Skip to main content

Articles

Page 1 of 5

  1. Smart contracts have significant losses due to various types of vulnerabilities. However, traditional vulnerability detection methods rely extensively on expert rules, resulting in low detection accuracy and p...

    Authors: Jingjie Xu, Ting Wang, Mingqi Lv, Tieming Chen, Tiantian Zhu and Baiyang Ji
    Citation: Cybersecurity 2024 7:55
  2. SM9 was established in 2016 as a Chinese official identity-based cryptographic (IBC) standard, and became an ISO standard in 2021. It is well-known that IBC is suitable for Internet of Things (IoT) application...

    Authors: Wenhan Xu, Hui Ma and Rui Zhang
    Citation: Cybersecurity 2024 7:29
  3. The differential privacy (DP) literature often centers on meeting privacy constraints by introducing noise to the query, typically using a pre-specified parametric distribution model with one or two degrees of...

    Authors: Sachin Kadam, Anna Scaglione, Nikhil Ravi, Sean Peisert, Brent Lunghino and Aram Shumavon
    Citation: Cybersecurity 2024 7:54
  4. The processing of personal data gives a rise to many privacy concerns, and one of them is to ensure the transparency of data processing to end users. Usually this information is communicated to them using priv...

    Authors: Mikhail Kuznetsov, Evgenia Novikova and Igor Kotenko
    Citation: Cybersecurity 2024 7:41
  5. The Internet of Things (IoT) has gained popularity and is widely used in modern society. The growth in the sizes of IoT networks with more internet-connected devices has led to concerns regarding privacy and s...

    Authors: Chenset Kim, Chakchai So-In, Yanika Kongsorot and Phet Aimtongkham
    Citation: Cybersecurity 2024 7:27
  6. The group fuzzy extractor allows group users to extract and reproduce group cryptographic keys from their individual non-uniform random sources. It can be easily used in group-oriented cryptographic applicatio...

    Authors: Kaini Chen, Peisong Shen, Kewei Lv, Xue Tian and Chi Chen
    Citation: Cybersecurity 2024 7:25
  7. Text-to-image (TTI) models provide huge innovation ability for many industries, while the content security triggered by them has also attracted wide attention. Considerable research has focused on content secu...

    Authors: Juntao He, Haoran Dai, Runqi Sui, Xuejing Yuan, Dun Liu, Hao Feng, Xinyue Liu, Wenchuan Yang, Baojiang Cui and Kedan Li
    Citation: Cybersecurity 2024 7:70
  8. Advanced Persistent Threats (APTs) achieves internal networks penetration through multiple methods, making it difficult to detect attack clues solely through boundary defense measures. To address this challeng...

    Authors: Boyuan Xu, Yiru Gong, Xiaoyu Geng, Yun Li, Cong Dong, Song Liu, Yuling Liu, Bo Jiang and Zhigang Lu
    Citation: Cybersecurity 2024 7:51
  9. As mobile internet and Internet of Things technologies continue to advance, the application scenarios of peer-to-peer Internet of Drones (IoD) are becoming increasingly diverse. However, the development of IoD...

    Authors: Zhuo Zhao, Chingfang Hsu, Lein Harn, Zhe Xia, Xinyu Jiang and Liu Liu
    Citation: Cybersecurity 2024 7:50
  10. Since the advent of Bitcoin, cryptocurrencies have gained substantial popularity, and crypto wallets have evolved into the predominant tool for safeguarding and managing cryptographic keys to access cryptocurrenc...

    Authors: Mingxing Hu, Zhen Liu and Yunhong Zhou
    Citation: Cybersecurity 2024 7:24
  11. Unprotected gradient exchange in federated learning (FL) systems may lead to gradient leakage-related attacks. CKKS is a promising approximate homomorphic encryption scheme to protect gradients, owing to its u...

    Authors: Yao Pan, Zheng Chao, Wang He, Yang Jing, Li Hongjia and Wang Liming
    Citation: Cybersecurity 2024 7:40
  12. With the popularity of the media cloud computing industry, individuals and organizations outsource image computation and storage to the media cloud server to reduce the storage burden. Media images usually con...

    Authors: Miao Tian, Yushu Zhang, Yongming Zhang, Xiangli Xiao and Wenying Wen
    Citation: Cybersecurity 2024 7:22
  13. The Internet of Things (IoT) integrates more than billions of intelligent devices over the globe with the capability of communicating with other connected devices with little to no human intervention. IoT enab...

    Authors: Tin Lai, Farnaz Farid, Abubakar Bello and Fariza Sabrina
    Citation: Cybersecurity 2024 7:44
  14. Within the thriving e-commerce landscape, some unscrupulous merchants hire spammer groups to post misleading reviews or ratings, aiming to manipulate public perception and disrupt fair market competition. This...

    Authors: Chaoqun Wang, Ning Li, Shujuan Ji, Xianwen Fang and Zhen Wang
    Citation: Cybersecurity 2024 7:37
  15. Atomic Cross-Chain Swap (ACCS) is one important topic in cryptocurrency, where users can securely and trustlessly exchange assets between two different blockchains. However, most known ACCS schemes assume spec...

    Authors: Zeshuo Zhu, Rui Zhang and Yang Tao
    Citation: Cybersecurity 2024 7:12
  16. As a progressive security strategy, the zero trust model has attracted notable attention and importance within the realm of network security, especially in the context of the Internet of Things (IoT). This pap...

    Authors: Chunwen Liu, Ru Tan, Yang Wu, Yun Feng, Ze Jin, Fangjiao Zhang, Yuling Liu and Qixu Liu
    Citation: Cybersecurity 2024 7:20
  17. Smart Grid (SG) technology utilizes advanced network communication and monitoring technologies to manage and regulate electricity generation and transport. However, this increased reliance on technology and co...

    Authors: Batoul Achaal, Mehdi Adda, Maxime Berger, Hussein Ibrahim and Ali Awde
    Citation: Cybersecurity 2024 7:10
  18. In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually res...

    Authors: Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang and Ruxin Wang
    Citation: Cybersecurity 2024 7:8
  19. Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an impo...

    Authors: Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li and Qun Xu
    Citation: Cybersecurity 2024 7:7
  20. Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn consid...

    Authors: Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang and Mingsheng Wang
    Citation: Cybersecurity 2024 7:33
  21. The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a po...

    Authors: Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao and Qiong Huang
    Citation: Cybersecurity 2024 7:18
  22. Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure...

    Authors: Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Jianhua Wang and Haoran Zhu
    Citation: Cybersecurity 2024 7:5
  23. In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified th...

    Authors: Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou and Jian Liu
    Citation: Cybersecurity 2024 7:17
  24. The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming incre...

    Authors: Vinayak Tanksale
    Citation: Cybersecurity 2024 7:4

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • SCOPUS
  • EBSCO Discovery Service
  • Gale
  • INSPEC
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • Citation Impact 2023
    Journal Impact Factor: 3.9
    5-year Journal Impact Factor: 4.9
    Source Normalized Impact per Paper (SNIP): 1.587
    SCImago Journal Rank (SJR): 1.136

    Speed 2023
    Submission to first editorial decision (median days): 8
    Submission to acceptance (median days): 95

    Usage 2023
    Downloads: 408,523
    Altmetric mentions: 15