219 | -- | 230 | Jiwoong Kang, Jaehyun Park 0003. SoC-based abnormal ethernet packet detector with automatic rule-set generator |
231 | -- | 260 | Youssef Taouil, El Bachir Ameur, Amine Benhfid, Rachid Harba, Hassan Douzi. Adaptive steganographic scheme using a variable matrix embedding |
261 | -- | 284 | Youcef Ould Yahia, Samia Bouzefrane 0001, Hanifa Boucheneb, Soumya Banerjee 0002. A data-owner centric privacy model with blockchain and adapted attribute-based encryption for internet-of-things and cloud environment |
285 | -- | 309 | Yavar Safaei Mehrabani, Roghayeh Ataie, Mohammad Hossein Shafiabadi, Abolghasem Ghasempour. Design and implementation of an ASIP for SHA-3 hash algorithm |
310 | -- | 320 | Gang Ke, Ruey-Shun Chen, Yeh-Cheng Chen, Yu-Xi Hu, Tsu-Yang Wu. Simple multi-scale human abnormal behaviour detection based on video |
321 | -- | 331 | Yujie Wan, Baoxiang Du. A new image encryption algorithm based on cascaded chaos and Arnold transform |
332 | -- | 350 | Ahmad Azab. The effectiveness of cost sensitive machine learning algorithms in classifying Zeus flows |
351 | -- | 364 | Zhixin Zeng, Liang Chang 0003, Yi-Ning Liu 0002. A fault tolerance data aggregation scheme for fog computing |
365 | -- | 404 | Khanh-Huu-The Dam, Tayssir Touili. Extracting malicious behaviours |
405 | -- | 423 | Sumit Kumar Debnath, Nibedita Kundu, Tanmay Choudhury. Efficient post-quantum private set-intersection protocol |
424 | -- | 437 | Bin Wu, Xiao Yi, Dongning Zhao. A node screening algorithm for wireless sensor network based on threshold measurement |