Vol. 1 No. 2 (2025): JICN

Published: 2025-11-30

Articles

  • Occlusion-Guided Feature Purification Learning via Reinforced Knowledge Distillation for Occluded Person Re-Identification

    Yufei Zheng, Yong Wu, Jiawei Liu, Wenjun Wang, Wenjun Gan (Author)
    1-16
    DOI: https://doi.org/10.64509/jicn.12.31
  • Exploring A Model Type Detection Attack against Machine Learning as A Service

    Yilong Yang, Xinjing Liu, Ruidong Han, Yang Liu (Author)
    17-30
    DOI: https://doi.org/10.64509/jicn.12.27
  • Pairing-Free Public Key Searchable Encryption Scheme Resilient to Frequency Analysis for IoT

    Kunlong Jin, Kaiqi Liu, Lujia Shi, Shuai Wang, Jiaen Zhou (Author)
    31-39
    DOI: https://doi.org/10.64509/jicn.12.38
  • A Low-Latency and Secure Data Sharing Method Based on Blockchain and Outsourced Attribute-Based Encryption

    Wen Zhang, Li Duan, Yimeng Feng, Pengrui Chen, Lufeng Feng (Author)
    40-53
    DOI: https://doi.org/10.64509/jicn.12.44
  • Exploring Test-time Adaptive Object Detection in the Frequency Domain

    Kunyu Wang, Qi Qi, Wei Zhai (Author)
    54-64
    DOI: https://doi.org/10.64509/jicn.12.40
  • Optimizing Distributed Training in Computing Power Networks: A Heterogeneity-aware Approach

    Zhe Deng, Renchao Xie, Qinqin Tang, Li Feng, Zeru Fang, Hongliang Lu, Tao Huang (Author)
    65-78
    DOI: https://doi.org/10.64509/jicn.12.39