Abstract is missing.
- A Position-Based Secure Fast Handover Mechanism for High-Speed TrainsYue Zhao, Zhouguo Chen, Hong Su, Enbo Sun, Yubin Guo, Jianwei Ding. 1-6 [doi]
- The social negative mood index for social networksRui Jin, Hongli Zhang 0001, Yu Zhang 0036. 1-5 [doi]
- The Research about Public Sentiment Differences between the Belt and Road Countries on China's Hot IssuesFulian Yin, Yiming Ma, Congcong Zhang, Jinbao Song. 7-14 [doi]
- Deep CNN-Based Methods to Evaluate Neighborhood-Scale Urban Valuation Through Street Scenes PerceptionJunhan Zhao, Xiang Liu, Yanqun Kuang, Yingjie Victor Chen, Baijian Yang. 20-27 [doi]
- Identity-Based Blind Proxy Re-Signature Scheme for Data SecurityXiaodong Yang 0006, Likun Xiao, Yutong Li, Shudong Li, Jinli Wang, Chunlin Chen. 28-32 [doi]
- The Real Time Gait Phase Detection Based on Long Short-Term MemoryZhen Ding, Chifu Yang, Kai Xing, Xueyan Ma, Kai Yang, Hao Guo, Chunzhi Yi, Feng Jiang 0001. 33-38 [doi]
- Topic Analysis Model for Online Social NetworkYan Jia 0001, Lu Deng, Bin Zhou 0004, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu 0004, Yong Quan. 39-44 [doi]
- Fast Top-k Area Topics Extraction with Knowledge BaseFang Zhang, Xiaochen Wang, Jingfei Han, Jie Tang 0001, Shiyin Wang. 45-52 [doi]
- The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching TechniquesTiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang. 53-60 [doi]
- Virtual Community Detection Model and Related Research in Online Social NetworksYan Jia 0001, Qiang Liu 0004, Binxing Fang, Bin Zhou 0004, Lu Deng, Yong Quan. 61-68 [doi]
- Question Classification Based on MAC-LSTMBengong Yu, Qingtang Xu, Peihang Zhang. 69-75 [doi]
- Toward Predicting Communication EffectivenessZeshan Peng, Wenbo Wang, Bitty Balducci, Detelina Marinova, Yi Shang. 76-83 [doi]
- Generic Generating Functions for the Counting Functions of Quadratic Functions with Prescribed Walsh SpectrumXiaolong Yang, Mengce Zheng, Honggang Hu. 84-91 [doi]
- Urban Road Congestion Condition Discrimination Research Based on Vector FeaturesZhinming Ding, Fujie Ren, Zhi Cai, Yang Cao. 92-98 [doi]
- ULE: Learning User and Location Embeddings for POI RecommendationHao Wang, Wentao Ouyang, Huawei Shen, Xueqi Cheng. 99-106 [doi]
- Reasoning about Cloud Storage SystemsHanpin Wang, Zhao Jin, Lei Zhang, Yuxin Jing, Yongzhi Cao. 107-114 [doi]
- TigerAware: An Innovative Mobile Survey and Sensor Data Collection and Analytics SystemWilliam Morrison, Luke M. Guerdan, Jayanth Kanugo, Timothy Trull, Yi Shang. 115-122 [doi]
- JMS: Joint Bandwidth Allocation and Flow Assignment for Transfers with Multiple SourcesGeng Li, Yichen Qian, Lili Liu, Y. Richard Yang. 123-130 [doi]
- Neural Network Based Clinical Treatment Decision Support System for Co-existing Medical ConditionsYichun Duan, Guopeng Zhou, Yuanxing Zhang, Zhaoqian Lan, Chunhua Chi, Wei Yan. 131-138 [doi]
- Multi-level Composite Neural Networks for Medical Question Answer MatchingDong Ye, Sheng Zhang, Hui Wang, Jiajun Cheng, Xin Zhang, Zhaoyun Ding, Pei Li. 139-145 [doi]
- A Robust Change-Point Detection Method by Eliminating Sparse Noises from Time SeriesKun Qin, Lei Sun 0006, Bo Liu, Yuan Fan, Kar-Ann Toh. 146-152 [doi]
- Webshell Detection Based on Random Forest-Gradient Boosting Decision Tree AlgorithmHandong Cui, Delu Huang, Yong Fang, Liang Liu, Cheng Huang. 153-160 [doi]
- Structural Brain Network Mining Based on Core TheoryYifan Zhang, Kan Zhang, Xinyi Zou. 161-168 [doi]
- Privacy-Aware Personal Information Propagation Management in Social NetworksYu Wu, Li Pan. 169-174 [doi]
- Traffic Status Evaluation Based on Possibilistic Fuzzy C-Means Clustering AlgorithmKhouanetheva Pholsena, Li Pan. 175-180 [doi]
- SLBot: A Serverless Botnet Based on Service FluxDi Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui. 181-188 [doi]
- A Data Storage Method Based on Blockchain for Decentralization DNSJingqiang Liu, Bin Li, Lizhang Chen, Meng Hou, Feiran Xiang, Peijun Wang. 189-196 [doi]
- Micro-Honeypot: Using Browser Fingerprinting to Track AttackersZhaopeng Jia, Xiang Cui, Qixu Liu, Xiaoxi Wang, Chaoge Liu. 197-204 [doi]
- Image Encryption Algorithm Based on Memristive BAM Neural NetworksJiuhong Xiao, Weiping Wang, Meiqi Wang. 205-212 [doi]
- Constructing Browser Fingerprint Tracking Chain Based on LSTM ModelXiaoyun Li, Xiang Cui, Limin Shi, Chaoge Liu, Xiaoxi Wang. 213-218 [doi]
- MaliceScript: A Novel Browser-Based Intranet ThreatChaoge Liu, Xiang Cui, Zhi Wang, Xiaoxi Wang, Yun-feng, Xiaoyun Li. 219-226 [doi]
- RansomTracer: Exploiting Cyber Deception for Ransomware TracingZihan Wang, Xu Wu, Chaoge Liu, Qixu Liu, Jialai Zhang. 227-234 [doi]
- User Tagging in MOOCs Through Network EmbeddingChaoyang Li, Zhengyang Song, Jie Tang 0001. 235-241 [doi]
- Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime AnalysisYan Li, Peiyi Han, Chuanyi Liu, Binxing Fang. 242-249 [doi]
- Approximation Algorithms for Controller Placement Problems in Software Defined NetworksTianshu Li, Zhaoquan Gu, Xiao Lin 0002, Shudong Li, Qingfeng Tan. 250-257 [doi]
- SAQP++: Bridging the Gap between Sampling-Based Approximate Query Processing and Aggregate PrecomputationDongxiang Zhang, Mingtao Lei, Xiang Zhu. 258-265 [doi]
- How to Control Target Nodes in Dynamic NetworksZhaoquan Gu, Yongcai Wang, Jing Qiu, Lihua Yin, Zhihong Tian. 266-273 [doi]
- Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social NetworksFang Liu, Li Pan, Lihong Yao. 274-279 [doi]
- Bitcoin Mixing Detection Using Deep AutoencoderLihao Nan, Dacheng Tao. 280-287 [doi]
- Robust Audio Watermarking Algorithm Based on Air Channel CharacteristicsWen Diao, Yuanxin Wu, Weiming Zhang, Bin Liu, Nenghai Yu. 288-293 [doi]
- Early Detection of Rumors in Heterogeneous Mobile Social NetworkYuanxing Zhang, Kaigui Bian, Lin Chen, Shaoling Dong, Lingyang Song, Xiaoming Li. 294-301 [doi]
- Research on Vulnerability of Space Information Network Based on Interdependent NetworksZhongwen Zhao, Zhangyuan Li, Huanghuang Guo, Miaoben Yang. 302-309 [doi]
- Stochastic Alternating Direction Method of Multipliers with Conjugate GradientMingyuan Ma, Dongyang Zhao. 310-316 [doi]
- Performance Comparison of Deep Learning Techniques for Recognizing Birds in Aerial ImagesYang Liu, Peng Sun, Max R. Highsmith, Nickolas M. Wergeles, Joel Sartwell, Andy Raedeke, Mary Mitchell, Heath Hagy, Andrew D. Gilbert, Brian Lubinski, Yi Shang. 317-324 [doi]
- H-Securebox: A Hardened Memory Data Protection Framework on ARM DevicesZhangkai Zhang, Zhoujun Li, Chunhe Xia, Jinhua Cui, Jinxin Ma. 325-332 [doi]
- Research of Urban Land Use and Regional Functions Based on Mobile Data TrafficQing Miao, Yuanyuan Qiao, Jie Yang 0023. 333-338 [doi]
- Course Concept Extraction in MOOC via Explicit/Implicit RepresentationXiaochen Wang, Wenzheng Feng, Jie Tang 0001, Qingyang Zhong. 339-345 [doi]
- AI-Assisted Prediction on Potential Health Risks with Regular Physical Examination RecordsZhaoqian Lan, Guopeng Zhou, Yichun Duan, Wei Yan. 346-352 [doi]
- Study on Security Technology of Internet of Things Based on Network CodingYejun Zhou, Lede Qiu, Hang Yu, Chunhui Sun. 353-357 [doi]
- Efficiently Preserving Privacy on Large Trajectory DatasetsChen-Yi Lin, Yuan-Chen Wang, Wan-Tian Fu, Yun-Sheng Chen, Kuan-Chen Chien, Bing-Yi Lin. 358-364 [doi]
- Lip Segmentation with Muti-scale Features Based on Fully Convolution NetworkZhen Ju, Xiang Lin, Fangqi Li, Shilin Wang. 365-370 [doi]
- Research on Discrete Emotion Classification of Chinese Online Product Reviews Based on OCC ModelLina Liu, Jiayin Qi. 371-378 [doi]
- Complete Graph Random Number Generator and Symmetrical Design SchemeYuguang Xu, Hanpin Wang, Hongyu Wang. 379-385 [doi]
- Predicting the Popularity of Online Content Based on the Weak Ties TheoryXiaomeng Wang, Binxing Fang, Hongli Zhang 0001, Shen Su. 386-391 [doi]
- Evaluating the Rationality of Judicial Decision with LSTM-Based Case ModelingShang Li, Hongli Zhang 0001, Lin Ye, Xiaoding Guo, Binxing Fang. 392-397 [doi]
- A Practical Approach to Answer Extraction for Constructing QA SolutionMingxuan Xiong, Aiping Li, Zongsheng Xie, Yan Jia 0001. 398-404 [doi]
- Structural Vulnerability of Complex Networks Under Multiple Edge-Based AttacksShudong Li, Xiaobo Wu, Aiping Li, Bin Zhou 0004, Zhihong Tian, Dawei Zhao. 405-409 [doi]
- Will the Big Data Strategic Alliance be Workable for Intelligent Vehicles and New Energy Vehicles Industry? - Perspective of System DynamicsXiaoyan Wang, Debao Hu, Hui Lu. 410-417 [doi]
- Distributed Large Scale Privacy-Preserving Deep MiningHao Xue, Zheng Huang, Huijuan Lian, Weidong Qiu, Jie Guo, Shen Wang, Zheng Gong. 418-422 [doi]
- Transfer Pretrained Sentence Encoder to Sentiment ClassificationMan Bai, Xu Han 0003, Haoran Jia, Cong Wang 0003, Yawei Sun. 423-427 [doi]
- Application of Improved Grey Model GM(1, 1) in Prediction of Human Health DataPin Ding, Qinliu Yang, Cong Wang 0003, Xiaoyan Wei, Yi Zhou. 428-432 [doi]
- Hybrid Recommendation Algorithm Based on Social Interaction and Tag WeightYujing Huang, Haoran Jia, Dan Jiang, Jincui Yang. 433-437 [doi]
- Ownership Concentration, Internal Control Quality and Real Earnings ManagementJianju Du, Lili Wang. 438-444 [doi]
- Dockless Bike-Sharing Reallocation Based on Data Analysis: Solving Complex Problem with Simple MethodMing Liu, Xifen Xu. 445-450 [doi]
- Sentiment Analysis Based on Deep Learning and Its Application in Screening for Perinatal DepressionYong Chen, Bin Zhou 0004, Weina Zhang, Wenjie Gong, Guangfu Sun. 451-456 [doi]
- Design and Implementation of Information Dissemination Simulation Algorithm in Large-Scale Complex Network Based on SparkChuan Ai, Bin Chen 0003, Liang Liu, Jian Dong, Lingnan He, Xiaogang Qiu. 457-464 [doi]
- A Bayesian Personalized Ranking Algorithm Based on Tag PreferenceYuanchun Jiang, Manli Lv, Jianshan Sun, Yezheng Liu. 465-471 [doi]
- Customized Bundle Recommendation by Association Rules of Product Categories for Online SupermarketsYan Fang, Xinyue Xiao, Xiaoyu Wang, Huiqing Lan. 472-475 [doi]
- Insider Threat Detection Using Characterizing User BehaviorXuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang. 476-482 [doi]
- An Intelligent Network Attack Detection Method Based on RNNYunsheng Fu, Fang Lou, Fangzhi Meng, Zhihong Tian, Hua Zhang, Feng Jiang. 483-489 [doi]
- A Novel Approach for Detecting Browser-Based Silent MinerJingqiang Liu, Zihao Zhao, Xiang Cui, Zhi Wang, Qixu Liu. 490-497 [doi]
- A Metadata-Based Representation Method of the Internet of ThingsGuangwei Yang, Haining Yu, Hongli Zhang 0001, Xiangzhan Yu. 498-505 [doi]
- Authentication of Multiple-User Spatial Keywords QueriesIsaac Amankona Obiri, Yong Wang, Raphael Elimeli Nuhoho, Erick Owiyo. 506-513 [doi]
- Automated Fuzz Generators for High-Coverage Tests Based on Program Branch PredicationsJinjing Zhao, Ling Pang. 514-520 [doi]
- Mode Decomposition Based Hybrid Model for Traffic Flow PredictionZhenpeng Zheng, Li Pan, Khouanetheva Pholsena. 521-526 [doi]
- A Method Based on Statistical Characteristics for Detection Malware Requests in Network TrafficKe Li, Rongliang Chen, Liang Gu, Chaoge Liu, Jie Yin. 527-532 [doi]
- An Improved Uniform Identity Authentication Method Based on SAML in Cloud EnvironmentJing Du, Yan Jie, Fujiang Ao, Ying Zhou. 533-536 [doi]
- A Location Privacy-Aware Method for kNN Query in Location Based ServicesYuhang Wang, Hongli Zhang 0001, Shen Su, Zhihong Tian. 537-541 [doi]
- Hand Gesture Recognition Based on Deep Learning MethodKai Xing, Zhen Ding, Shuai Jiang, Xueyan Ma, Kai Yang, Chifu Yang, Xiang Li, Feng Jiang. 542-546 [doi]
- A Novel Automatic Diagnosis Based Physical Therapy for Duchenne Muscular Dystrophy ChildrenChunzhi Yi, Ningling Ma, Chifu Yang, Hao Guo, Jiahong Han, Hefu Gao, Xiang Li, Feng Jiang. 547-552 [doi]
- Video Frame Interpolation Based on Multi-scale Convolutional Network and Adversarial TrainingChenguang Li, Donghao Gu, Xueyan Ma, Kai Yang, Shaohui Liu, Feng Jiang. 553-560 [doi]
- Analysis on the Influence Factors of the Medical Institutions' Medical Efficiency Change in ChinaYutao Zhang, Junwen Feng, Chenguang Li. 561-568 [doi]
- Efficient Identity-Based Offline/Online Encryption Scheme for Lightweight DevicesJin Xu, Xu Wu, Xiaqing Xie. 569-575 [doi]
- Deep Learning Based Attribute Classification Insider Threat Detection for Data SecurityFanzhi Meng, Fang Lou, Yunsheng Fu, Zhihong Tian. 576-581 [doi]
- Ensemble SteganographyChuan Qin, Wenbo Zhou, Weiming Zhang, Nenghai Yu. 582-587 [doi]
- An In-depth Study of Digits in Passwords for Chinese WebsitesRui Xu, Xiaojun Chen 0004, Xingxing Wang, Jinqiao Shi. 588-595 [doi]
- Chaotic-Map Image Encryption Scheme Based on AES Key Producing ScheduleYuhang Xing, Min Li, Litao Wang. 596-600 [doi]
- Automatic Generation of Review Content in Specific Domain of Social Network Based on RNNYu Tai, Hui He, Weizhe Zhang, Yanguo Jia. 601-608 [doi]
- A Novel Blockchain-Based Authenticated Key Exchange Protocol and Its ApplicationsHailong Yao, Caifen Wang. 609-614 [doi]
- Advanced Slide Attacks on the Even-Mansour SchemeGuang Yang, Ping Zhang 0020, Jiachen Ding, Honggang Hu. 615-621 [doi]
- Learning Automata Based Feature Selection for Network Traffic Intrusion DetectionYu Su, Kaiyue Qi, Chong Di, Yinghua Ma, Shenghong Li 0001. 622-627 [doi]
- Anomaly Detection for Power Grid Flow Patterns Based on the Multi-restricted Boltzmann MachinesYichen Li, Yinghua Ma, Mingda Guo, Shenghong Li 0001. 628-633 [doi]
- A Content Auditing Method of IPsec VPNGuanqun Wang, Yunxiao Sun, Qinggang He, Guodong Xin, BaiLing Wang. 634-639 [doi]
- Web Service Applying Moving Target DefenseJingzhe Zhang, Xuewei Feng, Dongxia Wang, Liang Ming. 640-645 [doi]
- A Passive-Measurement-Guided Tree Network Surveying and Mapping ModelWei Sun, Jianguo Jiang, Majing Su. 646-651 [doi]
- A Survey on Collaborative Deep Learning and Privacy-PreservingDayin Zhang, Xiaojun Chen 0004, Dakui Wang, Jinqiao Shi. 652-658 [doi]
- Detection of Malicious Domain Names Based on Hidden Markov ModelPin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang. 659-664 [doi]
- Decentralized Privacy Preserving Reputation SystemErick Owiyo, Yong Wang, Eunice Asamoah, Domnic Kamenyi, Isaac Obiri. 665-672 [doi]
- Research on the Prediction Method of Power Battery SOC Based on Deep LearningAnkang Li, Xiaoli Hu, Tong Li, Huibing Zhang. 673-679 [doi]
- The Feature Representation Ability of Variational AutoEncoderChenxi Dong, Tengfei Xue, Cong Wang 0003. 680-684 [doi]
- Multimodal Object Classification Using Bidirectional Gated Recurrent Unit NetworksDongzhe Wang, Kezhi Mao. 685-690 [doi]
- Sparse Weighted Naive Bayes Classifier for Efficient Classification of Categorical DataZhuoyuan Zheng, Yunpeng Cai, Yujie Yang, Ye Li 0002. 691-696 [doi]
- A Categorically Reweighted Feature Extraction Method for Anomaly DetectionRuyao Cui, Lei Sun 0006, Jie Yang, Bo Liu, Yuan Fan. 697-704 [doi]
- A Joint Decoding Algorithm for Named Entity RecognitionDongyang Zhao, Jiuming Huang, Yu Luo, Yan Jia 0001. 705-709 [doi]
- Establishment of Computer-Aided Diagnosis System for Liver Tumor CT Based on SVMLiwen Yu, Chaoli Wang, Shuqun Cheng, Lei Guo. 710-715 [doi]
- A Tensor-Based Sub-Mode Coordinate Algorithm for Stock PredictionJieyun Huang, Yunjia Zhang, Jialai Zhang, Xi Zhang. 716-721 [doi]
- Detecting Pyramid Scheme Accounts with Time Series Financial TransactionsFang Lv, Junheng Huang, Wei Wang, Guodong Xin, BaiLing Wang. 722-728 [doi]
- Visualization of Pairwise Data: An OverviewZhong-min Pei, Ming-hui Xiong, Wei Xiong. 729-734 [doi]
- Hyperspectral Image Denoising base on Adaptive Sparse RepresentationXiaorui Song, Lingda Wu, Hongxing Hao. 735-739 [doi]
- Tactical Wireless Network Visualization: Requirements and RepresentationsYougen Zhang, Yingchun Shi. 740-743 [doi]
- Reasearch on Dynamic Evolution Model Visualization of Satellite Communication Network Based on Complex NetworkChengxiang Liu, Wei Xiong. 744-748 [doi]
- A Speedup Spatial Rearrangement Algorithm for Dynamic Network VisualizationYingmei Wei, Xiaolei Du, Dalin Xu, Xianghan Wang. 749-753 [doi]
- Generation Framework for Situation Visualization Service from the Perspective of CognitionFande Yang, Li Qiang. 754-759 [doi]
- A Multi-layer Network Topology Visualization Layout Based on Louvain Community DetectionXitao Zhang, Lingda Wu, Zhonghua Yao, Shaobo Yu. 760-763 [doi]
- Research on the Technology of Electromagnetic Information Modeling and Visual AnalysisHongxing Hao, Lingda Wu, Ronghuan Yu. 764-767 [doi]
- Convolutional Neural Networks Based for High Spectral Dimensional Data ClassificationJiang Zhu, Lingda Wu, Yi Lu, Jiao Jiao, Xiaorui Song. 768-772 [doi]
- A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path FindingYingxiao Xiang, Wenjia Niu, Jiqiang Liu, Tong Chen, Zhen Han. 773-780 [doi]
- Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding TrainingXiaoXuan Bai, Wenjia Niu, Jiqiang Liu, Xu Gao, Yingxiao Xiang, Jingjing Liu. 781-787 [doi]
- Intention-Aware Multi-channel Keyword Extension for Content SecurityChunjing Qiu, Jiqiang Liu, Yingxiao Xiang, Wenjia Niu, Tong Chen. 788-794 [doi]
- A RF-PSO Based Hybrid Feature Selection Model in Intrusion Detection SystemHengxun Li, Wei Guo, Guoying Wu, Yanxia Li. 795-802 [doi]
- An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait DocumentShuanshuan Pang, Wenjia Niu, Jiqiang Liu, Yingxiao Xiang, Yingdi Wang. 803-810 [doi]
- Evaluation on Availability of Entity Information in CyberspaceJinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Yuanxin Zhang. 811-818 [doi]
- Prediction of Twist Angle for Assistive Exoskeleton Based on EMG SignalsHao Guo, Kai Yang, Xueyan Ma, Kai Xing, Xiaodong Xia, Chifu Yang, Chunzhi Yi, Feng Jiang. 819-823 [doi]
- A Matrix-Based Apriori Algorithm ImprovementQinliu Yang, Qunchao Fu, Cong Wang 0003, Jincui Yang. 824-828 [doi]
- A Hierarchical Demand Prediction Method with Station Clustering for Bike Sharing SystemSijia Feng, Hao Chen, Chun Du, Jun Li, Ning Jing. 829-836 [doi]
- Automatic Taxonomy Construction for Eye Colors Data without Using Context InformationJing Qiu, Yaqi Si, Zhihong Tian. 837-841 [doi]
- A Pricing Model for Self-Help Investigation Offline Based on Multivariate Linear Regression AnalysisPing Wang, Zhongtian Jia, Bo Zhang 0020, Chengbo Xu. 842-847 [doi]
- Research on Improve Topic Representation over Short TextLingyun Li, Yawei Sun, Xu Han 0003, Cong Wang 0003. 848-853 [doi]
- Realistic Traffic Data Based Mobility Modeling and Simulation of Smart EVChunyuan Kang, Tianle Zhang. 854-857 [doi]
- An Approach for Evaluating User Participation in BitcoinTengfei Xue, Yuyu Yuan, Cong Wang 0003. 858-864 [doi]
- Representation Learning Based on Influence of Node for Multiplex NetworkNianwen Ning, Bin Wu, Chengcheng Peng. 865-872 [doi]
- Exploiting Structured News Information to Improve Event Detection via Dual-Level ClusteringShuqi Yu, Bin Wu. 873-880 [doi]
- Expert Identification Based on Dynamic LDA Topic ModelRenjun Chi, Bin Wu, Lin Wang. 881-888 [doi]
- De-anonymizing Social Networks User via Profile SimilarityMeiqi Wang, Qingfeng Tan, Xuebin Wang, Jinqiao Shi. 889-895 [doi]
- BlockCAM: A Blockchain-Based Cross-Domain Authentication ModelWentong Wang, Ning Hu, Xin Liu. 896-901 [doi]
- A Method of Fast Locating the Key Nodes Based on the Distribution Law of Node's Propagation DomainXiaolin Zhao, Meijing Wu, Qi Zhang, Jingfeng Xue, Yiman Zhang. 902-909 [doi]
- A Survey on Security of Cloud Environment: Threats, Solutions, and InnovationJian Zhang, Luxin Zheng, Liangyi Gong, Zhaojun Gu. 910-916 [doi]
- OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based ServicesMing Hou, Hongli Zhang 0001, Yuhang Wang. 917-922 [doi]
- Remote Protocol Vulnerability Discovery for Intelligent Transportation Systems (ITS)Liang Ming, Gang Zhao, Minhuan Huang, Ling Pang, Jin Li, Jingzhe Zhang, Dan Li, Shuaibing Lu. 923-929 [doi]
- Data-Driven Vulnerability Pattern Analysis for FuzzingDan Li, Hua Chen, Huayang Cao, Liang Ming. 930-935 [doi]
- Research on Security of Key Algorithms in Intelligent Driving SystemYi-mu Ji, Chen Chen, Shangdong Liu, Fei Wu, ZhiYu Chen, Qiang Bi, Na Wang, Zhipeng Jiao, Yede Qi, Xingwang Yang, Siyang Hou, Xiangyu Cao, Yichao Dong. 936-942 [doi]
- A Vulnerability Test Method for Speech Recognition Systems Based on Frequency Signal ProcessingHonghao Yang, Dong Liang, Xiaohui Kuang, Changqiao Xu. 943-947 [doi]
- Who are in the Darknet? Measurement and Analysis of Darknet Person AttributesMeiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang. 948-955 [doi]
- Analysis on the Related Evaluation Technique of Composite Attack in Network ConfrontationYulu Qi, Rong Jiang, Yan Jia 0001, Aiping Li. 956-962 [doi]