Journal of Information Security Reserach ›› 2025, Vol. 11 ›› Issue (E2): 53-.
Previous Articles Next Articles
Online:2025-12-27
Published:2025-12-27
张春晖李剑杨榆秦素娟邹仕洪
(北京邮电大学网络空间安全学院北京100876)
通讯作者:
张春晖
硕士研究生.主要研究方向为人工智能安全、网络空间安全.
zhangchunhui@bupt.edu.cn
作者简介:张春晖
硕士研究生.主要研究方向为人工智能安全、网络空间安全.
zhangchunhui@bupt.edu.cn
李剑
博士,教授.主要研究方向为人工智能安全、网络空间安全、量子密码、区块链技术.
lijian@bupt.edu.cn
杨榆
博士,副教授.主要研究方向为人工智能安全、数字内容安全、信息隐藏和检测.
yangyu@bupt.edu.cn
秦素娟
博士,教授.主要研究方向为人工智能安全、量子密码、区块链技术.
qsujuan@bupt.edu.cn
邹仕洪
博士,副教授.主要研究方向为物联网安全、操作系统安全、区块链技术.
zoush@bupt.edu.cn
基金资助:北京邮电大学2023年教育教学改革项目(2023YB37)
[1]Altunay H C, Albayrak Z. A hybrid CNN+ LSTMbased intrusion detection system for industrial IoT networks[EBOL]. [20250901]. https:www.sciencedirect.comsciencearticlepiiS2215098622002312[2]Moussavou B M K, Park D J. Attentionbased 1D CNNBiLSTM hybrid model enhanced with fasttext word embedding for Korean voice phishing detection[EBOL]. [20250901]. https:webofscience.clarivate.cnwosalldbfullrecordWOS:001038898600001[3]Peng H, Wu C, Xiao Y,et al. A BiLSTMbased iot intrusion detection system with mutual information and focal loss[C] Proc of the 6th Int Conf on Frontier Technologies of Information and Computer (ICFTIC). Piscataway, NJ: IEEE, 2024: 16[4]Zhao J, Liu Y, Zhang Q, et al. CNNAttBiLSTM mechanism: A DDoS attack detection method based on attention mechanism and CNNBiLSTM[J]. IEEE Access, 2023, 11(7): 136308136317[5]Sangeetha J, Kumaran U,et al. Using BiLSTM structure with cascaded attention fusion model for sentiment analysis[EBOL]. [20250901]. https:xueshu.baidu.comuser centerpapershow?paperid=1q1c0ve06y0p0m20783w0vs0 mc345254&site=xueshu_se[6]Bamber S S, Katkuri A V R, Sharma S, et al. A hybrid CNNLSTM approach for intelligent cyber intrusion detection system[EBOL]. [20250901]. https:www.sciencedirect.comsciencearticleabspiiS0167404824004516[7]Yin X, Fang W, Liu Z, et al. A novel multiscale CNN and BiLSTM arbitration dense network model for lowrate DDoS attack detection[EBOL]. [20250901]. https:webofscience.clarivate.cnwosalldbfullrecordWOS:0011 79043600053 |
| [1] | . Research Progress on Detection Technologies for Network Attack Based on Large Language Model#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 16-. |
| [2] | . Smart Contract Vulnerabilities Based on Differential Evolutionary Algorithms and Solution Time Prediction Detection#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 24-. |
| [3] | . PUFbased Identity Authentication for Internet of Things Against Machine Learning Attacks in Zerotrust Architecture#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 33-. |
| [4] | . Object Removal Video Tampering Detection and Localization Based on Learnable Ptuning#br# [J]. Journal of Information Security Reserach, 2026, 12(1): 61-. |
| [5] |
.
The EU Artificial Intelligence Regulatory Sandbox System and Its Enlightenment#br#
#br#
[J]. Journal of Information Security Reserach, 2026, 12(1): 82-.
|
| [6] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 2-. |
| [7] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 8-. |
| [8] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 12-. |
| [9] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 15-. |
| [10] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 19-. |
| [11] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 25-. |
| [12] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 31-. |
| [13] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 35-. |
| [14] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 44-. |
| [15] | . [J]. Journal of Information Security Reserach, 2025, 11(E2): 48-. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||