Home / Journals / JIHPP / Vol.4, No.1, 2022
  • Open Access

    ARTICLE

    SPN-Based Performance Analysis of Multiple Users’ Behaviors for SNS

    Zhiguo Hong1,*, Yongbin Wang2,3, Minyong Shi4
    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 1-13, 2022, DOI:10.32604/jihpp.2022.026440
    Abstract With the rapid development of various applications of Information Technology, big data are increasingly generated by social network services (SNS) nowadays. The designers and providers of SNS distribute different client applications for PC, Mobile phone, IPTV etc., so that users can obtain related service via mobile or traditional Internet. Good scalability and considerably short time delay are important indices for evaluating social network systems. As a result, investigating and mining the principle of users’ behaviors is an important issue which can guide service providers to establish optimal systems with SNS. On the basis of analyzing the characteristics of social network… More >

  • Open Access

    ARTICLE

    An Overview of Adversarial Attacks and Defenses

    Kai Chen*, Jinwei Wang, Jiawei Zhang
    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 15-24, 2022, DOI:10.32604/jihpp.2022.029006
    Abstract In recent years, machine learning has become more and more popular, especially the continuous development of deep learning technology, which has brought great revolutions to many fields. In tasks such as image classification, natural language processing, information hiding, multimedia synthesis, and so on, the performance of deep learning has far exceeded the traditional algorithms. However, researchers found that although deep learning can train an accurate model through a large amount of data to complete various tasks, the model is vulnerable to the example which is modified artificially. This technology is called adversarial attacks, while the examples are called adversarial examples.… More >

  • Open Access

    ARTICLE

    Intrusion Detection System Using a Distributed Ensemble Design Based Convolutional Neural Network in Fog Computing

    Aiming Wu1, Shanshan Tu1,*, Muhammad Wagas1,2,3, Yongjie Yang1, Yihe Zhang1, Xuetao Bai1
    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 25-39, 2022, DOI:10.32604/jihpp.2022.029922
    Abstract With the rapid development of the Internet of Things (IoT), all kinds of data are increasing exponentially. Data storage and computing on cloud servers are increasingly restricted by hardware. This has prompted the development of fog computing. Fog computing is to place the calculation and storage of data at the edge of the network, so that the entire Internet of Things system can run more efficiently. The main function of fog computing is to reduce the burden of cloud servers. By placing fog nodes in the IoT network, the data in the IoT devices can be transferred to the fog… More >

  • Open Access

    ARTICLE

    A Survey of Anti-forensic for Face Image Forgery

    Haitao Zhang*
    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 41-51, 2022, DOI:10.32604/jihpp.2022.031707
    Abstract Deep learning related technologies, especially generative adversarial network, are widely used in the fields of face image tampering and forgery. Forensics researchers have proposed a variety of passive forensic and related anti-forensic methods for image tampering and forgery, especially face images, but there is still a lack of overview of anti-forensic methods at this stage. Therefore, this paper will systematically discuss the anti-forensic methods for face image tampering and forgery. Firstly, this paper expounds the relevant background, including the relevant tampering and forgery methods and forensic schemes of face images. The former mainly includes four aspects: conventional processing, fake face… More >

  • Open Access

    ARTICLE

    Conceptual Modeling and Simulation Application Analysis of In-service Assessment

    Jian-Hua Luo1, Xi Chen1,*, Hua Li1, Yu-Hang Zhou1, Jing-Wen Li2
    Journal of Information Hiding and Privacy Protection, Vol.4, No.1, pp. 53-60, 2022, DOI:10.32604/jihpp.2022.032109
    Abstract Firstly, this paper expounds the conceptual connotation of in-service assessment in the new system, then applies modeling and Simulation in the field of in-service assessment, establishes the conceptual model of in-service assessment and its process, and finally analyzes the application of modeling and simulation in the specific links of in-service assessment. More >

Share Link

WeChat scan