Toggle navigation
Home
About
About Journal
Editorial Board
Author Center
Current Issue
Just Accepted
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
E-mail Alert
RSS
Reader Center
Online Submission
Manuscript Tracking
Instruction
Download
Review Center
Peer Review
Office Work
Editor-in-Chief
Subscription
Contact Us
中文
Author Center
Online Submission
Instruction
Template
Copyright Agreement
Review Center
Peer Review
Editor Work
Editor-in-Chief
Office Work
Current Issue
2026 Issue 1 (Issue 0)
Publication Date
10 January 2026
Cover Story:
Internet Public Opinion Event Detection Based on the...
At present, the Internet has become an important place for public opinion, and major events of Internet public opinion have an increasingly
...More
Current Issue
Archive
Most Read
Most Download
Most Cited
10 January 2026, Volume 12 Issue 1
Previous Issue
Review of Secure Containers Based on System Call Isolation#br#
#br#
2026, 12(1): 2.
Asbtract
(
)
PDF
(2062KB) (
)
References
|
Related Articles
|
Metrics
This article elucidates the research progress in enhancing container security through the isolation of system calls. The article firstly outlines the development background of containerization technology and its major security challenges. Subsequently, an indepth analysis is conducted on the role of system call isolation in enhancing the security of containers, including the techniques of limiting the system calls of containerized applications to reduce the attack surface, and leveraging operating system middleware and hardware protection mechanisms to accomplish the isolation and protection of containers. By comparing the implementation principles, performance, and their effects on isolation, reduction of attack surfaces, and data protection, the article reveals the advantages and limitations of system call isolation technologies in enhancing container security.
Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br#
2026, 12(1): 16.
Asbtract
(
)
PDF
(1439KB) (
)
References
|
Related Articles
|
Metrics
Large language model (LLM), with its powerful feature learning ability, the ability to recognize complex patterns, and generalization ability, has paved the way for innovative and powerful methods in network attack detection. Firstly, this paper elaborates on the technical advantages of LLM in network attack detection and proposes a corresponding technical framework. Then, drawing on existing literature, the application status of LLM in network attack detection is reviewed from three aspects: processing original security data, extracting threat features, correlation analysis, and identifying threats in the target environment. Furthermore, the problems and challenges associated with network threat detection using LLM are analyzed. Lastly, the paper outlines the future research directions for network attack detection technology leveraging LLM. This paper aims to provide references for the further development of network attack detection technology based on LLM in the field of network security.
Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br#
2026, 12(1): 24.
Asbtract
(
)
PDF
(2331KB) (
)
References
|
Related Articles
|
Metrics
Aiming at the problems of inefficient exploration, nonguided test case generation, and poor constraintsolving tenacity in current hybrid fuzzy testing frameworks for smart contracts, this paper proposes an improved hybrid fuzzy detection framework DEST.The model integrates the advantages of fuzzy testing and symbolic execution methods to efficiently detect smart contracts, incorporates the differential evolution (DE) algorithm to optimize the quality of test cases and global search capability, and learns SMT script features through LSTM framework to predict the solving time. The DEST model uses the differential evolutionary (DE) algorithm to optimize the quality of test cases and global search capability, and learns SMT script features through LSTM framework to predict the solving time,thereby improving the solving efficiency of symbolic execution. Experiments show that the DEST model improves vulnerability detection by 9.42% and average code coverage by 3.6% over the stateoftheart benchmark model.
PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br#
2026, 12(1): 33.
Asbtract
(
)
PDF
(2690KB) (
)
References
|
Related Articles
|
Metrics
To enable scalable IoT systems, edge computing, as a new decentralized model, is introduced into IoT scenarios. Zero trust architecture (ZTA) is wellsuited for cloudedgeend systems with blurred boundaries, offering continuous dynamic authentication and improved security. Due to their lightweight and unclonable properties, physical unclonable functions (PUFs) are often used to generate hardware fingerprint identities for devices. PUFs exploit inherent randomness introduced during hardware fabrication processes to generate unique and nonpredictable challengeresponse pairs. If an attacker collects many plaintext CRPs during continuous authentication, he may model and predict future responses, enabling machine learning attacks. This paper proposes a PUFbased authentication solution (PAMLCA). It enhances privacy protection against machine learning attacks by leveraging oblivious pseudorandom function techniques to obfuscate CRP transmission. The solution combines static and continuous multilayer dynamic verification protocols, limiting implicit trust domains within a session. Security analysis and performance comparisons demonstrate that PAMLCA offers better security, functionality, communication, and computational efficiency compared to other related solutions.
Feedbackbased Quantum Key Dynamic Adjustment Scheme for Power System
2026, 12(1): 43.
Asbtract
(
)
PDF
(2353KB) (
)
References
|
Related Articles
|
Metrics
The power system features numerous nodes and heavy traffic. Current quantum key distribution have insufficient key generation rates to meet the encryption requirements of power system services. This paper proposes a dynamic feedbackbased quantum key adjustment scheme to address the security challenges in power system under limited quantum key resources in crossdomain key pools. The scheme consists of two phases, corresponding to the dynamic adjustment of key pool input and output. The feedback mechanism is applied to maintain equilibrium. During the dynamic adjustment of input, realtime selection and optimization of quantum key distribution protocols are carried out based on environmental factors to improve the realtime input rate of quantum keys. During the dynamic adjustment of output, the allocation and utilization of quantum key resources are settled to maximize the overall security level of data within the sampling time. Feedback on data security is reported to the input phase to ensure that the encryption can reach the predetermined lower limit of overall security level. Experimental results show that the proposed scheme achieves an average gain of 12.59% in overall service security under highsecurityrisk conditions, outperforming conventional methods.
Research and Application of General Testbed for Heterogeneous and Multimodal Blockchain#br#
2026, 12(1): 51.
Asbtract
(
)
PDF
(2826KB) (
)
References
|
Related Articles
|
Metrics
In the current era of digital economy, where globalization and informatization are deeply integrated, blockchain technology due to its inherent features of decentralization, immutability, and transparency has offered innovative solutions for secure data storage, value transfer, and trust building. Given the system complexity brought about by the distributed and decentralized nature of blockchain systems, conducting effectiveness tests is of particular importance. Taking this as a starting point, this research deeply analyzes blockchain technology and existing testing tools at home and abroad, and constructs a universal testing platform for heterogeneous and multimodal blockchain systems, with a focus on technical dimensions such as compatibility, universality, scalability, stability, reliability, and security. The aim is to promote research, facilitate product development, and enable realworld applications through testing, thereby accelerating the pace of innovation in blockchain technology.
Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br#
2026, 12(1): 61.
Asbtract
(
)
PDF
(2050KB) (
)
References
|
Related Articles
|
Metrics
With the continuous advancement of artificial intelligence and big data technologies, the threshold for making fake videos has been significantly reduced. Therefore, identifying whether a video has been tampered with is crucial for ensuring the authenticity and credibility of the information. Current mainstream video forgery detection methods rely on convolutional neural networks, which exhibit limited capability in capturing temporal dependencies and lack comprehensive understanding of global temporal patterns. To address this issue, this paper proposes a learnable Ptuning based method for video object removal tamper detection and localization. Firstly, the prior knowledge of the pretrained model is fully mined by learnable Ptuning, and multiview features such as spatial, temporal and highfrequency are efficiently extracted. Secondly, a multiscale feature interaction module is proposed to accurately capture the tampering traces from finegrained to coarsegrained through multiscale convolution operation and twostep decomposition strategy. Furthermore, a multiview fusion attention module is designed to significantly enhance the information sharing and fusion ability among multiview features via the crossview interaction mechanism. Experimental results demonstrate that the proposed method outperforms existing detection methods in both the time domain and the spatial domain.
Copyright Open Licensing Rules and Their Implementation Paths in Data Training
2026, 12(1): 68.
Asbtract
(
)
PDF
(1135KB) (
)
References
|
Related Articles
|
Metrics
The reliance of generative artificial intelligence training on massive volumes of copyrighted works has given rise to increasingly significant risks of copyright infringement. Jurisdictions such as the European Union, the United States, and Japan have introduced regulatory responses, including innovative rules on text and data mining exceptions. Although allowing the use of copyrighted works for data training has become a general theoretical consensus in China, there remains considerable controversy over the specific pathways to compliance. This article argues for the establishment of a copyright open licensing mechanism for data training, replacing individualized authorization with voluntary public declarations, and incentivizing right holders’ participation through fair benefit allocation and transparent regulatory safeguards. This approach aims to strike a dynamic balance between technological innovation and copyright protection. Given the automatic protection and vast quantity of copyrighted works, the legal effect of publicity of open licensing declarations should be expressly recognized to protect bona fide thirdparty reliance. Additionally, right holders should be permitted to grant collective licenses for series or sets of works to better accommodate the dataintensive utilization demands in the era of artificial intelligence.
Legal Regulation of Facial Recognition Applications from the Perspective of a Lawbased Government#br#
2026, 12(1): 75.
Asbtract
(
)
PDF
(979KB) (
)
References
|
Related Articles
|
Metrics
The use of facial recognition by administrative organs has special characteristics in terms of the source of usage permissions, usage purposes, usage methods, etc., which puts forward a practical need for differentiated norms for the use of facial recognition by administrative organs. However, at present, there is no special regulation on the personal information processing behavior of administrative organs in China, and the relevant legal provisions are relatively rough and vague. Therefore, in response to the existing problems and based on the requirements of building a rule of law government, it is proposed to choose an appropriate legal regulatory model, restrict facial recognition application subjects through prior approval, grant facial recognition application permissions in stages, facilitate participation in supervision channels and improve information transparency, and carry out differentiated accountability for different types of administrative actions, so as to achieve the legalization of the institutions, functions, authorities, procedures, and responsibilities of administrative agencies using facial recognition.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
2026, 12(1): 82.
Asbtract
(
)
PDF
(1138KB) (
)
References
|
Related Articles
|
Metrics
In order to cope with the potential risks and regulatory challenges brought by the rapid development of artificial intelligence technology, exploring how to stimulate technological innovation while ensuring public safety has become the core topic in the current reform of regulatory systems. This paper proposes an institutional analysis method to systematically analyze the balancing role of the EU’s artificial regulatory sandbox system in promoting technological innovation and ensuring public safety. The research findings reveal that although the system has the positive significance of reducing the risk cost of enterprises and improving the effectiveness of supervision, it also has the problems of limited application scenarios, limited scope of liability exemption and the emergence of power rentseeking in the access process. Based on the experience of the EU, China can advance the exploration of the artificial intelligence regulatory sandbox system in the following aspects: coordinating technological innovation and public safety, and establishing a centrallocal coordinated regulatory agency; optimizing the application, evaluation, testing, reporting and exit process; improving consumers’ risk tolerance, and safeguarding their rights to know and to be compensated; and through the establishment of regulatory chat rooms and institutional incentives to promote the effective implementation of the system.
A Survey on the Application of LSTM in Malicious Code Detection
2026, 12(1): 89.
Asbtract
(
)
PDF
(9291KB) (
)
References
|
Related Articles
|
Metrics
With the continuous evolution of hacking technology, the iterative upgrades of malicious code variants have been acclerating and the number of malicious codes has exploded. How to rapidly and accurately detect malicious code has become a challenging research hotspot in the realm of cybersecurity. The unique gating mechanism of long shortterm memory network (LSTM) can selectively retain important historical information. Moreover, it demonstrates excellent performance for the sequential dependence of data on time series, which can effectively solve the problem of gradient vanishing or gradient explosion that may occur when traditional RNNs deal with such problems. This distinctive sequential processing capability of LSTM is particularly important for malware detection, thus learning to its extensive application in this area. This paper comprehensively sorts out and summarizes the application of LSTM in malicious code detection from five aspects, including the detection method of malicious code, the basic model and variants of LSTM, the application of LSTM in malicious code detection, the performance analysis of LSTM in malicious code detection, and the future development direction of LSTM in the field of malicious code detection, aiming to facilitating further research and improvement of existing methods for malicious code detection.
Previous Issue
NianQi Search
Kdywords Search
Announcement
aadfas vcvsda fsd fa
2021-03-15
Air Clearance Calculation and Compacting Layout Design of Valve Hall in Converter Station of VSC-HVDC Grid with High Voltage and Large Capacity
2021-03-15
Application and optimization of intelligent heating in distribute gas heating systems
2021-03-15
aadfas vcvsda fsd fa fdas fdas fdsa fdas fdsa fds afads dsa fsd fsda
2021-03-15
More>>
Special Report
Application and optimization of intelligent h...
More>>
Expert Viewpoint
Air Clearance Calculation and Compacting Layo...
More>>
Academic Dynamic
Air Clearance Calculation and Compacting Layo...
More>>
Links
More>>