Highly Cited in 202407 RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 15

Model architecture level privacy leakage in neural networks
Li, Yan; Yan, Hongyang; Huang, Teng; Pan, Zijie; Lai, Jiewei; Zhang, Xiaoxue; Chen, Kongyang; Li, Jin
Sci China Inf Sci, 2024, 67(3): 132101
Keywords: neural architecture search; data reconstruction attack; membership inference attack
Cite as: Li Y, Yan H Y, Huang T, et al. Model architecture level privacy leakage in neural networks. Sci China Inf Sci, 2024, 67: 132101, doi: 10.1007/s11432-022-3507-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 6

TULAM: trajectory-user linking via attention mechanism
Li, Hao; Cao, Shuyu; Chen, Yaqing; Zhang, Min; Feng, Dengguo
Sci China Inf Sci, 2024, 67(1): 112103
Keywords: information security; data security and privacy; trajectory-user linking; deep learning; recurrent neural network; attention mechanism
Cite as: Li H, Cao S Y, Chen Y Q, et al. TULAM: trajectory-user linking via attention mechanism. Sci China Inf Sci, 2024, 67: 112103, doi: 10.1007/s11432-021-3673-6

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 5

Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
Yao, Lisha; Hou, Lin; Weng, Jian; Zhao, Feixiang
Sci China Inf Sci, 2024, 67(1): 119101
Keywords: attribute-based; keyword search; chosen-keyword attacks; insider keyword guessing attacks; ideal lattices
Cite as: Yao L S, Hou L, Weng J, et al. Provably secure attribute-based authenticated encryption with keyword search from ideal lattices. Sci China Inf Sci, 2024, 67: 119101, doi: 10.1007/s11432-022-3808-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 4

Unbalanced private set intersection with linear communication complexity
Zhao, Quanyu; Jiang, Bingbing; Zhang, Yuan; Wang, Heng; Mao, Yunlong; Zhong, Sheng
Sci China Inf Sci, 2024, 67(3): 132105
Keywords: unbalanced private set intersection; Hash proof system; linear communication complexity; small set; resource-constrained devices
Cite as: Zhao Q Y, Jiang B B, Zhang Y, et al. Unbalanced private set intersection with linear communication complexity. Sci China Inf Sci, 2024, 67: 132105, doi: 10.1007/s11432-022-3717-9

REVIEW Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Privacy-preserving explainable AI: a survey
Nguyen, Thanh Tam; Huynh, Thanh Trung; Ren, Zhao; Nguyen, Thanh Toan; Nguyen, Phi Le; Yin, Hongzhi; Nguyen, Quoc Viet Hung
Sci China Inf Sci, 2025, 68(1): 111101
Keywords: privacy-preserving explainable AI; privacy attacks; privacy defences; PrivEx; PPXAI
Cite as: Nguyen T T, Huynh T T, Ren Z, et al. Privacy-preserving explainable AI: a survey. Sci China Inf Sci, 2025, 68: 111101, doi: 10.1007/s11432-024-4123-4

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

LOL: a highly flexible framework for designing stream ciphers
Feng, Dengguo; Jiao, Lin; Hao, Yonglin; Zheng, Qunxiong; Wu, Wenling; Qi, Wenfeng; Zhang, Lei; Zhang, Liting; Sun, Siwei; Tian, Tian
Sci China Inf Sci, 2024, 67(9): 192101
Keywords: stream cipher; 5G/6G mobile system; fast software implementation
Cite as: Feng D G, Jiao L, Hao Y L, et al. LOL: a highly flexible framework for designing stream ciphers. Sci China Inf Sci, 2024, 67: 192101, doi: 10.1007/s11432-023-3901-0

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Fault-tolerant identity-based encryption from SM9
Liu, Xiaohong; Huang, Xinyi; Cheng, Zhaohui; Wu, Wei
Sci China Inf Sci, 2024, 67(2): 122101
Keywords: attribute-based encryption; identity-based encryption; fault-tolerant; SM9
Cite as: Liu X H, Huang X Y, Cheng Z H, et al. Fault-tolerant identity-based encryption from SM9. Sci China Inf Sci, 2024, 67: 122101, doi: 10.1007/s11432-022-3706-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

RCCA-SM9: securing SM9 on corrupted machines
Chen, Rongmao; Chen, Jinrong; Huang, Xinyi; Wang, Yi
Sci China Inf Sci, 2024, 67(11): 212103
Keywords: SM9; subversion resilience; subversion attack; cryptographic reverse firewall; RCCA
Cite as: Chen R M, Chen J R, Huang X Y, et al. RCCA-SM9: securing SM9 on corrupted machines. Sci China Inf Sci, 2024, 67: 212103, doi: 10.1007/s11432-023-3877-9

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Blockchain-assisted multi-keyword searchable provable data possession for cloud storage
Miao, Ying; Gai, Keke; Zhu, Liehuang
Sci China Inf Sci, 2026, 69(3): 132101
Keywords: multi-keyword searchability; provable data possession; blockchain; cloud storage
Cite as: Miao Y, Gai K K, Zhu L H. Blockchain-assisted multi-keyword searchable provable data possession for cloud storage. Sci China Inf Sci, 2026, 69: 132101, doi: 10.1007/s11432-024-4409-6

SCIS Selected Articles on Large Language Models (LLM)
REVIEW Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Artificial intelligence security and privacy: a survey
He, Xinlei; Xu, Guowen; Han, Xingshuo; Wang, Qian; Zhao, Lingchen; Shen, Chao; Lin, Chenhao; Zhao, Zhengyu; Li, Qian; Yang, Le; Ji, Shouling; Li, Shaofeng; Zhu, Haojin; Wang, Zhibo; Zheng, Rui; Zhu, Tianqing; Li, Qi; He, Chaoxiang; Wang, Qifan; Hu, Hongsheng; Wang, Shuo; Sun, Shi-Feng; Yao, Hongwei; Qin, Zhan; Chen, Kai; Zhao, Yue; Li, Hongwei; Huang, Xinyi; Feng, Dengguo
Sci China Inf Sci, 2025, 68(8): 181101
Keywords: artificial intelligence security and privacy; attacks against large language models; data poisoning; backdoor; adversarial attacks; model extraction; privacy inference; distributed training and inference defenses
Cite as: He X L, Xu G W, Han X S, et al. Artificial intelligence security and privacy: a survey. Sci China Inf Sci, 2025, 68: 181101, doi: 10.1007/s11432-025-4388-5

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Witness encryption with updatable ciphertexts
Wang, Yuzhu; Zhang, Mingwu
Sci China Inf Sci, 2025, 68(3): 132109
Keywords: witness encryption; NP relation; updatable ciphertext; access control; indistinguishable obfuscation
Cite as: Wang Y Z, Zhang M W. Witness encryption with updatable ciphertexts. Sci China Inf Sci, 2025, 68: 132109, doi: 10.1007/s11432-024-4214-0

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Committed-programming reductions: formalizations, implications and relations
Zhang, Jiang; Yu, Yu; Feng, Dengguo; Fan, Shuqin; Zhang, Zhenfeng
Sci China Inf Sci, 2024, 67(10): 202101
Keywords: provable security; random oracle model; quantum random oracle model; black-box reduction; black-box separation; programmability
Cite as: Zhang J, Yu Y, Feng D G, et al. Committed-programming reductions: formalizations, implications and relations. Sci China Inf Sci, 2024, 67: 202101, doi: 10.1007/s11432-022-3893-3

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Blockchain-based immunization against kleptographic attacks
Jiang, Changsong; Xu, Chunxiang; Chen, Jie; Chen, Kefei
Sci China Inf Sci, 2024, 67(7): 172102
Keywords: kleptographic attacks; subliminal channel; blockchain; immunization; randomized algorithm
Cite as: Jiang C S, Xu C X, Chen J, et al. Blockchain-based immunization against kleptographic attacks. Sci China Inf Sci, 2024, 67: 172102, doi: 10.1007/s11432-023-3883-4

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm
Li, Teng; Lin, Weiguo; Ma, Ruichen; Ma, Zhuo; Shen, Yulong; Ma, Jianfeng
Sci China Inf Sci, 2024, 67(5): 159103
Keywords: UAV swarm; cooperative detection; privacy protection; consensus; decentralization
Cite as: Li T, Lin W G, Ma R C, et al. CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci China Inf Sci, 2024, 67: 159103, doi: 10.1007/s11432-023-3984-7