Abstract is missing.
- Research and Application of Anomaly Detection of Industrial Control System Based on Improved Zoe AlgorithmXin Xie, Bin Wang, Tiancheng Wan, Xunyi Jiang, Weiru Wang, Wenliang Tang. 3-12 [doi]
- An Intrusion Detection Method Based on Hierarchical Feature Learning and Its ApplicationXin Xie, Xunyi Jiang, Weiru Wang, Bin Wang, Tiancheng Wan, Hao Yang. 13-20 [doi]
- Spoofing Attack Detection for Radar Network System State EstimationTianqi Huang, Buhong Wang, Dong Lin. 21-33 [doi]
- Survey of Network Security Situational AwarenessJiayu Yao, Xiani Fan, Ning Cao 0002. 34-44 [doi]
- Encrypting VoLTE Communication via Baseband Firmware ExtensionYao Wang, Wencong Han, Lianfang Wang, Lu Liu, Xiao Yu. 45-56 [doi]
- Mitigating Link-Flooding Attack with Segment Rerouting in SDNLixia Xie, Ying Ding, Hongyu Yang. 57-69 [doi]
- BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification FunctionYifang Zhi, Li Yang 0005, Shui Yu, Jianfeng Ma. 73-88 [doi]
- A Data Protection Scheme via Isolating Android PartitionsKai Yang, Xiaoya Ma, Hongwei Jiang, Yuan Xue, Wencong Han, Lianfang Wang, Lu Liu. 89-101 [doi]
- A Code Protection Scheme via Inline Hooking for Android ApplicationsHongwei Jiang, Kai Yang, Lianfang Wang, Jinbao Gao, Sikang Hu. 102-116 [doi]
- Log-Based Control Flow Attestation for Embedded DevicesJingbin Liu, Qin Yu, Wei Liu, Shijun Zhao, Dengguo Feng, Weifeng Luo. 117-132 [doi]
- A New Algorithm for Retrieving Diffuse Attenuation Coefficient Based on Big LiDAR Bathymetry DataKai Ding, Chisheng Wang, Ming Tao, Peican Huang. 133-142 [doi]
- Shuffle Dense Networks for Biometric AuthenticationHuaijuan Zang, Qiuyu Li, Ailian Chen, Jinlong Chen, Shu Zhan. 143-156 [doi]
- An Efficient Attribute Based Encryption Scheme in Smart GridWenti Yang, Zhitao Guan. 159-172 [doi]
- Attribute-Based Signatures for Inner-Product Predicate from LatticesYanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia. 173-185 [doi]
- Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic MapsJiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo. 186-202 [doi]
- Achieving Data Security, Access Control and Authentication of Controllers in Hierarchical Software Defined Networking with Attribute Based EncryptionYuhua Xu 0004, Zhixin Sun. 203-213 [doi]
- 2: Error Correcting Code and Elliptic Curve Based CryptosystemFangguo Zhang, Zhuoran Zhang. 214-229 [doi]
- A New Provably Secure Identity-Based Multi-proxy Signature SchemeQunshan Chen, Zhenjie Huang, Yong Ding, Yuping Zhou, Hui Huang. 230-242 [doi]
- A Differentially Private Trajectory Publishing Mechanism Based on Stay PointsYing Xia, Yao Lin, Hao Wang. 245-257 [doi]
- Data Privacy Protection in Medical Alliance Chain Based on K-AnonymityHui Sun, Cheng Huang, Xu Cheng, Fulong Chen 0002. 258-264 [doi]
- IMES: An Automatically Scalable Invisible Membrane Image Encryption for Privacy Protection on IoT SensorsSong-Zhan Lv, Yining Liu, Jingtao Sun. 265-273 [doi]
- Privacy-Awareness Fair Contract Signing Protocol Based on BlockchainDongfeng Wang, Qinghua Li, Fengyin Li, Quanxin Zhang, Banghai Xu. 274-278 [doi]
- Efficient Privacy Protection Authentication Scheme in Vehicle Ad Hoc NetworksShanguo Lv. 279-288 [doi]
- Cooperative Privacy Preservation for Internet of Vehicles with Mobile Edge ComputingJun Luo, Hong Liu, Qianyang Cheng. 289-303 [doi]
- DeT: Defending Against Adversarial Examples via Decreasing TransferabilityChangjiang Li, Haiqin Weng, Shouling Ji, Jianfeng Dong, Qinming He. 307-322 [doi]
- ADS-B Data Attack Detection Based on Generative Adversarial NetworksTengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao. 323-336 [doi]
- Stealthy and Sparse False Data Injection Attacks Based on Machine LearningJiwei Tian, Buhong Wang, Tengyao Li, Fute Shang, Kunrui Cao, Jing Li. 337-347 [doi]
- Automated Detection System for Adversarial Examples with High-Frequency Noises SieveDang Duy Thang, Toshihiro Matsui. 348-362 [doi]
- An Improvement of the Degradation of Speaker Recognition in Continuous Cold Speech for Home AssistantHaojun Ai, Yifeng Wang, Yuhong Yang, Quanxin Zhang. 363-373 [doi]
- Evading PDF Malware Classifiers with Generative Adversarial NetworkYaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang. 374-387 [doi]
- Non-linguistic Features for Cyberbullying Detection on a Social Media Platform Using Machine LearningYuyi Liu, Pavol Zavarsky, Yasir Malik. 391-406 [doi]
- Another Look at a Proposed Cubic Chaotic MappingQi Wu. 407-412 [doi]
- Research on Drug Regulation Mode in the Age of the Internet of ThingsYan Zhao, Huwei Liu, Ning Cao 0002. 413-424 [doi]
- Privacy-Aware Service Migration for Edge Computing in Urban CitiesXihua Liu, Lianyong Qi, Xiaolong Xu, Xuyun Zhang, Shaohua Wan. 425-436 [doi]
- A Certificateless Aggregate Signature Scheme Based on Blockchain for EMRHong Shu, Fulong Chen 0002, Dong Xie, Ping Qi, Yongqing Huang. 437-443 [doi]
- The Fuzzy Integral Evaluation Method Based on Feature Weighting for the Level of Complex Social DevelopmentMeifang Du, Haojia Zhu. 444-454 [doi]
- Big Data Based E-commerce Search Advertising RecommendationMing Tao, Peican Huang, Xueqiang Li, Kai Ding. 457-466 [doi]
- File Recovery of High-Order Clearing First Cluster Based on FAT32Xu Chang, Fanchang Hao, Jian Wu, Guorui Feng. 467-476 [doi]
- Mobile Recommendation Method for Fusing Item Features and User Trust RelationshipShanguo Lv. 477-488 [doi]
- Research on Collaborative Filtering Recommendation Method Based on Context and User CredibilityHongli Chen, Shanguo Lv. 489-500 [doi]
- Multi-watermarking Algorithm for Medical Image Based on NSCT-RDWT-DCTJingjun Zhou, JingBing Li, Hui Li, Jing Liu, Jialing Liu, Qianning Dai, Saqib Ali Nawaz. 501-515 [doi]
- An Improved Container Scheduling Algorithm Based on PSO for Big Data ApplicationsJiawei Li, Bo Liu, Weiwei Lin, Pengfei Li, Qian Gao. 516-530 [doi]
- A Secure Density Peaks Clustering Algorithm on Cloud ComputingShang Ci, Liping Sun, Xiaoqing Liu, Tingli Du, Xiaoyao Zheng. 533-541 [doi]
- Research on Cloud Computing Security Problems and Protection CountermeasuresXiani Fan, Jiayu Yao, Ning Cao 0002. 542-551 [doi]
- Research on Logistics Distribution Vehicle Scheduling Algorithm Based on Cloud ComputingHuwei Liu, Yan Zhao, Ning Cao 0002. 552-561 [doi]
- Cloud Security Solution Based on Software Defined NetworkShengli Zhao, Zhaochan Li, Ning Cao 0002. 562-574 [doi]
- An Optimized Multi-Paxos Consensus Protocol for Practical Cloud Storage ApplicationsWenmin Lin, Xuan Sheng, Lianyong Qi. 575-584 [doi]
- A Blockchain Based Searchable Encryption Scheme for Multiple Cloud StorageChao Zhang, Shaojing Fu, Weijun Ao. 585-600 [doi]