Abstract is missing.
- Semantically Rich Differential Access to Secure Cloud EHRRedwan Walid, Karuna P. Joshi, Seung Geol Choi. 1-9 [doi]
- A Survey of Weakly-supervised Semantic SegmentationKaiyin Zhu, Neal N. Xiong, Mingming Lu. 10-15 [doi]
- PriFR: Privacy-preserving Large-scale File Retrieval System via Blockchain for Encrypted Cloud DataHao Ren 0001, Guowen Xu, Han Qiu 0001, Tianwei Zhang 0004. 16-23 [doi]
- Privacy Analysis of Federated Learning via Dishonest ServersTre' R. Jeter, My T. Thai. 24-29 [doi]
- 2MiCo: A Contrastive Semi-Supervised Method with Double Mixup for Smart Meter Modbus RS-485 Communication SecurityXiaodi Li, Md. Delwar Hossain, Hideya Ochiai, Latifur Khan. 30-39 [doi]
- A New Method of Construction of Permutation Trinomials with Coefficients 1Hua Guo, Shuo Wang, Hutao Song, Yiran Han, Xiyong Zhang, Jianwei Liu. 40-44 [doi]
- Cross-Consensus Measurement of Individual-level Decentralization in BlockchainsChao Li 0023, Balaji Palanisamy, Runhua Xu, Li Duan. 45-50 [doi]
- An Expert Knowledge Generation Model in Smart Contract Vulnerability FuzzingXing Li. 51-56 [doi]
- Cyber Attack Detection using Secret Sharing SchemesChi Sing Chum, Xinzhou Wei, Xiaowen Zhang. 57-59 [doi]
- Research and Application of Blind Watermark Based on DCTRuiyi Zhang, Song Yuan. 60-65 [doi]
- Exploring Downvoting in Blockchain-based Online Social Media PlatformsRui Sun, Chao Li, Jingyu Liu, Xingchen Sun. 66-71 [doi]
- Malicious ADS-B data Generation Based on Improved GANJin Lei, Ruifang Jiang, Zhijun Wu 0001. 72-77 [doi]
- Inventory Big Data Management for Internet of Things based on Privacy PreservingChaoliang Li, Hongjing Zhou, Yao Liu, Hua Huang, Shukun Liu. 78-83 [doi]
- Identification of Important Features at Different IoT layers for Dynamic Attack DetectionSafwana Haque, Fadi El-Moussa 0001, Nikos Komninos, Muttukrishnan Rajarajan. 84-90 [doi]
- Securitizing Microcredits Using blockchainHarsh Agrawal, Mohnish Sankhe, Arnav Chaudhari, Deepak Karia, Narendra Bhagat, Najib Ghatte. 91-95 [doi]
- An Efficient Transformer with Distance-aware AttentionGaoxiang Duan, Xiaoying Zheng, Yongxin Zhu 0001, Tao Ren, Yan Yan. 96-101 [doi]
- Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection VulnerabilitiesSuliman Alazmi, Daniel Conte de Leon. 102-106 [doi]
- Lightweight Batch Authentication Protocol for Bus-NB-IoT Hierarchical Network in Smart Grid Using Physically Unclonable FunctionFeifei Liu, Yu Sun, Zheng Liu, Yu Yan, Huilin Li, Yiran Han, Jianwei Liu 0001. 107-114 [doi]
- Application of Profiled Analysis to ADC-Based Remote Side-Channel AttacksJunichi Sakamoto, Kazuki Tachibana, Tsutomu Matsumoto. 115-121 [doi]
- ImageFed: Practical Privacy Preserving Intrusion Detection System for In-Vehicle CAN Bus ProtocolHamideh Taslimasa, Sajjad Dadkhah, Euclides Carlos Pinto Neto, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani 0001. 122-129 [doi]
- FedGraph-KD: An Effective Federated Graph Learning Scheme Based on Knowledge DistillationShiyu Wang, Jiahao Xie, Mingming Lu, Neal N. Xiong. 130-134 [doi]
- Vision Transformer (ViT)-based Applications in Image ClassificationYingzi Huo, Kai Jin, Jiahong Cai, Huixuan Xiong, Jiacheng Pang. 135-140 [doi]
- Multi-level Encryption for Agricultural Data ProtectionMeikang Qiu, Xiangyu Gao. 141-146 [doi]
- Software Trusted Startup and Update Protection Scheme of IoT DevicesMengqiao Zhang, YingPeng Zhang, Shizhong Li, Qinjun Wan. 147-152 [doi]
- An Individual-differences-based Method for Discovering Viewpoints on Interactive BehaviorZhang Kunqi, Chunyan Tong, Cai Xiaokang, Wang Hao. 153-162 [doi]
- *Huixuan Xiong, Kai Jin, Jingnian Liu, Jiahong Cai, Lijun Xiao. 163-168 [doi]
- An Efficient Privacy-preserving Join-Aggregation Scheme in Smart GridsPeng Zhou, Weiqiang Qi, Jiasai Sun, Zichao Xu. 169-174 [doi]
- Probabilistic Task Assignment in Edge ComputingSeth Brozdzik, Michael Paulson, Xiao Chen. 175-180 [doi]
- SG-RC: SG-CIM Grid Knowledge Graph Relationship Complementation Model Based on Entropy Uncertainty and Semantic RecognitionPengyu Zhang, Shijie Gao, Yi Shen, Shiyu Yang, Lizhuang Sun. 181-186 [doi]
- An Improved Data Backup Scheme Based on Multi-Factor AuthenticationJinghai Yi, Yunhua Wen. 187-197 [doi]
- Honey2Fish - A Hybrid Encryption Approach for Improved Password and Message SecuritySomil Jain, Cristina Hava Muntean, Rohit Verma. 198-203 [doi]
- Optimizing Cabin Wireless Network Signal Coverage with Ray Tracing MethodFengyun Li, Shuang Huang, Zihao Zhan, Yunfei Lu, Tian Shen, Jianguo Zhou. 204-209 [doi]
- Home health care system for the Elderly based on IMU wearable deviceZhi-Ying Yang, Chaohsiung Lee, Lu-Chin Kung, Jung-Tang Huang. 210-215 [doi]
- DDS-Based Information Interaction System for Ship Cloud Storage Data CenterShuang Huang, Fengyun Li, Zihao Zhan, Kaiyu Li, Wenhao Zhang, Jianguo Zhou. 216-221 [doi]
- The Impact of ChatGPT on Streaming Media: A Crowdsourced and Data-Driven Analysis using Twitter and RedditYunhe Feng, Pradhyumna Poralla, Swagatika Dash, Kaicheng Li, Vrushabh Desai, Meikang Qiu. 222-227 [doi]