•  
  •  
 
Tsinghua Science and Technology

Volume 25, Issue 5 (2020)

Research Articles

PDF

A Novel Hybrid Method to Analyze Security Vulnerabilities in Android Applications
Junwei Tang, Ruixuan Li, Kaipeng Wang, Xiwu Gu, and Zhiyong Xu

PDF

A Memory-Related Vulnerability Detection Approach Based on Vulnerability Features
Jinchang Hu, Jinfu Chen, Lin Zhang, Yisong Liu, Qihao Bao, Hilary Ackah-Arthur, and Chi Zhang

PDF

Fast Carrier Selection of JPEG Steganography Appropriate for Application
Weixiang Ren, Yibo Xu, Liming Zhai, Lina Wang, and Ju Jia

PDF

ePUF: A Lightweight Double Identity Verification in IoT
Bo Zhao, Pengyuan Zhao, and Peiru Fan

PDF

Hybrid Structure Reliability Analysis Based on the Damped Newton Method
Hongwei Zheng, Guangwei Meng, Feng Li, Tonghui Wei, Wei Luo, and Yaming Guo

PDF

Modified Multi-Key Fully Homomorphic Encryption Based on NTRU Cryptosystem without Key-Switching
Xiaoliang Che, Tanping Zhou, Ningbo Li, Haonan Zhou, Zhenhua Chen, and Xiaoyuan Yang

PDF

Real-Time Facial Pose Estimation and Tracking by Coarse-to-Fine Iterative Optimization
Xiaolong Yang, Xiaohong Jia, Mengke Yuan, and Dong-Ming Yan

TST cover