Abstract is missing.
- Establish a scientific concept of network security and build a strong defense line of network securityChangXiang Shen, Lei Zhang, David M. Perry, Guangyi Liu. [doi]
- Blockchain-based Dynamic Group Management for Multiple Keywords Searchable Encryption TechnologyYuxiang Chen, Jian Bai, Yao Hao, Sijie Liao, Zhongqiang Yi, Hao Zhang. 1-6 [doi]
- A universal decentralized authentication and authorization protocol based on BlockchainYang Tan, Wei Li, Juan Yin, Yun Deng. 7-14 [doi]
- Blockchain at the Shop Floor for MaintenanceDominik Welte, Axel Sikora, Daniel Schönle, Jan Stodt, Christoph Reich. 15-22 [doi]
- Towards Decentralized Trust Management Using Blockchain in Crowdsourcing NetworksHaochen Yang, Guanghui Wang, Zhonghao Zhai, Xin He. 23-28 [doi]
- An Ethereum-based Energy Trading Protocol (EETP)Yassin M. Thibodeau Hafid, Dimitrios Makrakis, Etienne Elie. 29-34 [doi]
- Semi-Supervised Deep Learning based Network Intrusion DetectionSiyuan Zhang, Chaoming Du. 35-40 [doi]
- A Comprehensive Detection Approach of Wannacry: Principles, Rules and ExperimentsGuohang Lu, Yi Liu, Yifei Chen, Chengwei Zhang 0002, Yayu Gao, Guohui Zhong. 41-49 [doi]
- Electronic voting protocol based on ring signature and secure multi-party computingJingzhong Wang, Yue Zhang, Haibin Li. 50-55 [doi]
- An Anti-Collusion Fingerprinting based on CFF Code and RS CodeYuxin Sun, Yingzhou Zhang, Linlin Zhu. 56-63 [doi]
- A Comprehensive Detection Approach of Nmap: Principles, Rules and ExperimentsSi Liao, Chenming Zhou, Yonghui Zhao, Zhiyu Zhang, Chengwei Zhang 0002, Yayu Gao, Guohui Zhong. 64-71 [doi]
- Verifiable and Privacy-Preserving Outsourcing of Matrix MultiplicationsMeng Zhao, Yong Ding 0005, Yujue Wang, Huiyong Wang, Bo Han. 72-75 [doi]
- Intelligent Cybersecurity Situational Awareness Model Based on Deep Neural NetworkChuang Ma, Haisheng You, Li Wang, Jiajun Zhang. 76-83 [doi]
- Network Attack Detection Based on Kernel Principal Component Analysis and Decision TreeChuang Ma, Jiajun Zhang, Li Wang, Haisheng You. 84-91 [doi]
- An Adaptive Dummy-based Mechanism to Protect Location Privacy in Smart Health Care SystemJianbo Huang, Liang Chang 0003, Long Li 0005, Xuguang Bao. 92-97 [doi]
- Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast DecryptionYing Fang, Tianlong Gu, Liang Chang, Long Li. 98-106 [doi]
- Single High-Value Region Detection Based on Image Equal-SegmentationJinlong Chen, Lei Huang. 107-113 [doi]
- An Image Data Query Algorithm Based on Ontology and Singular Value DecompositionHuang Xia. 114-119 [doi]
- Image encryption algorithm based on Logistic-Sine compound chaosHaini Zeng, Deli Chen. 120-123 [doi]
- A VR/AR-based Display System for Arts and Crafts MuseumYang Tao. 124-129 [doi]
- A Semi-Supervised Feature Fusion Method for Sentence Similarity MatchingYanru Zhong, Leixian Zhao, Chaohao Jiang, Zhaorong He, Xiaonan Luo. 130-137 [doi]
- Information Extraction Method based on Dilated Convolution and Character-Enhanced Word EmbeddingZhaorong He, Xiaonan Luo, Yanru Zhong, Chaohao Jiang, Leixian Zhao. 138-143 [doi]
- Open Entity Semantic Relation Extraction in Big Data EnvironmentLi Zhen, Yang Zengchun. 144-151 [doi]
- Weibo Sentiment Classification Based on Two Channels Text Convolution Neural Network with Multi-FeatureYu Wu, Zhenni Zhao, Jie Yang, Yijun Lin. 152-160 [doi]
- Research on Open Entity Semantic Relation Extraction in Big Data EnvironmentLi Zhen. 161-168 [doi]
- Classification and Characteristics analysis with Dynamic Model on Public Opinion in the Chinese Sina-microblogFulian Yin, Xueying Shao, Yifan Zhang, Xiaowei Zhu. 169-175 [doi]
- An Online Framework for Temporal Social Unrest Event Prediction Using News StreamFengcai Qiao, Jinsheng Deng, Li Wei. 176-182 [doi]
- A Hierarchical Participant Classification Model of Hot Events in Chinese MicroblogFulian Yin, Sitong Li, Xiaowei Liu, Lingyao Zhu, Wenhui Yu. 183-189 [doi]
- Attentional Autoencoder for Course Recommendation in MOOC with Course RelevanceJindan Tan, Liang Chang 0003, Tieyuan Liu, Xuemei Zhao. 190-196 [doi]
- MOOCs Dropout Prediction Based on Hybrid Deep Neural NetworkYan Zhang, Liang Chang 0003, Tieyuan Liu. 197-203 [doi]
- An Improved Parallel SVM Algorithm on Distributed SystemZelu Kang, Nong Xiao, Zhiguang Chen, Yang Ou, Xinming Li. 204-209 [doi]
- Translation Russian Cyrillic to Latin Alphabet using Random Forest AlgorithmMuhammad Mufti Ramadhan, Budhi Irawan, Casi Setianingsih. 210-213 [doi]
- Choosing the Right Compute Resources in the Cloud: An analysis of the compute services offered by Amazon, Microsoft and GoogleRobert Kelley, Antara Debnath Antu, Anup Kumar, Bin Xie 0001. 214-223 [doi]
- Relational Database Watermarking for Data TracingXi Shen, Yingzhou Zhang, Tianqi Wang, Yuxin Sun. 224-231 [doi]
- A Database Collusion Detection and Measurement Based on Bloom FilterChonghui Ge, Yunlong Di, Yuxin Sun, Yongjin Zhu, Linfeng Xie, Yingzhou Zhang. 232-238 [doi]
- Reversible Database Watermarking Based on Random Forest and Genetic AlgorithmChonghui Ge, Jian Sun, Yuxin Sun, Yunlong Di, Yongjin Zhu, Linfeng Xie, Yingzhou Zhang. 239-247 [doi]
- Verifiable Decentralized Access Control for Distributed DatabasesXiaowen Feng, Pengcheng Deng, Yanzi Yi, Qi Yu, Decun Luo, Hua Deng, Yujue Wang. 248-253 [doi]
- Database Traceability Algorithm Based On Zero WatermarkMaolin Shen, Yingzhou Zhang, Yunlong Di, Yuxin Sun. 254-259 [doi]
- Research on Index Scheme of Encrypted XML Data StructureWei Wei. 260-263 [doi]
- Multiple Kernel Learning via Ensemble Artifice in Reproducing Kernel Hilbert SpaceKou Lu, Jiajing Zhao, Jianming Zhang, Cheng Qin. 264-267 [doi]
- Multi-grained rough set in job guidance for college graduatesJunliang Wang, Kaiyou Yuan, Zehan Shi. 268-271 [doi]
- Intelligent Fault Diagnosis with Deep ArchitectureJinrui Gan, Peng Wu, Guoliang Zhang, Shiwen Dong, Zhaogang Han, Weiwei Liu. 272-275 [doi]
- Computing Resource Allocation and Offloading Method based on Simulated Annealing AlgorithmTinghui Huang, Sijun Li, Xinyu Gao. 276-282 [doi]
- Evaluating the Structural Model using Internet Interdomain Topological DatasetsBo Jiao. 283-286 [doi]
- Convolutional Recurrent Neural Networks for Knowledge TracingWei Wang, Tieyuan Liu, Liang Chang 0003, Tianlong Gu, Xuemei Zhao. 287-290 [doi]
- Daily Passenger Volume Prediction in the Bus Transportation System using ARIMAX Model with Big DataYingchen Su, Yinna Ye. 291-300 [doi]
- News Influence Model Based on Neural NetworkJin Dai, Jiayao Li. 301-308 [doi]
- One Class Support Vector Machine Active Learning Method for Unbalanced DataJin Dai, Haichuan Liu, Qirui Zhang. 309-315 [doi]
- Utility Function based Power Control Scheme in Femtocell NetworkSun Xia, Chen Yin. 316-320 [doi]
- Cooperative Jamming Algorithm Based on Trust UpdateWeifeng Lu, Zhihao Ren, Jia Xu, Siguang Chen. 321-324 [doi]
- Security Performance Analysis of Physical Layer for UAV Swarm NetworksRunze Dong, Buhong Wang, Tianhao Cheng. 325-330 [doi]
- A Reliable and Efficient Distributed Semantic Discovery Mechanism for Mobile P2P NetworksShengnan Chen, Liang Qian. 331-334 [doi]
- Primary User Channel State Prediction Based on Channel Allocation and DBHMMMilembolo Miantezila, Bin Guo, Chenjie Zhang, Xuemei Bai. 335-338 [doi]
- Research on Data Fusion Scheme of WSNs Based on DGM Prediction ModelJin Dai, Xianjing Zhao, Xingxing Zhou, Qirui Zhang. 339-347 [doi]
- Evaluation of TDM-based Integrated Access and Backhaul Schemes for 5G and Beyond at mmWave BandBobo Yin, Ning Wang, Yajun Fan, Xiaofang Sun, Danping He, Wenhao Liu. 348-353 [doi]
- Real-time Traffic Signs Detection Based on YOLO Network ModelWenkao Yang, Wei Zhang. 354-357 [doi]
- Ocean Sound Velocity Estimation Based on RBF Neural NetworksChengchang Wan, Xinghui Cao, Wei Wu, Chen Wang. 358-361 [doi]
- Hand-assisted rehabilitation robot based on human-machine master-slave motion modeXiaosu Tan, Qingqin Luo, Shuang Yang, Yulian Jiang. 362-365 [doi]
- Line inspection logistics robot delivery system based on machine vision and wireless communicationHanzhong Tan. 366-374 [doi]
- The Modbus Protocol Vulnerability Test in Industrial Control SystemsHung-Chang Chang, Chen-Yi Lin, Da-Jyun Liao, Tung-Ming Koo. 375-378 [doi]
- Signal processing for extracting velocity information from spatial filtering signalsYanbin Sun, Jianmei Zhou, Shanshan Chen, Xiangkai Zeng, Xia Sun. 379-383 [doi]