Abstract is missing.
- Analysis of Zero-Key Authentication and Zero-Knowledge ProofHuancheng Lin, Zhehan Wang, Tong Xu, Shanyue Zhou, Yang Hong, Jun Huang. 1-8 [doi]
- On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart GridJianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han. 9-11 [doi]
- Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence ModelsThejavathy Vengappa Raja, Zoheir Ezziane, Jun He, Xiaoqi Ma, Asmau Wali-Zubai Kazaure. 12-18 [doi]
- Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code TensorZhao Yang, Fengyang Deng, Linxi Han. 19-28 [doi]
- DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic EncryptionJing Wang, Fengheng Wu, Tingbo Zhang, Xiaohua Wu. 29-32 [doi]
- Adversarial Attack and Defense for Webshell Detection on Machine Learning ModelsQian Zhang, Lishen Chen, Qiao Yan. 33-41 [doi]
- Relevance of the Gaussian classification on the Detection of DDoS AttacksAbdou Romaric Tapsoba, Frédéric Tounwendyam Ouédraogo, Arnold Elvis Ouédraogo. 42-49 [doi]
- Big data encrypting transmission framework for a multi-AGV systemTongpo Zhang, Yuxin Wan, Miguel López-Benítez, Enggee Lim, Fei Ma, Limin Yu. 50-56 [doi]
- Blockchain-based Multi-layer Data Security Sharing ModelYishan Wei, Xiaomei Cao. 57-65 [doi]
- A Privacy-Preserving Blockchain-based Energy Supply Chain System Supporting SupervisionZhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li. 66-75 [doi]
- BIM Credibility: A Framework of Blockchain-enabled BIM DataHui Jiang. 76-79 [doi]
- A Re-configurable Interaction Model in Distributed IoT EnvironmentFangze Qiu, Huaxiao Huang, Yuji Dong. 80-86 [doi]
- RTOSExtracter: Extracting user-defined functions in stripped RTOS-based firmwareXinguang Xie, Junjian Ye, Lifa Wu, Rong Li. 87-96 [doi]
- Machine Learning Model Design for IoT-Based Flooding ForecastQinghua Wang. 97-103 [doi]
- LwF4IEE: An Incremental Learning Method for Interactive Event ExtractionJiashun Duan, Xin Zhang, Chi Xu. 104-113 [doi]
- Deep Learning To Model The Complexity Of Algal BloomHaoyu Wu, Zhibin Lin, Borong Lin, Zhenhao Li, Nanlin Jin, Xiaohui Zhu. 114-122 [doi]
- A Multimodal Off-Road Terrain Classification Benchmark for Extraterrestrial Traversability AnalysisHuang Huang, Yi Yang, Liang Tang, Zhang Zhang, NaiLong Liu, Mou Li, Liang Wang. 123-126 [doi]
- An enhanced interpretable deep learning approach for diabetic retinopathy detectionSoha Alrajjou, Edward Kwadwo Boahen, Chunyun Meng, Keyang Cheng. 127-135 [doi]
- Ghost Expectation Point with Deep Reinforcement Learning in Financial Portfolio ManagementXuting Yang, Ruoyu Sun, Xiaotian Ren, Angelos Stefanidis, Fengchen Gu, Jionglong Su. 136-142 [doi]
- MDAEN: Multi-Dimensional Attention-based Ensemble Network in Deep Reinforcement Learning Framework for Portfolio ManagementRuiyu Zhang, Xiaotian Ren, Fengchen Gu, Angelos Stefanidis, Ruoyu Sun, Jionglong Su. 143-151 [doi]
- A New Hybrid Steganography Scheme Employing A Time-Varying Delayed Chaotic Neural NetworkKarim H. Moussa, Marwa H. El-Sherif. 152-157 [doi]
- A Novel DenseNet-based Deep Reinforcement Framework for Portfolio ManagementRuoyi Gao, Fengchen Gu, Ruoyu Sun, Angelos Stefanidis, Xiaotian Ren, Jionglong Su. 158-165 [doi]
- Design and Implementation of Industrial Control Cyber Range SystemXuan Low, Dequan Yang, Dengpan Yang. 166-170 [doi]
- Study on fast convergence method of IIR low pass filterZuping Zhang. 171-176 [doi]
- Modeling and Accelerating of Mobile Advertisement Dissemination in Vehicular NetworksJie Wang. 177-180 [doi]
- Deep Neural Networks Enhanced Phase Asynchronous Physical-Layer Network CodingXuesong Wang, Lu Lu. 181-184 [doi]
- QT-STNet: A Spatial and Temporal Network Combined with QT Segment for MI Detection and LocationJie Yu, Jian Gao, Ning Wang, Panpan Feng, Bing Zhou, Zongmin Wang. 185-188 [doi]
- A CVD Critical Level-aware Scheduling Model Based on Reinforcement Learning for ECG Service RequestJian Gao, Jie Yu, Ning Wang, Panpan Feng, Huiqing Cheng, Bing Zhou 0003, Zongmin Wang. 189-192 [doi]
- Sparse coding based on L2,1-norm and manifold regularization for remote sensing imagesJianjun Yuan, Shifeng Li. 193-197 [doi]
- Ultra-low Dose CT Image Denoising based on Conditional Denoising Diffusion Probabilistic modelQiwei Li, Chen Li, Chenggong Yan, Xiaomei Li, Haixia Li, Tianjing Zhang, Hui Song, Roman Schaffert, Weimin Yu, Yu Fan, Jianwei Ye, Hao Chen. 198-205 [doi]
- A Lightweight Deep Learning Model for Real-time Detection and Recognition of Traffic Signs Images Based on YOLOv5Hui He, Qihong Chen, Guoping Xie, Boxiong Yang, Shelei Li, Bo Zhou, Yuye Gu. 206-212 [doi]
- Machine Learning-based Gesture Recognition Using Wearable DevicesHaoyu Wu, Jun Qi, Wei Wang, Jianjun Chen. 213-221 [doi]
- Improved YOLOv5s algorithm for small item detection of wheelhouseJin Hu, Wang Juan, Wang Zuli, Long Dan. 222-225 [doi]
- Research on Multiple Targets Pedestrian Reidentification with Night Scene Image EnhancementMinkang Zhang, Ding Chen, Yongxin Huang. 226-229 [doi]
- *Qi Qing. 230-239 [doi]
- A Relation Enhanced Model For Abstractive Dialogue SummarizationPengyao Yi, Ruifang Liu. 240-246 [doi]
- A Task Allocation Method in Edge Computing Based on Multi-Objective OptimizationYang Xiao. 247-251 [doi]
- Security hardening solution for docker containerNan Yang, Cen Chen, Tao Yuan, Yujie Wang, Xiaofan Gu, Dan Yang. 252-257 [doi]
- Dangerous Action Recognition for Ship Sailing to Limited Resource EnvironmentShengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang. 258-262 [doi]
- Comprehensive defense scheme against container escape related to container management procedureZhimin Guo, Zhuo Lv, Nuannuan Li, Tao Yuan, Xue Gao, Zekun Yuan. 263-266 [doi]
- Point cloud objective recognition method combining SHOT features and ESF featuresJunfeng Ding, Hao Chen, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang. 267-274 [doi]
- Study on the automatic modeling method of 3D information model for substationsJunfeng Ding, Haonan Zong, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang. 275-283 [doi]
- Multi-task Assignment Research for Heterogeneous UAVs based on Improved Simulated Annealing Particle Swarm Optimization AlgorithmJie Zhang, Pengcheng Wen, Ai Xiong. 284-288 [doi]
- UAV Trajectory Optimization for PHY Secure Communication Against Cooperative EavesdroppersHuanran Zhang, Lingfeng Shen, Ning Wang 0004, Xiaomin Mu. 289-293 [doi]
- Causal Unstructured Pruning in Linear Networks Using Effective InformationChangyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai 0002, Yutao Yue. 294-302 [doi]
- Conditional Metadata Embedding Data Preprocessing Method for Semantic SegmentationJuntuo Wang, Qiaochu Zhao, Dongheng Lin, Erick Purwanto, Ka Lok Man. 303-311 [doi]
- A Personalized Recommendation Fusing Tag Feature and Temporal ContextLing Li. 312-317 [doi]
- Comparison of ARIMA Model and GM(1,1) Model in Passenger Flow Prediction of Sanya AirportYuan-hui Li, Zhao Wen, Hai-yun Han, Zhipeng Ou, Liu Xia. 318-323 [doi]