Most Download articles

    Published in last 1 year | In last 2 years| In last 3 years| All| Most Downloaded in Recent Month| Most Downloaded in Recent Year|

    Most Downloaded in Recent Month
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Research on Critical Information Infrastructure Security Protection
    Journal of Information Security Reserach    2025, 11 (12): 1074-.  
    Abstract52)      PDF (334KB)(36)       Save
    Related Articles | Metrics
    Research on Data Space Security Under Critical Information  Infrastructure Security
    Journal of Information Security Reserach    2025, 11 (12): 1093-.  
    Abstract35)      PDF (968KB)(30)       Save
    Against the backdrop of the deepening development of the digital economy, researching the security of trustworthy data spaces is of great significance for enhancing the data protection level of critical information infrastructure and promoting the highquality development of the datafactor market. This study systematically analyzes the development status of data spaces in the United States, the European Union and Japan. Building on international experience, it focuses on industrial sectors, examining the development landscape and existing challenges of data space security in each field. The study proposes policy recommendations, including strengthening the legal and regulatory framework for data spaces, advancing breakthroughs in core technologies, fostering diverse application scenarios and market ecosystems, optimizing the supply structure, and enhancing international cooperation. These proposals aim to ensure the secure circulation of data as a production factor and to promote the highquality development of the data factor market.
    Reference | Related Articles | Metrics
    Research on Frontier Technologies for Critical Information  Infrastructure Security Protection
    Journal of Information Security Reserach    2025, 11 (12): 1075-.  
    Abstract53)      PDF (994KB)(26)       Save
    Currently, China’s critical information infrastructure (CII) faces significant threats, including statesponsored cyber attacks and supply chain disruptions. This research aims to systematically analyze the key technological frameworks and development trends in CII security protection, assess China’s current technological capabilities and core bottlenecks in this domain, and propose development strategies and implementation pathways aligned with national conditions. Focusing on key technology clusters such as dynamic active defense, intelligent analysis and response, and resilience architectures, the study explores their synergistic application mechanisms and integration points with existing policies. The study seeks to provide critical technical support and policy recommendations for enhancing the security resilience and compliance of CII.
    Reference | Related Articles | Metrics
    Research on Critical Information Infrastructure Security Protection
    Journal of Information Security Reserach    2025, 11 (11): 978-.  
    Abstract36)      PDF (325KB)(23)       Save
    Related Articles | Metrics
    Research on Security Challenges and Countermeasures for Critical  Information Infrastructure in the Artificial Intelligence Era
    Journal of Information Security Reserach    2025, 11 (12): 1087-.  
    Abstract42)      PDF (944KB)(20)       Save
    With the rapid advancement of artificial intelligence (AI) technologies, critical information infrastructure is confronting unprecedented security challenges. This paper employs systematic analysis and comparative research methods to examine the security threats faced by critical information infrastructure in the AI era, specifically focusing on structural vulnerabilities, governance lag, and dual technical risks. Drawing on the strategic practices of major economies such as the United States, the European Union, and Japan, it proposes that China should enhance AI security policy standards, establish a security risk governance framework, and strengthen security technology innovation. Through these pathways, China can build a selfreliant, secure, and reliable AIenabled critical information infrastructure system, thereby enhancing national digital security capabilities and global competitiveness.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 14-.  
    Abstract48)      PDF (999KB)(20)       Save
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 19-.  
    Abstract29)      PDF (1799KB)(20)       Save
    Reference | Related Articles | Metrics
    A Survey of Zero Trust Research
    Journal of Information Security Research    2020, 6 (7): 608-614.  
    Abstract1368)      PDF (2068KB)(1635)       Save
    With the popularization of cloud computing, mobile office and other technologies, the enterprise network structure becomes complex. The traditional network security model is based on the idea of boundary protection, which can not meet the current needs. Zero trust is a new network security model, where no distinction is made between internal and external networks and all entities need authentication and authorization before accessing resources, which can be used to protect the network whose perimeter is increasingly fuzzy. This paper gives the definition of zero trust, introduces the architecture of zero trust, analyzes the core technology of zero trust, compares and analyses several representative zero trust schemes, summarizes the development status, points out the research direction needing attention in this field, which can provide reference for the research and application of zero trust.
    Reference | Related Articles | Metrics
    Research on the Standard System of Security Protection for Critical Information Infrastructure#br#
    #br#
    Journal of Information Security Reserach    2025, 11 (11): 979-.  
    Abstract32)      PDF (947KB)(20)       Save
    As a pivotal cornerstone of the digital society, the security of critical information infrastructure directly affects economic development, social stability, national wellbeing, and national security. By analyzing the strategic significance of security protection standards for critical information infrastructure, and drawing on a study of the current landscape of domestic and international policies, this paper conducts an indepth analysis of the challenges and existing issues confronting the development of China’s security protection standard system for critical information infrastructure. In response to these problems, optimized strategies of China’s security protection standard system for critical information infrastructure are proposed from the perspectives of toplevel design, improvement of the standard system, and enhancement of effectiveness. The purpose of this paper is to refine the nation’s security protection standard system for critical information infrastructure, elevate the security protection capabilities thereof, safeguard social stability and national security, and realize sustainable development.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 5-.  
    Abstract37)      PDF (1368KB)(16)       Save
    Reference | Related Articles | Metrics
    AI and Data Privacy Protection: The Way to Federated Learning
    Journal of Information Security Research    2019, 5 (11): 961-965.  
    Abstract1390)      PDF (1395KB)(1330)       Save
    With the tremendous advance in computing, algorithms and data volume, artificial intelligence ushered in the third development climax, and began to gain a foot hold in exploring various industries. However, as the emergence of “big data”, more “small data” or “poorquality data”, and “data silos” exist in industry applications. For example, in the information security realm, it is difficult for enterprises who provide security services such as content security auditing and intrusion detection based on artificial intelligence technology to exchange raw data due to the consideration of user privacy and trade secrets protection. The services between enterprises are independent, and the overall development of cooperation and technology is difficult to make a breakthrough in a short period of time. How to promote greater cooperation on the premise of protecting the privacy of organizations? Will there be any chance for technical means to solve the data privacy protection problems? Federated Learning is an effective way to solve this problem and achieve acrossenterprise collaborative governance.
    Reference | Related Articles | Metrics
    An Overview of Application and Technology of Artificial Intelligence in Cybersecurity
    Journal of Information Security Reserach    2022, 8 (2): 110-.  
    Abstract2069)      PDF (1142KB)(1422)       Save
    Compared with the developed countries, the basic research and technology application in the field of artificial intelligence in China started later, especially the application of artificial intelligence in the important field of network security. Domestic and abroad disparity is still very obvious, which seriously affects the improvement of China's cybersecurity capability. This paper elaborates the relationship between artificial intelligence, network attack and network defense, and widely investigates the application status of artificial intelligence in major information security companies at home and abroad. It points out that APT detection, 0day vulnerability mining and cloud security are three core areas that affect the level of cybersecurity capability, This paper deeply analyzes the key technologies of artificial intelligence technology applied in these three fields, and puts forward the safety risks of artificial intelligence technology, and points out that artificial intelligence technology is not a panacea for all diseases, This Paper provides a scientific reference for the further research and application of artificial intelligence technology in China's information security industry.
    Reference | Related Articles | Metrics
    Research on Talent Cultivation for Critical Information Infrastructure  Security Protection
    Journal of Information Security Reserach    2025, 11 (12): 1081-.  
    Abstract34)      PDF (922KB)(14)       Save
    As the digital wave sweeps across the globe, the security of critical information infrastructure has become central to national cybersecurity strategies. Cultivating a highcaliber talent pool capable of protecting these core facilities from cyber attacks has therefore become particularly crucial. By examining international practical experience in training professionals for the security protection of critical information infrastructure systems, and considering the current status and challenges of talent development in this field in China, this paper proposes recommendations to strengthen the foundation, address existing challenges, and optimize talent development. These suggestions aim to support and guide the development and training of professionals responsible for securing China’s critical information infrastructure.
    Reference | Related Articles | Metrics
    An Access Control Model Based on Data Classification and Grading  System for Education Cloud Platform
    Journal of Information Security Reserach    2022, 8 (4): 400-.  
    Abstract243)      PDF (2511KB)(261)       Save
    The education cloud platform is one of the key infrastructures for education digitization construction. It unifies business data from different departments and organizations to eliminate information silos and reduce the redundant construction of information systems. However, although the education cloud platform realizes data sharing, it also seriously influences the security of data resources because of its open and dynamic characteristics. Considering the data management and control of the education cloud platform, this paper proposes an access control model based on data classification and grading system. The model comprehensively considers the security factors such as data class, security grade, life cycle and sensitive level, and tags the data from multidimension views. The secure tag is integrated with the rolebased access control policy to construct a twostage authorization model of coarsegrained filtering and finegrained control for managing data. The prototype system proves that the proposed model can restrict data sharing and prevent users from overprivileged manipulation.Key wordscloud platform; data security; access control model; data classification and grading; secure tag; RBAC
    Reference | Related Articles | Metrics
    A Federated Learning Privacy Protection Method for Multikey Homomorphic  Encryption in the Internet of Things
    Journal of Information Security Reserach    2024, 10 (10): 958-.  
    Abstract615)      PDF (1704KB)(237)       Save
    With federated learning, multiple distributed IoT devices can jointly train a global model by updating the transmission model without leaking raw data. However, federated learning systems are susceptible to model inference attacks, resulting in compromised system robustness and data privacy. A federated learning privacy protection method for multikey homomorphic encryption in the Internet of Things is proposed to address the issues of existing federated learning solutions being unable to protect the confidentiality of shared gradients and resisting collusion attacks initiated by clients and servers. This method utilizes multikey homomorphic encryption to achieve gradient update confidentiality protection. Firstly, by using proxy reencryption technology, the ciphertext under different public keys is converted into encrypted data under the public key, ensuring that the cloud server can decrypt the gradient ciphertext. Then, IoT devices use their own public key and random secret factor to encrypt local gradient data, which can resist collusion attacks initiated by malicious devices and servers. Secondly, an identity authentication method based on hybrid cryptography was designed to achieve realtime verification of the identities of participants in federated modeling. In addition, in order to further reduce client computing costs, some decryption calculations are coordinated with trusted servers for computation, and users only need a small amount of computation. A comprehensive analysis was conducted on the proposed solution to evaluate its safety and efficiency. The results indicate that the proposed scheme meets the expected security requirements. Experimental simulation shows that compared to existing schemes, this scheme has lower computational overhead and can achieve faster and more accurate model training.
    Reference | Related Articles | Metrics
    Private Set Intersection Cardinality Protocol for Supporting Set  Dynamic Updating
    Journal of Information Security Reserach    2025, 11 (12): 1099-.  
    Abstract27)      PDF (1322KB)(13)       Save
    The private set intersection cardinality (PSICA) enables each participant to obtain only the intersection size while keeping other information private. For instance, when it comes to measuring the ad conversion rates, the number of ad viewers on the ad platform is much smaller than the number of service subscribers of the service provider, and the set owned by the service provider is constantly changing. However, the majority of the existing PSICA protocols do not suppport the dynamic updating of sets. To this end, this paper proposes a PSICA protocol based on switched encryption and dynamic Bloom filters for nonequilibrium scenarios and supports dynamic updating of ensembles. The security proof shows that the protocol can be proven to be secure under the random oracle model. The performance analysis and simulation experimental results indicate that the protocol is able to achieve the intersection base computation with acceptable overhead and the misclassification rate of the dynamic Bloom filter is maintained at a low level. 
    Reference | Related Articles | Metrics
    Insider Threat Detection Model Based on SSIMGAN and  Time Series Transformer
    Journal of Information Security Reserach    2025, 11 (12): 1108-.  
    Abstract33)      PDF (2431KB)(12)       Save
    Insider threat detection is a critical component of information security, aiming to protect enterprise networks and data security by preventing damage caused by insider misconduct. This paper proposes a novel insider threat detection framework based on the CERT4.2 dataset. First, we construct multivariate timeseries data and design a structural similarity indexdriven auxiliary classifier generative adversarial network (SSIMACGAN) to augment threat data across different scenarios. This approach addresses the class imbalance issue in the CERT4.2 dataset by generating synthetic samples that closely match the original data distribution. Subsequently, a time series Transformer model with Focal Loss is adopted for classification tasks, enabling the model to prioritize hardtoclassify and minorityclass samples. Precision, recall, and F1score are used as evaluation metrics. Experimental results show that our method achieves a recall of 96.22% and F1score of 94.22% on the CERT4.2 dataset, outperforming baseline models. These results validate its effectiveness in mitigating data imbalance and reducing false negative rates.
    Reference | Related Articles | Metrics
    Fileless Obfuscation Attack Recognition Based on Semantic Recovery and  Large Language Model
    Journal of Information Security Reserach    2025, 11 (12): 1125-.  
    Abstract31)      PDF (1478KB)(11)       Save
    With the continuous advancement of fileless attack techniques and strategies, research on identifying fileless malicious attack has garnered significant attention. Among these, fileless obfuscation attack, as a new type of covert, dynamic, and complex attack, can rapidly bypass existing attack engines and rulebased frameworks. To address this problem, this paper proposes an attack script restoration method guided by dynamic partial execution and semantic analysis tree guidance, enabling the restoration of obfuscated code. Furthermore, leveraging the efficiency of large models in attack understanding and semantic recognition, we integrate large models to achieve efficient identification and classification of fileless code. To further alleviate the limitations of large models in handling large code files and long passages, we also provide a semantic code compression strategy to retain critical attack semantics. Experimental results demonstrate that our proposed semantic restoration and large model identification methods can enhance effectiveness by around 10% compared to existing models and methods, while maintaining efficient attack identification efficiency.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2023, 9 (E2): 53-.  
    Abstract181)      PDF (1403KB)(156)       Save
    Reference | Related Articles | Metrics
    Reentrancy Vulnerability Detection Method in Smart Contracts #br# Based on Hybrid Model and Attention Mechanism#br#
    Journal of Information Security Reserach    2024, 10 (11): 1056-.  
    Abstract128)      PDF (2021KB)(70)       Save
    Addressing the challenges of low efficiency and accuracy in reentrancy vulnerability detection by traditional smart contract vulnerability detection tools and single deep learning models, this paper proposes a reentrancy vulnerability detection method based on hybrid model and attention mechanism (CNNBiLSTMATT). Firstly, data processing is performed using the Word2vec model to obtain feature vectors. Secondly, these vectors undergo processing through a combination of convolutional neural network (CNN) and bidirectional long shortterm memory (BiLSTM) networks to extract features. The attention mechanism then assigns weights to highlight key features. Finally, a fully connected layer and Softmax classifier are utilized to classify the generated results, enabling reentrancy vulnerability detection in smart contracts. The experimental results demonstrate that compared with the traditional tools and deep learning methods, the method based on CNNBiLSTMATT proposed in this paper has been greatly improved in reentrant vulnerability detection. The accuracy, precision, recall rate and F1 value reached 92.53%, 93.27%, 91.73% and 92.5% respectively, confirming the effectiveness of the proposed method.
    Reference | Related Articles | Metrics
    The Research of the Organizational Management Systems in Security Protection for Critical Information Infrastructure#br#
    Journal of Information Security Reserach    2025, 11 (11): 993-.  
    Abstract27)      PDF (946KB)(10)       Save
    In recent years, cyberattacks targeting national critical information infrastructure systems have increased rapidly, intensifying the security situation increasingly severe. Cyberattacks exploiting vulnerabilities in weak defense systems have become a major threat to the security protection of critical information infrastructure. Under the increasingly complex cyberattack environment, building a coordinated defense mechanism has become especially important. This paper analyzes the evolution and progress of organizational management in the area of critical information infrastructure security both domestically and internationally, and proposes a series of improvement measures. These efforts aim to provide reference for the future development of organizational management systems in coordinated security protection for critical information infrastructure.
    Reference | Related Articles | Metrics
    Research on Blockchainbased Trusted Manufacturing Traceability System
    Journal of Information Security Reserach    2025, 11 (11): 1020-.  
    Abstract24)      PDF (1823KB)(10)       Save
    In view of the issues encountered in product tracking and traceability during the manufacturing process—such as data dispersion, opaque information, susceptibility to tampering, and the lack of trust—this paper proposes a construction method for a trustworthy manufacturing traceability system based on blockchain. First, the system architecture and its key functions are designed, and the system workflow is clearly specified. A production transaction control model based on smart contracts is developed to facilitate interactions between users and producers as well as to control the business processes among different production nodes. Using Cuckoo filters as a priori conditions, an onchain and offchain data storage and retrieval algorithm based on Cuckoo filters and Merkle trees is established to achieve efficient traceability process retrieval. This method stores key information onchain while storing raw data in an offchain database. Finally, system performance is evaluated on a Hyperledger Fabric blockchain network. The results indicate that the retrieval algorithm based on Cuckoo filters and Merkle trees improves system throughput and resource utilization efficiency, while also reducing transaction latency.
    Reference | Related Articles | Metrics
    Comparative Analysis and Countermeasures of Domestic and Foreign Laws and Regulations on Artificial Intelligence#br#
    Journal of Information Security Reserach    2025, 11 (11): 1048-.  
    Abstract30)      PDF (1119KB)(10)       Save
    In recent years, AI (artificial intelligence) technology has developed rapidly. As one of the core driving forces, AI algorithms have gradually shown great potential and influence in many fields, such as medical care and finance. However, while algorithmic technology brings innovation and convenience, it also raises a series of complex legal and ethical issues. In response to these  concerns, governments have introduced relevant laws and regulations to regulate the development and application of algorithms, and safeguard the public interest and social order. However, the current domestic and foreign laws and regulations show the characteristics of decentralization and fragmentation, lack of systematic and comprehensive analysis, which not only increases the difficulty of enterprises in algorithm compliance, but also affects the healthy and orderly development of algorithm technology. Therefore, this paper systematically and comprehensively analyzes the basic framework and characteristics of China’s AI regulations, and further compares the algorithm governance with relevant foreign regulations. The advantages and disadvantages are summarized to put forward targeted countermeasures and suggestions, which provides valuable practical reference for policy makers and enterprise managers, and jointly promotes the development and application of China’s AI technologies.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 43-.  
    Abstract26)      PDF (529KB)(10)       Save
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 109-.  
    Abstract28)      PDF (770KB)(10)       Save
    Reference | Related Articles | Metrics
    Research on Software Reliability Engineering Integrated Application Modeling Technology
    Journal of Information Security Research    2018, 4 (11): 1002-1010.  
    Abstract139)      PDF (2236KB)(320)       Save
    tSoftware reliability engineering, as a technology to ensure and improve software reliability, plays an important role in software development. But because of software reliability engineering activities is put in bigger difference, the purpose and process in engineering practice to the software reliability engineering technology organically unifies in together, and it's easy to have a software reliability engineering process from the situation of the software development process, seriously affected the application and promotion of software reliability engineering. This article through to the software reliability engineering activities and the development process, and the reliability engineering activity data analysis of the interactive relationship between data-driven software reliability engineering process model is put forward, the model in the form of a workflow implementation information interaction between the software reliability engineering activities, realize the whole process of the software reliability engineering of software development technical support, reliability is conducive to the realization of the software reliability engineering integrated environment.
    Reference | Related Articles | Metrics
    Flow Anomaly Detection Based on Hierarchical Clustering Method
    Journal of Information Security Research    2020, 6 (6): 0-0.  
    Abstract1168)      PDF (1784KB)(673)       Save
    With the advent of the big data era, the attacks in network traffic are rising dramatically. Detecting malicious traffic through abnormal flow detection is vital. Nowadays, the equipment of abnormal flow detection used in industry mainly adopts statistical analysis method or simple machine learning method. However, the amount of flow data and redundant data is large. The precision rate is low and the false alarm rate is high. In order to solve these problems, this paper presents a new method to detect flow anomalies based on hierarchical clustering in data processing. This method first uses the hierarchical clustering algorithm to achieve the purpose of data reduction. Then based on seven different machine learning algorithms, an abnormal traffic model based on hierarchical clustering is constructed. The experimental results show that this method can detect the abnormal behavior on the DARPA dataset with a precision rate of 99% and a recall rate of 99%. At the same time, while maintaining the precision rate of 90%, the data reduction can be up to 47.58%, which greatly improves the detection efficiency.
    Related Articles | Metrics
    Highorder Program Driven by Large Language Model
    Journal of Information Security Reserach    2025, 11 (11): 1008-.  
    Abstract25)      PDF (2871KB)(9)       Save
    Large language models (LLMs) often exhibit hallucinations in various occasions, leading to unreliable inferences. Such vulnerabilities render it  critical for LLMs to be adopted cautiously in vertical domains such as financial, medical, and cybersecurity domains. In preLLM era, humans have accumulated the best practices to ensure reliabilities of complicated tasks through careful engineering. Standard operating procedures (SOP) and Check List are the exemplars of these best practices. Likewise, in LLM era, we propose highorder program (HOP)to achieve the reliability breakthroughs. By fusing both accurate execution of traditional programing languages, and superior knowledge intrinsics of LLMs, HOP sets the backbone of the control system required by vertical LLM applications. HOP achieves automations by leveraging key vertical knowledge and practices. More importantly, it delivers expected reliability through verifications. HOP itself can be autogenerated by LLMs, which further incentivizes its wide adoptions. Lately, we have applied HOP in different scenarios including fulllifecycle financial risk management in cryptographic computing settings, duplicate charges in medical diagnosis, and intrusion detection. HOP has achieved 5 to 10 folds of efficiency improvement, and an accuracy as good as 99% across aforementioned scenarios.
    Reference | Related Articles | Metrics
    Research on the Risk Assessment System for Data Security in the Transportation Industry#br#
    Journal of Information Security Reserach    2025, 11 (11): 1064-.  
    Abstract28)      PDF (5683KB)(10)       Save
    The transportation information system is not only a critical component of the national key information infrastructure, but also an important industry of the 2+8+N system, in which is crucial to the nation’s economy and people’s livelihood. With the continuous advancement of smart transportation construction, the volume of traffic data is growing rapidly. The position of data as a production factor highlights its importance and value, and also induces higher demands for data security. The transportation industry pays close attention to data security, and based on national policies, laws, regulations, and standards, the competent transportation authorities have issued a series of industry standards and regulations to guide the security of transportation data. However, the transportation industry covers a wide range of business areas, and its data has characteristics such as multisource, heterogeneity, partiality, spatiotemporal correlation, asynchronicity, information sparsity, and concurrency. Moreover, the data has a high degree of mobility, and the operational conditions and flow are complex, making data surveillance a large range and great difficulty, which brings a series of challenges to the protection of data security. Based on existing laws, regulations, and standards, and deeply integrating the characteristics of transportation industry data, this research on the data security risk assessment system provides a reference for the construction of transportation data security protection.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 139-.  
    Abstract26)      PDF (945KB)(9)       Save
    Reference | Related Articles | Metrics
    Unified Authority Management Scheme in Zero Trust Architecture 
    Journal of Information Security Reserach    2021, 7 (11): 1047-.  
    Abstract488)      PDF (1922KB)(406)       Save
    Zero trust security architecture is subverting people's perception of enterprise security. Its main point is "continuous verification, never trust", which makes more requirements for the subject, object and time of authentication and authorization. This paper mainly discusses how to quickly achieve unified authority management and control under the background of zero trust from the perspective of authority management. Through the investigation and analysis of many enterprises, functional authority and data authority are the most common dimensions of authority management in enterprises. Based on this, we can design a set of universal and highly flexible unified authority platform, which is used to centrally manage the authority data of each enterprise information system, realize the efficient control of authority under the zero trust architecture, and ensure the data security and business security
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2024, 10 (E2): 105-.  
    Abstract679)      PDF (929KB)(360)       Save
    Reference | Related Articles | Metrics
    A Trust Framework for Large Language Model Application
    Journal of Information Security Reserach    2024, 10 (12): 1153-.  
    Abstract335)      PDF (1420KB)(220)       Save
    The emergence of large language model has greatly propelled the rapid application of artificial intelligence across various domains. In practice, however, there are a series of security and trust challenges in the applications of large language models caused by “model hallucinations”. These challenges make it difficult for practical applications to trust and adopt the results returned by the large language models, especially in securityrelated application domains. In many professional fields, we find that there lacks a unified technical framework to ensure the trustworthiness of results returned by large language models, which seriously hinders the application of largescale model technology in professional fields. To address this issue, a largescale model trusted application framework DKCF, integrating sufficient data (D), expertise knowledge (K), intellectual collaboration (C), and efficient feedback (F), is proposed. This framework is developed based on our practical applications in professional fields such as finance, healthcare, and security. We believe that DKCF can shed light on secure and reliable applications of large language models, and facilitate the intellectual revolution across various professional domains.
    Reference | Related Articles | Metrics
    Multiparty Data Security Sharing Scheme Based on Decentralized Verification
    Journal of Information Security Reserach    2025, 11 (6): 578-.  
    Abstract157)      PDF (4817KB)(58)       Save
    With the development of the Internet of Things, collaborative work between multiple devices is becoming increasingly common. However, in the process of data sharing, user privacy may face the risk of data theft and tampering. Existing FL methods rely on mobile edge computing (MEC) servers for model aggregation, and have problems with trust, security threats, and single points of failure. To solve these problems, a new multiparty data sharing scheme based on blockchain is proposed, in which a decentralized verification mechanism and a consensus mechanism inspired by proof of stake (PoS) are introduced. The decentralized verification mechanism ensures the legitimacy of each local model update by evaluating node behavior and voting, and only legitimate updates are used for global model building. In the process of model construction, homomorphic encryption and key sharing techniques are used to encrypt the local model parameters to ensure the security integrity of model parameters in the process of transmission and aggregation. The PoS consensus mechanism rewards honest behavior devices, increasing their chances of becoming block generators. In addition, the cache mechanism of information search is introduced to reduce the number of multiparty search. The data sharing scheme has been verified to enhance data security.
    Reference | Related Articles | Metrics
    USB Device Access Control Policy Based on Attributebased  RBAC Mixed Extension
    Journal of Information Security Reserach    2025, 11 (12): 1146-.  
    Abstract25)      PDF (2108KB)(8)       Save
    Aiming at the hot issue of USB (universal serial bus) device security defense, this paper explores access control methodologies. It proposes a mixed extention access control model of Attributebased RBAC (rolebased access control). Then based on the model, this paper designs and implements an access control system for USB device by combining authentication and control. This experiment verifies the feasibility of the model and its access control system. The results show that this system could solve the problems of coarsegrained and static allocation in traditional USB device access control.
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E1): 177-.  
    Abstract23)      PDF (2475KB)(8)       Save
    Reference | Related Articles | Metrics
    Journal of Information Security Reserach    2025, 11 (E2): 193-.  
    Abstract2)      PDF (758KB)(8)       Save
    Related Articles | Metrics
    SM3 Cryptographic Hash Algorithm
    Journal of Information Security Research    2016, 2 (11): 983-994.  
    Abstract1451)      PDF (8502KB)(900)       Save
    The cryptographic hash functions play an important role in modern cryptography. They are used to compress messages of arbitrary length to fixed length hash values. The most common cryptographic applications of hash functions are with digital signature and for data integrity. SM3 cryptographic hash algorithm is issued as the industry standard in 2012. In 2016, it was published as national standard. It takes a 512bit message as input and outputs a 256bit hash value. This paper summarizes the design, properties, software and hardware implementations and cryptanalysis of SM3 cryptographic hash algorithm. Furthermore, we compare SM3 with other hash standards.
    Reference | Related Articles | Metrics
    TOPSEC, Leading Brand of Independent Innovation, Supporting Cyberspace Power Strategy
    Journal of Information Security Research    2018, 4 (9): 774-782.  
    Abstract180)      PDF (1579KB)(884)       Save
    Related Articles | Metrics
    Research on Physical Layer Security of CRNOMA System Based on  DC Programming
    Journal of Information Security Reserach    2025, 11 (3): 275-.  
    Abstract113)      PDF (1559KB)(39)       Save
    A physical layer security scheme for CRNOMA systems based on DC(difference of convex) function planning is proposed to address the communication security issues caused by the openness of CRNOMA systems. In the NOMA(nonorthogonal multiple access) communication scenario, construct a multiuser eavesdropping channel model derive the security and rate expressions for the CRNOMA system; And design a DCbased carrier power allocation algorithm to solve the optimal solution for subchannel power allocation and improve the security of system subcarriers. The simulation results show that without increasing the power of the base station, its SSR is improved by 35% and 10%, respectively, compared to OFDMA and NOMA; Under the same SSR, the maximum number of users can increase by 200%. Verified that the scheme can effectively enhance the physical layer security of the system.
    Reference | Related Articles | Metrics