网络与信息安全学报2022年(第8卷)总目次

2022-02-11 06:33
网络与信息安全学报 2022年6期
关键词:方法

网络与信息安全学报2022年(第8卷)总目次

视 角

期 页码

隐私计算的学术内涵与研究趋势...................李凤华,李晖,牛犇,邱卫东 6 [2022078](1)

综 述

基于攻防博弈的网络防御决策方法研究综述......................................刘小虎,张恒巍,马军强,张玉臣,谭晶磊 1 [2021089](1)

深度学习模型的版权保护研究综述...................王馨雅,华光,江昊,张海剑 2 [2022015](1)

工业控制系统关键组件安全风险综述......................................唐士杰,袁方,李俊,丁勇,王会勇 3 [2022030](1)

可解释的知识图谱推理方法综述......................................夏毅,兰明敬,陈晓慧,罗军勇,周刚,何鹏 5 [2022063](1)

专 栏

基于诱捕的软件异常检测综述...................傅建明,刘畅,解梦飞,罗陈可 1 [2022003](15)

基于流谱理论的SSL/TLS协议攻击检测方法......................................郭世泽,张帆,宋卓学,赵子鸣,赵新杰,王小娟,罗向阳 1 [2022004](30)

融合注意力机制和BSRU的工业互联网安全态势预测方法......................................胡向东,田正国 1 [2021092](41)

面向项目版本差异性的漏洞识别技术研究......................................黄诚,孙明旭,段仁语,吴苏晟,陈斌 1 [2021094](52)

基于半局部结构的异常连边识别算法...................石灏苒,吉立新,刘树新,王庚润 1 [2021040](63)

基于混合深度学习的多类型低速率DDoS攻击检测方法......................................李丽娟,李曼,毕红军,周华春 1 [2022001](73)

网络空间拟态防御发展综述:从拟态概念到“拟态+”生态......................................马海龙,王亮,胡涛,江逸茗,曲彦泽 2 [2022018](15)

基于证据理论物联网安全态势感知方法研究...................李剑,董廷鲁,李劼 2 [2022022](39)

基于softmax激活变换的对抗防御方法...................陈晋音,吴长安,郑海斌 2 [2022016](48)

基于以太坊状态数据库的攻击与防御方案...................高镇,张东彬,田潇 2 [2022013](64)

基于API调用管理的SDN应用层DDoS攻击防御机制......................................王洋,汤光明,王硕,楚江 2 [2022017](73)

基于多维特征图知识蒸馏的对抗样本防御方法...................邱宝琳,易平 2 [2022012](88)

NFT图像隐写...................王子驰,冯国瑞,张新鹏 3 [2022029](18)

基于空域与频域关系建模的篡改文本图像检测......................................王裕鑫,张博强,谢洪涛,张勇东 3 [2022035](29)

基于加权最小二乘的社交网络用户定位方法...................时文旗,罗向阳,郭家山 3 [2022031](41)

安全性可控的生成式文本隐写算法...................梅佳蒙,任延珍,王丽娜 3 [2022039](53)

增强图像平滑度的可逆信息隐藏方案......................................王婧晗,朱辉,李鹤麟,李晖,杨晓鹏 3 [2022040](66)

用于失配隐写分析的对抗子领域自适应网络...................章蕾,王宏霞 3 [2022028](76)

基于区块链的高透明度PKI认证协议...................陈立全,李潇,杨哲懿,钱思杰 4 [2022052](1)

基于形式化方法的智能合约验证研究综述......................................张文博,陈思敏,魏立斐,宋巍,黄冬梅 4 [2022041](12)

区块链密码学隐私保护技术综述...................刘峰,杨杰,齐佳音 4 [2022054](29)

元宇宙中区块链的应用与展望...................宋晓玲,刘勇,董景楠,黄勇飞 4 [2022045](45)

基于区块链的多权限属性隐藏电子病历共享方案...................金琳,田有亮 4 [2022044](66)

基于正常交易掩盖下的区块链隐蔽通信方案......................................姜鹏坤,张问银,王九如,黄善云,宋万水 4 [2022043](77)

基于GRU的智能手机多场景步态认证......................................姜奇,冯茹,张瑞杰,王金花,陈婷,魏福山 5 [2022060](26)

基于GNN双源学习的访问控制关系预测方法......................................单棣斌,杜学绘,王文娟,刘敖迪,王娜 5 [2022062](40)

动态聚合权重的隐私保护联邦学习框架...................应作斌,方一晨,张怡文 5 [2022069](56)

基于鸽群的鲁棒强化学习算法...................张明英,华冰,张宇光,李海东,郑墨泓 5 [2022064](66)

基于区块链与国密SM9的抗恶意KGC无证书签名方案......................................唐飞,甘宁,阳祥贵,王金洋 6 [2022073](9)

基于国密算法的车载以太网控制器身份认证方法...................郭辉,罗勇,郭晓潞 6 [2022079](20)

低功耗嵌入式平台的SM2国密算法优化实现......................................刘赣秦,李晖,朱辉,黄煜坤,刘兴东 6 [2022080](29)

基于SM2的两方协作盲签名协议...................白雪,秦宝东,郭瑞,郑东 6 [2022081](39)

集群网络密钥管理方案研究综述...................刘军,袁霖,冯志尚 6 [2022082](52)

学术论文

基于图像重构的MNIST对抗样本防御算法......................................秦中元,贺兆祥,李涛,陈立全 1 [2021095](86)

面向5G mMTC的网络切片安全研究...................徐子钧,刘建伟,李耕 1 [2022006](95)

基于细粒度嵌入空间预留的密文域图像可逆信息隐藏方法......................................李锦伟,张晓雅,姚远志,俞能海 1 [2022008](106)

智能化的安卓手势密码取证关键技术......................................裘佳浩,邱卫东,王杨德,查言,谢宇明,李岩 1 [2022005](118)

基于信誉管理模型的矿工类型鉴别机制设计...................余佳仁,田有亮,林晖 1 [2022002](128)

支持多数不规则用户的隐私保护联邦学习框架......................................陈前昕,毕仁万,林劼,金彪,熊金波 1 [2022011](139)

基于网络防御知识图谱的0day攻击路径预测方法......................................孙澄,胡浩,杨英杰,张红旗 1 [2021101](151)

面向智能汽车的信息安全漏洞评分模型......................................于海洋,陈秀真,马进,周志洪,侯书凝 1 [2021096](167)

面向商用活体检测平台的鲁棒性评估......................................王鹏程,郑海斌,邹健飞,庞玲,李虎,陈晋音 1 [2022010](180)

基于原子混淆的通用侧信道漏洞修补方法......................................邹德清,张盼,刘伟,陈维杰,陆弈帆 2 [2022014](100)

云环境下基于属性策略隐藏的可搜索加密方案......................................周艺华,扈新宇,李美奇,杨宇光 2 [2022019](112)

基于SM2联合签名的电子发票公开验证方案......................................罗玙榕,曹进,李晖,赵兴文,尚超 2 [2022020](122)

元宇宙发展演变及安全风险研究...................王海龙,李阳春,李欲晓 2 [2022023](132)

基于标签传播的两阶段社区检测算法......................................孙学良,王巍,黄俊恒,辛国栋,王佰玲 2 [2021099](139)

基于DSR和BGRU模型的聊天文本证据分类方法......................................张宇,李炳龙,李学娟,张和禹 2 [2022007](150)

基于混合分析的Java反序列化利用链挖掘方法...................武永兴,陈力波,姜开达 2 [2022009](160)

基于FANP的云用户行为信任评估优化机制......................................张艺,田立勤,毋泽南,武文星 2 [2021100](175)

容器云中基于信号博弈的容器迁移与蜜罐部署策略......................................李凌书,邬江兴,曾威,刘文彦 3 [2021042] (87)

保护隐私的有理数科学计算...................刘旭红,孙晨 3 [2022038] (97)

面向图像识别的卷积神经网络鲁棒性研究进展...................林点,潘理,易平 3 [2022037](111)

基于联盟链的跨域认证方案...................牛建林,任志宇,杜学绘 3 [2022036](123)

基于合成语音的计算安全隐写方法...................李梦涵,陈可江,张卫明,俞能海 3 [2022025](134)

基于信任值的车联网分层共识优化协议......................................翟宝琴,王健,韩磊,刘吉强,何嘉豪,刘天皓 3 [2021097](142)

5G移动边缘计算场景下的快速切换认证方案......................................张伟成,卫红权,刘树新,普黎明 3 [2022034](154)

基于SEIPQR模型的工控蠕虫防御策略...................潘 洁,叶兰,赵贺,张鑫磊 3 [2022032](169)

云计算多授权中心CP-ABE代理重加密方案...................刘尚,郭银章 3 [2022033](176)

基于期望收益率攻击图的网络风险评估研究......................................刘文甫,庞建民,周鑫,李男,岳峰 4 [2022047](87)

基于博弈论抗共谋攻击的全局随机化共识算法...................张宝,田有亮,高胜 4 [2022048](98)

载体独立的深度光照水印算法...................陈浩,王锋,张卫明,俞能海 4 [2022056](110)

面向高速网络流量的加密混淆型WebShell检测......................................曹艺怀,陈伟,张帆,吴礼发 4 [2022055](119)

基于节点匹配度的动态网络链路预测方法......................................李聪,季新生,刘树新,李劲松,李海涛 4 [2022053](131)

基于动态浏览器指纹的链接检测技术研究...................高凡,王健,刘吉强 4 [2022049](144)

车联网中基于攻防博弈的蜜罐防御及传输策略......................................易杰,曹腾飞,郜帅,黄建强 4 [2022050](157)

基于改进Transformer的社交媒体谣言检测......................................郑洪浩,郝一诺,于洪涛,李邵梅,吴翼腾 4 [2022042](168)

面向网络安全资源池的智能服务链系统设计与分析......................................王泽南,李佳浩,檀朝红,皮德常 4 [2022051](175)

支持受损数据定位与恢复的动态群用户可证明存储......................................姜涛,徐航,王良民,马建峰 5 [2022071](75)

新的基于双混沌系统和压缩感知的图像加密算法...................杨宇光,曹国栋 5 [2022058](88)

面向物联网设备固件的硬编码漏洞检测方法......................................穆超,王鑫,杨明,张恒,陈振娅,吴晓明 5 [2022070](98)

基于字节码的以太坊智能合约分类方法...................林 丹,林凯欣,吴嘉婧,郑子彬 5 [2022046](111)

面向进程多变体软件系统的攻击面定性建模分析......................................邢福康,张铮,隋然,曲晟,季新生 5 [2022059](121)

基于SAT方法进一步加速差分特征的搜索...................许峥 5 [2022066](129)

基于BRLWE的物联网后量子加密技术研究......................................高艺恬,陈立全,屠天扬,高原,陈芊叶 5 [2022024](140)

数字货币交易匿名性与监管的博弈分析......................................张娴,朱建明,隋智源,明盛智 5 [2022068](150)

CAT-RFE:点击欺诈的集成检测框架......................................卢翼翔,耿光刚,延志伟,朱效民,张新常 5 [2022065](158)

基于通道间相关性的图像重着色检测......................................陈诺,祁树仁,张玉书,薛明富,花忠云 5 [2022057](167)

新的基于鼠标行为的持续身份认证方法...................易聪,胡军 5 [2022067](179)

具有隐私保护的动态高效车载云管理方案......................................肖敏,姚涛,刘媛妮,黄永洪 6 [2022083](70)

基于卷积神经网络的加密流量分类方法...................谢绒娜,马铸鸿,李宗俞,田野 6 [2022077](84)

国家自然科学基金委员会网络安全现状与展望......................................李东,郝艳妮,彭升辉,訾瑞杰,刘西蒙 6 [2022076](92)

基于剪枝技术和鲁棒蒸馏融合的轻量对抗攻击防御方法......................................王滨,李思敏,钱亚冠,张君,李超豪,朱晨鸣,张鸿飞 6 [2022074](102)

基于双分支网络的图像修复取证方法......................................章登勇,文凰,李峰,曹鹏,向凌云,杨高波,丁湘陵 6 [2022084](110)

基于符号执行和-scope复杂度的代码混淆度量方法......................................肖玉强,郭云飞,王亚文 6 [2022085](123)

基于ROP/JOP gadgets性质的软件多样化评估方法......................................迟宇宁,郭云飞,王亚文,扈红超 6 [2022086](135)

空域频域相结合的唇型篡改检测方法...................林佳滢,周文柏,张卫明,俞能海 6 [2022075](146)

具有紧凑标签的基于身份匿名云审计方案......................................卢晨昕,陈兵,丁宁,陈立全,吴戈 6 [2022087](156)

信息增值机制下在线医疗隐私保护策略...................明盛智,朱建明,隋智源,张娴 6 [2022072](169)

教育与教学

网络空间安全专业课程思政教学探索与实践——以东南大学“网络空间安全新进展”课程为例...................李古月,胡爱群 2 [2022021](183)

本科“机器学习”课程教学改革初探...................韦 南,殷丽华,宁洪,方滨兴 4 [2022026](182)

Chinese Journal of Network and Information Security Contents List Vol.8 (2022)

No. Page

Perspective

Academic connotation and research trends of privacy computing......................................,,,6 [2022078](1)

Comprehensive Reviews

Research review of network defense decision-making methods based on attack and defense game......................................,,,Yuchen,1 [2021089](1)

Survey on intellectual property protection for deep learning model......................................,,,2 [2022015](1)

Review on security risks of key components in industrial control system......................................,,,,3 [2022030](1)

Survey on explainable knowledge graph reasoning methods......................................,,,,,5 [2022063](1)

Topics

Survey of software anomaly detection based on deception......................................,,,1 [2022003](15)

Detection of SSL/TLS protocol attacks based on flow spectrum theory...................,,...................,,,,1 [2022004](30)

Methods of security situation prediction for industrial internet fused attention mechanism and BSRU......................................,1 [2021092](41)

Vulnerability identification technology research based on project version difference......................................,,,,1 [2021094](52)

Abnormal link detection algorithm based on semi-local structure......................................,,,1 [2021040](63)

Multi-typelow-rate DDoS attack detection method based on hybrid deep learning......................................,,,1 [2022001](73)

Survey on the development of mimic defense in cyberspace: from mimic concept to “mimic+” ecology...................,,,,2 [2022018](15)

Research on IoT security situation awareness method based on evidence theory......................................,,2 [2022022](39)

Novel defense based on softmax activation transformation......................................,,2 [2022016](48)

Defense scheme for the world state based attack in Ethereum......................................,,2 [2022013](64)

Defense mechanism of SDN application layer against DDoS attack based on API call management......................................,,,2 [2022017](73)

Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation...................,2 [2022012](88)

Steganography in NFT images...................,,3 [2022029](18)

Tampered text detection via RGB and frequency relationship modeling......................................,,,3 [2022035](29)

Social network user geolocating method based on weighted least squares......................................,,3 [2022031](41)

Generation-based linguistic steganography with controllable security......................................,,3 [2022039](53)

Reversible data hiding scheme based on enhanced image smoothness......................................,,,,3 [2022040](66)

Adversarial subdomain adaptation network for mismatched steganalysis......................................,3 [2022028](76)

Blockchain-based high transparent PKI authentication protocol......................................,,,4 [2022052](1)

State-of-the-art survey of smart contract verification based on formal methods......................................,,,,4 [2022041](12)

Survey on blockchain privacy protection techniques in cryptography...................,,4 [2022054](29)

Application and prospect of blockchain in Metaverse......................................,,,4 [2022045](45)

Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain......................................,4 [2022044](66)

Blockchain covert communication scheme based on the cover of normal transactions......................................,,,,4 [2022043] (77)

GRU-based multi-scenario gait authentication for smartphones......................................,,,,,5 [2022060] (26)

Access control relationship prediction method based on GNN dual source learning......................................,,,,5 [2022062] (40)

Privacy-preserving federated learning framework with dynamic weight aggregation......................................,,5 [2022069] (56)

Robust reinforcement learning algorithm based on pigeon-inspired optimization......................................,,,,5 [2022064] (66)

Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9...................,,,6 [2022073] (9)

Automotive ethernet controller authentication method based on national cryptographic algorithms......................................,,6 [2022079] (20)

Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform...................,,,,6 [2022080] (29)

Two-party cooperative blind signature based on SM2......................................,,,6 [2022081] (39)

Survey of key management schemes for cluster networks...................,,6 [2022082] (52)

Papers

Adversarial example defense algorithm for MNIST based on image reconstruction......................................,,,1 [2021095] (86)

Research on network slicing security for 5G mMTC...................,,1 [2022006] (95)

Reversible data hiding in encrypted images based on fine-grained embedding room reservation......................................,,,1 [2022008](106)

Intellectualized forensic technique for Android pattern locks......................................,,,,,1 [2022005](118)

Design of miner type identification mechanism based on reputation management model......................................,,1 [2022002](128)

Privacy-preserving federated learning framework with irregular-majority users......................................,,,,1 [2022011](139)

Prediction method of 0day attack path based on cyber defense knowledge graph......................................,,,1 [2021101](151)

Information security vulnerability scoring model for intelligent vehicles......................................,,,,1 [2021096](167)

Robustness evaluation of commercial liveness detection platform......................................,,,,,1 [2022010](180)

Universal patching method for side-channel vulnerabilities based on atomic obfuscation......................................,,,,2 [2022014](100)

Searchable encryption scheme based on attribute policy hiding in a cloud environment......................................,,,2 [2022019](112)

Electronic invoice public verification scheme based on SM2 coalition signature algorithm......................................,,,,2 [2022020](122)

Research on evolution and security risk of Metaverse...................,,2 [2022023](132)

Two-stage community detection algorithm based on label propagation......................................,,,,2 [2021099](139)

Evidence classification method of chat text based on DSR and BGRU model......................................,,,2 [2022007](150)

Java deserialization gadget chain discovery method based on hybrid analysis......................................,,2 [2022009](160)

Trust evaluation optimization mechanism for cloud user behavior based on FANP......................................,,,2 [2021100](175)

Strategy of container migration and honeypot deployment based on signal game in cloud environment......................................,,,3 [2021042] (87)

Private-preserving scientific computation of the rational numbers...................,3 [2022038] (97)

Research on the robustness of convolutional neural networks in image recognition......................................,,3 [2022037](111)

Cross-domain authentication scheme based on consortium blockchain......................................,,3 [2022036](123)

Computationally secure steganography based on speech synthesis......................................3 [2022025](134)

Hierarchical proxy consensus optimization for IoV based on blockchain and trust value......................................,,,,,3 [2021097](142)

Fast handover authentication scheme in 5G mobile edge computing scenarios......................................,,,3 [2022034](154)

Defense strategy of industrial control worm based on SEIPQR model......................................,,,3 [2022032](169)

Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing......................................,3 [2022033](176)

Research on network risk assessment based on attack graph of expected benefits-rate......................................,,,,4 [2022047](87)

Global randomized consensus algorithm resist collusion attack based on game theory......................................,,4 [2022048](98)

Carrier-independent deep optical watermarking algorithm......................................,,,4 [2022056](110)

Encrypted and obfuscation WebShell detection for high-speed network traffic......................................,,,4 [2022055](119)

Link prediction method for dynamic networks based on matching degree of nodes......................................,,,,4 [2022053](131)

Research on link detection technology based on dynamic browser fingerprint......................................,,4 [2022049](144)

Honeypot defense and transmission strategy based on offensive and defensive games in vehicular networks......................................,,,4 [2022050](157)

Rumor detection in social media based on eahanced Transformer......................................,,,,4 [2022042](168)

Design and analysis of intelligent service chain system for network security resource pool......................................,,,4 [2022051](175)

Proof of storage with corruption identification and recovery for dynamic group users......................................,,,5 [2022071] (75)

New image encryption algorithm based on double chaotic system and compressive sensing......................................,5 [2022058] (88)

Hardcoded vulnerability detection approach for IoT device firmware......................................,,,,,5 [2022070] (98)

Bytecode-based approach for Ethereum smart contract classification5 [2022046](111)

Qualitative modeling and analysis of attack surface for process multi-variant execution software system......................................,,,,5 [2022059](121)

Further accelerating the search of differential characteristics based on the SAT method...................5 [2022066](129)

Post-quantum encryption technology based on BRLWE for internet of things......................................,,,,5 [2022024](140)

Analysis on anonymity and regulation of digital currency transactions based on game theory......................................,,,5 [2022068](150)

CAT-RFE: ensemble detection framework for click fraud......................................,,,,5 [2022065](158)

Image recoloring detection based on inter-channel correlation......................................,,,,5 [2022057](167)

Novel continuous identity authentication method based on mouse behavior...................,5 [2022067](179)

Dynamic and efficient vehicular cloud management scheme with privacy protection......................................,,,6 [2022083] (70)

Encrypted traffic classification method based on convolutional neural network......................................,,,6 [2022077] (84)

Network security of the National Natural Science Foundation of China: today and prospects......................................,,,,6 [2022076] (92)

Lightweight defense mechanism against adversarial attacks via adaptive pruning and robust distillation......................................,,,,,,6 [2022074](102)

Image inpainting forensics method based on dual branch network...................,,,,,,6 [2022084](110)

Metrics for code obfuscation based on symbolic execution and-scope complexity......................................,,6 [2022085](123)

Software diversity evaluation method based on the properties of ROP/JOP gadgets......................................,,,6 [2022086](135)

Lip forgery detection via spatial-frequency domain combination......................................,,,6 [2022075](146)

Identity-based anonymous cloud auditing scheme with compact tags......................................,,,,6 [2022087](156)

Online medical privacy protection strategy under information value-added mechanism......................................,,,6 [2022072](169)

Education and teaching

Exploration and practice on integration of ideological, political courses into professional courses of cyberspace security specialty...................,2 [2022021](183)

Preliminary study on the reform of machine learning teaching......................................,,,4 [2022026](182)

猜你喜欢
方法
高中数学知识与方法大梳理(二)
中医特有的急救方法
高中数学教学改革的方法
化学反应多变幻 “虚拟”方法帮大忙
变快的方法
学习方法
用对方法才能瘦
最有效的简单方法
四大方法 教你不再“坐以待病”!
赚钱方法