Abstract is missing.
- An Education Program for Big Data Security and PrivacyBhavani Thuraisingham, Kim Nimon, Latifur Khan. 1-4 [doi]
- Anomaly Detection in Multivariate Time Series with Contaminated Training Data Using VAEDongfeng Lv, Manman Ma, Hanxia Dong, Yishan Shang, Kuo Bao. 5-10 [doi]
- A Low-Cost Positioning Beacon in Rail Transit SystemZhouji Wang, Xinyue Lu, Kui Li, Wei Gong. 11-16 [doi]
- Test Case Recommendation for Blockchain Systems Based on Graph Convolutional NetworksShuyi Li, Pengyu Zhang, Xueyang Liu, Wenhui Hu. 17-22 [doi]
- A Survey of Major Cybersecurity Compliance FrameworksWenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe. 23-34 [doi]
- User Dual Intents Graph Modeling for Information Diffusion PredictionYingying Cai, Wenhui Hu, Xueyang Liu, Haoxuan Wang, Xiankui Zhang, Jiaxi Wang. 35-40 [doi]
- Towards Privacy Protection: A Non-Invasive Human Detection Method via Edge-Cloud CollaborationLuxiu Yin, Qihui Huang, Xuanya Wang, Wei Liang, Chun Wang. 41-46 [doi]
- Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language ModelsBeihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang, Shuyi Li. 47-51 [doi]
- A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-Cloud Hybrid EnvironmentsXinyi Yang, Kaipei Li, Jie Tian. 52-57 [doi]
- Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text ClassificationYong Lin, Peng Jiang, Keke Gai, Liehuang Zhu. 58-65 [doi]
- Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series ModelsChen Yang, Xueyang Liu, Shuyi Li, Wenhui Hu, Beihu Wu, Hao Tian. 66-70 [doi]
- A Survey of Bluetooth Indoor LocalizationTaolei Shi, Wei Gong. 71-77 [doi]
- Precision Assistance for Residents with Subsistence Allowance: Cluster Analysis of Mixed-Type Data Based on K-PrototypesFangming Jing, Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu. 78-83 [doi]
- Evaluating the Soft Error Resilience of Graph Applications on GPGPUsXiaohui Wei, Mengting Zhou, Nan Jiang, Hengshan Yue. 84-89 [doi]
- A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoTShizhong Li, Wei Zhang, Ruonan Chen, Dawei Li. 90-95 [doi]
- SyNet: Medical image anomaly detection with noise synthesis networkJingnian Liu, Wei Liang, Yuxiang Chen, Kai Jin. 96-100 [doi]
- An Invisible Backdoor Attack on Cloud Computing in the Internet of ThingsXiangyun Qian, Rui Zhang, Zi Kang, Hui Xia 0001. 101-106 [doi]
- A Method for Anomaly Detection in Power Energy Topology Graph Data Based on Domain Knowledge Graph and Graph Neural NetworksMing Chen, Sen Yang, Wenbo Dai, Zisheng Wang, Jun Xu. 107-112 [doi]
- Improving Substation Network Security with DevSecOps and AIOpsWei Yu, Jianguo Qian, Ranyue Xu, Chenxing Jin, Haina Fang, Xianhai Shi. 113-118 [doi]
- Decision Tree-based Privacy Protection in Federated Learning: A SurveyZijun Wang, Hongchen Guo, Keke Gai. 119-124 [doi]
- A Method for Anomaly Detection in Power Time Series Data within Energy Big Data Based on Generative Adversarial NetworksChen Jiang, Mengxian Chen, Huasen Xie, Hua Wang, Jun Xu. 125-129 [doi]
- Diffusion Model Based Secure Semantic Communications with Adversarial PurificationXintian Ren, Jun Wu 0001, Hansong Xu, Xiuzhen Chen. 130-134 [doi]
- Research on Production Capacity Utilization Index Based on Electricity Big DataMengyuan Zhang, Yingying Zhao, Yingjie Tian 0002. 135-138 [doi]
- Sound-LDR Sensors Empowered Secure True Random Number Generator for PoS Consensus in BlockchainHaozhe Chai, Jun Wu 0001, Qianqian Pan, Xinzheng Feng. 139-144 [doi]
- OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutationGuohao Cui, Hao Wang, Wentao Hao, Xiaoyi Zhou. 145-149 [doi]
- Explainable AI: A Way to Achieve Trustworthy AIYanlu Li, Yufeng Xiao, Yinyan Gong, Ronglin Zhang, Yingzi Huo, Yanbing Wu. 150-155 [doi]
- A Blockchain-Based Identity Control Scheme for Cross-Organizational Data SharingWenjing Xu, Yulun Song, Haochen Liang, Lin Sun, Yunlong Xie. 156-160 [doi]
- Industrial Internet of Things (IIoT) Identity Resolution Techniques: A ReviewChuangchuang Dai, Haodong Li, Lei Guan, Mingbo Chi. 161-166 [doi]
- AI-Finger: From Physical Unclonable Function to AI-Hardware FingerprintQianqian Pan, Jun Wu 0001. 167-172 [doi]
- Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence PlatformRanyue Xu, Wei Yu, Hao Huang, Yongchun Pan, Chen Zhou, Gang Zheng. 173-178 [doi]