Open Access
ARTICLE
Chongzhen Zhang1,2,*, Zhichen Liu3, Xiangrui Xu3, Fuqiang Hu3, Jiao Dai3, Baigen Cai1, Wei Wang3
1 School of Automation and Intelligence, Beijing Jiaotong University, Beijing, 100044, China
2 Shuohuang Railway Development Co., Ltd., National Energy Group, Cangzhou, 062350, China
3 Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer Science and Technology, Beijing Jiaotong University, Beijing, 100044, China
* Corresponding Author: Chongzhen Zhang. Email:
(This article belongs to the Special Issue: Information Security and Trust Issues in the Digital World)
Computer Modeling in Engineering & Sciences https://doi.org/10.32604/cmes.2024.055596
Received 02 July 2024; Accepted 10 October 2024; Published online 20 November 2024
View
Download
Like
A Survey of Image Information Hiding Algorithms Based on Deep Learning
Ruohan Meng, Qi Cui, Chengsheng...Quantum Risk Assessment Model Based on Two Three-Qubit GHZ States
Tao Zheng, Yan Chang, Shibin ZhangALCencryption: A Secure and Efficient Algorithm for Medical Image Encryption
Jiao GeAn Anonymous Authentication Scheme with Controllable Linkability for Vehicle Sensor Networks
Yousheng Zhou, Lvjun Chen, Xiaofeng...Attribute-Based Keyword Search over the Encrypted Blockchain
Zhen Yang, Hongao Zhang, Haiyang...