Skip to main content


Page 1 of 5

  1. In generating adversarial examples, the conventional black-box attack methods rely on sufficient feedback from the to-be-attacked models by repeatedly querying until the attack is successful, which usually res...

    Authors: Renyang Liu, Wei Zhou, Xin Jin, Song Gao, Yuanyu Wang and Ruxin Wang
    Citation: Cybersecurity 2024 7:8
  2. Lattice-based digital signature has become one of the widely recognized post-quantum algorithms because of its simple algebraic operation, rich mathematical foundation and worst-case security, and also an impo...

    Authors: Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li and Qun Xu
    Citation: Cybersecurity 2024 7:7
  3. Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) are cryptographic protocols that offer efficient and privacy-preserving means of verifying NP language relations and have drawn consid...

    Authors: Xi Lin, Heyang Cao, Feng-Hao Liu, Zhedong Wang and Mingsheng Wang
    Citation: Cybersecurity 2024 7:33
  4. The encryption of user data is crucial when employing electronic health record services to guarantee the security of the data stored on cloud servers. Attribute-based encryption (ABE) scheme is considered a po...

    Authors: Ximing Li, Hao Wang, Sha Ma, Meiyan Xiao and Qiong Huang
    Citation: Cybersecurity 2024 7:18
  5. Fully homomorphic encryption (FHE) has experienced significant development and continuous breakthroughs in theory, enabling its widespread application in various fields, like outsourcing computation and secure...

    Authors: Yanwei Gong, Xiaolin Chang, Jelena Mišić, Vojislav B. Mišić, Jianhua Wang and Haoran Zhu
    Citation: Cybersecurity 2024 7:5
  6. In MILCOM 2015, Kelly et al. proposed the authentication encryption algorithm MK-3, which applied the 16-bit S-box. This paper aims to implement the 16-bit S-box with less circuit area. First, we classified th...

    Authors: Yanjun Li, Weiguo Zhang, Yiping Lin, Jian Zou and Jian Liu
    Citation: Cybersecurity 2024 7:17
  7. The rapid expansion of intra-vehicle networks has increased the number of threats to such networks. Most modern vehicles implement various physical and data-link layer technologies. Vehicles are becoming incre...

    Authors: Vinayak Tanksale
    Citation: Cybersecurity 2024 7:4
  8. Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices. Impossible dif...

    Authors: Yuting Liu, Yongqiang Li, Huiqin Chen and Mingsheng Wang
    Citation: Cybersecurity 2023 6:52
  9. Federated Learning (FL) suffers from the Non-IID problem in practice, which poses a challenge for efficient and accurate model training. To address this challenge, prior research has introduced clustered FL (C...

    Authors: Jie Yuan, Rui Qian, Tingting Yuan, Mingliang Sun, Jirui Li and Xiaoyong Li
    Citation: Cybersecurity 2023 6:39
  10. In today’s interconnected world, network traffic is replete with adversarial attacks. As technology evolves, these attacks are also becoming increasingly sophisticated, making them even harder to detect. Fortu...

    Authors: Fikirte Ayalke Demmese, Ajaya Neupane, Sajad Khorsandroo, May Wang, Kaushik Roy and Yu Fu
    Citation: Cybersecurity 2023 6:32
  11. In order to address the shortcomings of traditional anonymity network anonymity evaluation methods, which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,...

    Authors: Jun Cui, Changqi Huang, Huan Meng and Ran Wei
    Citation: Cybersecurity 2023 6:55
  12. Vulnerability reports are essential for improving software security since they record key information on vulnerabilities. In a report, CWE denotes the weakness of the vulnerability and thus helps quickly under...

    Authors: Peng Liu, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao and Yongnan Li
    Citation: Cybersecurity 2023 6:29
  13. Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...

    Authors: Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi and Dongbin Wang
    Citation: Cybersecurity 2023 6:50
  14. Ethereum’s high attention, rich business, certain anonymity, and untraceability have attracted a group of attackers. Cybercrime on it has become increasingly rampant, among which scam behavior is convenient, c...

    Authors: Chuyi Yan, Chen Zhang, Meng Shen, Ning Li, Jinhao Liu, Yinhao Qi, Zhigang Lu and Yuling Liu
    Citation: Cybersecurity 2023 6:46
  15. It is not uncommon for malicious sellers to collude with fake reviewers (also called spammers) to write fake reviews for multiple products to either demote competitors or promote their products’ reputations, f...

    Authors: Qi Zhang, Zhixiang Liang, Shujuan Ji, Benyong Xing and Dickson K. W. Chiu
    Citation: Cybersecurity 2023 6:26
  16. In recent years, many researchers focused on unsupervised learning for network anomaly detection in edge devices to identify attacks. The deployment of the unsupervised autoencoder model is computationally exp...

    Authors: B S Sharmila and Rohini Nagapadma
    Citation: Cybersecurity 2023 6:41
  17. The Learning With Errors (LWE) problem is widely used in lattice-based cryptography, which is the most promising post-quantum cryptography direction. There are a variety of LWE-solving methods, which can be cl...

    Authors: Yu Wei, Lei Bi, Xianhui Lu and Kunpeng Wang
    Citation: Cybersecurity 2023 6:24
  18. Intrusion detection systems are increasingly using machine learning. While machine learning has shown excellent performance in identifying malicious traffic, it may increase the risk of privacy leakage. This p...

    Authors: Kaisheng Fan, Weizhe Zhang, Guangrui Liu and Hui He
    Citation: Cybersecurity 2023 6:35

Affiliated with

  • The Institute of Information Engineering (IIE) is a national research institute in Beijing that specializes in comprehensive research on theories and applications related to information technology.

    IIE strives to be a leading global academic institution by creating first-class research platforms and attracting top researchers. It also seeks to become an important national strategic power in the field of information technology.

    IIE’s mission is to promote China’s innovation and industrial competitiveness by advancing information science, standards, and technology in ways that enhance economic security and public safety as well as improve our quality of life.

    Read more..

The journal is indexed by

  • EI Compendex
  • Emerging Sources Citation Index
  • DBLP
  • DOAJ
  • EBSCO Discovery Service
  • Gale
  • Institute of Scientific and Technical Information of China
  • Google Scholar
  • Dimensions
  • CNKI
  • Naver
  • Norwegian Register for Scientific Journals and Series
  • OCLC WorldCat Discovery Service
  • ProQuest-ExLibris Primo
  • ProQuest-ExLibris Summon
  • TD Net Discovery Service
  • UGC-CARE List (India)

Annual Journal Metrics

  • 2022 Citation Impact
    3.1 - 2-year Impact Factor
    4.8 - 5-year Impact Factor
    2.071 - SNIP (Source Normalized Impact per Paper)
    1.266 - SJR (SCImago Journal Rank)

    2023 Speed
    8 days submission to first editorial decision for all manuscripts (Median)
    95 days submission to accept (Median)

    2023 Usage 
    15 Altmetric mentions