Vol. 1 No. 2 (2025): JICN

					View Vol. 1 No. 2 (2025): JICN
Published: 2025-11-30

Articles

  • Occlusion-Guided Feature Purification Learning via Reinforced Knowledge Distillation for Occluded Person Re-Identification

    Yufei Zheng, Yong Wu, Jiawei Liu, Wenjun Wang, Wenjun Gan (Author)
    1-16
    DOI: https://doi.org/10.64509/jicn.12.31
  • Exploring A Model Type Detection Attack against Machine Learning as A Service

    Yilong Yang, Xinjing Liu, Ruidong Han, Yang Liu (Author)
    17-30
    DOI: https://doi.org/10.64509/jicn.12.27
  • Pairing-Free Public Key Searchable Encryption Scheme Resilient to Frequency Analysis for IoT

    Kunlong Jin, Kaiqi Liu, Lujia Shi, Shuai Wang, Jiaen Zhou (Author)
    31-39
    DOI: https://doi.org/10.64509/jicn.12.38
  • A Low-Latency and Secure Data Sharing Method Based on Blockchain and Outsourced Attribute-Based Encryption

    Wen Zhang, Li Duan, Yimeng Feng, Pengrui Chen, Lufeng Feng (Author)
    40-53
    DOI: https://doi.org/10.64509/jicn.12.44