401 | -- | 416 | Ke Huang 0002, Xiaosong Zhang 0001, Yi Mu 0001, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong. Blockchain-based deduplication with arbitration and incentives |
417 | -- | 431 | Linlin Xue, Yue Wang, Zhongpeng Wang. Secure image block compressive sensing using complex Hadamard measurement matrix and bit-level XOR |
432 | -- | 441 | Yongqiang Yu, Xuehu Yan, Longlong Li, Jiayu Wang. Renewal of secret and shadows in secret image sharing |
442 | -- | 458 | Zhangguo Tang, Junfeng Wang, Baoguo Yuan, Huanzhou Li, Jian Zhang, Han Wang. Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification |
459 | -- | 469 | Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata. Matching attacks on Romulus-M |
470 | -- | 481 | Adrián Ranea, Vincent Rijmen. Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA) |
482 | -- | 0 | . Erratum: Quantum-resistant anonymous identity-based encryption with traceable identities |