排序方式:
1.An Enhanced Linearly Homomorphic Network Coding Signature Scheme for Secure Data Delivery in IoT Networks
Huang, Hao, Wang, Xi
More...
Huang, Hao, Wang, Xiaofen, Au, Man Ho, Cao, Sheng, Zhao, Qinglin, Yu, Jiguo
Less
IEEE Transactions on Information Forensics and Security[1556-6013],
Published 2025,
Volume 20,
Pages 5534-5548
收錄情况:
WOS
SCOPUS
WOS核心合集引用: 0
2024影響因子:
8.0
2.Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning
Che, Z, Shen, M, Tan
More...
Che, Z, Shen, M, Tan, ZH, Du, HB, Wang, W, Chen, T, Zhao, QL, Xie, Y, Zhu, LH
Less
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[1556-6013],
Published 2025,
Volume 20,
Pages 4783-4798
收錄情况:
WOS
SCOPUS
WOS核心合集引用: 5
2024影響因子:
8.0
3.Modeling the Performance-Security Trade-Off of Gasper's Block Proposal Mechanism Under Latency-Driven Attacks
Qi, SH, Zhao, QL, Li
More...
Qi, SH, Zhao, QL, Liu, ZJ, Zhou, MC, Shen, M, Zhang, PY, Sun, Y
Less
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[1556-6013],
Published 2026,
Volume 21,
Pages 1213-1227
收錄情况:
WOS
SCOPUS
WOS核心合集引用: 0
2024影響因子:
8.0