Abstract is missing.
- IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDNYinqi Yang, Jian Wang, Baoqin Zhai, Jiqiang Liu. 3-17 [doi]
- Location Consistency-Based MITM Attack Detection in 802.11ad NetworksXianglin Wei, Chaogang Tang. 18-29 [doi]
- Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural NetworkYifu Liu, Jieren Cheng, Xiangyan Tang, Mengyang Li, Luyi Xie. 30-41 [doi]
- DDoS Attack Detection Method Based on V-Support Vector MachineXiangyan Tang, Rui Cao, Jieren Cheng, Dong Fan, Wenxuan Tu. 42-56 [doi]
- DDOS Multivariate Information Fusion Model Based on Hierarchical Representation LearningXiangyan Tang, Yiyang Zhang, Jieren Cheng, Jinying Xu, Hui Li. 57-66 [doi]
- A Method of Malicious Bot Traffic DetectionMengying Wu, Zhendong Wu, Hao Lv, Jingjing Wang. 67-76 [doi]
- Intrusion Detection Traps within Live Network EnvironmentXiaochun Cheng, Matus Mihok. 77-89 [doi]
- A Confidence-Guided Anomaly Detection Approach Jointly Using Multiple Machine Learning AlgorithmsXueshuo Xie, Zongming Jin, Qingqi Han, Shenwei Huang, Tao Li. 93-100 [doi]
- Boosting Training for PDF Malware Classifier via Active LearningXinxin Wang, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang. 101-110 [doi]
- Malicious Intentions: Android Internet Permission Security RisksJohn Mark Andah, Jinfu Chen. 111-120 [doi]
- DeepWAF: Detecting Web Attacks Based on CNN and LSTM ModelsXiaohui Kuang, Ming Zhang, Hu Li, Gang Zhao, Huayang Cao, Zhendong Wu, Xianmin Wang. 121-136 [doi]
- Research on Intrusion Detection Based on Semantic Re-encoding and Multi-space ProjectionJingjing Wang, Zhendong Wu, Zhang Zhang. 137-150 [doi]
- Software Defect Prediction Model Based on GA-BP AlgorithmMengtian Cui, Yameng Huang, Jing Luo. 151-161 [doi]
- Security Solution Based on Raspberry PI and IoTBahast Ali, Xiaochun Cheng. 162-171 [doi]
- Design of Anonymous Communication Protocol Based on Group SignatureHaojia Zhu, Can Cui, Fengyin Li, Zhongxing Liu, Quanxin Zhang. 175-181 [doi]
- Research on K-Means Clustering Algorithm Over Encrypted DataChen Wang, Andi Wang, Xinyu Liu, Jian Xu 0004. 182-191 [doi]
- Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing DecryptionWang Yao, Faguo Wu, Xiao Zhang. 192-204 [doi]
- An Efficient Dynamic Group Signatures Scheme with CCA-Anonymity in Standard ModelXiaohan Yue, Mingju Sun, Xibo Wang, Hong Shao, Yuan He 0002. 205-219 [doi]
- An Efficient Property-Based Authentication Scheme in the Standard ModelXiaohan Yue, Xin Wang, Xibo Wang, Wencheng Cui, Yuan He 0002. 220-233 [doi]
- Group Identification via Non-threshold Leakage-Resilient Secret Sharing SchemePing Li 0018, Jin Li, Alzubair Hassan. 234-241 [doi]
- A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual SystemPengtao Liu. 242-252 [doi]
- Lightweight Encryption Algorithm Containing SPN Structure for IoTYiming Qin, Xinchun Cui, Yuefan Wang, Hong Qiao, Shancang Li. 253-262 [doi]
- A Blind Watermarking Scheme Using Adaptive Neuro-Fuzzy Inference System Optimized by BP Network and LS Learning ModelJilin Yang, Chunjie Cao, Jun Zhang, Jixin Ma, Xiaoyi Zhou. 263-274 [doi]
- Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple KeysChuan Zhao, Shengnan Zhao, Bo Zhang 0020, Shan Jing, Zhenxiang Chen, Minghao Zhao. 275-284 [doi]
- Secure and Dynamic Outsourcing Computation of Machine Learning in Cloud ComputingPing Li, Jin Li. 285-292 [doi]
- A Biometric Key Generation Method for Fingerprint and Finger Vein FusionHua Yang, Zhendong Wu. 293-300 [doi]
- A Fingerprint and Voiceprint Fusion Identity Authentication MethodYaoping Wu, Zhendong Wu, Hua Yang. 301-310 [doi]
- Research and Application of Trusted Service Evaluation Model in Social NetworkRui Ge, Ying Zheng, Fengyin Li, Dongfeng Wang, Yuanzhang Li. 313-317 [doi]
- Effective L-Diversity Anonymization Algorithm Based on Improved ClusteringWantong Zheng, Yong Ma, Zhongyue Wang, Chunfu Jia, Peng Li. 318-329 [doi]
- Semantic Location Privacy Protection Based on Privacy Preference for Road NetworkYonglu Wang, KaiZhong Zuo, Rui Liu, Liangmin Guo. 330-342 [doi]
- Efficient Privacy Preserving Cross-Datasets Collaborative Outlier DetectionZhaohui Wei, Qingqi Pei, Xuefeng Liu, Lichuan Ma. 343-356 [doi]
- An SVM Based Secural Image Steganography Algorithm for IoTWeifeng Sun, MingHan Jia, Shumiao Yu, Boxiang Dong, Xinyi Li. 357-371 [doi]
- A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol ModelBaochang Zhang, Juan Li, Xi Zheng, Jingjun Ge, Juan Sun. 372-381 [doi]
- Privacy-Preserving Attribute-Based Multi-keyword Search Encryption Scheme with User TracingZhenhua Liu, Yan Liu, Jing Xu, Baocang Wang. 382-397 [doi]
- Facial Localization Based on Skin Color ModelingWei Li, Nan Li. 401-408 [doi]
- A Textual Password Entry Method Resistant to Human Shoulder-Surfing AttackShudi Chen, Youwen Zhu. 409-420 [doi]
- Speaker Recognition Based on Lightweight Neural Network for Smart Home SolutionsHaojun Ai, Wuyang Xia, Quanxin Zhang. 421-431 [doi]
- A Fine-Grained Authorized Keyword Secure Search Scheme in the Cloud ComputingFan Wang, Zheng Qin, Hui Yin. 432-447 [doi]
- Implementing Fingerprint Recognition on One-Time Password Device to Enhance User AuthenticationXiaochun Cheng, Andreas Pitziolis, Aboubaker Lasebae. 448-461 [doi]
- A Secure Authentication Scheme Based on Chen's Chaotic System and Finger Vein's Auxiliary DataTingting Lan, Hui Wang, Lin You. 462-476 [doi]
- Image Denoising Based on Sparse Representation over Learned DictionariesJuan Wang, Guanghui Li 0003, Fei Du, Meng Wang, Yong Hu, Meng Yu, Aiyun Zhan, Yuejin Zhang. 479-486 [doi]
- Cyclic DenseNet for Tumor Detection and IdentificationDi Jiang, Hui Liu 0016, Qiang Guo, Caiming Zhang. 487-493 [doi]
- Stock Prediction Model Based on Wavelet Packet Transform and Improved Neural NetworkXin Liu, Hui Liu 0016, Qiang Guo, Caiming Zhang. 494-500 [doi]
- An Image Denoising Algorithm Based on Singular Value Decomposition and Non-local Self-similarityGuoyu Yang, Yilei Wang, Banghai Xu, Xiaofeng Zhang. 501-510 [doi]
- Dummy Trajectory Generation Scheme Based on Deep LearningJiaji Pan, Jingkang Yang, Yining Liu. 511-523 [doi]
- Explaining Concept Drift of Deep Learning ModelsXiaolu Wang, Zhi Wang 0014, Wei Shao, Chunfu Jia, Xiang Li. 524-534 [doi]
- Attention Bilinear Pooling for Fine-Grained Facial Expression RecognitionLiyuan Liu, Lifeng Zhang, Shixiang Jia. 535-542 [doi]
- A Secure Collision Avoidance Warning Algorithm Based on Environmental Characteristics and Driver CharacteristicsYuejin Zhang, Fei Du, Meng Wang, Juan Wang, Yong Hu, Meng Yu, Guanghui Li 0003, Aiyun Zhan. 545-552 [doi]
- Research on Safety Early Warning Transmission Control Algorithm Based on Driving StabilityAiyun Zhan, Meng Wang, Juan Wang, Fei Du, Yong Hu, Meng Yu, Guanghui Li 0003, Yuejin Zhang. 553-561 [doi]
- Body-Weight Estimation of Plateau Yak with Simple Dimensional MeasurementYu-an Zhang, Xiaofeng Qin, Minghao Zhao, Meiyun Du, Rende Song. 562-571 [doi]
- Bank Card Number Identification Based on Template Matching MethodWei Li, Zhilin Song. 572-578 [doi]
- A Security Situation Assessment Method Based on Neural NetworkXiangyan Tang, Meizhu Chen, Jieren Cheng, Jinying Xu, Hui Li. 579-587 [doi]
- Main Enabling Technologies in Industry 4.0 and Cybersecurity ThreatsLei Shi, Xiao Chen 0002, Sheng Wen, Yang Xiang 0001. 588-597 [doi]