Highly Cited in 202407 RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 10

Model architecture level privacy leakage in neural networks
Li, Yan; Yan, Hongyang; Huang, Teng; Pan, Zijie; Lai, Jiewei; Zhang, Xiaoxue; Chen, Kongyang; Li, Jin
Sci China Inf Sci, 2024, 67(3): 132101
Keywords: neural architecture search; data reconstruction attack; membership inference attack
Cite as: Li Y, Yan H Y, Huang T, et al. Model architecture level privacy leakage in neural networks. Sci China Inf Sci, 2024, 67(3): 132101, doi: 10.1007/s11432-022-3507-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 8

Transaction transmission model for blockchain channels based on non-cooperative games
Zhang, Peiyun; Li, Chenxi; Zhou, Mengchu; Huang, Wenjun; Abusorrah, Abdullah; Bamasag, Omaimah O.
Sci China Inf Sci, 2023, 66(1): 112105
Keywords: Blockchain channel; transaction transmission; channel balance; channel state; channel transmission probability; non-cooperative game
Cite as: Zhang P Y, Li C X, Zhou M C, et al. Transaction transmission model for blockchain channels based on non-cooperative games. Sci China Inf Sci, 2023, 66(1): 112105, doi: 10.1007/s11432-021-3362-9

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 6

A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis
Zhang, Kai; Lai, Xuejia; Wang, Lei; Guan, Jie; Hu, Bin
Sci China Inf Sci, 2023, 66(3): 139106
Keywords: cybersecurity; cryptanalysis; lightweight block cipher; impossible differential cryptanalysis; Simeck
Cite as: Zhang K, Lai X J, Wang L, et al. A revisited security evaluation of Simeck family ciphers against impossible differential cryptanalysis. Sci China Inf Sci, 2023, 66(3): 139106, doi: 10.1007/s11432-022-3466-x

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 5

Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
Ghopur, Dilxat; Ma, Jianfeng; Ma, Xindi; Miao, Yinbin; Hao, Jialu; Jiang, Tao
Sci China Inf Sci, 2023, 66(7): 172104
Keywords: ciphertext-policy attribute-based encryption; puncturable encryption; user revocation; outsource decryption; digital signature
Cite as: Ghopur D, Ma J F, Ma X D, et al. Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation. Sci China Inf Sci, 2023, 66(7): 172104, doi: 10.1007/s11432-022-3585-9

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Lattice-based autonomous path proxy re-encryption in the standard model
Xie, Wenli; Weng, Jian; Tong, Yao; Liang, Xiaojian; Yao, Lisha; Zhao, Feixiang
Sci China Inf Sci, 2023, 66(10): 202101
Keywords: autonomous path proxy re-encryption; proxy re-encryption; lattice-based cryptography; learning with errors; controlled delegation
Cite as: Xie W L, Weng J, Tong Y, et al. Lattice-based autonomous path proxy re-encryption in the standard model. Sci China Inf Sci, 2023, 66(10): 202101, doi: 10.1007/s11432-022-3612-6

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
Xiang, Axin; Gao, Hongfeng; Tian, Youliang; Wan, Liang
Sci China Inf Sci, 2023, 66(3): 139102
Keywords: key escrow; blockchain; smart contract; committee selection; anonymous authentication
Cite as: Xiang A X, Gao H F, Tian Y L, et al. DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection. Sci China Inf Sci, 2023, 66(3): 139102, doi: 10.1007/s11432-021-3378-3

From CAS & CAE Members
RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 3

Locally differentially private high-dimensional data synthesis
Chen, Xue; Wang, Cheng; Yang, Qing; Hu, Teng; Jiang, Changjun
Sci China Inf Sci, 2023, 66(1): 112101
Keywords: preserving protocols local differential privacy; high-dimensional data synthesis; sampling; data privacy; privacy-
Cite as: Chen X, Wang C, Yang Q, et al. Locally differentially private high-dimensional data synthesis. Sci China Inf Sci, 2023, 66(1): 112101, doi: 10.1007/s11432-022-3583-x

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Unbalanced private set intersection with linear communication complexity
Zhao, Quanyu; Jiang, Bingbing; Zhang, Yuan; Wang, Heng; Mao, Yunlong; Zhong, Sheng
Sci China Inf Sci, 2024, 67(3): 132105
Keywords: unbalanced private set intersection; Hash proof system; linear communication complexity; small set; resource-constrained devices
Cite as: Zhao Q Y, Jiang B B, Zhang Y, et al. Unbalanced private set intersection with linear communication complexity. Sci China Inf Sci, 2024, 67(3): 132105, doi: 10.1007/s11432-022-3717-9

LETTER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Provably secure attribute-based authenticated encryption with keyword search from ideal lattices
Yao, Lisha; Hou, Lin; Weng, Jian; Zhao, Feixiang
Sci China Inf Sci, 2024, 67(1): 119101
Keywords: attribute-based; keyword search; chosen-keyword attacks; insider keyword guessing attacks; ideal lattices
Cite as: Yao L S, Hou L, Weng J, et al. Provably secure attribute-based authenticated encryption with keyword search from ideal lattices. Sci China Inf Sci, 2024, 67(1): 119101, doi: 10.1007/s11432-022-3808-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 2

Resource investment for DDoS attack resistant SDN: a practical assessment
Yuan, Bin; Zhang, Fan; Wan, Jun; Zhao, Huan; Yu, Shui; Zou, Deqing; Hua, Qiangsheng; Jin, Hai
Sci China Inf Sci, 2023, 66(7): 172103
Keywords: SDN security; DDoS attacks; resource management; queueing theory; QoS
Cite as: Yuan B, Zhang F, Wan J, et al. Resource investment for DDoS attack resistant SDN: a practical assessment. Sci China Inf Sci, 2023, 66(7): 172103, doi: 10.1007/s11432-022-3593-7

RESEARCH PAPER Supplementary Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 1

Framework for understanding intention-unbreakable malware
Ji, Tiantian; Fang, Binxing; Cui, Xiang; Wang, Zhongru; Liao, Peng; Song, Shouyou
Sci China Inf Sci, 2023, 66(4): 142104
Keywords: malware; unbreakable property; modeling mechanism; accurate identification; intention concealment
Cite as: Ji T T, Fang B X, Cui X, et al. Framework for understanding intention-unbreakable malware. Sci China Inf Sci, 2023, 66(4): 142104, doi: 10.1007/s11432-021-3567-y

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Witness encryption with updatable ciphertexts
Wang, Yuzhu; Zhang, Mingwu
Sci China Inf Sci, 2025, 68(3): 132109
Keywords: witness encryption; NP relation; updatable ciphertext; access control; indistinguishable obfuscation
Cite as: Wang Y Z, Zhang M W. Witness encryption with updatable ciphertexts. Sci China Inf Sci, 2025, 68(3): 132109, doi: 10.1007/s11432-024-4214-0

REVIEW Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Privacy-preserving explainable AI: a survey
Nguyen, Thanh Tam; Huynh, Thanh Trung; Ren, Zhao; Nguyen, Thanh Toan; Nguyen, Phi Le; Yin, Hongzhi; Nguyen, Quoc Viet Hung
Sci China Inf Sci, 2025, 68(1): 111101
Keywords: privacy-preserving explainable AI; privacy attacks; privacy defences; PrivEx; PPXAI
Cite as: Nguyen T T, Huynh T T, Ren Z, et al. Privacy-preserving explainable AI: a survey. Sci China Inf Sci, 2025, 68(1): 111101, doi: 10.1007/s11432-024-4123-4

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

RCCA-SM9: securing SM9 on corrupted machines
Chen, Rongmao; Chen, Jinrong; Huang, Xinyi; Wang, Yi
Sci China Inf Sci, 2024, 67(11): 212103
Keywords: SM9; subversion resilience; subversion attack; cryptographic reverse firewall; RCCA
Cite as: Chen R M, Chen J R, Huang X Y, et al. RCCA-SM9: securing SM9 on corrupted machines. Sci China Inf Sci, 2024, 67(11): 212103, doi: 10.1007/s11432-023-3877-9

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Committed-programming reductions: formalizations, implications and relations
Zhang, Jiang; Yu, Yu; Feng, Dengguo; Fan, Shuqin; Zhang, Zhenfeng
Sci China Inf Sci, 2024, 67(10): 202101
Keywords: provable security; random oracle model; quantum random oracle model; black-box reduction; black-box separation; programmability
Cite as: Zhang J, Yu Y, Feng D G, et al. Committed-programming reductions: formalizations, implications and relations. Sci China Inf Sci, 2024, 67(10): 202101, doi: 10.1007/s11432-022-3893-3

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

LOL: a highly flexible framework for designing stream ciphers
Feng, Dengguo; Jiao, Lin; Hao, Yonglin; Zheng, Qunxiong; Wu, Wenling; Qi, Wenfeng; Zhang, Lei; Zhang, Liting; Sun, Siwei; Tian, Tian
Sci China Inf Sci, 2024, 67(9): 192101
Keywords: stream cipher; 5G/6G mobile system; fast software implementation
Cite as: Feng D G, Jiao L, Hao Y L, et al. LOL: a highly flexible framework for designing stream ciphers. Sci China Inf Sci, 2024, 67(9): 192101, doi: 10.1007/s11432-023-3901-0

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Blockchain-based immunization against kleptographic attacks
Jiang, Changsong; Xu, Chunxiang; Chen, Jie; Chen, Kefei
Sci China Inf Sci, 2024, 67(7): 172102
Keywords: kleptographic attacks; subliminal channel; blockchain; immunization; randomized algorithm
Cite as: Jiang C S, Xu C X, Chen J, et al. Blockchain-based immunization against kleptographic attacks. Sci China Inf Sci, 2024, 67(7): 172102, doi: 10.1007/s11432-023-3883-4

LETTER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm
Li, Teng; Lin, Weiguo; Ma, Ruichen; Ma, Zhuo; Shen, Yulong; Ma, Jianfeng
Sci China Inf Sci, 2024, 67(5): 159103
Keywords: UAV swarm; cooperative detection; privacy protection; consensus; decentralization
Cite as: Li T, Lin W G, Ma R C, et al. CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm. Sci China Inf Sci, 2024, 67(5): 159103, doi: 10.1007/s11432-023-3984-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

Fault-tolerant identity-based encryption from SM9
Liu, Xiaohong; Huang, Xinyi; Cheng, Zhaohui; Wu, Wei
Sci China Inf Sci, 2024, 67(2): 122101
Keywords: attribute-based encryption; identity-based encryption; fault-tolerant; SM9
Cite as: Liu X H, Huang X Y, Cheng Z H, et al. Fault-tolerant identity-based encryption from SM9. Sci China Inf Sci, 2024, 67(2): 122101, doi: 10.1007/s11432-022-3706-7

RESEARCH PAPER Webpage Webpage-cn SpringerLink Google Scholar Cited in SCI: 0

TULAM: trajectory-user linking via attention mechanism
Li, Hao; Cao, Shuyu; Chen, Yaqing; Zhang, Min; Feng, Dengguo
Sci China Inf Sci, 2024, 67(1): 112103
Keywords: information security; data security and privacy; trajectory-user linking; deep learning; recurrent neural network; attention mechanism
Cite as: Li H, Cao S Y, Chen Y Q, et al. TULAM: trajectory-user linking via attention mechanism. Sci China Inf Sci, 2024, 67(1): 112103, doi: 10.1007/s11432-021-3673-6