通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 16
Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach
Ning, Zhaolong; Sun, Shouming; Wang, Xiaojie; Guo, Lei; Wang, Guoyin; Gao, Xinbo; Kwok, Ricky Y. K.
Sci China Inf Sci, 2021, 64(6): 162303
Keywords: mobile blockchain; deep reinforcement learning; mobile edge computing; power allocation; bandwidth allocation
Cite as: Ning Z L, Sun S M, Wang X J, et al. Intelligent resource allocation in mobile blockchain for privacy and security transactions: a deep reinforcement learning based approach. Sci China Inf Sci, 2021, 64(6): 162303, doi: 10.1007/s11432-020-3125-y
通信
网络安全
REVIEW
Website
SpringerLink
Google Scholar
Cited in SCI: 15
Physical layer security for massive access in cellular Internet of Things
Qi, Qiao; Chen, Xiaoming; Zhong, Caijun; Zhang, Zhaoyang
Sci China Inf Sci, 2020, 63(2): 121301
Keywords: 5g and beyond; phy-security; massive access; cellular iot
Cite as: Qi Q, Chen X M, Zhong C J, et al. Physical layer security for massive access in cellular Internet of Things. Sci China Inf Sci, 2020, 63(2): 121301, doi: 10.1007/s11432-019-2650-4
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 13
Secure network coding from secure proof of retrievability
Chang, Jinyong; Shao, Bilin; Ji, Yanyan; Xu, Maozhi; Xue, Rui
Sci China Inf Sci, 2021, 64(12): 229301
Keywords: network coding; proof of retrievability; random oracle; provable security; cloud storage
Cite as: Chang J Y, Shao B L, Ji Y Y, et al. Secure network coding from secure proof of retrievability. Sci China Inf Sci, 2021, 64(12): 229301, doi: 10.1007/s11432-020-2997-0
Highly Cited Paper
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 13
Keywords: industry 4.0; wireless sensor networks; password authentication; forward secrecy; offline dictionary attack
Cite as: Wang C Y, Wang D, Xu G A, et al. Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci China Inf Sci, 2022, 65(1): 112301, doi: 10.1007/s11432-020-2975-6
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 11
Keywords: rational secret sharing; game theory; sequential equilibrium; incentive-compatible; smart contract
Cite as: Chen Z R, Tian Y L, Peng C G. An incentive-compatible rational secret sharing scheme using blockchain and smart contract. Sci China Inf Sci, 2021, 64(10): 202301, doi: 10.1007/s11432-019-2858-8
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信
网络安全
REVIEW
Website
SpringerLink
Google Scholar
Cited in SCI: 6
Keywords: 5g; cryptographic primitives; lightweight cryptography; post-quantum cryptography
Cite as: Yang J, Johansson T. An overview of cryptographic primitives for possible use in 5G and beyond. Sci China Inf Sci, 2020, 63(12): 220301, doi: 10.1007/s11432-019-2907-4
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 5
Generative adversarial networks enhanced location privacy in 5G networks
Qu, Youyang; Zhang, Jingwen; Li, Ruidong; Zhang, Xiaoning; Zhai, Xuemeng; Yu, Shui
Sci China Inf Sci, 2020, 63(12): 220303
Keywords: 5g; privacy preservation; generative adversarial nets; differential privacy
Cite as: Qu Y Y, Zhang J W, Li R D, et al. Generative adversarial networks enhanced location privacy in 5G networks. Sci China Inf Sci, 2020, 63(12): 220303, doi: 10.1007/s11432-019-2834-x
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 4
Secure routing and transmission scheme for space-ocean broadband wireless network
Fu, Yuzhou; Jiang, Chuan-Ao; Qin, Yurong; Yin, Liuguo
Sci China Inf Sci, 2020, 63(4): 149303
Keywords: security; routing; transmission scheme; space-ocean network; relay; network efficiency
Cite as: Fu Y Z, Jiang C-A, Qin Y R, et al. Secure routing and transmission scheme for space-ocean broadband wireless network. Sci China Inf Sci, 2020, 63(4): 149303, doi: 10.1007/s11432-018-9876-6
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信
网络安全
REVIEW
Website
SpringerLink
Google Scholar
Cited in SCI: 4
Security in edge-assisted Internet of Things: challenges and solutions
Shen, Shuaiqi; Zhang, Kuan; Zhou, Yi; Ci, Song
Sci China Inf Sci, 2020, 63(12): 220302
Keywords: internet of things; edge computing; network security; machine learning; data analytics
Cite as: Shen S Q, Zhang K, Zhou Y, et al. Security in edge-assisted Internet of Things: challenges and solutions. Sci China Inf Sci, 2020, 63(12): 220302, doi: 10.1007/s11432-019-2906-y
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 3
Revocable and certificateless public auditing for cloud storage
Zhang, Yinghui; Zhang, Tiantian; Xu, Shengmin; Xu, Guowen; Zheng, Dong
Sci China Inf Sci, 2020, 63(10): 209302
Keywords: certificateless signature; public auditing; tag update; cloud storage; key update
Cite as: Zhang Y H, Zhang T T, Xu S M, et al. Revocable and certificateless public auditing for cloud storage. Sci China Inf Sci, 2020, 63(10): 209302, doi: 10.1007/s11432-019-2793-y
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Homepage
Cited in SCI: 3
Efficient and secure image authentication with robustness and versatility
Chen, Haixia; Huang, Xinyi; Wu, Wei; Mu, Yi
Sci China Inf Sci, 2020, 63(12): 222301
Keywords: image authentication; image processing; cryptography; bilinear maps
Cite as: Chen H X, Huang X Y, Wu W, et al. Efficient and secure image authentication with robustness and versatility. Sci China Inf Sci, 2020, 63(12): 222301, doi: 10.1007/s11432-020-3007-5
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 2
Secure analysis over generalized-K channels
Zhang, Luyao; Zhao, Hui; Pan, Gaofeng; Yang, Liang; Chen, Jiawei
Sci China Inf Sci, 2020, 63(4): 149304
Keywords: physical layer security; secrecy outage probability; generalized-k channels; performance anlsysis; asymptotic analysis
Cite as: Zhang L Y, Zhao H, Pan G F, et al. Secure analysis over generalized-K channels. Sci China Inf Sci, 2020, 63(4): 149304, doi: 10.1007/s11432-019-9892-y
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 2
An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET
Soleymani, S. A.; Anisi, M. H.; Abdullah, A. Hanan; Ngadi, M. Asri; Goudarzi, Sh; Khan, M. Khurram; Kama, M. Nazri
Sci China Inf Sci, 2020, 63(12): 220305
Keywords: authentication; plausibility; fuzzy logic; cuckoo filter; 5g-vanet; big data
Cite as: Soleymani S A, Anisi M H, Abdullah A H, et al. An authentication and plausibility model for big data analytic under LOS and NLOS conditions in 5G-VANET. Sci China Inf Sci, 2020, 63(12): 220305, doi: 10.1007/s11432-019-2835-4
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 2
Keywords: blind quantum computation; mutual identity authentication; load balancer; semi-trust ca; quantum network
Cite as: Shan R-T, Chen X B, Yuan K-G. Multi-party blind quantum computation protocol with mutual authentication in network. Sci China Inf Sci, 2021, 64(6): 162302, doi: 10.1007/s11432-020-2977-x
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 1
Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system
Wu, Yue; Yin, Shishu; Zhou, Jian; Yang, Pei; Yang, Hongwen
Sci China Inf Sci, 2020, 63(2): 122303
Keywords: physical layer security (pls); hybrid automatic repeat request (harq); chase combining (cc); effective secrecy throughput (est); quasi-concave optimization
Cite as: Wu Y, Yin S S, Zhou J, et al. Quasi-concave optimization of secrecy redundancy rate in HARQ-CC system. Sci China Inf Sci, 2020, 63(2): 122303, doi: 10.1007/s11432-019-2660-3
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 1
Achieving adaptively secure data access control with privacy protection for lightweight IoT devices
Guan, Zhitao; Yang, Wenti; Zhu, Liehuang; Wu, Longfei; Wang, Ruimiao
Sci China Inf Sci, 2021, 64(6): 162301
Keywords: iot; cp-abe; constant-size ciphertexts; adaptively secure; privacy protection
Cite as: Guan Z T, Yang W T, Zhu L H, et al. Achieving adaptively secure data access control with privacy protection for lightweight IoT devices. Sci China Inf Sci, 2021, 64(6): 162301, doi: 10.1007/s11432-020-2957-5
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 1
Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
Li, Zengpeng; Sharma, Vishal; Ma, Chunguang; Ge, Chunpeng; Susilo, Willy
Sci China Inf Sci, 2021, 64(6): 169301
Keywords: cloud computing; access control; constrained prf; ciphertext-policy attribute-based proxy re-encryption; proxy re-encryption; attribute-based proxy re-encryption
Cite as: Li Z P, Sharma V, Ma C G, et al. Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci China Inf Sci, 2021, 64(6): 169301, doi: 10.1007/s11432-019-2856-8
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 1
On efficient key tag writing in RFID-enabled IoT
Zhang, Pengfei; Liu, Hao; Yu, Jihong
Sci China Inf Sci, 2021, 64(6): 169305
Keywords: rfid; key tag writiing; time efficiency; iot; multiple groups
Cite as: Zhang P F, Liu H, Yu J H. On efficient key tag writing in RFID-enabled IoT. Sci China Inf Sci, 2021, 64(6): 169305, doi: 10.1007/s11432-019-2891-3
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 1
Keywords: legitimate surveillance; proactive eavesdropping; wireless powered suspicious interference networks; successive interference cancellation; physical layer security
Cite as: Xu D, Zhu H B. Proactive eavesdropping of wireless powered suspicious interference networks. Sci China Inf Sci, 2021, 64(12): 229305, doi: 10.1007/s11432-020-2992-3
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Multi-variant network address hopping to defend stealthy crossfire attack
Zhou, Boyang; Pan, Gaoning; Wu, Chunming; Zhu, Kai; Ruan, Wei
Sci China Inf Sci, 2020, 63(6): 169301
Keywords: multi-variant network address hopping; crossfire attack; cyber mimic defense; openflow; software-defined networking; distributed denial-of-service attack
Cite as: Zhou B Y, Pan G N, Wu C M, et al. Multi-variant network address hopping to defend stealthy crossfire attack. Sci China Inf Sci, 2020, 63(6): 169301, doi: 10.1007/s11432-019-9921-7
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 0
Secure transmission for heterogeneous cellular network with limited feedback
Jiang, Wenyu; Huang, Kaizhi; Xiao, Shuaifang; Xu, Xiaoming
Sci China Inf Sci, 2020, 63(12): 220304
Keywords: physical layer security; heterogeneous cellular networks; limited feedback; secure transmission; average secrecy throughput
Cite as: Jiang W Y, Huang K Z, Xiao S F, et al. Secure transmission for heterogeneous cellular network with limited feedback. Sci China Inf Sci, 2020, 63(12): 220304, doi: 10.1007/s11432-019-2836-0
Special Focus on Challenges and New Insights for Network Security in 5G-and-Beyond
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 0
Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks
Huang, Kaizhi; Zhang, Bo; Zhong, Zhou; Chen, Yajun; Xu, Xiaoming
Sci China Inf Sci, 2020, 63(12): 220306
Keywords: physical layer security; simultaneous wireless information and power transfer; heterogeneous networks; robust beamforming; convex optimization
Cite as: Huang K Z, Zhang B, Zhong Z, et al. Probabilistic constrained robust secure transmission for wireless powered heterogeneous networks. Sci China Inf Sci, 2020, 63(12): 220306, doi: 10.1007/s11432-019-2923-0
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
An area based physical layer authentication framework to detect spoofing attacks
Li, Na; Xia, Shida; Tao, Xiaofeng; Zhang, Zhiyuan; Wang, Xiaohui
Sci China Inf Sci, 2020, 63(12): 222302
Keywords: physical layer authentication; light weight authentication; security situation distribution; spoofing; area authentication
Cite as: Li N, Xia S D, Tao X F, et al. An area based physical layer authentication framework to detect spoofing attacks. Sci China Inf Sci, 2020, 63(12): 222302, doi: 10.1007/s11432-019-2802-x
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Robustness of interdependent multi-model addressing networks
Han, Weitao; Tian, Le; Zhang, Fengyu; Yi, Peng
Sci China Inf Sci, 2021, 64(6): 169304
Keywords: multi-model addressing; interdependent networks; robustness; percolation; cascade of failures
Cite as: Han W T, Tian L, Zhang F Y, et al. Robustness of interdependent multi-model addressing networks. Sci China Inf Sci, 2021, 64(6): 169304, doi: 10.1007/s11432-019-2892-0
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things
Xie, Renchao; Wang, Zhiyuan; Yu, Fei Richard; Huang, Tao; Liu, Yunjie
Sci China Inf Sci, 2021, 64(8): 182301
Keywords: industrial internet of things; identity resolution; distributed hash table; small world model
Cite as: Xie R C, Wang Z Y, Yu F R, et al. A novel identity resolution system design based on Dual-Chord algorithm for industrial Internet of Things. Sci China Inf Sci, 2021, 64(8): 182301, doi: 10.1007/s11432-020-3016-x
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX
Huang, Yanyu; Lv, Siyi; Liu, Zheli; Song, Xiangfu; Li, Jin; Yuan, Yali; Dong, Changyu
Sci China Inf Sci, 2021, 64(8): 182314
Keywords: searchable encryption; sgx technique; file injection attack; forward/toward privacy; cloud databases
Cite as: Huang Y Y, Lv S Y, Liu Z L, et al. Cetus: an efficient symmetric searchable encryption against file-injection attack with SGX. Sci China Inf Sci, 2021, 64(8): 182314, doi: 10.1007/s11432-020-3039-x
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Keywords: beamforming; circular symmetric complex gaussian; covert communication; miso channels; power control
Cite as: Yu X C, Luo Y, Chen W. Covert communication with beamforming over MISO channels in the finite blocklength regime. Sci China Inf Sci, 2021, 64(9): 192303, doi: 10.1007/s11432-019-2919-5
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 0
Keywords: wireless powered communication network; secure communication; eavesdropping; energy accumulation; energy harvesting
Cite as: Xu D. Secure communication in wireless powered communication networks with energy accumulation. Sci China Inf Sci, 2021, 64(10): 209301, doi: 10.1007/s11432-019-2840-2
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Supplementary
Cited in SCI: 0
Secure polar coding for a joint source-channel model
Wang, Haowei; Tao, Xiaofeng; Wu, Huici; Li, Na; Xu, Jin
Sci China Inf Sci, 2021, 64(11): 212301
Keywords: polar codes; joint source-channel model; correlated sources; secret-key generation; wiretap channel
Cite as: Wang H W, Tao X F, Wu H C, et al. Secure polar coding for a joint source-channel model. Sci China Inf Sci, 2021, 64(11): 212301, doi: 10.1007/s11432-020-3119-3
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Functional signatures: new definition and constructions
Guo, Qingwen; Huang, Qiong; Ma, Sha; Xiao, Meiyan; Yang, Guomin; Susilo, Willy
Sci China Inf Sci, 2021, 64(12): 222301
Keywords: cloud computation security; digital signature; functional signature; non-interactive zero-knowledge proof; e-commerce
Cite as: Guo Q W, Huang Q, Ma S, et al. Functional signatures: new definition and constructions. Sci China Inf Sci, 2021, 64(12): 222301, doi: 10.1007/s11432-019-2855-3
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Differential game-based analysis of multi-attacker multi-defender interaction
Gao, Qiuyue; Wu, Huici; Zhang, Yunfei; Tao, Xiaofeng
Sci China Inf Sci, 2021, 64(12): 222302
Keywords: differential game; multi-attacker to multi-defender interaction; optimal control theory; hamilton function; equilibrium strategy
Cite as: Gao Q Y, Wu H C, Zhang Y F, et al. Differential game-based analysis of multi-attacker multi-defender interaction. Sci China Inf Sci, 2021, 64(12): 222302, doi: 10.1007/s11432-020-3228-8
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Keywords: cyberspace security; software diversity; mimic defense; web server system; quantitative evaluation
Cite as: Tong Q, Guo Y F. A comprehensive evaluation of diversity systems based on mimic defense. Sci China Inf Sci, 2021, 64(12): 229304, doi: 10.1007/s11432-020-3008-1
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker
Teng, Yin; Li, Jiayu; Huang, Mengxing; Liu, Lin; Xia, Guiyang; Zhou, Xiaobo; Shu, Feng; Wang, Jiangzhou
Sci China Inf Sci, 2022, 65(1): 119302
Keywords: malicious attacker; secure; directional modulation; secrecy rate; receive beamforming; null-space projection
Cite as: Teng Y, Li J Y, Huang M X, et al. Low-complexity and high-performance receive beamforming for secure directional modulation networks against an eavesdropping-enabled full-duplex attacker. Sci China Inf Sci, 2022, 65(1): 119302, doi: 10.1007/s11432-020-3232-4
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
A detailed analysis of primal attack and its variants
Zhang, Xue; Zheng, Zhongxiang; Wang, Xiaoyun
Sci China Inf Sci, 2022, 65(3): 132301
Keywords: crytanalysis; lattice-based cryptography; learning with errors problem; primal attack; unique-svp
Cite as: Zhang X, Zheng Z X, Wang X Y. A detailed analysis of primal attack and its variants. Sci China Inf Sci, 2022, 65(3): 132301, doi: 10.1007/s11432-020-2958-9
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
Liu, Jun; Rijmen, Vincent; Hu, Yupu; Chen, Jie; Wang, Baocang
Sci China Inf Sci, 2022, 65(3): 132302
Keywords: white-box cryptography; block cipher; design; addition/rotation/xor; efficiency improvement
Cite as: Liu J, Rijmen V, Hu Y P, et al. WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci China Inf Sci, 2022, 65(3): 132302, doi: 10.1007/s11432-020-3105-1
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Lattice-based group encryptions with only one trapdoor
Pan, Jing; Zhang, Jiang; Zhang, Fangguo; Chen, Xiaofeng; Susilo, Willy
Sci China Inf Sci, 2022, 65(5): 152304
Keywords: lattice cryptography; group encryptions; lattice trapdoors; accumulators; zero-knowledge
Cite as: Pan J, Zhang J, Zhang F G, et al. Lattice-based group encryptions with only one trapdoor. Sci China Inf Sci, 2022, 65(5): 152304, doi: 10.1007/s11432-020-3226-6
通信
网络安全
PERSPECTIVE
Website
SpringerLink
Google Scholar
Cited in SCI: 0
Keywords: reconfigurable architectures; energy efficiency; cryptographic accelerator; flexibility; side channel analysis
Cite as: Wu J X. Development paradigms of cyberspace endogenous safety and security. Sci China Inf Sci, 2022, 65(5): 156301, doi: 10.1007/s11432-021-3379-2
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Keywords: intelligent networking; adversarial; attacks; defense; security
Cite as: Zhao Y, Xu K, Li Q, et al. Intelligent networking in adversarial environment: challenges and opportunities. Sci China Inf Sci, 2022, 65(7): 170301, doi: 10.1007/s11432-021-3463-9
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Keywords: federated learning; secure computing; industrial Internet of Things (IIoT); machine vision; texture encoding; image classification; Non-IID
Cite as: Peng B, Chi M M, Liu C. Non-IID federated learning via random exchange of local feature maps for textile IIoT secure computing. Sci China Inf Sci, 2022, 65(7): 170302, doi: 10.1007/s11432-021-3423-9
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Keywords: AI security; adversarial sample; data poisoning; network intrusion detection; generative adversarial network
Cite as: Liu G R, Zhang W Z, Li X J, et al. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems. Sci China Inf Sci, 2022, 65(7): 170303, doi: 10.1007/s11432-021-3455-1
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Keywords: user authentication; Internet of things; convolutional neural network; RF fingerprinting; NP-hard optimization problem
Cite as: Wu W W, Hu S, Lin D, et al. Reliable resource allocation with RF fingerprinting authentication in secure IoT networks. Sci China Inf Sci, 2022, 65(7): 170304, doi: 10.1007/s11432-021-3284-y
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Keywords: cyber deception defense; artificial intelligence; cloud security; reconnaissance attack; deep reinforcement learning; deception strategy
Cite as: Li H R, Guo Y F, Huo S M, et al. Defensive deception framework against reconnaissance attacks in the cloud with deep reinforcement learning. Sci China Inf Sci, 2022, 65(7): 170305, doi: 10.1007/s11432-021-3462-4
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
RESEARCH PAPER
Website
SpringerLink
Google Scholar
Supplementary
Keywords: certified defense; adversarial patch; patch localization; randomized smoothing; joint voting
Cite as: Zhang K, Zhou H, Bian H Y, et al. Certified defense against patch attacks via mask-guided randomized smoothing. Sci China Inf Sci, 2022, 65(7): 170306, doi: 10.1007/s11432-021-3457-7
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Keywords: vertically federated learning; privacy-preserving; logistic regression; symmetric homomorphic encryption; efficiency
Cite as: Zhao J Q, Zhu H, Wang F W, et al. ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data. Sci China Inf Sci, 2022, 65(7): 170307, doi: 10.1007/s11432-021-3415-1
Special Focus on Cyber Security in the Era of Artificial Intelligence
通信
网络安全
LETTER
Website
SpringerLink
Google Scholar
Supplementary
Keywords: designated verifier signatures; zk-SNARKs; double authentication preventing signatures; lattice; machine learning
Cite as: Liu J H, Yu Y, Bi H L, et al. Post quantum secure fair data trading with deterability based on machine learning. Sci China Inf Sci, 2022, 65(7): 170308, doi: 10.1007/s11432-021-3441-y