• 工作总结
  • 工作计划
  • 心得体会
  • 领导讲话
  • 发言稿
  • 演讲稿
  • 述职报告
  • 入党申请
  • 党建材料
  • 党课下载
  • 脱贫攻坚
  • 对照材料
  • 主题教育
  • 事迹材料
  • 谈话记录
  • 扫黑除恶
  • 实施方案
  • 自查整改
  • 调查报告
  • 公文范文
  • 思想汇报
  • 当前位置: 雅意学习网 > 文档大全 > 公文范文 > 正文

    网络与信息安全学报2022年(第8卷)总目次

    时间:2023-06-13 13:45:41 来源:雅意学习网 本文已影响 雅意学习网手机站

    网络与信息安全学报2022年(第8卷)总目次

    视 角

    期 页码

    隐私计算的学术内涵与研究趋势...................李凤华,李晖,牛犇,邱卫东 6 [2022078](1)

    综 述

    基于攻防博弈的网络防御决策方法研究综述......................................刘小虎,张恒巍,马军强,张玉臣,谭晶磊 1 [2021089](1)

    深度学习模型的版权保护研究综述...................王馨雅,华光,江昊,张海剑 2 [2022015](1)

    工业控制系统关键组件安全风险综述......................................唐士杰,袁方,李俊,丁勇,王会勇 3 [2022030](1)

    可解释的知识图谱推理方法综述......................................夏毅,兰明敬,陈晓慧,罗军勇,周刚,何鹏 5 [2022063](1)

    专 栏

    基于诱捕的软件异常检测综述...................傅建明,刘畅,解梦飞,罗陈可 1 [2022003](15)

    基于流谱理论的SSL/TLS协议攻击检测方法......................................郭世泽,张帆,宋卓学,赵子鸣,赵新杰,王小娟,罗向阳 1 [2022004](30)

    融合注意力机制和BSRU的工业互联网安全态势预测方法......................................胡向东,田正国 1 [2021092](41)

    面向项目版本差异性的漏洞识别技术研究......................................黄诚,孙明旭,段仁语,吴苏晟,陈斌 1 [2021094](52)

    基于半局部结构的异常连边识别算法...................石灏苒,吉立新,刘树新,王庚润 1 [2021040](63)

    基于混合深度学习的多类型低速率DDoS攻击检测方法......................................李丽娟,李曼,毕红军,周华春 1 [2022001](73)

    网络空间拟态防御发展综述:从拟态概念到“拟态+”生态......................................马海龙,王亮,胡涛,江逸茗,曲彦泽 2 [2022018](15)

    基于证据理论物联网安全态势感知方法研究...................李剑,董廷鲁,李劼 2 [2022022](39)

    基于softmax激活变换的对抗防御方法...................陈晋音,吴长安,郑海斌 2 [2022016](48)

    基于以太坊状态数据库的攻击与防御方案...................高镇,张东彬,田潇 2 [2022013](64)

    基于API调用管理的SDN应用层DDoS攻击防御机制......................................王洋,汤光明,王硕,楚江 2 [2022017](73)

    基于多维特征图知识蒸馏的对抗样本防御方法...................邱宝琳,易平 2 [2022012](88)

    NFT图像隐写...................王子驰,冯国瑞,张新鹏 3 [2022029](18)

    基于空域与频域关系建模的篡改文本图像检测......................................王裕鑫,张博强,谢洪涛,张勇东 3 [2022035](29)

    基于加权最小二乘的社交网络用户定位方法...................时文旗,罗向阳,郭家山 3 [2022031](41)

    安全性可控的生成式文本隐写算法...................梅佳蒙,任延珍,王丽娜 3 [2022039](53)

    增强图像平滑度的可逆信息隐藏方案......................................王婧晗,朱辉,李鹤麟,李晖,杨晓鹏 3 [2022040](66)

    用于失配隐写分析的对抗子领域自适应网络...................章蕾,王宏霞 3 [2022028](76)

    基于区块链的高透明度PKI认证协议...................陈立全,李潇,杨哲懿,钱思杰 4 [2022052](1)

    基于形式化方法的智能合约验证研究综述......................................张文博,陈思敏,魏立斐,宋巍,黄冬梅 4 [2022041](12)

    区块链密码学隐私保护技术综述...................刘峰,杨杰,齐佳音 4 [2022054](29)

    元宇宙中区块链的应用与展望...................宋晓玲,刘勇,董景楠,黄勇飞 4 [2022045](45)

    基于区块链的多权限属性隐藏电子病历共享方案...................金琳,田有亮 4 [2022044](66)

    基于正常交易掩盖下的区块链隐蔽通信方案......................................姜鹏坤,张问银,王九如,黄善云,宋万水 4 [2022043](77)

    基于GRU的智能手机多场景步态认证......................................姜奇,冯茹,张瑞杰,王金花,陈婷,魏福山 5 [2022060](26)

    基于GNN双源学习的访问控制关系预测方法......................................单棣斌,杜学绘,王文娟,刘敖迪,王娜 5 [2022062](40)

    动态聚合权重的隐私保护联邦学习框架...................应作斌,方一晨,张怡文 5 [2022069](56)

    基于鸽群的鲁棒强化学习算法...................张明英,华冰,张宇光,李海东,郑墨泓 5 [2022064](66)

    基于区块链与国密SM9的抗恶意KGC无证书签名方案......................................唐飞,甘宁,阳祥贵,王金洋 6 [2022073](9)

    基于国密算法的车载以太网控制器身份认证方法...................郭辉,罗勇,郭晓潞 6 [2022079](20)

    低功耗嵌入式平台的SM2国密算法优化实现......................................刘赣秦,李晖,朱辉,黄煜坤,刘兴东 6 [2022080](29)

    基于SM2的两方协作盲签名协议...................白雪,秦宝东,郭瑞,郑东 6 [2022081](39)

    集群网络密钥管理方案研究综述...................刘军,袁霖,冯志尚 6 [2022082](52)

    学术论文

    基于图像重构的MNIST对抗样本防御算法......................................秦中元,贺兆祥,李涛,陈立全 1 [2021095](86)

    面向5G mMTC的网络切片安全研究...................徐子钧,刘建伟,李耕 1 [2022006](95)

    基于细粒度嵌入空间预留的密文域图像可逆信息隐藏方法......................................李锦伟,张晓雅,姚远志,俞能海 1 [2022008](106)

    智能化的安卓手势密码取证关键技术......................................裘佳浩,邱卫东,王杨德,查言,谢宇明,李岩 1 [2022005](118)

    基于信誉管理模型的矿工类型鉴别机制设计...................余佳仁,田有亮,林晖 1 [2022002](128)

    支持多数不规则用户的隐私保护联邦学习框架......................................陈前昕,毕仁万,林劼,金彪,熊金波 1 [2022011](139)

    基于网络防御知识图谱的0day攻击路径预测方法......................................孙澄,胡浩,杨英杰,张红旗 1 [2021101](151)

    面向智能汽车的信息安全漏洞评分模型......................................于海洋,陈秀真,马进,周志洪,侯书凝 1 [2021096](167)

    面向商用活体检测平台的鲁棒性评估......................................王鹏程,郑海斌,邹健飞,庞玲,李虎,陈晋音 1 [2022010](180)

    基于原子混淆的通用侧信道漏洞修补方法......................................邹德清,张盼,刘伟,陈维杰,陆弈帆 2 [2022014](100)

    云环境下基于属性策略隐藏的可搜索加密方案......................................周艺华,扈新宇,李美奇,杨宇光 2 [2022019](112)

    基于SM2联合签名的电子发票公开验证方案......................................罗玙榕,曹进,李晖,赵兴文,尚超 2 [2022020](122)

    元宇宙发展演变及安全风险研究...................王海龙,李阳春,李欲晓 2 [2022023](132)

    基于标签传播的两阶段社区检测算法......................................孙学良,王巍,黄俊恒,辛国栋,王佰玲 2 [2021099](139)

    基于DSR和BGRU模型的聊天文本证据分类方法......................................张宇,李炳龙,李学娟,张和禹 2 [2022007](150)

    基于混合分析的Java反序列化利用链挖掘方法...................武永兴,陈力波,姜开达 2 [2022009](160)

    基于FANP的云用户行为信任评估优化机制......................................张艺,田立勤,毋泽南,武文星 2 [2021100](175)

    容器云中基于信号博弈的容器迁移与蜜罐部署策略......................................李凌书,邬江兴,曾威,刘文彦 3 [2021042] (87)

    保护隐私的有理数科学计算...................刘旭红,孙晨 3 [2022038] (97)

    面向图像识别的卷积神经网络鲁棒性研究进展...................林点,潘理,易平 3 [2022037](111)

    基于联盟链的跨域认证方案...................牛建林,任志宇,杜学绘 3 [2022036](123)

    基于合成语音的计算安全隐写方法...................李梦涵,陈可江,张卫明,俞能海 3 [2022025](134)

    基于信任值的车联网分层共识优化协议......................................翟宝琴,王健,韩磊,刘吉强,何嘉豪,刘天皓 3 [2021097](142)

    5G移动边缘计算场景下的快速切换认证方案......................................张伟成,卫红权,刘树新,普黎明 3 [2022034](154)

    基于SEIPQR模型的工控蠕虫防御策略...................潘 洁,叶兰,赵贺,张鑫磊 3 [2022032](169)

    云计算多授权中心CP-ABE代理重加密方案...................刘尚,郭银章 3 [2022033](176)

    基于期望收益率攻击图的网络风险评估研究......................................刘文甫,庞建民,周鑫,李男,岳峰 4 [2022047](87)

    基于博弈论抗共谋攻击的全局随机化共识算法...................张宝,田有亮,高胜 4 [2022048](98)

    载体独立的深度光照水印算法...................陈浩,王锋,张卫明,俞能海 4 [2022056](110)

    面向高速网络流量的加密混淆型WebShell检测......................................曹艺怀,陈伟,张帆,吴礼发 4 [2022055](119)

    基于节点匹配度的动态网络链路预测方法......................................李聪,季新生,刘树新,李劲松,李海涛 4 [2022053](131)

    基于动态浏览器指纹的链接检测技术研究...................高凡,王健,刘吉强 4 [2022049](144)

    车联网中基于攻防博弈的蜜罐防御及传输策略......................................易杰,曹腾飞,郜帅,黄建强 4 [2022050](157)

    基于改进Transformer的社交媒体谣言检测......................................郑洪浩,郝一诺,于洪涛,李邵梅,吴翼腾 4 [2022042](168)

    面向网络安全资源池的智能服务链系统设计与分析......................................王泽南,李佳浩,檀朝红,皮德常 4 [2022051](175)

    支持受损数据定位与恢复的动态群用户可证明存储......................................姜涛,徐航,王良民,马建峰 5 [2022071](75)

    新的基于双混沌系统和压缩感知的图像加密算法...................杨宇光,曹国栋 5 [2022058](88)

    面向物联网设备固件的硬编码漏洞检测方法......................................穆超,王鑫,杨明,张恒,陈振娅,吴晓明 5 [2022070](98)

    基于字节码的以太坊智能合约分类方法...................林 丹,林凯欣,吴嘉婧,郑子彬 5 [2022046](111)

    面向进程多变体软件系统的攻击面定性建模分析......................................邢福康,张铮,隋然,曲晟,季新生 5 [2022059](121)

    基于SAT方法进一步加速差分特征的搜索...................许峥 5 [2022066](129)

    基于BRLWE的物联网后量子加密技术研究......................................高艺恬,陈立全,屠天扬,高原,陈芊叶 5 [2022024](140)

    数字货币交易匿名性与监管的博弈分析......................................张娴,朱建明,隋智源,明盛智 5 [2022068](150)

    CAT-RFE:点击欺诈的集成检测框架......................................卢翼翔,耿光刚,延志伟,朱效民,张新常 5 [2022065](158)

    基于通道间相关性的图像重着色检测......................................陈诺,祁树仁,张玉书,薛明富,花忠云 5 [2022057](167)

    新的基于鼠标行为的持续身份认证方法...................易聪,胡军 5 [2022067](179)

    具有隐私保护的动态高效车载云管理方案......................................肖敏,姚涛,刘媛妮,黄永洪 6 [2022083](70)

    基于卷积神经网络的加密流量分类方法...................谢绒娜,马铸鸿,李宗俞,田野 6 [2022077](84)

    国家自然科学基金委员会网络安全现状与展望......................................李东,郝艳妮,彭升辉,訾瑞杰,刘西蒙 6 [2022076](92)

    基于剪枝技术和鲁棒蒸馏融合的轻量对抗攻击防御方法......................................王滨,李思敏,钱亚冠,张君,李超豪,朱晨鸣,张鸿飞 6 [2022074](102)

    基于双分支网络的图像修复取证方法......................................章登勇,文凰,李峰,曹鹏,向凌云,杨高波,丁湘陵 6 [2022084](110)

    基于符号执行和-scope复杂度的代码混淆度量方法......................................肖玉强,郭云飞,王亚文 6 [2022085](123)

    基于ROP/JOP gadgets性质的软件多样化评估方法......................................迟宇宁,郭云飞,王亚文,扈红超 6 [2022086](135)

    空域频域相结合的唇型篡改检测方法...................林佳滢,周文柏,张卫明,俞能海 6 [2022075](146)

    具有紧凑标签的基于身份匿名云审计方案......................................卢晨昕,陈兵,丁宁,陈立全,吴戈 6 [2022087](156)

    信息增值机制下在线医疗隐私保护策略...................明盛智,朱建明,隋智源,张娴 6 [2022072](169)

    教育与教学

    网络空间安全专业课程思政教学探索与实践——以东南大学“网络空间安全新进展”课程为例...................李古月,胡爱群 2 [2022021](183)

    本科“机器学习”课程教学改革初探...................韦 南,殷丽华,宁洪,方滨兴 4 [2022026](182)

    Chinese Journal of Network and Information Security Contents List Vol.8 (2022)

    No. Page

    Perspective

    Academic connotation and research trends of privacy computing......................................,,,6 [2022078](1)

    Comprehensive Reviews

    Research review of network defense decision-making methods based on attack and defense game......................................,,,Yuchen,1 [2021089](1)

    Survey on intellectual property protection for deep learning model......................................,,,2 [2022015](1)

    Review on security risks of key components in industrial control system......................................,,,,3 [2022030](1)

    Survey on explainable knowledge graph reasoning methods......................................,,,,,5 [2022063](1)

    Topics

    Survey of software anomaly detection based on deception......................................,,,1 [2022003](15)

    Detection of SSL/TLS protocol attacks based on flow spectrum theory...................,,...................,,,,1 [2022004](30)

    Methods of security situation prediction for industrial internet fused attention mechanism and BSRU......................................,1 [2021092](41)

    Vulnerability identification technology research based on project version difference......................................,,,,1 [2021094](52)

    Abnormal link detection algorithm based on semi-local structure......................................,,,1 [2021040](63)

    Multi-typelow-rate DDoS attack detection method based on hybrid deep learning......................................,,,1 [2022001](73)

    Survey on the development of mimic defense in cyberspace: from mimic concept to “mimic+” ecology...................,,,,2 [2022018](15)

    Research on IoT security situation awareness method based on evidence theory......................................,,2 [2022022](39)

    Novel defense based on softmax activation transformation......................................,,2 [2022016](48)

    Defense scheme for the world state based attack in Ethereum......................................,,2 [2022013](64)

    Defense mechanism of SDN application layer against DDoS attack based on API call management......................................,,,2 [2022017](73)

    Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation...................,2 [2022012](88)

    Steganography in NFT images...................,,3 [2022029](18)

    Tampered text detection via RGB and frequency relationship modeling......................................,,,3 [2022035](29)

    Social network user geolocating method based on weighted least squares......................................,,3 [2022031](41)

    Generation-based linguistic steganography with controllable security......................................,,3 [2022039](53)

    Reversible data hiding scheme based on enhanced image smoothness......................................,,,,3 [2022040](66)

    Adversarial subdomain adaptation network for mismatched steganalysis......................................,3 [2022028](76)

    Blockchain-based high transparent PKI authentication protocol......................................,,,4 [2022052](1)

    State-of-the-art survey of smart contract verification based on formal methods......................................,,,,4 [2022041](12)

    Survey on blockchain privacy protection techniques in cryptography...................,,4 [2022054](29)

    Application and prospect of blockchain in Metaverse......................................,,,4 [2022045](45)

    Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain......................................,4 [2022044](66)

    Blockchain covert communication scheme based on the cover of normal transactions......................................,,,,4 [2022043] (77)

    GRU-based multi-scenario gait authentication for smartphones......................................,,,,,5 [2022060] (26)

    Access control relationship prediction method based on GNN dual source learning......................................,,,,5 [2022062] (40)

    Privacy-preserving federated learning framework with dynamic weight aggregation......................................,,5 [2022069] (56)

    Robust reinforcement learning algorithm based on pigeon-inspired optimization......................................,,,,5 [2022064] (66)

    Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9...................,,,6 [2022073] (9)

    Automotive ethernet controller authentication method based on national cryptographic algorithms......................................,,6 [2022079] (20)

    Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform...................,,,,6 [2022080] (29)

    Two-party cooperative blind signature based on SM2......................................,,,6 [2022081] (39)

    Survey of key management schemes for cluster networks...................,,6 [2022082] (52)

    Papers

    Adversarial example defense algorithm for MNIST based on image reconstruction......................................,,,1 [2021095] (86)

    Research on network slicing security for 5G mMTC...................,,1 [2022006] (95)

    Reversible data hiding in encrypted images based on fine-grained embedding room reservation......................................,,,1 [2022008](106)

    Intellectualized forensic technique for Android pattern locks......................................,,,,,1 [2022005](118)

    Design of miner type identification mechanism based on reputation management model......................................,,1 [2022002](128)

    Privacy-preserving federated learning framework with irregular-majority users......................................,,,,1 [2022011](139)

    Prediction method of 0day attack path based on cyber defense knowledge graph......................................,,,1 [2021101](151)

    Information security vulnerability scoring model for intelligent vehicles......................................,,,,1 [2021096](167)

    Robustness evaluation of commercial liveness detection platform......................................,,,,,1 [2022010](180)

    Universal patching method for side-channel vulnerabilities based on atomic obfuscation......................................,,,,2 [2022014](100)

    Searchable encryption scheme based on attribute policy hiding in a cloud environment......................................,,,2 [2022019](112)

    Electronic invoice public verification scheme based on SM2 coalition signature algorithm......................................,,,,2 [2022020](122)

    Research on evolution and security risk of Metaverse...................,,2 [2022023](132)

    Two-stage community detection algorithm based on label propagation......................................,,,,2 [2021099](139)

    Evidence classification method of chat text based on DSR and BGRU model......................................,,,2 [2022007](150)

    Java deserialization gadget chain discovery method based on hybrid analysis......................................,,2 [2022009](160)

    Trust evaluation optimization mechanism for cloud user behavior based on FANP......................................,,,2 [2021100](175)

    Strategy of container migration and honeypot deployment based on signal game in cloud environment......................................,,,3 [2021042] (87)

    Private-preserving scientific computation of the rational numbers...................,3 [2022038] (97)

    Research on the robustness of convolutional neural networks in image recognition......................................,,3 [2022037](111)

    Cross-domain authentication scheme based on consortium blockchain......................................,,3 [2022036](123)

    Computationally secure steganography based on speech synthesis......................................3 [2022025](134)

    Hierarchical proxy consensus optimization for IoV based on blockchain and trust value......................................,,,,,3 [2021097](142)

    Fast handover authentication scheme in 5G mobile edge computing scenarios......................................,,,3 [2022034](154)

    Defense strategy of industrial control worm based on SEIPQR model......................................,,,3 [2022032](169)

    Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing......................................,3 [2022033](176)

    Research on network risk assessment based on attack graph of expected benefits-rate......................................,,,,4 [2022047](87)

    Global randomized consensus algorithm resist collusion attack based on game theory......................................,,4 [2022048](98)

    Carrier-independent deep optical watermarking algorithm......................................,,,4 [2022056](110)

    Encrypted and obfuscation WebShell detection for high-speed network traffic......................................,,,4 [2022055](119)

    Link prediction method for dynamic networks based on matching degree of nodes......................................,,,,4 [2022053](131)

    Research on link detection technology based on dynamic browser fingerprint......................................,,4 [2022049](144)

    Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks......................................,,,4 [2022050](157)

    Rumor detection in social media based on eahanced Transformer......................................,,,,4 [2022042](168)

    Design and analysis of intelligent service chain system for network security resource pool......................................,,,4 [2022051](175)

    Proof of storage with corruption identification and recovery for dynamic group users......................................,,,5 [2022071] (75)

    New image encryption algorithm based on double chaotic system and compressive sensing......................................,5 [2022058] (88)

    Hardcoded vulnerability detection approach for IoT device firmware......................................,,,,,5 [2022070] (98)

    Bytecode-based approach for Ethereum smart contract classification5 [2022046](111)

    Qualitative modeling and analysis of attack surface for process multi-variant execution software system......................................,,,,5 [2022059](121)

    Further accelerating the search of differential characteristics based on the SAT method...................5 [2022066](129)

    Post-quantum encryption technology based on BRLWE for internet of things......................................,,,,5 [2022024](140)

    Analysis on anonymity and regulation of digital currency transactions based on game theory......................................,,,5 [2022068](150)

    CAT-RFE: ensemble detection framework for click fraud......................................,,,,5 [2022065](158)

    Image recoloring detection based on inter-channel correlation......................................,,,,5 [2022057](167)

    Novel continuous identity authentication method based on mouse behavior...................,5 [2022067](179)

    Dynamic and efficient vehicular cloud management scheme with privacy protection......................................,,,6 [2022083] (70)

    Encrypted traffic classification method based on convolutional neural network......................................,,,6 [2022077] (84)

    Network security of the National Natural Science Foundation of China: today and prospects......................................,,,,6 [2022076] (92)

    Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation......................................,,,,,,6 [2022074](102)

    Image inpainting forensics method based on dual branch network...................,,,,,,6 [2022084](110)

    Metrics for code obfuscation based on symbolic execution and-scope complexity......................................,,6 [2022085](123)

    Software diversity evaluation method based on the properties of ROP/JOP gadgets......................................,,,6 [2022086](135)

    Lip forgery detection via spatial-frequency domain combination......................................,,,6 [2022075](146)

    Identity-based anonymous cloud auditing scheme with compact tags......................................,,,,6 [2022087](156)

    Online medical privacy protection strategy under information value-added mechanism......................................,,,6 [2022072](169)

    Education and teaching

    Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty...................,2 [2022021](183)

    Preliminary study on the reform of machine learning teaching......................................,,,4 [2022026](182)

    猜你喜欢 方法 高中数学知识与方法大梳理(二)新世纪智能(数学备考)(2021年10期)2021-12-21中医特有的急救方法中老年保健(2021年9期)2021-08-24高中数学教学改革的方法河北画报(2021年2期)2021-05-25化学反应多变幻 “虚拟”方法帮大忙中学生数理化(高中版.高考理化)(2020年2期)2020-04-21变快的方法儿童绘本(2020年5期)2020-04-07学习方法儿童故事画报(2019年5期)2019-05-26用对方法才能瘦Coco薇(2016年2期)2016-03-22最有效的简单方法山东青年(2016年1期)2016-02-28四大方法 教你不再“坐以待病”!Coco薇(2015年1期)2015-08-13赚钱方法小雪花·成长指南(2015年7期)2015-08-11

    推荐访问:目次 学报 信息安全

    • 文档大全
    • 故事大全
    • 优美句子
    • 范文
    • 美文
    • 散文
    • 小说文章