-2513. DOI: 10.7544/issn1000-1239.202440351
    Abstract PDF
    An Efficient Passwordless Authentication Scheme Based on Blockchain
    Ke Yuhong, Lin Chao, Huang Xinyi, Wu Wei, Chen Yujie
    2024, 61(10): 2514-2525. DOI: 10.7544/issn1000-1239.202440468
    Abstract PDF
    An Accurate Blockchain Anomaly Detection Mechanism Built on Approximate Sketch Algorithms
    Zhu Longlong, Chen Xiang, Chen Haodong, Niu Jitang, Liu Wenjing, Lin Shengrui, Zhang Dong, Wu Chunming
    2024, 61(10): 2526-2539. DOI: 10.7544/issn1000-1239.202440477
    Abstract PDF
    A Privacy-Preserving Data Element Trading Audit Scheme for Cross-Consortium-Blockchains
    Zhang Chuan, Wang Zihao, Liang Jinwen, Liu Mengxuan, Deng Haotian, Zhu Liehuang
    2024, 61(10): 2540-2553. DOI: 10.7544/issn1000-1239.202440472
    Abstract PDF
    A Blockchain Data Acceleration Exchange Method for Data Element Circulation
    Li Zhenyu, Ding Yong, Yi Chen, Liang Hai
    2024, 61(10): 2554-2569. DOI: 10.7544/issn1000-1239.202440367
    Abstract PDF
    Cross-Domain Data Trading System Based on Decentralized Identity
    Hao Jiakun, Xiang Peng, He Yifei, Gao Jianbo, Guan Zhi, Xie Anming, Chen Zhong
    2024, 61(10): 2570-2586. DOI: 10.7544/issn1000-1239.202440456
    Abstract PDF
    Intellectual Property Protection of Deep Neural Network Models Based on Watermarking Technology
    Jin Biao, Lin Xiang, Xiong Jinbo, You Weijing, Li Xuan, Yao Zhiqiang
    2024, 61(10): 2587-2606. DOI: 10.7544/issn1000-1239.202440413
    Abstract PDF
    Survey of Backdoor Attack and Defense Algorithms Based on Federated Learning
    Liu Jialang, Guo Yanming, Lao Mingrui, Yu Tianyuan, Wu Yulun, Feng Yunhao, Wu Jiazhuang
    2024, 61(10): 2607-2626. DOI: 10.7544/issn1000-1239.202440487
    Abstract PDF
    Survey of Security Attack and Defense Strategies for Artificial Intelligence Model
    Qin Zhen, Zhuang Tianming, Zhu Guosong, Zhou Erqiang, Ding Yi, Geng Ji
    2024, 61(10): 2627-2648. DOI: 10.7544/issn1000-1239.202440449
    Abstract PDF
    A Machine Unlearning Method via Feature Constraint and Adaptive Loss Balance
    Yin Yuyu, Wu Guangqiang, Li Youhuizi, Wang Xinyu, Gao Honghao
    2024, 61(10): 2649-2661. DOI: 10.7544/issn1000-1239.202440476
    Abstract PDF