Abstract is missing.
- A Survey on Range Proof and Its Applications on BlockchainChunhua Deng, Jia-Fan, Zhen Wang, Yili Luo, Yue Zheng, Yixin Li, Jianwei Ding. 1-8 [doi]
- Accountable Data Sharing Scheme Based on Blockchain and SGXYili Luo, Jia-Fan, Chunhua Deng, Yixin Li, Yue Zheng, Jianwei Ding. 9-16 [doi]
- An Extensible Consensus Algorithm Based on PBFTYixin Li, Zhen Wang, Jia-Fan, Yue Zheng, Yili Luo, Chunhua Deng, Jianwei Ding. 17-23 [doi]
- An Improved Gossip Algorithm Based on Semi-Distributed Blockchain NetworkXiaowei He, Yiju Cui, Yunchao Jiang. 24-27 [doi]
- Analysis of Blockchain Technology for Higher EducationFernando Vidal, Feliz Gouveia, Christophe Soares. 28-33 [doi]
- Basis Path Coverage Criteria for Smart Contract Application TestingXinming Wang, Zhijian Xie, Jiahao He, Gansen Zhao, Ruihua Nie. 34-41 [doi]
- Blockchain-Based Privacy Protection Unified Identity AuthenticationYue Zheng, Yarong Li, Zhen Wang, Chunhua Deng, Yili Luo, Yixin Li, Jianwei Ding. 42-49 [doi]
- Record and Reward Federated Learning Contributions with BlockchainIsmael Martinez, Sreya Francis, Abdelhakim Senhaji Hafid. 50-57 [doi]
- An Effective Differential Power Attack Method for Advanced Encryption StandardQingsheng Hu, Xiangning Fan, Qiaowei Zhang. 58-61 [doi]
- An Encrypted Malicious Traffic Detection System Based on Neural NetworkTangda Yu, Futai Zou, Linsen Li, Ping Yi. 62-70 [doi]
- Automatic XSS Detection and Automatic Anti-Anti-Virus Payload GenerationLin Li, Linfeng Wei. 71-76 [doi]
- Distributed Node Selection Algorithm for Physical Layer Security in D2D NetworkWeifeng Lu, Mingji Wang, Jia Xu, Siguang Chen, Lijun Yang, Jian Xu. 77-80 [doi]
- Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider ThreatSonali Chandel, Yu Sun, Yitian Tang, Zhili Zhou, Yusheng Huang. 81-89 [doi]
- Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge ComputingShuaipeng Zhang, Hong Liu. 90-96 [doi]
- Hierarchical Key Management Scheme with Multilevel Secure AccessMingxin Ma, Xiaotong Yang, Guozhen Shi, FengHua Li. 97-102 [doi]
- Trust Enhancement Scheme for Cross Domain Authentication of PKI SystemYuxiang Chen, Guishan Dong, Jian Bai, Yao Hao, Feng Li, Haiyang Peng. 103-110 [doi]
- The Golden Shield Project of China: A Decade Later - An in-Depth Study of the Great FirewallSonali Chandel, Zang Jingji, Yu Yunnan, Sun Jingyao, Zhang Zhipeng. 111-119 [doi]
- A Generic Construction of Puncturable EncryptionMingyuan Xia, Lingyuan Yin. 120-124 [doi]
- A New Method for Error Analysis of Binocular Stereo Vision SystemWenwen Chen, Zhibin Zhang, Hui Li, Shuaimin Hou. 125-130 [doi]
- Contrast Limited Adaptive Histogram Equalization for an Advanced Stereo Visual SLAM SystemWenkao Yang, Xiangwei Zhai. 131-134 [doi]
- Info-Retrieval with Relevance Feedback using Hybrid Learning Scheme for RS ImageYongfu Zhou, Zhi Zeng. 135-138 [doi]
- Cascaded Algorithm Representation for Purifying Face Dataset with Labeled NoiseLanfei Wang, Jun Guo. 139-142 [doi]
- Network Coding for Reliable Video Distribution in Device-to-Device CommunicationsYu Liu, Chunling Cheng, Yulong Li, Lei Wang. 143-146 [doi]
- A Study of Online Function Approximation System Based on BP Neural NetworkYaohui Jia, Feng Chen, Peng Wu, Qiang Liu, Yamin Chen, Yun Liu. 147-150 [doi]
- A User Influence Rank Algorithm Based on Interaction Behaviors in Cyber Group EventsJiangpeng Lin, Yu Wu, Li Wang, Weidong Ai, Yan Zeng. 151-157 [doi]
- BDNE: A Method of Bi-Directional Distance Network EmbeddingDongjie Zhu, Yundong Sun, Ning Cao, Xueming Qiao, Ming Xu, Jinlin Li, Junzhou Yang. 158-161 [doi]
- Face Recognition in Complex Lighting EnvironmentChangpeng Zou, Chenggong Ni, Qing Lin, Kaiqiang Feng, Yuxi Wang. 162-165 [doi]
- Forecast of the Tourist Volume of Sanya City by XGBoost Model and GM ModelXia Liu, Yi-nan Chen, Zhao Qiu, Mingrui Chen. 166-173 [doi]
- Impact of Feature Selection Methods on Data Classification for IDSShuai Jiang, Xiaolong Xu. 174-180 [doi]
- Mixed Attribute Clustering Algorithm Based on Filtering MechanismWenxin Wang, Ruilin Zhang. 181-189 [doi]
- Byzantine Fault Tolerant Algorithm Based on VoteHaiyong Wang, Kaixuan Guo. 190-196 [doi]
- Cybersecurity and the Blockchain: Preventing the Insertion of Child Pornography ImagesKirsten Cremona, Donald Tabone, Clifford De Raffaele. 197-204 [doi]
- eRoc: A Distributed Blockchain System with Fast ConsensusLin Zhong, Xihua Duan, Yujue Wang, Jingyan Chen, Jidong Liu, Xiaoguang Wang. 205-214 [doi]
- Impact of Network Load on Direct Acyclic Graph Based Blockchain for Internet of ThingsBin Cao 0002, Shouming Huang, Daquan Feng, Lei Zhang 0035, Shengli Zhang, Mugen Peng. 215-218 [doi]
- Implementing an Asset Trading System Based on Blockchain and Game TheoryHaihui Huang, Jing Cai, Shaoci Xie. 219-226 [doi]
- MDP-Based Quantitative Analysis Framework for Proof of AuthorityXuefeng Liu, Gansen Zhao, Xinming Wang, Yixing Lin, Ziheng Zhou, Hua Tang, Bingchuan Chen. 227-236 [doi]
- Multi-terminal Collaborative Control Decision-Making Mechanism Based on BlockchainGuoliang Qiu, Qiwen Zheng, Xing Hu. 237-244 [doi]
- A Method for Extracting Topological Features of Internet Testbeds Oriented to Equivalent DeductionBo Jiao. 245-248 [doi]
- A Non-Coherent Detection Scheme of O-QPSK Receiver for Perfect-Communication Establishment in Blockchain TechnologyCongyu Shi, Gaoyuan Zhang, Congzheng Han, Baofeng Ji, Ping Xie. 249-252 [doi]
- Density Clustering Algorithm Based on the Dynamic Selection of Cluster CenterLulu Sun, Ruilin Zhang. 253-260 [doi]
- Detecting Domain Generation Algorithms Based on Reinforcement LearningHua Cheng, Yiquan Fang, Lihuang Chen, Jing Cai. 261-264 [doi]
- Drug Audit Based on Bisecting K-Means Clustering AlgorithmYingjuan Tao, Jinsheng Deng, Xingshen Song. 265-270 [doi]
- Slot Filling Using En-TrainingQuansheng Dou, Panpan Cui. 271-276 [doi]
- Weather Analysis to Predict Rice Pest Using Neural Network and D-S Evidential TheoryChuang Ma, Yanming Liang, Xiaofei Lyu. 277-283 [doi]
- A Greedy Approach for TDMA Based on Matrix OperationXiaoying Shuai. 284-287 [doi]
- High Precision Timing Based on Parabola Curve Fitting in Narrowband SystemJun Zou, Chen Xu. 288-291 [doi]
- Near Field Beam Forming Characteristics of Conformal Antenna ArraysShun-Ping Chen. 292-297 [doi]
- Oblique Projection Polarization Filter-Based Self-Interference Cancellation Scheme in In-Band Full-Duplex SystemsChen Xie, Xiaokai Zhang, Daoxing Guo. 298-303 [doi]
- Research on Simultaneous Wireless Information and Power Transmission Based on OFDM for Space SystemChunfeng Wang, Naijin Liu. 304-307 [doi]
- The Future of Broadband Access Network Architecture and Intelligent OperationsCharlie Chen-Yui Yang, Guangzhi Li, Xiang Liu, Zonghuan Wu, Kaiyu Zhang. 308-316 [doi]
- A Dynamic Weighting Fusion Positioning Method Based on Opportunity Correction for INS and UWBNannan Wang, Dalong Zhang, Gangtao Han, Jiayao Chen. 317-321 [doi]
- A Reliable Broadcast Algorithm with Multiple-Opportunity Acknowledgement in Internet of VehiclesPengxue Liu, Dalong Zhang, Yitong Li, Shijie Shi, Cuiping Kong. 322-328 [doi]
- A CNN Approach of Activity Recognition via Channel State Information (CSI)Xiaolan Xie, Zhihong Guo. 329-336 [doi]
- Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler DivergenceElena Basan, Alexander S. Basan, Oleg B. Makarevich. 337-340 [doi]
- Multi-UAV Formation Transformation Based on Improved Heuristically-Accelerated Reinforcement LearningYanbing Xiao, Yingzhou Zhang, Yuxin Sun, Junyan Qian. 341-347 [doi]
- Performance Analysis for Blockchain Driven Wireless IoT Systems Based on Tempo-Spatial ModelYao Sun, Lei Zhang, Gang Feng 0004, Bowen Yang, Bin Cao 0002, Muhammad Ali Imran. 348-353 [doi]
- Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart CardAnnv Liu, An Wang 0001, Yongyin Dong, Ying Shi, Caisen Chen, Guoshuang Zhang. 354-359 [doi]
- Recognizing Fine-Grained Home Contexts Using Multiple Cognitive APIsSinan Chen, Sachio Saiki, Masahide Nakamura. 360-366 [doi]
- Study of the Integration of Robot in Cyber-Physical Production SystemsQiong Liu, Pengxiang Hua, Awais Sultan, Longzhang Shen, Egon Müller, Frank Boerner. 367-370 [doi]
- The Lightweight System for UAV Cooperative Mission Planning SimulationGe Gao, Yingzhou Zhang, Junyan Qian, Yuxin Sun. 371-374 [doi]
- Dynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor NetworksYu Pan, Qianqian Ren, Jinbao Li, Hu Jin. 375-378 [doi]
- Generalization of Quantum Strassen TheoremJingtong Ge. 379-382 [doi]
- Program Slicing Method of LLVM IR Based on Information-Flow AnalysisYuxin Sun, Yingzhou Zhang, Junyan Qian. 383-390 [doi]
- Risk-Based Attributed Access Control Modelling in a Health Platform: Results from Project CityZenEmilio Nakamura, Sérgio Ribeiro. 391-398 [doi]
- Supply-Demand Collaborative Energy Internet for Smart City: A Three-Stage Stackelberg Game ApproachZailong Zhang, Zhiwei Chen. 399-404 [doi]
- The Diagnosis of Alzheimer's Disease Based on Enhanced Residual Neutral NetworkMingchang Xu, Zhenbing Liu, Zimin Wang, Long Sun, Zhibin Liang. 405-411 [doi]
- Tibetan Location Name Recognition Based on BiLSTM-CRF ModelWei Ma, Hongzhi Yu, Kun Zhao, Deshun Zhao, Jun Yang, Jing Ma. 412-416 [doi]
- Ultralightweight RFID Authentication Protocol Based on Permutation Matrix EncryptionTinghui Huang, Yong Ding, Zhen Wang, Huijiao Wang. 417-423 [doi]
- A TSGP-Based Tip Search Optimization AlgorithmHuifang Wang, Zhihong Zhang. 424-427 [doi]
- NERD: Neural Network for Edict of Risky Data StreamsSandro Passarelli, Cem Gündogan, Lars Stiemert, Matthias Schopp, Peter Hillmann. 428-435 [doi]
- Passenger Flow Prediction in Bus Transportation System using ARIMA Models with Big DataYinna Ye, Li Chen, Feng Xue. 436-443 [doi]
- Translational Bit-by-Bit Multi-bit Quantization for CRNN on Keyword SpottingYuhao Sun, Bo Liu. 444-451 [doi]
- Vertical Stratification of Seawater in the Southern South China Sea in Winter Based on Cluster AnalysisChengchang Wan, Xinghui Cao, Wei Wu. 452-455 [doi]
- Water Quality Prediction of Small Watershed Based on Wavelet Neural NetworkChuang Ma, Linfeng Li, Daiqi Zhou. 456-463 [doi]
- Lightweight EEG Classification Model Based on EEG-sensor with Few ChannelsHaoyan Xu, Xiaolong Xu. 464-473 [doi]
- Detecting Sensitive Information of Unstructured Text Using Convolutional Neural NetworkGuosheng Xu, Chunhao Qi, Hai Yu, Shengwei Xu, Chunlu Zhao, Jing Yuan. 474-479 [doi]