RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 12

Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
Tang, Weixuan; Li, Bin; Li, Weixiang; Wang, Yuangen; Huang, Jiwu
Sci China Inf Sci, 2023, 66(3): 132305
Keywords: information hiding; non-additive steganography; steganalysis; cost learning; image processing
Cite as: Tang W X, Li B, Li W X, et al. Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Sci China Inf Sci, 2023, 66(3): 132305, doi: 10.1007/s11432-021-3453-5

Special Topic: XAI-Enabled Network Automation for 5G and Beyond: Move Closer to Zero-Touch
SCIS Selected Articles on Network Security
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 10

Path signature-based XAI-enabled network time series classification
Sun, Le; Wang, Yueyuan; Ren, Yongjun; Xia, Feng
Sci China Inf Sci, 2024, 67(7): 170305
Keywords: network time series classification; explainable artificial intelligence; path signature; automated network management; recurrent neural network
Cite as: Sun L, Wang Y Y, Ren Y J, et al. Path signature-based XAI-enabled network time series classification. Sci China Inf Sci, 2024, 67(7): 170305, doi: 10.1007/s11432-023-3978-y

SCIS Selected Articles on Remote Senser
LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 10

Few-shot RF fingerprinting recognition for secure satellite remote sensing and image processing
Lin, Di; Hu, Su; Wu, Weiwei; Wu, Gang
Sci China Inf Sci, 2023, 66(8): 189304
Keywords: Satellite remote sensing; User authentication; Radio frequency fingerprinting; Image perturbation; Spatially transformed adversarial
Cite as: Lin D, Hu S, Wu W W, et al. Few-shot RF fingerprinting recognition for secure satellite remote sensing and image processing. Sci China Inf Sci, 2023, 66(8): 189304, doi: 10.1007/s11432-022-3672-7

SCIS Selected Articles on Network Security
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 4

Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
Hu, Xiaoyan; Wan, Zheng; Huang, Kaizhi; Jin, Liang; Yan, Mengyao; Chen, Yajun; Yang, Jinmei
Sci China Inf Sci, 2024, 67(1): 112303
Keywords: physical layer security; one-time pad; wireless channel; physical layer encryption; perfect secrecy
Cite as: Hu X Y, Wan Z, Huang K Z, et al. Modulated symbol-based one-time pad secure transmission scheme using physical layer keys. Sci China Inf Sci, 2024, 67(1): 112303, doi: 10.1007/s11432-022-3768-8

SCIS Selected Articles on Network Security
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

A DHR executor selection algorithm based on historical credibility and dissimilarity clustering
Shao, Sisi; Ji, Yimu; Zhang, Weili; Liu, Shangdong; Jiang, Fei; Cao, Zhigang; Wu, Fei; Zeng, Fukang; Zuo, Jun; Zhou, Longfei
Sci China Inf Sci, 2023, 66(11): 212304
Keywords: endogenous security; mimic defense; DHR; executor selection; historical credibility
Cite as: Shao S S, Ji Y M, Zhang W L, et al. A DHR executor selection algorithm based on historical credibility and dissimilarity clustering. Sci China Inf Sci, 2023, 66(11): 212304, doi: 10.1007/s11432-022-3635-2

SCIS Selected Articles on Network Security
LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

DP-GenFL: a local differentially private federated learning system through generative data
Li, Jun; Wei, Kang; Ma, Chuan; Shu, Feng
Sci China Inf Sci, 2023, 66(8): 189303
Keywords: Federated learning; Differential Privacy; Generative Adversarial Networks; Membership Inference Attack; Privacy Enhancing Technique
Cite as: Li J, Wei K, Ma C, et al. DP-GenFL: a local differentially private federated learning system through generative data. Sci China Inf Sci, 2023, 66(8): 189303, doi: 10.1007/s11432-022-3678-7

SCIS Selected Articles on Network Security
RESEARCH PAPER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Multi-party privacy-preserving decision tree training with a privileged party
Tong, Yiwen; Feng, Qi; Luo, Min; He, Debiao
Sci China Inf Sci, 2024, 67(8): 182303
Keywords: privacy protection; decision trees; secure multi-party computation; secret sharing; privileged party
Cite as: Tong Y W, Feng Q, Luo M, et al. Multi-party privacy-preserving decision tree training with a privileged party. Sci China Inf Sci, 2024, 67(8): 182303, doi: 10.1007/s11432-023-4013-x

SCIS Selected Articles on Network Security
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
Luo, Xiang; Liu, Chang; Gou, Gaopeng; Xiong, Gang; Li, Zhen; Fang, Binxing
Sci China Inf Sci, 2024, 67(8): 182302
Keywords: concept drift; malicious traffic identification; variational autoencoder; intrusion detection; cyberspace security
Cite as: Luo X, Liu C, Gou G P, et al. Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder. Sci China Inf Sci, 2024, 67(8): 182302, doi: 10.1007/s11432-023-4010-4

SCIS Selected Articles on Network Security
LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
Li, Xuan; Wang, Naiyu; Zhu, Liehuang; Yuan, Shuai; Guan, Zhitao
Sci China Inf Sci, 2024, 67(4): 149302
Keywords: federated Learning; electricity theft detection; smart grid; split learning; computational overhead; privacy-preserving
Cite as: Li X, Wang N Y, Zhu L H, et al. FUSE: a federated learning and U-shape split learning-based electricity theft detection framework. Sci China Inf Sci, 2024, 67(4): 149302, doi: 10.1007/s11432-023-3946-x

RESEARCH PAPER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

A nonprofiled side-channel analysis based on variational lower bound related to mutual information
Zhang, Chi; Lu, Xiangjun; Cao, Pei; Gu, Dawu; Guo, Zheng; Xu, Sen
Sci China Inf Sci, 2023, 66(1): 112302
Keywords: side-channel analysis; nonprofiled method; variational lower bound; mutual information; neural networks
Cite as: Zhang C, Lu X J, Cao P, et al. A nonprofiled side-channel analysis based on variational lower bound related to mutual information. Sci China Inf Sci, 2023, 66(1): 112302, doi: 10.1007/s11432-021-3451-1

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar

Keywords: timed commitment; randomness beacon; random number; optimal communication complexity; permissionless setting
Cite as: Wu Z Y, Liu H L, Wang L. PltcRB: a practical distributed randomness beacon with optimal amortized communication complexity. Sci China Inf Sci, 2025, 68(2): 122304, doi: 10.1007/s11432-024-4232-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM
Qiao, Kexin; Wang, Zhaoyang; Chang, Heng; Sun, Siwei; Wu, Zehan; Cheng, Junjie; Ou, Changhai; Wang, An; Zhu, Liehuang
Sci China Inf Sci, 2024, 67(11): 212302
Keywords: KYBER; chosen-ciphertext attack; side-channel; belief propagation; contraction strategy; machine learning
Cite as: Qiao K X, Wang Z Y, Chang H, et al. A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM. Sci China Inf Sci, 2024, 67(11): 212302, doi: 10.1007/s11432-024-4150-3

Special Topic: XAI-Enabled Network Automation for 5G and Beyond: Move Closer to Zero-Touch
SCIS Selected Articles on Network Security
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

HEN: a novel hybrid explainable neural network based framework for robust network intrusion detection
Wei, Wei; Chen, Sijin; Chen, Cen; Wang, Heshi; Liu, Jing; Cheng, Zhongyao; Zou, Xiaofeng
Sci China Inf Sci, 2024, 67(7): 170304
Keywords: explainable artificial intelligence; light gradient boosting machine; machine learning; network intrusion detection; Shapley additive explanation; hybrid explainable neural network; HEN
Cite as: Wei W, Chen S J, Chen C, et al. HEN: a novel hybrid explainable neural network based framework for robust network intrusion detection. Sci China Inf Sci, 2024, 67(7): 170304, doi: 10.1007/s11432-023-4067-x

Special Topic: XAI-Enabled Network Automation for 5G and Beyond: Move Closer to Zero-Touch
SCIS Selected Articles on 6G
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios
Li, Bo; Cheng, Guanjie; Gao, Honghao; Yan, Xueqiang; Deng, Shuiguang
Sci China Inf Sci, 2024, 67(7): 170301
Keywords: blockchain; distributed ledger technology; DLT; 6G; performance assessment; 6G scenarios analysis; transaction arrival rate
Cite as: Li B, Cheng G J, Gao H H, et al. Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios. Sci China Inf Sci, 2024, 67(7): 170301, doi: 10.1007/s11432-023-4054-5

SCIS Selected Articles on UAV Communication
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
Ma, Chengyan; Xi, Ning; Lu, Di; Feng, Yebo; Ma, Jianfeng
Sci China Inf Sci, 2024, 67(6): 162305
Keywords: unmanned system; memory corruption attack; memory protection; system security; randomized memory address
Cite as: Ma C Y, Xi N, Lu D, et al. CToMP: a cycle-task-oriented memory protection scheme for unmanned systems. Sci China Inf Sci, 2024, 67(6): 162305, doi: 10.1007/s11432-023-3865-0