Advertisement

Most Down Articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month | Most Downloaded in Recent Year|

    All
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Chinese Journal of Network and Information Security    2017, 3 (3): 71-77.   DOI: 10.11959/j.issn.2096-109x.2017.00157
    Abstract6100)   HTML89)    PDF(pc) (169KB)(62389)       Save
    Table and Figures | Reference | Related Articles | Metrics
    Delay-aware cross-layer optimization method for FANET
    Shaojie WEN, Chuanhe HUANG
    Journal on Communications    2018, 39 (4): 1-12.   DOI: 10.11959/j.issn.1000-436x.2018070
    Abstract3255)   HTML1540)    PDF(pc) (822KB)(34695)       Save

    An asynchronous distributed cross-layer optimization (ADCO) method was proposed to solve the problem of jointly considering real-time routing,rate allocation and power control in FANET (flying ad hoc network).And a delay-constrained cross-layer optimization framework was designed to formally represent proposed problem.Then Lagrangian relaxation and dual decomposition methods was used to divide joint optimization problem into several sub-problems.ADCO allowed each relay node to perform the optimization operation for different sub-problems with local information,and the relay nodes could update the dual variables based on asynchronous update mechanism.The simulation results show that the proposed algorithm can improve the network performance effectively in terms of energy efficiency,packet timeout ratio and network throughput.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of block chain
    Xin SHEN,Qing-qi PEI,Xue-feng LIU
    Chinese Journal of Network and Information Security    2016, 2 (11): 11-20.   DOI: 10.11959/j.issn.2096-109x.2016.00107
    Abstract20828)   HTML2614)    PDF(pc) (461KB)(28300)       Save

    With the wide spread of Bitcoin,block chain serving as the building block of digital currency becomes a hot spot in industry and academia.Due to the decentration of network,the unforgeability of block data,etc.,block chain has attracted more and more attentions from financial institutions.The essential theory and core technique of block chain were surveyed,and the issues of management and security problems of block chain based applications were discussed.To help improve the block chain techniques is the goal.

    Table and Figures | Reference | Related Articles | Metrics
    Internet of things and pan-healthcares
    Jianguo MA,Hengyue JIN
    Chinese Journal on Internet of Things    2018, 2 (1): 42-55.   DOI: 10.11959/j.issn.2096-3750.2018.00040
    Abstract3822)   HTML83)    PDF(pc) (8173KB)(22370)       Save

    The Internet of things is the result of the informatization.The purpose of the Internet of things is to let things speak.The health of both man’s body and the structures being used daily needs to talk urgently.A novel IoT architecture based on the deep machine-learning was proposed.The Internet of things through embedded depth learning,realizes the flow from the data stream to the streams of events,and then to the flow of knowledge the value stream.The core technology for IoT is prediction,protection and prevention.

    Table and Figures | Reference | Related Articles | Metrics
    Study on BGP route leak
    Jia JIA,Zhi-wei YAN,Guang-gang GENG,Jian JIN
    Chinese Journal of Network and Information Security    2016, 2 (8): 54-61.   DOI: 10.11959/j.issn.2096-109x.2016.00074
    Abstract3269)   HTML132)    PDF(pc) (472KB)(20923)       Save

    With the rapid expansion of the scale of Internet,BGP plays a more and more important role in the Inter domain routing system.BGP has a lot of security risks,which result in prefix hijacking,AS_PATH hijacking and route leak attacks occuring frequently,causing serious threats to the Internet.In currently,the content introduction and security research mechanism were little,so a detailed study of BGP route leak was carried out.The BGP proto-col,route policy and established rules were introduced,six types of major route leak security incidents were analy-sised,the current security mechanisms and methods were summarized and compared to solve and detect route leak.In the last,a new prospect for the security and protection mechanism of route leak was proposed.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of blockchain:principle,progress and application
    Shiqin ZENG, Ru HUO, Tao HUANG, Jiang LIU, Shuo WANG, Wei FENG
    Journal on Communications    2020, 41 (1): 134-151.   DOI: 10.11959/j.issn.1000-436x.2020027
    Abstract2480)   HTML404)    PDF(pc) (1174KB)(13780)       Save

    Blockchain is a kind of distributed ledger technology that upgrades to a complete storage system by adding logic control functions such as intelligent contracts.With the changes of its classification,service mode and application requirements,the core technology forms of Blockchain show diversified development.In order to understand the Blockchain ecosystem thoroughly,a hierarchical technology architecture of Blockchain was proposed.Furthermore,each layer of blockchain was analyzed from the perspectives of basic principle,related technologies and research progress in-depth.Moreover,the technology selections and characteristics of typical Blockchain projects were summarized systematically.Finally,some application directions of blockchain frontiers,technology challenges and research prospects including Smart Cities and Industrial Internet were given.

    Table and Figures | Reference | Related Articles | Metrics
    Research on host malcode detection using machine learning
    Dong ZHANG,Yao ZHANG,Gang LIU,Gui-xiang SONG
    Chinese Journal of Network and Information Security    2017, 3 (7): 25-32.   DOI: 10.11959/j.issn.2096-109x.2017.00179
    Abstract2835)   HTML135)    PDF(pc) (648KB)(12358)       Save

    Main trends of host malcode detection using machine learning were focused on,and two categories of detection models(namely static analysis and dynamic analysis) were well discussed.Moreover,the critical stages such as malcode samples collection,feature extraction and selection,the construction of machine learning classifiers were considered fully.At last,some future work and challenges in this field were listed.The work can serve as a practical reference for establishing next-generation malcode detection techniques.

    Table and Figures | Reference | Related Articles | Metrics
    Supply chain dynamic multi-center coordination authentication model based on block chain
    Jian-ming ZHU,Yong-gui FU
    Chinese Journal of Network and Information Security    2016, 2 (1): 27-33.   DOI: 10.11959/j.issn.2096-109x.2016.00019
    Abstract6243)   HTML153)    PDF(pc) (1052KB)(11310)       Save

    The value of block chain technology is proved by the success of Bitcoin. The characteristics, limitations and its chain structure Hash principle of block chain were analyzed, the applications of block chain technology were researched, the B2B+B2C supply chain each transaction subject transaction structure diagram and dynamic multi-center coordination authentication model based on block chain were proposed. Then the producing process of block chain in B2B+B2C supply chain electronic transaction with example was analyzed, and the facing problems that block chain spreading use in B2B+B2C supply chain enterprise were pointed out. The research results have proposed a new idea for the application of cryptography and block chain.

    Table and Figures | Reference | Related Articles | Metrics
    Define cyberspace security
    Binxing FANG
    Chinese Journal of Network and Information Security    2018, 4 (1): 1-5.   DOI: 10.11959/j.issn.2096-109x.2018002
    Abstract5008)   HTML340)    PDF(pc) (456KB)(10767)       Save

    The booming development of the Internet brought unparalleled revolution to production and social life style,and the Internet itself has become the new driving force of economy in almost every country.However,It is embraced that not only development opportunities,but also enormous security challenges in the cyberspace.So as to enhance the healthiness of cyberspace and social form,every state and nation is actively promoting the construction of cyberspace security system and in-depth research of key technologies.A comprehensive view of cyberspace security development status was provided in the globe and in major areas,with systematic analysis on its core elements as well as the hierarchical model.

    Table and Figures | Reference | Related Articles | Metrics
    Review of key technology and its application of blockchain
    Feng ZHANG, Boxuan SHI, Wenbao JIANG
    Chinese Journal of Network and Information Security    2018, 4 (4): 22-29.   DOI: 10.11959/j.issn.2096-109x.2018028
    Abstract5582)   HTML590)    PDF(pc) (690KB)(10209)       Save

    The rise of blockchain technology is a paradigm shift,which is similar to the rise of the Internet,and it has attracted wide attention.Blockchain has characteristics of decentralization,tamper-resistant,traceability and so on.The achievements of some papers about blockchain at home and abroad have been analysed in recent years,and the core technology principle of blockchain has been parsed.The application scenarios of blockchain were disscussed,such as financial services,credit management,tenure management,public network service and other fields.The existing problems in various application fields were pointed out.Some opinions on the development and application of blockchain were put forward,dedicated to blockchain and hoped to do contribution for the research about blockchain and its applications.

    Table and Figures | Reference | Related Articles | Metrics
    Research progress and trend of text summarization
    Tuosiyu MING, Hongchang CHEN
    Chinese Journal of Network and Information Security    2018, 4 (6): 1-10.   DOI: 10.11959/j.issn.2096-109x.2018048
    Abstract5702)   HTML93)    PDF(pc) (568KB)(10179)       Save

    With the explosive growth of information on the Internet,how to extract useful information from massive information has become a key technical issue.The text summarization technology can compress and extract refined and concise document information from big data,effectively reducing the user information overload problem,and it has become a research hotspot.The domestic and foreign text summarization methods and their concrete realization in recent years were analyzed,the advantages and disadvantages between traditional methods and deep learning summary methods were compared,and a reasonable outlook for future research directions was made.

    Table and Figures | Reference | Related Articles | Metrics
    Machine learning security and privacy:a survey
    Lei SONG, Chunguang MA, Guanghan DUAN
    Chinese Journal of Network and Information Security    2018, 4 (8): 1-11.   DOI: 10.11959/j.issn.2096-109x.2018067
    Abstract6097)   HTML280)    PDF(pc) (701KB)(10080)       Save

    As an important method to implement artificial intelligence,machine learning technology is widely used in data mining,computer vision,natural language processing and other fields.With the development of machine learning,it brings amount of security and privacy issues which are getting more and more attention.Firstly,the adversary model was described according to machine learning.Secondly,the common security threats in machine learning was summarized,such as poisoning attacks,adversarial attacks,oracle attacks,and major defense methods such as regularization,adversarial training,and defense distillation.Then,privacy issues such were summarized as stealing training data,reverse attacks,and membership tests,as well as privacy protection technologies such as differential privacy and homomorphic encryption.Finally,the urgent problems and development direction were given in this field.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on computation offloading in mobile edge computing
    Renchao XIE,Xiaofei LIAN,Qingmin JIA,Tao HUANG,Yunjie LIU
    Journal on Communications    2018, 39 (11): 138-155.   DOI: 10.11959/j.issn.1000-436x.2018215
    Abstract2892)   HTML369)    PDF(pc) (1284KB)(9569)       Save

    Computation offloading in mobile edge computing would transfer the resource intensive computational tasks to the edge network.It can not only solve the shortage of mobile user equipment in resource storage,computation performance and energy efficiency,but also deal with the problem of resource occupation,high latency and network load compared to cloud computing.Firstly the architecture of MEC was introduce and a comparative analysis was made according to various deployment schemes.Then the key technologies of computation offloading was studied from three aspects of decision on computation offloading,allocation of computing resource within MEC and system implement of MEC.Based on the analysis of MEC deployment scheme in 5G,two optimization schemes on computation offloading was proposed in 5G MEC.Finally,the current challenges in the mobility management was summarized,interference management and security of computation offloading in MEC.

    Table and Figures | Reference | Related Articles | Metrics
    Analysis and enlightenment on the cybersecurity strategy of various countries in the world
    Yu-xiao LI,Yong-jiang XIE
    Chinese Journal of Network and Information Security    2016, 2 (1): 1-5.   DOI: 10.11959/j.issn.2096-109x.2016.00017
    Abstract2514)   HTML199)    PDF(pc) (374KB)(9479)       Save

    National cybersecurity strategy is the top-level design and strategic framework of the country, which in-cludes the national security, risk management and the personal protection. Now the main developed countries in the world have made the national cybersecurity strategy. So the strategy of our country drawing lessons from the ex-perience of the developed countries should also be enacted. And the strategy should include the cybersecurity situa-tion assessment, strategic target, strategic actions, the system and mechanism of internet governance, and so on.

    Reference | Related Articles | Metrics
    The new era of artificial intelligence
    Nanning ZHENG
    Chinese Journal of Intelligent Science and Technology    2019, 1 (1): 1-3.   DOI: 10.11959/j.issn.2096-6652.201914
    Abstract9862)   HTML12616)    PDF(pc) (506KB)(9220)       Save

    The goal of artificial intelligence (AI) is to make machines learn,think and understand like human beings,with the focus of using computers to imitate human intelligence.It integrates knowledge of multi-disciplines including intuitive reasoning (with all kinds of physical and social common senses),computer vision,natural language perception and interaction,and machine learning.Hybrid-augmented intelligence is the typical feature of the next generation of AI,and cognitive computing of visual and auditory information is the core research content.Therefore,comprehending the human visual and auditory cognition mechanism and building its computable model is of vital significance for AI’s research and development.

    Reference | Related Articles | Metrics
    Survey on data security and privacy-preserving for the research of edge computing
    Jiale ZHANG,Yanchao ZHAO,Bing CHEN,Feng HU,Kun ZHU
    Journal on Communications    2018, 39 (3): 1-21.   DOI: 10.11959/j.issn.1000-436x.2018037
    Abstract3029)   HTML314)    PDF(pc) (857KB)(9092)       Save

    With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.,has also introduced new security problems especially the data security and privacy issues.Firstly,the background and challenges of data security and privacy-preserving in edge computing were described,and then the research architecture of data security and privacy-preserving was presented.Secondly,the key technologies of data security,access control,identity authentication and privacy-preserving were summarized.Thirdly,the recent research advancements on the data security and privacy issues that may be applied to edge computing were described in detail.Finally,some potential research points of edge computing data security and privacy-preserving were given,and the direction of future research work was pointed out.

    Table and Figures | Reference | Related Articles | Metrics
    Research of phishing detection technology
    Xi ZHANG,Zhi-wei YAN,Hong-tao LI,Guang-gang GENG
    Chinese Journal of Network and Information Security    2017, 3 (7): 7-24.   DOI: 10.11959/j.issn.2096-109x.2017.00180
    Abstract2480)   HTML113)    PDF(pc) (870KB)(8863)       Save

    The current status of phishing scams were analyzed and the data sets and evaluation indicators commonly used in phishing detection were summaried.On this basis,a detailed overview of the typical methods of phishing detection was given,which included blacklist strategies,heuristic methods,visual matching methods,and methods based on machine learning and natural language processing.The comparison and analysis of those methods were given,and furtherly,the challenges and future trends of phishing detection were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Research status and development trends of security assurance for space-ground integration information network
    Feng-hua LI,Li-hua YIN,Wei WU,Lin-jie ZHANG,Guo-zhen SHI
    Journal on Communications    2016, 37 (11): 156-168.   DOI: 10.11959/j.issn.1000-436x.2016229
    Abstract1954)   HTML138)    PDF(pc) (665KB)(8686)       Save

    Space-ground integration information network consists of space-based backbone network, space-based access network, the node net of foundation, Internet, mobile communication network, which has important significance for the realization of the target of national security strategy. Firstly, the characteristics of space-ground integration network, such as exposed channel, heterogeneous network integration, etc, were analyzed. Also, the corresponding threats from the physical layer, operation layer, data layer were introduced. Secondly, a comprehensive study on current status of surviv-ability, anti-jamming, secure access, secure routing, secure handoff, secure transmission and key management were made. Finally, combined with research status, the important trends were proposed.

    Table and Figures | Reference | Related Articles | Metrics
    Symbolic execution based control flow graph extraction method for Android native codes
    Hui-ying YAN,Zhen-ji ZHOU,Li-fa WU,Zheng HONG,He SUN
    Chinese Journal of Network and Information Security    2017, 3 (7): 33-46.   DOI: 10.11959/j.issn.2096-109x.2017.00178
    Abstract1709)   HTML14)    PDF(pc) (619KB)(8314)       Save

    A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of DDoS defense:challenges and directions
    Fei CHEN,Xiao-hong BI,Jing-jing WANG,Yuan LIU
    Chinese Journal of Network and Information Security    2017, 3 (10): 16-24.   DOI: 10.11959/j.issn.2096-109x.2017.00202
    Abstract2632)   HTML90)    PDF(pc) (555KB)(8214)       Save

    The distributed denial of server (DDoS) attack is a major threat to the Internet.Numerous works have been proposed to deal with this problem through attack detection and defense mechanism design.A survey was presented to introduce the DDoS defense technologies,from the traditional strategies,through Cloud-based systems,toward SDN-based mechanisms.According to the characteristics of DDoS attack,the features and drawbacks of these systems were discussed,which could provide new insights for the development of the new generation of network security framework in the future.

    Table and Figures | Reference | Related Articles | Metrics
    Artificial intelligence is entering the post deep-learning era
    Bo ZHANG
    Chinese Journal of Intelligent Science and Technology    2019, 1 (1): 4-6.   DOI: 10.11959/j.issn.2096-6652.201913
    Abstract2856)   HTML1765)    PDF(pc) (494KB)(8200)       Save

    Points of views on the concept of artificial intelligence (AI),the progress AI has made,and the trend of AI’s future development were presented in this paper.

    Reference | Related Articles | Metrics
    Review and perspective on encrypted traffic identification research
    Wu-bin PAN,Guang CHENG,Xiao-jun GUO,Shun-xiang HUANG
    Journal on Communications    2016, 37 (9): 154-167.   DOI: 10.11959/j.issn.1000-436x.2016187
    Abstract1800)   HTML224)    PDF(pc) (996KB)(8196)       Save

    Considering the importance of encrypted traffic identification technology and existing research work,first,the type of encrypted traffic identification according to the demand of traffic analysis were introduced,such as protocols,applications and services.Second,the encrypted traffic identification technology was summarized,and identification technology was compared from multiple views.Third,the deficiencies and the affecting factors of the existing encrypted traffic identification technologies were induced,such as tunneling,traffic camouflage technology,new protocols of HTTP/2.0 and QUIC.Finally,prospect trends and directions of future research on encrypted traffic identification were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Data security and protection techniques in big data:a survey
    Kai-min WEI,Jian WENG,Kui REN
    Chinese Journal of Network and Information Security    2016, 2 (4): 1-11.   DOI: 10.11959/j.issn.2096-109x.2016.00046
    Abstract4055)   HTML132)    PDF(pc) (1446KB)(8170)       Save

    Big Data has attracted tremendous attention from all over the world nowadays.Its sheer volume,complex structure and realtime processing requirements often obsolete traditional technologies when coming to provide suffi-cient security protection.To address this challenge,significant research efforts have been carried out by the research community since recent years.Different technical aspects of big data security,including encryption algorithms,data integrity auditing,access control,secure data duplication,assured deletion,and secure search were surveyed,and in-depth discussions on their pros and cons were provided.Various future research directions were also discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Machine learning algorithm for intelligent detection of WebShell
    Hua DAI,Jing LI,Xin-dai LU,Xin SUN
    Chinese Journal of Network and Information Security    2017, 3 (4): 51-57.   DOI: 10.11959/j.issn.2096-109x.2017.00126
    Abstract2820)   HTML54)    PDF(pc) (671KB)(8078)       Save

    WebShell is a common tool for network intrusions,which has the characteristics of great harm and good concealment.The current detection method is relatively simple,and easy to be bypassed,so it is difficult to deal with complex and flexible WebShell.To solve these problems,a supervised machine learning algorithm was put forward to detect WebShell intelligently.By learning the features of existing WebShell and non-existing WebShell pages,the algorithm can make prediction of the unknown pages,and the flexibility and adaptability were both very good.Compared with the traditional WebShell detection methods,the experiment proves that the algorithm has higher detection efficiency and accuracy,and at the same time there is a certain probability to detect new types of WebShell.

    Table and Figures | Reference | Related Articles | Metrics
    Recent development and its prospect of satellite communications
    Ke-chu1 YI,Yi LI,Chen-hua SUN,Chun-guo NAN
    Journal on Communications    2015, 36 (6): 157-172.   DOI: 10.11959/j.issn.1000-436x.2015223
    Abstract1179)   HTML152)    PDF(pc) (624KB)(7906)       Save

    After analyzing the characteristics of satellite communications,the developing status of communication satellite platform,available frequency resource,as well as the related key techniques are summarized.Through introducing some typical satellite communications systems,were presented the applications and industrialization of satellite communications,and furthermore shows the bright prospects.

    Table and Figures | Reference | Related Articles | Metrics
    Research development and forecast of automatic speech recognition technologies
    Haikun WANG,Jia PAN,Cong LIU
    Telecommunications Science    2018, 34 (2): 1-11.   DOI: 10.11959/j.issn.1000-0801.2018095
    Abstract3512)   HTML493)    PDF(pc) (1267KB)(7790)       Save

    The purpose of automatic speech recognition (ASR) is to make the machine to be able to “understand” the human speech and transform it to readable text information.ASR is one of the key technologies of human machine interaction and also a hot research domain for a long time.In recent years,due to the application of deep neural networks,the use of big data and the popularity of cloud computing,ASR has made great progress and break through the threshold of application in many industries.More and more products with ASR have entered people’s daily life,such as Apple’s Siri,Amazon’s Alexa,IFLYTEK speech input method and Dingdong intelligent speaker and so on.The development status and key breakthrough technologies in recent years were introduced.Also,a forecast of ASR technologies’ trend of development was given.

    Table and Figures | Reference | Related Articles | Metrics
    Suggestions on cyber security talents cultivation
    Hui LI,Ning ZHANG
    Chinese Journal of Network and Information Security    2015, 1 (1): 18-23.   DOI: 10.11959/j.issn.2096-109x.2015.00003
    Abstract2227)   HTML63)    PDF(pc) (357KB)(7752)       Save

    Cyber security has been approved to be the first level discipline by Academic Degrees Committee of the State Council.It is important to figure out the curriculum of this new discipline and make it clear what is the differ-ence between this new discipline and existed ones.The relationship between cyber security discipline and other dis-ciplines such as information and communication engineering,computer sciences and technology,etc was analyzed.The cyber security was divided into 5 research areas,including fundamental theory,physical security,network secu-rity,system security,data and information security.Based on a given knowledge framework,the cultivation standard for master and Ph.D.students,as well as a reference curriculum of cyber security discipline was proposed.Finally,some suggestions were given for training talents of cyber security.

    Table and Figures | Reference | Related Articles | Metrics
    Malware classification method based on static multiple-feature fusion
    Bo-wen SUN,Yan-yi HUANG,Qiao-kun WEN,Bin TIAN,Peng WU,Qi LI
    Chinese Journal of Network and Information Security    2017, 3 (11): 68-76.   DOI: 10.11959/j.issn.2096-109x.2017.00217
    Abstract1719)   HTML85)    PDF(pc) (529KB)(7677)       Save

    In recent years,the amount of the malwares has tended to rise explosively.New malicious samples emerge as variability and polymorphism.By means of polymorphism,shelling and confusion,traditional ways of detecting can be avoided.On the basis of massive malicious samples,a safe and efficient method was designed to classify the mal-wares.Extracting three static features including file byte features,assembly features and PE features,as well as im-proving generalization of the model through feature fusion and ensemble learning,which realized the complementarity between the features and the classifier.The experiments show that the sample achieve a stable F1-socre (93.56%).

    Table and Figures | Reference | Related Articles | Metrics
    Network traffic classification method basing on CNN
    Yong WANG,Huiyi ZHOU,Hao FENG,Miao YE,Wenlong KE
    Journal on Communications    2018, 39 (1): 14-23.   DOI: 10.11959/j.issn.1000-436x.2018018
    Abstract2454)   HTML217)    PDF(pc) (733KB)(7206)       Save

    Since the feature selection process will directly affect the accuracy of the traffic classification based on the traditional machine learning method,a traffic classification algorithm based on convolution neural network was tailored.First,the min-max normalization method was utilized to process the traffic data and map them into gray images,which would be used as the input data of convolution neural network to realize the independent feature learning.Then,an improved structure of the classical convolution neural network was proposed,and the parameters of the feature map and the full connection layer were designed to select the optimal classification model to realize the traffic classification.The tailored method can improve the classification accuracy without the complex operation of the network traffic.A series of simulation test results with the public data sets and real data sets show that compared with the traditional classification methods,the tailored convolution neural network traffic classification method can improve the accuracy and reduce the time of classification.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(6)
    Analysis of cyberspace security based on game theory
    Jian-ming ZHU,Qin WANG
    Chinese Journal of Network and Information Security    2015, 1 (1): 43-49.   DOI: 10.11959/j.issn.2096-109x.2015.00006
    Abstract2198)   HTML73)    PDF(pc) (764KB)(7169)       Save

    Information security economics is an important research area and game theory is one of the main basic theories and tools of cyberspace security.Based on game theory,the main problems of cyberspace securing were analyzed which including network attack and defense,cryptographic protocol design,and security technology con-figuration.The conflicts between attackers and defenders as well as the dependence among defenders were mainly analyzed on network and defense.Game theory’s applications in secret sharing and secure multi-party computation were emphasized on cryptographic protocol design.The game theory’s applications in intrusion detection system and firewall technology were analyzed on security technology configuration.Finally,the limitations of current re-searches and carries on the forecast to the future research directions were pointed out.

    Table and Figures | Reference | Related Articles | Metrics
    Overview of searchable encryption research
    Ying LI, Chunguang MA
    Chinese Journal of Network and Information Security    2018, 4 (7): 13-21.   DOI: 10.11959/j.issn.2096-109x.2018062
    Abstract2130)   HTML123)    PDF(pc) (592KB)(7097)       Save

    With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Current Research and Development Trend of 5G Network Technologies
    Hucheng Wang,Hui Xu,Zhimi Cheng,Ke Wang
    Telecommunications Science    2015, 31 (9): 149-155.   DOI: 10.11959/j.issn.1000-0801.2015218
    Abstract2718)   HTML394)    PDF(pc) (1401KB)(7070)       Save

    The challenges for mobile communication network raised by new requirements in 5G were analyzed, and then the necessity of researching 5G network technologies was explained. After that, the research situation of global research organizations was introduced, such as NGMN, 5GPPP, IMT-2020 and so on, regarding 5G network technologies, moreover, the standardization status of global standards development organizations on 5G network technologies were introduced. According to the analysis on new requirements and new challenges in 5G network, and current research of 5G network technologies, the development trend of 5G network technologies was predicted and some specific network technologies for the future network were provided. At last, the development of 5G network was concluded and forecasted.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of federated learning research
    Chuanxin ZHOU, Yi SUN, Degang WANG, Huawei GE
    Chinese Journal of Network and Information Security    2021, 7 (5): 77-92.   DOI: 10.11959/j.issn.2096-109x.2021056
    Abstract5611)   HTML883)    PDF(pc) (787KB)(6858)       Save

    Federated learning has rapidly become a research hotspot in the field of security machine learning in recent years because it can train the global optimal model collaboratively without the need for multiple data source aggregation.Firstly, the federated learning framework, algorithm principle and classification were summarized.Then, the main threats and challenges it faced, were analysed indepth the comparative analysis of typical research programs in the three directions of communication efficiency, privacy and security, trust and incentive mechanism was focused on, and their advantages and disadvantages were pointed out.Finally, Combined with application of edge computing, blockchain, 5G and other emerging technologies to federated learning, its future development prospects and research hotspots was prospected.

    Table and Figures | Reference | Related Articles | Metrics
    Progress of research on privacy protection for data publication and data mining
    Jiao WANG,Ke-feng FAN,Yong WANG
    Chinese Journal of Network and Information Security    2016, 2 (1): 18-26.   DOI: 10.11959/j.issn.2096-109x.2016.00021
    Abstract1523)   HTML19)    PDF(pc) (965KB)(6803)       Save

    With the rapid development of the computer technology, there are more and more data in the society. In order to acquire knowledge from the large amounts of data, collecting and data mining is necessary. However, the privacy information will inevitably be disclosed during the process. So it is particularly important to improve the security of data and protect the useful data to avoid being disclosed. Several methods of data privacy preserving technology were analyzed when data was processed and briefly discussed the international standards which were made by JTC1 about privacy protection. According to its different application fields, the possible future research di-rections was proposed. Certain reference foundation could be provided for people who were in the field of informa-tion security.

    Reference | Related Articles | Metrics
    Survey on research of mini-drones security
    Wei LIU,Bing-wen FENG,Jian WENG
    Chinese Journal of Network and Information Security    2016, 2 (3): 39-45.   DOI: 10.11959/j.issn.2909-109x.2016.00037
    Abstract3235)   HTML58)    PDF(pc) (546KB)(6657)       Save

    With the decreasing of the manufacturing cost and the development of technology, mini-drones are spreading from military and high-end commercial areas to civilian and consumer areas, and they have attracted great interests in recent years. On the one hand, mini-drones bring convenient, and on the other hand, they face with serious security problems. The research status of mini-drones, including the security threats of mini drones, the security attacks from mini drones, the authentication and traceability of mini drones, etc were introduced and analyzed. Finally, the future development of security research in mini-drones was also prospected.

    Table and Figures | Reference | Related Articles | Metrics
    Study of Row Hammer attack
    Wenwei WANG,Peishun LIU
    Chinese Journal of Network and Information Security    2018, 4 (1): 69-75.   DOI: 10.11959/j.issn.2096-109x.2018007
    Abstract1304)   HTML37)    PDF(pc) (577KB)(6348)       Save

    The related technologies and defense methods of the current Row Hammer vulnerabilities were analyzed and summarized,and the security problems and possible precautions were pointed out.At the end,the current research work both at home and abroad is summarized.Two valuable directions for security research in the future are pointed out:Row Hammer exploit techniques and precautions in the ARM architecture,and accurate and controlled attacks on Row Hammer vulnerabilities.

    Table and Figures | Reference | Related Articles | Metrics
    Review of image classification based on deep learning
    Fu SU,Qin LV,Renze LUO
    Telecommunications Science    2019, 35 (11): 58-74.   DOI: 10.11959/j.issn.1000-0801.2019268
    Abstract3275)   HTML684)    PDF(pc) (926KB)(6281)       Save

    In recent years,deep learning performed superior in the field of computer vision to traditional machine learning technology.Indeed,image classification issue drew great attention as a prominent research topic.For traditional image classification method,huge volume of image data was of difficulty to process and the requirements for the operation accuracy and speed of image classification could not be met.However,deep learning-based image classification method broke through the bottleneck and became the mainstream method to finish these classification tasks.The research significance and current development status of image classification was introduced in detail.Also,besides the structure,advantages and limitations of the convolutional neural networks,the most important deep learning methods,such as auto-encoders,deep belief networks and deep Boltzmann machines image classification were concretely analyzed.Furthermore,the differences and performance on common datasets of these methods were compared and analyzed.In the end,the shortcomings of deep learning methods in the field of image classification and the possible future research directions were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Design and application of blockchain pattern for credit information industry
    Shuohang GUO, Ziqi SONG
    Chinese Journal of Network and Information Security    2018, 4 (4): 63-71.   DOI: 10.11959/j.issn.2096-109x.2018029
    Abstract2457)   HTML34)    PDF(pc) (1285KB)(6225)       Save

    Based on the current status of Chinese credit information system,expounding the problems arising from the traditional credit information system structure,a credit system structure based on blockchain technology and two data transaction pattern and the technical framework of the credit data trading platform was proposed,It has the characteristics of decentralization,safe and credible,collective maintenance,and untampering.And the process of data transaction were expounded.To explore the advantage of application of blockchain in the credit and information industry:promote credit data sharing,improve the quality of supervision of the credit and information industry,ensure the privacy of the information subject,effectively improve the dimension of credit information.

    Table and Figures | Reference | Related Articles | Metrics
    Kubernetes based converged cloud native infrastructure solution and key technologies
    Zhenwei HE,Danchi HUANG,Liyun YAN,Yuanzhi LIN,Xinzhang YANG
    Telecommunications Science    2020, 36 (12): 77-88.   DOI: 10.11959/j.issn.1000-0801.2020314
    Abstract771)   HTML120)    PDF(pc) (876KB)(6208)       Save

    With a wide range of applications in IT domain and CT domain of cloud native technology,cloud native infrastructure is becoming the next generation of cloud infrastructure.The mainstream technology system and its limitations of cloud native infrastructure were analyzed,a lightweight converged cloud native infrastructure and its management scheme based on kubernetes was proposed,and the key technologies and application scenarios of converged cloud native infrastructure were discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Edge computing and network slicing technology in 5G
    Hongyu XIANG,Yangwen XIAO,Xian ZHANG,Zhuying PIAO,Mugen PENG
    Telecommunications Science    2017, 33 (6): 54-63.   DOI: 10.11959/j.issn.1000-0801.2017200
    Abstract1184)   HTML74)    PDF(pc) (1109KB)(6134)       Save

    As a cost-efficient way to meet the wide range of use cases that the fifth generation wireless network will provide,network slicing and edge computing have been advocated by both academia and industry.In the concept of network slicing,the network entities are sliced into several logical networks to provide the requested services for different use cases.The edge computing pushes the frontier of computing applications,data,and services away from centralized nodes to the logical extremes of a network and even the user equipments,which can improve the traditional mobile broadband service capability,and handle with the emerging machine type service.The edge computing based radio access network slicing was proposed as a combination of edge computing and network slicing.The radio access network slicing can meet the diverse use cases and business models in 5G,and enable operators to flexibly provide personalized network services based on third-party need and network situation in a cost-efficient way.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(1)