通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 16

Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach
Ning, Zhaolong; Sun, Shouming; Wang, Xiaojie; Guo, Lei; Wang, Guoyin; Gao, Xinbo; Kwok, Ricky Y. K.
Sci China Inf Sci, 2021, 64(6): 162303
Keywords: mobile blockchain; deep reinforcement learning; mobile edge computing; power allocation; bandwidth allocation
Cite as: Ning Z L, Sun S M, Wang X J, et al. Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci China Inf Sci, 2021, 64(6): 162303, doi: 10.1007/s11432-020-3125-y

通信 网络安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 15

Physical layer security for massive access in cellular Internet of Things
Qi, Qiao; Chen, Xiaoming; Zhong, Caijun; Zhang, Zhaoyang
Sci China Inf Sci, 2020, 63(2): 121301
Keywords: 5g and beyond; phy-security; massive access; cellular iot
Cite as: Qi Q, Chen X M, Zhong C J, et al. Physical layer security for massive access in cellular Internet of Things. Sci China Inf Sci, 2020, 63(2): 121301, doi: 10.1007/s11432-019-2650-4

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 13

Secure network coding from secure proof of retrievability
Chang, Jinyong; Shao, Bilin; Ji, Yanyan; Xu, Maozhi; Xue, Rui
Sci China Inf Sci, 2021, 64(12): 229301
Keywords: network coding; proof of retrievability; random oracle; provable security; cloud storage
Cite as: Chang J Y, Shao B L, Ji Y Y, et al. Secure network coding from secure proof of retrievability. Sci China Inf Sci, 2021, 64(12): 229301, doi: 10.1007/s11432-020-2997-0

Highly Cited Paper 通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 13

Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0
Wang, Chenyu; Wang, Ding; Xu, Guoai; He, Debiao
Sci China Inf Sci, 2022, 65(1): 112301
Keywords: industry 4.0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack
Cite as: Wang C Y, Wang D, Xu G A, et al. Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci China Inf Sci, 2022, 65(1): 112301, doi: 10.1007/s11432-020-2975-6

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 11

An incentive-compatible rational secret sharing scheme using blockchain and smart contract
Chen, Zerui; Tian, Youliang; Peng, Changgen
Sci China Inf Sci, 2021, 64(10): 202301
Keywords: rational secret sharing; game theory; sequential equilibrium; incentive-compatible; smart contract
Cite as: Chen Z R, Tian Y L, Peng C G. An incentive-compatible rational secret sharing scheme using blockchain and smart contract. Sci China Inf Sci, 2021, 64(10): 202301, doi: 10.1007/s11432-019-2858-8

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 6

An overview of cryptographic primitives for possible use in 5G and beyond
Yang, Jing; Johansson, Thomas
Sci China Inf Sci, 2020, 63(12): 220301
Keywords: 5g; cryptographic primitives; lightweight cryptography; post-quantum cryptography
Cite as: Yang J, Johansson T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci China Inf Sci, 2020, 63(12): 220301, doi: 10.1007/s11432-019-2907-4

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 5

Generative adversarial networks enhanced location privacy in 5G networks
Qu, Youyang; Zhang, Jingwen; Li, Ruidong; Zhang, Xiaoning; Zhai, Xuemeng; Yu, Shui
Sci China Inf Sci, 2020, 63(12): 220303
Keywords: 5g; privacy preservation; generative adversarial nets; differential privacy
Cite as: Qu Y Y, Zhang J W, Li R D, et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci China Inf Sci, 2020, 63(12): 220303, doi: 10.1007/s11432-019-2834-x

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 4

Secure routing and transmission scheme for space-ocean broadband wireless network
Fu, Yuzhou; Jiang, Chuan-Ao; Qin, Yurong; Yin, Liuguo
Sci China Inf Sci, 2020, 63(4): 149303
Keywords: security; routing; transmission scheme; space-ocean network; relay; network efficiency
Cite as: Fu Y Z, Jiang C-A, Qin Y R, et al. Secure routing and transmission scheme for space-ocean broadband wireless network. Sci China Inf Sci, 2020, 63(4): 149303, doi: 10.1007/s11432-018-9876-6

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 REVIEW Website SpringerLink Google Scholar Cited in SCI: 4

Security in edge-assisted Internet of Things: challenges and solutions
Shen, Shuaiqi; Zhang, Kuan; Zhou, Yi; Ci, Song
Sci China Inf Sci, 2020, 63(12): 220302
Keywords: internet of things; edge computing; network security; machine learning; data analytics
Cite as: Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63(12): 220302, doi: 10.1007/s11432-019-2906-y

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 3

Revocable and certificateless public auditing for cloud storage
Zhang, Yinghui; Zhang, Tiantian; Xu, Shengmin; Xu, Guowen; Zheng, Dong
Sci China Inf Sci, 2020, 63(10): 209302
Keywords: certificateless signature; public auditing; tag update; cloud storage; key update
Cite as: Zhang Y H, Zhang T T, Xu S M, et al. Revocable and certificateless public auditing for cloud storage. Sci China Inf Sci, 2020, 63(10): 209302, doi: 10.1007/s11432-019-2793-y

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Homepage Cited in SCI: 3

Efficient and secure image authentication with robustness and versatility
Chen, Haixia; Huang, Xinyi; Wu, Wei; Mu, Yi
Sci China Inf Sci, 2020, 63(12): 222301
Keywords: image authentication; image processing; cryptography; bilinear maps
Cite as: Chen H X, Huang X Y, Wu W, et al. Efficient and secure image authentication with robustness and versatility. Sci China Inf Sci, 2020, 63(12): 222301, doi: 10.1007/s11432-020-3007-5

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 2

Secure analysis over generalized-K channels
Zhang, Luyao; Zhao, Hui; Pan, Gaofeng; Yang, Liang; Chen, Jiawei
Sci China Inf Sci, 2020, 63(4): 149304
Keywords: physical layer security; secrecy outage probability; generalized-k channels; performance anlsysis; asymptotic analysis
Cite as: Zhang L Y, Zhao H, Pan G F, et al. Secure analysis over generalized-K channels. Sci China Inf Sci, 2020, 63(4): 149304, doi: 10.1007/s11432-019-9892-y

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET
Soleymani, S. A.; Anisi, M. H.; Abdullah, A. Hanan; Ngadi, M. Asri; Goudarzi, Sh; Khan, M. Khurram; Kama, M. Nazri
Sci China Inf Sci, 2020, 63(12): 220305
Keywords: authentication; plausibility; fuzzy logic; cuckoo filter; 5g-vanet; big data
Cite as: Soleymani S A, Anisi M H, Abdullah A H, et al. An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci China Inf Sci, 2020, 63(12): 220305, doi: 10.1007/s11432-019-2835-4

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Multi-party blind quantum computation protocol with mutual authentication in network
Shan, Rui-Ting; Chen, Xiubo; Yuan, Kai-Guo
Sci China Inf Sci, 2021, 64(6): 162302
Keywords: blind quantum computation; mutual identity authentication; load balancer; semi-trust ca; quantum network
Cite as: Shan R-T, Chen X B, Yuan K-G. Multi-party blind quantum computation protocol with mutual authentication in network. Sci China Inf Sci, 2021, 64(6): 162302, doi: 10.1007/s11432-020-2977-x

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system
Wu, Yue; Yin, Shishu; Zhou, Jian; Yang, Pei; Yang, Hongwen
Sci China Inf Sci, 2020, 63(2): 122303
Keywords: physical layer security (pls); hybrid automatic repeat request (harq); chase combining (cc); effective secrecy throughput (est); quasi-concave optimization
Cite as: Wu Y, Yin S S, Zhou J, et al. Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system. Sci China Inf Sci, 2020, 63(2): 122303, doi: 10.1007/s11432-019-2660-3

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Achieving adaptively secure data access control with privacy protection for lightweight IoT devices
Guan, Zhitao; Yang, Wenti; Zhu, Liehuang; Wu, Longfei; Wang, Ruimiao
Sci China Inf Sci, 2021, 64(6): 162301
Keywords: iot; cp-abe; constant-size ciphertexts; adaptively secure; privacy protection
Cite as: Guan Z T, Yang W T, Zhu L H, et al. Achieving adaptively secure data access control with privacy protection for lightweight IoT devices. Sci China Inf Sci, 2021, 64(6): 162301, doi: 10.1007/s11432-020-2957-5

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Li, Zengpeng; Sharma, Vishal; Ma, Chunguang; Ge, Chunpeng; Susilo, Willy
Sci China Inf Sci, 2021, 64(6): 169301
Keywords: cloud computing; access control; constrained prf; ciphertext-policy attribute-based proxy re-encryption; proxy re-encryption; attribute-based proxy re-encryption
Cite as: Li Z P, Sharma V, Ma C G, et al. Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci China Inf Sci, 2021, 64(6): 169301, doi: 10.1007/s11432-019-2856-8

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

On efficient key tag writing in RFID-enabled IoT
Zhang, Pengfei; Liu, Hao; Yu, Jihong
Sci China Inf Sci, 2021, 64(6): 169305
Keywords: rfid; key tag writiing; time efficiency; iot; multiple groups
Cite as: Zhang P F, Liu H, Yu J H. On efficient key tag writing in RFID-enabled IoT. Sci China Inf Sci, 2021, 64(6): 169305, doi: 10.1007/s11432-019-2891-3

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Proactive eavesdropping of wireless powered suspicious interference networks
Xu, Ding; Zhu, Hongbo
Sci China Inf Sci, 2021, 64(12): 229305
Keywords: legitimate surveillance; proactive eavesdropping; wireless powered suspicious interference networks; successive interference cancellation; physical layer security
Cite as: Xu D, Zhu H B. Proactive eavesdropping of wireless powered suspicious interference networks. Sci China Inf Sci, 2021, 64(12): 229305, doi: 10.1007/s11432-020-2992-3

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Multi-variant network address hopping to defend stealthy crossfire attack
Zhou, Boyang; Pan, Gaoning; Wu, Chunming; Zhu, Kai; Ruan, Wei
Sci China Inf Sci, 2020, 63(6): 169301
Keywords: multi-variant network address hopping; crossfire attack; cyber mimic defense; openflow; software-defined networking; distributed denial-of-service attack
Cite as: Zhou B Y, Pan G N, Wu C M, et al. Multi-variant network address hopping to defend stealthy crossfire attack. Sci China Inf Sci, 2020, 63(6): 169301, doi: 10.1007/s11432-019-9921-7

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Secure transmission for heterogeneous cellular network with limited feedback
Jiang, Wenyu; Huang, Kaizhi; Xiao, Shuaifang; Xu, Xiaoming
Sci China Inf Sci, 2020, 63(12): 220304
Keywords: physical layer security; heterogeneous cellular networks; limited feedback; secure transmission; average secrecy throughput
Cite as: Jiang W Y, Huang K Z, Xiao S F, et al. Secure transmission for heterogeneous cellular network with limited feedback. Sci China Inf Sci, 2020, 63(12): 220304, doi: 10.1007/s11432-019-2836-0

Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks
Huang, Kaizhi; Zhang, Bo; Zhong, Zhou; Chen, Yajun; Xu, Xiaoming
Sci China Inf Sci, 2020, 63(12): 220306
Keywords: physical layer security; simultaneous wireless information and power transfer; heterogeneous networks; robust beamforming; convex optimization
Cite as: Huang K Z, Zhang B, Zhong Z, et al. Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks. Sci China Inf Sci, 2020, 63(12): 220306, doi: 10.1007/s11432-019-2923-0

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

An area based physical layer authentication framework to detect spoofing attacks
Li, Na; Xia, Shida; Tao, Xiaofeng; Zhang, Zhiyuan; Wang, Xiaohui
Sci China Inf Sci, 2020, 63(12): 222302
Keywords: physical layer authentication; light weight authentication; security situation distribution; spoofing; area authentication
Cite as: Li N, Xia S D, Tao X F, et al. An area based physical layer authentication framework to detect spoofing attacks. Sci China Inf Sci, 2020, 63(12): 222302, doi: 10.1007/s11432-019-2802-x

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Robustness of interdependent multi-model addressing networks
Han, Weitao; Tian, Le; Zhang, Fengyu; Yi, Peng
Sci China Inf Sci, 2021, 64(6): 169304
Keywords: multi-model addressing; interdependent networks; robustness; percolation; cascade of failures
Cite as: Han W T, Tian L, Zhang F Y, et al. Robustness of interdependent multi-model addressing networks. Sci China Inf Sci, 2021, 64(6): 169304, doi: 10.1007/s11432-019-2892-0

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things
Xie, Renchao; Wang, Zhiyuan; Yu, Fei Richard; Huang, Tao; Liu, Yunjie
Sci China Inf Sci, 2021, 64(8): 182301
Keywords: industrial internet of things; identity resolution; distributed hash table; small world model
Cite as: Xie R C, Wang Z Y, Yu F R, et al. A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things. Sci China Inf Sci, 2021, 64(8): 182301, doi: 10.1007/s11432-020-3016-x

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
Huang, Yanyu; Lv, Siyi; Liu, Zheli; Song, Xiangfu; Li, Jin; Yuan, Yali; Dong, Changyu
Sci China Inf Sci, 2021, 64(8): 182314
Keywords: searchable encryption; sgx technique; file injection attack; forward/toward privacy; cloud databases
Cite as: Huang Y Y, Lv S Y, Liu Z L, et al. Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Sci China Inf Sci, 2021, 64(8): 182314, doi: 10.1007/s11432-020-3039-x

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Covert communication with beamforming over MISO channels in the finite blocklength regime
Yu, Xinchun; Luo, Yuan; Chen, Wen
Sci China Inf Sci, 2021, 64(9): 192303
Keywords: beamforming; circular symmetric complex gaussian; covert communication; miso channels; power control
Cite as: Yu X C, Luo Y, Chen W. Covert communication with beamforming over MISO channels in the finite blocklength regime. Sci China Inf Sci, 2021, 64(9): 192303, doi: 10.1007/s11432-019-2919-5

通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Keywords: wireless powered communication network; secure communication; eavesdropping; energy accumulation; energy harvesting
Cite as: Xu D. Secure communication in wireless powered communication networks with energy accumulation. Sci China Inf Sci, 2021, 64(10): 209301, doi: 10.1007/s11432-019-2840-2

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Secure polar coding for a joint source-channel model
Wang, Haowei; Tao, Xiaofeng; Wu, Huici; Li, Na; Xu, Jin
Sci China Inf Sci, 2021, 64(11): 212301
Keywords: polar codes; joint source-channel model; correlated sources; secret-key generation; wiretap channel
Cite as: Wang H W, Tao X F, Wu H C, et al. Secure polar coding for a joint source-channel model. Sci China Inf Sci, 2021, 64(11): 212301, doi: 10.1007/s11432-020-3119-3

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Functional signatures: new definition and constructions
Guo, Qingwen; Huang, Qiong; Ma, Sha; Xiao, Meiyan; Yang, Guomin; Susilo, Willy
Sci China Inf Sci, 2021, 64(12): 222301
Keywords: cloud computation security; digital signature; functional signature; non-interactive zero-knowledge proof; e-commerce
Cite as: Guo Q W, Huang Q, Ma S, et al. Functional signatures: new definition and constructions. Sci China Inf Sci, 2021, 64(12): 222301, doi: 10.1007/s11432-019-2855-3

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Differential game-based analysis of multi-attacker multi-defender interaction
Gao, Qiuyue; Wu, Huici; Zhang, Yunfei; Tao, Xiaofeng
Sci China Inf Sci, 2021, 64(12): 222302
Keywords: differential game; multi-attacker to multi-defender interaction; optimal control theory; hamilton function; equilibrium strategy
Cite as: Gao Q Y, Wu H C, Zhang Y F, et al. Differential game-based analysis of multi-attacker multi-defender interaction. Sci China Inf Sci, 2021, 64(12): 222302, doi: 10.1007/s11432-020-3228-8

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

A comprehensive evaluation of diversity systems based on mimic defense
Tong, Qing; Guo, Yunfei
Sci China Inf Sci, 2021, 64(12): 229304
Keywords: cyberspace security; software diversity; mimic defense; web server system; quantitative evaluation
Cite as: Tong Q, Guo Y F. A comprehensive evaluation of diversity systems based on mimic defense. Sci China Inf Sci, 2021, 64(12): 229304, doi: 10.1007/s11432-020-3008-1

通信 网络安全 LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker
Teng, Yin; Li, Jiayu; Huang, Mengxing; Liu, Lin; Xia, Guiyang; Zhou, Xiaobo; Shu, Feng; Wang, Jiangzhou
Sci China Inf Sci, 2022, 65(1): 119302
Keywords: malicious attacker; secure; directional modulation; secrecy rate; receive beamforming; null-space projection
Cite as: Teng Y, Li J Y, Huang M X, et al. Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker. Sci China Inf Sci, 2022, 65(1): 119302, doi: 10.1007/s11432-020-3232-4

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A detailed analysis of primal attack and its variants
Zhang, Xue; Zheng, Zhongxiang; Wang, Xiaoyun
Sci China Inf Sci, 2022, 65(3): 132301
Keywords: crytanalysis; lattice-based cryptography; learning with errors problem; primal attack; unique-svp
Cite as: Zhang X, Zheng Z X, Wang X Y. A detailed analysis of primal attack and its variants. Sci China Inf Sci, 2022, 65(3): 132301, doi: 10.1007/s11432-020-2958-9

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
Liu, Jun; Rijmen, Vincent; Hu, Yupu; Chen, Jie; Wang, Baocang
Sci China Inf Sci, 2022, 65(3): 132302
Keywords: white-box cryptography; block cipher; design; addition/rotation/xor; efficiency improvement
Cite as: Liu J, Rijmen V, Hu Y P, et al. WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci China Inf Sci, 2022, 65(3): 132302, doi: 10.1007/s11432-020-3105-1

通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Lattice-based group encryptions with only one trapdoor
Pan, Jing; Zhang, Jiang; Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy
Sci China Inf Sci, 2022, 65(5): 152304
Keywords: lattice cryptography; group encryptions; lattice trapdoors; accumulators; zero-knowledge
Cite as: Pan J, Zhang J, Zhang F G, et al. Lattice-based group encryptions with only one trapdoor. Sci China Inf Sci, 2022, 65(5): 152304, doi: 10.1007/s11432-020-3226-6

通信 网络安全 PERSPECTIVE Website SpringerLink Google Scholar Cited in SCI: 0

Development paradigms of cyberspace endogenous safety and security
Wu, Jiangxing
Sci China Inf Sci, 2022, 65(5): 156301
Keywords: reconfigurable architectures; energy efficiency; cryptographic accelerator; flexibility; side channel analysis
Cite as: Wu J X. Development paradigms of cyberspace endogenous safety and security. Sci China Inf Sci, 2022, 65(5): 156301, doi: 10.1007/s11432-021-3379-2

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar

Intelligent networking in adversarial environment: challenges and opportunities
Zhao Y, Xu K, Li Q, et al
Sci China Inf Sci, 2022, 65(7): 170301
Keywords: intelligent networking; adversarial; attacks; defense; security
Cite as: Zhao Y, Xu K, Li Q, et al. Intelligent networking in adversarial environment: challenges and opportunities. Sci China Inf Sci, 2022, 65(7): 170301, doi: 10.1007/s11432-021-3463-9

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar

Keywords: federated learning; secure computing; industrial Internet of Things (IIoT); machine vision; texture encoding; image classification; Non-IID
Cite as: Peng B, Chi M M, Liu C. Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing. Sci China Inf Sci, 2022, 65(7): 170302, doi: 10.1007/s11432-021-3423-9

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar

Keywords: AI security; adversarial sample; data poisoning; network intrusion detection; generative adversarial network
Cite as: Liu G R, Zhang W Z, Li X J, et al. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems. Sci China Inf Sci, 2022, 65(7): 170303, doi: 10.1007/s11432-021-3455-1

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar

Reliable resource allocation with RF fingerprinting authentication in secure IoT networks
Wu W W, Hu S, Lin D, et al
Sci China Inf Sci, 2022, 65(7): 170304
Keywords: user authentication; Internet of things; convolutional neural network; RF fingerprinting; NP-hard optimization problem
Cite as: Wu W W, Hu S, Lin D, et al. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks. Sci China Inf Sci, 2022, 65(7): 170304, doi: 10.1007/s11432-021-3284-y

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar

Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning
Li H R, Guo Y F, Huo S M, et al
Sci China Inf Sci, 2022, 65(7): 170305
Keywords: cyber deception defense; artificial intelligence; cloud security; reconnaissance attack; deep reinforcement learning; deception strategy
Cite as: Li H R, Guo Y F, Huo S M, et al. Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. Sci China Inf Sci, 2022, 65(7): 170305, doi: 10.1007/s11432-021-3462-4

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 RESEARCH PAPER Website SpringerLink Google Scholar Supplementary

Certified defense against patch attacks via mask-guided randomized smoothing
Zhang K, Zhou H, Bian H Y, et al
Sci China Inf Sci, 2022, 65(7): 170306
Keywords: certified defense; adversarial patch; patch localization; randomized smoothing; joint voting
Cite as: Zhang K, Zhou H, Bian H Y, et al. Certified defense against patch attacks via mask-guided randomized smoothing. Sci China Inf Sci, 2022, 65(7): 170306, doi: 10.1007/s11432-021-3457-7

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary

Keywords: vertically federated learning; privacy-preserving; logistic regression; symmetric homomorphic encryption; efficiency
Cite as: Zhao J Q, Zhu H, Wang F W, et al. ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data. Sci China Inf Sci, 2022, 65(7): 170307, doi: 10.1007/s11432-021-3415-1

Special Focus on Cyber Security in the Era of Artificial Intelligence
通信 网络安全 LETTER Website SpringerLink Google Scholar Supplementary

Post quantum secure fair data trading with deterability based on machine learning
Liu J H, Yu Y, Bi H L, et al
Sci China Inf Sci, 2022, 65(7): 170308
Keywords: designated verifier signatures; zk-SNARKs; double authentication preventing signatures; lattice; machine learning
Cite as: Liu J H, Yu Y, Bi H L, et al. Post quantum secure fair data trading with deterability based on machine learning. Sci China Inf Sci, 2022, 65(7): 170308, doi: 10.1007/s11432-021-3441-y