Highly Cited in 202407
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 67
Keywords: industry 4.0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack
Cite as: Wang C Y, Wang D, Xu G A, et al. Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci China Inf Sci, 2022, 65(1): 112301, doi: 10.1007/s11432-020-2975-6
PERSPECTIVE
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 11
Keywords: reconfigurable architectures; energy efficiency; cryptographic accelerator; flexibility; side channel analysis
Cite as: Wu J X. Development paradigms of cyberspace endogenous safety and security. Sci China Inf Sci, 2022, 65(5): 156301, doi: 10.1007/s11432-021-3379-2
SCIS Selected Articles on Remote Senser
LETTER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 10
Keywords: Satellite remote sensing; User authentication; Radio frequency fingerprinting; Image perturbation; Spatially transformed adversarial
Cite as: Lin D, Hu S, Wu W W, et al. Few-shot RF fingerprinting recognition for secure satellite remote sensing and image processing. Sci China Inf Sci, 2023, 66(8): 189304, doi: 10.1007/s11432-022-3672-7
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 10
Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism
Tang, Weixuan; Li, Bin; Li, Weixiang; Wang, Yuangen; Huang, Jiwu
Sci China Inf Sci, 2023, 66(3): 132305
Keywords: information hiding; non-additive steganography; steganalysis; cost learning; image processing
Cite as: Tang W X, Li B, Li W X, et al. Reinforcement learning of non-additive joint steganographic embedding costs with attention mechanism. Sci China Inf Sci, 2023, 66(3): 132305, doi: 10.1007/s11432-021-3453-5
REVIEW
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 10
A survey on cryptographic techniques for protecting big data security: present and forthcoming
Lu, Siqi; Zheng, Jianhua; Cao, Zhenfu; Wang, Yongjuan; Gu, Chunxiang
Sci China Inf Sci, 2022, 65(10): 201301
Keywords: big data security; cryptographic techniques; ciphertext-based data sharing and computing; au- thenticated encryption; functional encryption; homomorphic encryption; secure multi-party computing
Cite as: Lu S Q, Zheng J H, Cao Z F, et al. A survey on cryptographic techniques for protecting big data security: present and forthcoming. Sci China Inf Sci, 2022, 65(10): 201301, doi: 10.1007/s11432-021-3393-x
Special Topic: XAI-Enabled Network Automation for 5G and Beyond: Move Closer to Zero-Touch
SCIS Selected Articles on Network Security
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 8
Path signature-based XAI-enabled network time series classification
Sun, Le; Wang, Yueyuan; Ren, Yongjun; Xia, Feng
Sci China Inf Sci, 2024, 67(7): 170305
Keywords: network time series classification; explainable artificial intelligence; path signature; automated network management; recurrent neural network
Cite as: Sun L, Wang Y Y, Ren Y J, et al. Path signature-based XAI-enabled network time series classification. Sci China Inf Sci, 2024, 67(7): 170305, doi: 10.1007/s11432-023-3978-y
Special Focus on Cyber Security in the Era of Artificial Intelligence
LETTER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 8
ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data
Zhao, Jiaqi; Zhu, Hui; Wang, Fengwei; Lu, Rongxing; Li, Hui; Zhou, Zhongmin; Wan, Haitao
Sci China Inf Sci, 2022, 65(7): 170307
Keywords: vertically federated learning; privacy-preserving; logistic regression; symmetric homomorphic encryption; efficiency
Cite as: Zhao J Q, Zhu H, Wang F W, et al. ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data. Sci China Inf Sci, 2022, 65(7): 170307, doi: 10.1007/s11432-021-3415-1
Special Focus on Cyber Security in the Era of Artificial Intelligence
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 7
Intelligent networking in adversarial environment: challenges and opportunities
Zhao, Yi; Xu, Ke; Li, Qi; Wang, Haiyang; Wang, Dan; Zhu, Min
Sci China Inf Sci, 2022, 65(7): 170301
Keywords: intelligent networking; adversarial; attacks; defense; security
Cite as: Zhao Y, Xu K, Li Q, et al. Intelligent networking in adversarial environment: challenges and opportunities. Sci China Inf Sci, 2022, 65(7): 170301, doi: 10.1007/s11432-021-3463-9
LETTER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 7
Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker
Teng, Yin; Li, Jiayu; Huang, Mengxing; Liu, Lin; Xia, Guiyang; Zhou, Xiaobo; Shu, Feng; Wang, Jiangzhou
Sci China Inf Sci, 2022, 65(1): 119302
Keywords: malicious attacker; secure; directional modulation; secrecy rate; receive beamforming; null-space projection
Cite as: Teng Y, Li J Y, Huang M X, et al. Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker. Sci China Inf Sci, 2022, 65(1): 119302, doi: 10.1007/s11432-020-3232-4
Special Focus on Cyber Security in the Era of Artificial Intelligence
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 6
Keywords: cyber deception defense; artificial intelligence; cloud security; reconnaissance attack; deep reinforcement learning; deception strategy
Cite as: Li H R, Guo Y F, Huo S M, et al. Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. Sci China Inf Sci, 2022, 65(7): 170305, doi: 10.1007/s11432-021-3462-4
Special Focus on Cyber Security in the Era of Artificial Intelligence
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 6
Keywords: user authentication; Internet of things; convolutional neural network; RF fingerprinting; NP-hard optimization problem
Cite as: Wu W W, Hu S, Lin D, et al. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks. Sci China Inf Sci, 2022, 65(7): 170304, doi: 10.1007/s11432-021-3284-y
Special Focus on Cyber Security in the Era of Artificial Intelligence
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 6
Keywords: federated learning; secure computing; industrial Internet of Things (IIoT); machine vision; texture encoding; image classification; Non-IID
Cite as: Peng B, Chi M M, Liu C. Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing. Sci China Inf Sci, 2022, 65(7): 170302, doi: 10.1007/s11432-021-3423-9
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 5
Secure coordinated direct and untrusted relay transmissions via interference engineering
Lv, Lu; Li, Zan; Ding, Haiyang; Zhou, Yuchen; Chen, Jian
Sci China Inf Sci, 2022, 65(8): 182304
Keywords: physical layer security; untrusted relay; interference exploitation; coordinated transmission; ergodic secrecy rate
Cite as: Lv L, Li Z, Ding H Y, et al. Secure coordinated direct and untrusted relay transmissions via interference engineering. Sci China Inf Sci, 2022, 65(8): 182304, doi: 10.1007/s11432-021-3259-0
Special Focus on Cyber Security in the Era of Artificial Intelligence
LETTER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 4
Post quantum secure fair data trading with deterability based on machine learning
Liu, Jinhui; Yu, Yong; Bi, Hongliang; Zhao, Yanqi; Wang, Shijia; Zhang, Huanguo
Sci China Inf Sci, 2022, 65(7): 170308
Keywords: designated verifier signatures; zk-SNARKs; double authentication preventing signatures; lattice; machine learning
Cite as: Liu J H, Yu Y, Bi H L, et al. Post quantum secure fair data trading with deterability based on machine learning. Sci China Inf Sci, 2022, 65(7): 170308, doi: 10.1007/s11432-021-3441-y
Special Focus on Cyber Security in the Era of Artificial Intelligence
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 4
Keywords: AI security; adversarial sample; data poisoning; network intrusion detection; generative adversarial network
Cite as: Liu G R, Zhang W Z, Li X J, et al. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems. Sci China Inf Sci, 2022, 65(7): 170303, doi: 10.1007/s11432-021-3455-1
SCIS Selected Articles on Network Security
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 2
A DHR executor selection algorithm based on historical credibility and dissimilarity clustering
Shao, Sisi; Ji, Yimu; Zhang, Weili; Liu, Shangdong; Jiang, Fei; Cao, Zhigang; Wu, Fei; Zeng, Fukang; Zuo, Jun; Zhou, Longfei
Sci China Inf Sci, 2023, 66(11): 212304
Keywords: endogenous security; mimic defense; DHR; executor selection; historical credibility
Cite as: Shao S S, Ji Y M, Zhang W L, et al. A DHR executor selection algorithm based on historical credibility and dissimilarity clustering. Sci China Inf Sci, 2023, 66(11): 212304, doi: 10.1007/s11432-022-3635-2
SCIS Selected Articles on Network Security
LETTER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 2
Keywords: Federated learning; Differential Privacy; Generative Adversarial Networks; Membership Inference Attack; Privacy Enhancing Technique
Cite as: Li J, Wei K, Ma C, et al. DP-GenFL: a local differentially private federated learning system through generative data. Sci China Inf Sci, 2023, 66(8): 189303, doi: 10.1007/s11432-022-3678-7
SCIS Selected Articles on Network Security
RESEARCH PAPER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
Multi-party privacy-preserving decision tree training with a privileged party
Tong, Yiwen; Feng, Qi; Luo, Min; He, Debiao
Sci China Inf Sci, 2024, 67(8): 182303
Keywords: privacy protection; decision trees; secure multi-party computation; secret sharing; privileged party
Cite as: Tong Y W, Feng Q, Luo M, et al. Multi-party privacy-preserving decision tree training with a privileged party. Sci China Inf Sci, 2024, 67(8): 182303, doi: 10.1007/s11432-023-4013-x
SCIS Selected Articles on Network Security
LETTER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
FUSE: a federated learning and U-shape split learning-based electricity theft detection framework
Li, Xuan; Wang, Naiyu; Zhu, Liehuang; Yuan, Shuai; Guan, Zhitao
Sci China Inf Sci, 2024, 67(4): 149302
Keywords: federated Learning; electricity theft detection; smart grid; split learning; computational overhead; privacy-preserving
Cite as: Li X, Wang N Y, Zhu L H, et al. FUSE: a federated learning and U-shape split learning-based electricity theft detection framework. Sci China Inf Sci, 2024, 67(4): 149302, doi: 10.1007/s11432-023-3946-x
SCIS Selected Articles on Network Security
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
Modulated symbol-based one-time pad secure transmission scheme using physical layer keys
Hu, Xiaoyan; Wan, Zheng; Huang, Kaizhi; Jin, Liang; Yan, Mengyao; Chen, Yajun; Yang, Jinmei
Sci China Inf Sci, 2024, 67(1): 112303
Keywords: physical layer security; one-time pad; wireless channel; physical layer encryption; perfect secrecy
Cite as: Hu X Y, Wan Z, Huang K Z, et al. Modulated symbol-based one-time pad secure transmission scheme using physical layer keys. Sci China Inf Sci, 2024, 67(1): 112303, doi: 10.1007/s11432-022-3768-8
RESEARCH PAPER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
A nonprofiled side-channel analysis based on variational lower bound related to mutual information
Zhang, Chi; Lu, Xiangjun; Cao, Pei; Gu, Dawu; Guo, Zheng; Xu, Sen
Sci China Inf Sci, 2023, 66(1): 112302
Keywords: side-channel analysis; nonprofiled method; variational lower bound; mutual information; neural networks
Cite as: Zhang C, Lu X J, Cao P, et al. A nonprofiled side-channel analysis based on variational lower bound related to mutual information. Sci China Inf Sci, 2023, 66(1): 112302, doi: 10.1007/s11432-021-3451-1
POSITION PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
Keywords: information network development paradigm; separation of technical systems and supporting environment; polymorphic network; PINet
Cite as: Wu J X. On the revolution of the information network development paradigm. Sci China Inf Sci, 2022, 65(11): 213301, doi: 10.1007/s11432-021-3480-9
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel
Gong, Shixun; Tao, Xiaofeng; Li, Na; Wang, Haowei; Xu, Jin
Sci China Inf Sci, 2022, 65(9): 192304
Keywords: physical layer security; physical layer secret key generation; Nakagami-m fading; correlated eavesdropping channel; secret key capacity
Cite as: Gong S X, Tao X F, Li N, et al. Secret key generation over a Nakagami-m fading channel with correlated eavesdropping channel. Sci China Inf Sci, 2022, 65(9): 192304, doi: 10.1007/s11432-021-3353-5
Special Focus on Cyber Security in the Era of Artificial Intelligence
RESEARCH PAPER
Supplementary
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 1
Certified defense against patch attacks via mask-guided randomized smoothing
Zhang, Kui; Zhou, Hang; Bian, Huanyu; Zhang, Weiming; Yu, Nenghai
Sci China Inf Sci, 2022, 65(7): 170306
Keywords: certified defense; adversarial patch; patch localization; randomized smoothing; joint voting
Cite as: Zhang K, Zhou H, Bian H Y, et al. Certified defense against patch attacks via mask-guided randomized smoothing. Sci China Inf Sci, 2022, 65(7): 170306, doi: 10.1007/s11432-021-3457-7
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM
Qiao, Kexin; Wang, Zhaoyang; Chang, Heng; Sun, Siwei; Wu, Zehan; Cheng, Junjie; Ou, Changhai; Wang, An; Zhu, Liehuang
Sci China Inf Sci, 2024, 67(11): 212302
Keywords: KYBER; chosen-ciphertext attack; side-channel; belief propagation; contraction strategy; machine learning
Cite as: Qiao K X, Wang Z Y, Chang H, et al. A closer look at the belief propagation algorithm in side-channel attack on CCA-secure PQC KEM. Sci China Inf Sci, 2024, 67(11): 212302, doi: 10.1007/s11432-024-4150-3
SCIS Selected Articles on Network Security
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder
Luo, Xiang; Liu, Chang; Gou, Gaopeng; Xiong, Gang; Li, Zhen; Fang, Binxing
Sci China Inf Sci, 2024, 67(8): 182302
Keywords: concept drift; malicious traffic identification; variational autoencoder; intrusion detection; cyberspace security
Cite as: Luo X, Liu C, Gou G P, et al. Identifying malicious traffic under concept drift based on intraclass consistency enhanced variational autoencoder. Sci China Inf Sci, 2024, 67(8): 182302, doi: 10.1007/s11432-023-4010-4
Special Topic: XAI-Enabled Network Automation for 5G and Beyond: Move Closer to Zero-Touch
SCIS Selected Articles on Network Security
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
HEN: a novel hybrid explainable neural network based framework for robust network intrusion detection
Wei, Wei; Chen, Sijin; Chen, Cen; Wang, Heshi; Liu, Jing; Cheng, Zhongyao; Zou, Xiaofeng
Sci China Inf Sci, 2024, 67(7): 170304
Keywords: explainable artificial intelligence; light gradient boosting machine; machine learning; network intrusion detection; Shapley additive explanation; hybrid explainable neural network; HEN
Cite as: Wei W, Chen S J, Chen C, et al. HEN: a novel hybrid explainable neural network based framework for robust network intrusion detection. Sci China Inf Sci, 2024, 67(7): 170304, doi: 10.1007/s11432-023-4067-x
Special Topic: XAI-Enabled Network Automation for 5G and Beyond: Move Closer to Zero-Touch
SCIS Selected Articles on 6G
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios
Li, Bo; Cheng, Guanjie; Gao, Honghao; Yan, Xueqiang; Deng, Shuiguang
Sci China Inf Sci, 2024, 67(7): 170301
Keywords: blockchain; distributed ledger technology; DLT; 6G; performance assessment; 6G scenarios analysis; transaction arrival rate
Cite as: Li B, Cheng G J, Gao H H, et al. Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios. Sci China Inf Sci, 2024, 67(7): 170301, doi: 10.1007/s11432-023-4054-5
SCIS Selected Articles on UAV Communication
RESEARCH PAPER
Webpage
Webpage-cn
SpringerLink
Google Scholar
Cited in SCI: 0
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems
Ma, Chengyan; Xi, Ning; Lu, Di; Feng, Yebo; Ma, Jianfeng
Sci China Inf Sci, 2024, 67(6): 162305
Keywords: unmanned system; memory corruption attack; memory protection; system security; randomized memory address
Cite as: Ma C Y, Xi N, Lu D, et al. CToMP: a cycle-task-oriented memory protection scheme for unmanned systems. Sci China Inf Sci, 2024, 67(6): 162305, doi: 10.1007/s11432-023-3865-0