Abstract is missing.
- The Survey on the development of Secure Multi-Party Computing in the blockchainSongqi Wu, Jin Li, Fenghui Duan, Yueming Lu, Xu Zhang, Jiefu Gan. 1-7 [doi]
- Modeling Connection Strength in Graph Neural Networks for Social Influence PredictionHongwu Zhuang, Bin Zhou 0004, Wen Xi, Liqun Gao, Haiyang Wang. 8-15 [doi]
- Rumor Detection on Social Media Using Temporal Dynamic Structure and Emotional InformationChenming Wang, Bin Zhou 0004, Hongkui Tu, Yujia Liu. 16-22 [doi]
- Network Security Situation Prediction Model Based on Security Situation FactorsWei Hu, Jianyi Liu, Han Guo, Jing Li, Xinjian Zhao, Mingyang Zhang. 23-31 [doi]
- Sampled Data Debugging via Fuzzy C-MeansXiayu Xiang, Shaoming Duan, Hezhong Pan, Peiyi Han, Chuanyi Liu. 32-39 [doi]
- Adversarial Residual Variational Graph Autoencoder with Batch NormalizationQisheng Liao, Xu Wu, Xiaqing Xie, Jingchen Wu, Lirong Qiu, Lijuan Sun. 40-46 [doi]
- Sensitive Image Information Recognition Model of Network Community based on Content TextLi Gao, Xu Wu, Jingchen Wu, Xiaqing Xie, Lirong Qiu, Lijuan Sun. 47-52 [doi]
- Malware classification based on visualization and feature fusionZilin Zhao, Dawei Zhao, Shudong Li, Shumian Yang. 53-60 [doi]
- A Security-Enhanced Modbus TCP Protocol and Authorized Access MechanismFumin Yi, Lei Zhang, Shumian Yang, Dawei Zhao. 61-67 [doi]
- Relation Extraction based on Data Partition and Representation IntegrationJiapeng Zhao, Panpan Zhang, Tingwen Liu, Zhenyu Zhang 0006, Yanzeng Li, Jinqiao Shi. 68-75 [doi]
- Mining Open-Source Cyber Threat Intelligence with Distant Supervision from the WebPanpan Zhang, Jing Ya, Tingwen Liu, Jinqiao Shi. 76-82 [doi]
- Sequence Attention for Multivariate Time Series ForecastingWenrui Wu, Tao Tao, Jing Shang, Ding Xiao, Chuan Shi, Yong Jiang. 83-90 [doi]
- Identification Domain Fronting Traffic for Revealing Obfuscated C2 CommunicationsZeYu Li, Meiqi Wang, Xuebin Wang, Jinqiao Shi, Kexin Zou, Majing Su. 91-98 [doi]
- Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service DetectionKexin Zou, Jinqiao Shi, Yue Gao 0003, Xuebin Wang, Meiqi Wang, ZeYu Li, Majing Su. 99-105 [doi]
- TCABRS: An Efficient Traceable Constant-Size Attribute-Based Ring Signature Scheme for Electronic Health Record SystemAoran Lu, Weihai Li, Yuanzhi Yao, Nenghai Yu. 106-113 [doi]
- Bow-tie Technology Analysis of Safety Risks of Lithium-ion Battery in Air TransportYan Zhang, Hongli Zhao, Bin Li. 114-121 [doi]
- LoginSoEasy: a System Enabling both Authentication and Protection of Personal Information based on Trusted User AgentWenyin Liu, Yin Lin, Zongcheng Qi, Zekai Wu, Guipeng Zhang, Kai Wang, Shuai Fan 0008, Zhenguo Yang. 122-129 [doi]
- ResNet Approach for Coding Unit Fast Splitting Decision of HEVC Intra CodingYixiao Li, Lixiang Li 0001, Zirui Zhuang, Yuan Fang, Yixian Yang. 130-135 [doi]
- MilKBQA: A Complex Knowledge Base Question Answering Dataset on Chinese Military FieldPike Xu, Tiejun Li, Zhen Huang, Min Guo, Jiezhong He, Ding Sun. 136-143 [doi]
- A Review of Entity Alignment based on Graph Convolutional Neural NetworkZeshi Wang, Mohan Li, Zhaoquan Gu. 144-151 [doi]
- Survey on Knowledge Graph Embedding Based on Hyperbolic GeometryMengqi Lin, Qing Liao 0001, Yan Jia 0001, Ye Wang. 152-158 [doi]
- Survey on social event detectionYutao Huang, Qing Liao 0001, Yan Jia 0001, Ye Wang. 159-165 [doi]
- A proxy-protected proxy signature based on SM9Xiaodong Yang, Sen Yuan, Hang Zhou, Binbin Ding. 166-170 [doi]
- APT Behaviors Detection Based on Email Business ScenariosBo Bai, Yun-feng, Baoxu Liu, Xutong Wang, Jiaxi Liu, Qingyue Liu, Qixu Liu, Shuang Zhao. 171-178 [doi]
- A Universal Targeted Attack Method against Image ClassificationHuili Luo, Zhaoquan Gu, Chunajing Zhang, Le Wang 0008, Shuhao Li, Zhiqin Chen. 179-186 [doi]
- A Survey on Translating Embedding based Entity Alignment in Knowledge GraphsJin Jiang, Mohan Li, Zhaoquan Gu. 187-194 [doi]
- FedDeepFM: Ad CTR prediction based on Federated Factorization MachineChenjia Yu, Shuhan Qi, Yang Liu 0003. 195-202 [doi]
- GRU and Multi-autoencoder based Insider Threat Detection for Cyber SecurityFanzhi Meng, Peng Lu, Junhao Li, Teng Hu, MingYong Yin, Fang Lou. 203-210 [doi]
- A Decentralized Access Control Framework For DDSQifeng Luo, Ruisheng Shi. 211-218 [doi]
- Improving the Transferability of Adversarial Examples with Advanced Diversity-Ensemble MethodYinhu Xu, Qi Chu 0001, Nenghai Yu. 219-225 [doi]
- PTMT: Multi-Target Stance Detection with PTM-enhanced Multi-Task LearningWen Xi, Chenguang Chen, Hongwu Zhuang, Haiyang Wang, Liqun Gao, Bin Zhou 0004. 226-232 [doi]
- Research on Label Based Data Flow Control MechanismRongna Xie, Xiaonan Fan 0003, Jiayu Zhu, Guozhen Shi, Jiapeng Lou, Yuxin Huang. 233-239 [doi]
- Universal Pre-Calculating Structure: Reducing Complexity of Ising Chips with Arbitrary ConnectivityJian Zhang, Linghui Lv, Zhi Wang, Ying Zhang, Yang Yang, Jinjiu Li, Yaohua Wang. 240-247 [doi]
- FIGAT: Accurately Predict Individual Crime Risks with Multi-information FusionXianzhe Yu, Peiyi Han, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Xiayu Xiang. 248-255 [doi]
- Audio Steganography with Speech Recognition SystemHao Tan, Chenwei Liu, Yinyu Lyu, Xiao Zhang, Denghui Zhang, Zhaoquan Gu. 256-263 [doi]
- PRFP: Privacy-respecting and Accurate Device Fingerprint IdentificationXunan Gao, Peiyi Han, Chuanyi Liu, Shaoming Duan, Hezhong Pan, Xiayu Xiang. 264-271 [doi]
- Generate Adversarial Examples Combined with Image Entropy DistributionWenrong Xie, Fashan Dong, Haiyang Yu, Zhaoquan Gu, Le Wang 0008, Zhihong Tian. 272-279 [doi]
- Attack-words Guided Sentence Generation for Textual Adversarial AttackHuan Zhang, Yushun Xie, Ziqi Zhu, Jingling Sun, Chao Li, Zhaoquan Gu. 280-287 [doi]
- A Novel Deep Neural Network Model for Credit Risk Prediction of Chinese FarmersYalong Xie, Aiping Li, Ziniu Liu, Kai Chen, Hongkui Tu. 288-293 [doi]
- Survey on Temporal Knowledge GraphChong Mo, Ye Wang, Yan Jia 0001, Qing Liao 0001. 294-300 [doi]
- Hierarchical Cooperative Social Spider Algorithm for Community Detection in Large NetworkPeng Chen, Jun Zhang, Yang Wang, Jiawei Xu, Shenghao Cao. 301-308 [doi]
- RanPAS: A Behavior-based System for Ransomware DetectionBidong Wang, Hui Liu, Xinli Han, Dongliang Xuan. 309-314 [doi]
- Dynamic Topic Model for Tracking Topic Evolution and Measuring Popularity of Scientific LiteratureYe-Zheng Liu 0001, Jicheng Wang, Yang Qian, Yuanchun Jiang, Jianshan Sun, Yidong Chai. 315-320 [doi]
- Identifying Reply Relationships from Telegram Groups Using Multi-Features FusionPanpan Zhang, Yao Qi, Yanzeng Li, Jing Ya, Xuebin Wang, Tingwen Liu, Jinqiao Shi. 321-327 [doi]
- A Manifold Learning Method to Passage Retrieval for Open-Domain Question AnsweringRuidong Ding, Bin Zhou 0004, Hongkui Tu. 328-333 [doi]
- A Method for Discovering Hidden Patterns of Cybersecurity Knowledge Based on Hierarchical ClusteringZhaoyun Ding, Deqi Cao, Lina Liu, Donghua Yu, Haoyang Ma, Fei Wang. 334-338 [doi]
- An Overview of Entity Alignment: Cross-lingual and Graph ApproachesFang Wang, Yongqiang Xie, Kai Zhang. 339-345 [doi]
- BDCP: An Improved Nested Named Entity Recognition Model Based on LSTMLing Zhou, Tianjiao Luan, Na Yao, Jianming Li, Jie Ding. 346-352 [doi]
- Gradient-oriented gray-box protocol fuzzingYinfan Qin, Xiang Li, Jianwen Tian, Taotao Gu, Xiaohui Kuang. 353-360 [doi]
- Software Misconfiguration Troubleshooting Based on State AnalysisKe Li, Yuan Xue, Yujie Shao, Bing Su, Yu-an Tan 0001, Jingjing Hu. 361-366 [doi]
- A Multilevel Non-interference Vulnerability Analysis Method for Information Leakage ProblemWenjing Zhong, Jinjing Zhao, HeSuan Hu. 367-374 [doi]
- Deep Learning Framework Fuzzing Based on Model MutationXiangzhong Shen, Jieyi Zhang, Xiaonan Wang, Hongfang Yu, Gang Sun. 375-380 [doi]
- GraphEye: A Novel Solution for Detecting Vulnerable Functions Based on Graph Attention NetworkLi Zhou, Minhuan Huang, Yujun Li, Yuanping Nie, Jin Li, Yiwei Liu. 381-388 [doi]
- IfCut: If Branch Cutting Based Fuzzing SystemXumeng Liu, Tianqi Sun, Zijie Zhao, Du Wu, Qi Hu, Weijia Chen, Li Gu. 389-395 [doi]
- Machine Learning for Software Vulnerability Analysis: A SurveyYetao Jia, Honglin Zhuang, Zhechao Lin, Yangyang Meng. 396-402 [doi]
- Code Decoupling Execution Isolating Based on TF Card Firmware ExtensionZhiwei Shi, Tian Chen, Yuan Xue, Yuanzhang Li, Quanxin Zhang, Yu-an Tan 0001, Jingjing Hu. 403-408 [doi]
- A Method of Malicious Data Flow Detection Based on Convolutional Neural NetworkBinghao Jia, Yanhui Guo, Hongmei Li, Chunlai Du. 409-412 [doi]
- Artificial Intelligence Security for Hydraulic Machinery SystemLei Wang, Shuai Ren, Guangao Li, Yang Liu, Gang Wang, Qian Sun. 413-419 [doi]
- Investigations on Answer Selection Based on Co-attention Guided Stacked BiLSTM with BERTMingli Wu, Shuaibo Li, Ke Teng, Chunlai Du, Jianyong Duan. 420-427 [doi]
- A Joint Warning and Notification Mechanism for CyberSecurity IncidentsZhenhuan Zhang, Hongmei Li, Yulin Zheng, Wenbo Guan, Binghao Jia. 428-432 [doi]
- Review on Fuzz Testing for Protocols in Industrial Control SystemsHuiying Lan, Yanbin Sun. 433-438 [doi]
- A Survey of Cyber Security Approaches for PredictionHaitian Liu, Rong Jiang, Bin Zhou 0004, Xing Rong, Juan Li, Aiping Li. 439-444 [doi]
- Focus on the Stability of Large Systems: Toward Automatic Prediction and Analysis of Vulnerability Threat IntelligenceShiwen Song, Qiong Wu, Xin Zheng, Peng Wang, Yuchen Dou, Zhongwen Li, Lidong Zhai. 445-449 [doi]
- User Experience based Perspective Guidance Method for Immersive Interactive VideoLing Zou, Hongxi Li. 450-453 [doi]
- Art Experience Innovation Design in Digital Media EraFeng Ye, Yong Liang. 454-457 [doi]
- Analysis of Visual Subject Types in Immersive ImageSongheng Wang. 458-461 [doi]
- Research on the application of digital media technology in media convergenceJing Li, Yong Liang. 462-465 [doi]
- Generating Highly Structured Inputs: A SurveyYabin Li, Yinfan Qin, Jianwen Tian, Taotao Gu, Yuanping Nie, Xiaohui Kuang. 466-473 [doi]
- A Survey of DeepFakes Generation and DetectionKaihan Lin, Weihong Han, Zhaoquan Gu, Shudong Li. 474-478 [doi]
- Research on Strategy Selection of Dynamic Defense Based on Game TheoryTong Peng, Yueming Lu, Jinxin Zuo, Jiefu Gan. 479-484 [doi]
- Research on Requirements Recommendation Method for High-end Equipment Based on Generative Adversarial NetworksZeshui Liu, Xiangqian Xu, Nan Xiang, Zhuoqian Li, Yajie Dou, Yuejin Tan. 485-492 [doi]
- Self-attention UNet Model for Radar Based Precipitation NowcastingTengfei Nie, Kefeng Deng, Chengcheng Shao, Chengwu Zhao, Kaijun Ren, Junqiang Song. 493-499 [doi]
- Adversarial Attacks on Vehicle Re-IdentificationHaiyang Yu, Fashan Dong, Jianming Li, Wenrong Xie, Jing Qiu, Zhaoquan Gu. 500-507 [doi]
- The Controlled Sharing Mechanism for Private Data Based on BlockchainLi Wenqing, Dong Wenjie, Zhang Xu, Yueming Lu. 508-515 [doi]
- Research on Progress of Blockchain Access ControlTao Liu, Xiaowei Chen, Jin Li, Shaocheng Wu, Wenlong Sun, Yueming Lu. 516-522 [doi]
- A Honeypot-enabled SDN-based Selector for Industrial Device Access ControlJun Li, Chunhui Wang, Zhenyu Li, Yong Ding 0005. 523-528 [doi]
- Differential Cryptanalysis of TweGIFT-128 Based on Neural NetworkRunlian Zhang, Mi Zhang, Jiaxu Yan, Yixing Li, Xiaonian Wu, Lingchen Li. 529-534 [doi]
- Enhancing Continuous Service of Information Systems Based on Cyber ResilienceJinxin Zuo, Ziyu Guo, Jiefu Gan, Yueming Lu. 535-542 [doi]
- Networked Device Identification: A SurveyYu Jiang, Yuying Li, Yanbin Sun. 543-548 [doi]
- Information Security Detection Technology for Industrial Control Equipment Modeling Generated by Excitation Traversal Test Based on Big DataChen Cui, Jianhuai Qi, Jing Song, Peng Luo, Juan Tang. 549-555 [doi]
- Review of Firmware Homology Detection: a System AspectYan Song 0002, Binbin Wang, Yu Xiaohu, Tinghui Li, Shanshan Zhu, Daojing He, Guisong Yang, Sammy Chan. 556-563 [doi]
- Insider Threat Detection Based on User Historical Behavior and Attention MechanismWeiyu He, Xu Wu, Jingchen Wu, Xiaqing Xie, Lirong Qiu, Lijuan Sun. 564-569 [doi]
- Graph Neural Network Based User Group Comments Interaction Behavior Prediction on Microblog WebsitesYisen Chen, Xu Wu, Xiaqing Xie, Jingchen Wu, Lirong Qiu, Lijuan Sun. 570-576 [doi]
- Interframe Variance in Vehicle Re-identificationJianming Li, Ling Zhou, Jie Ding, Haiyang Yu. 577-582 [doi]
- A Survey on Smart Home Privacy Data Protection TechnologyBing Chen, Yaping Liu, Shuo Zhang, Jie Chen, Zhiyu Han. 583-590 [doi]
- Pneumonia Detection with U-EfficientNetZechuan Yu. 591-594 [doi]
- Multi-dimensional Intelligent Network Asset IdentificationYi Xiong, Xiaoyan Zhang, Ling Pang, Zhechao Lin. 595-601 [doi]
- Rooted Subtrees Recursive Neural Networks on GraphsFangzhou Liang, Yueming Lu. 602-607 [doi]
- A Survey of Advanced Persistent Threats Attack and DefenseYangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu. 608-613 [doi]
- A Novel Malware Encrypted Traffic Detection Framework Based On Ensemble LearningChuanyu Zhao, Shudong Li, Xiaobo Wu, Weihong Han, Zhihong Tian, Maofei Chen. 614-620 [doi]
- APT Detection Based on Association Rule Mining with Bayesian ModelLiang Ge. 621-624 [doi]
- A New Method for Malware Detection Based on EnergyLiang Ge. 625-628 [doi]
- An android malware detection approach using multi-feature fusion and TF-IDF algorithmHaipeng Zhang, Shudong Li, Xiaobo Wu, Weihong Han, Laifu Wang. 629-634 [doi]
- An APT Malware Classification Method Based on Adaboost Feature Selection and LightGBMNa Xu, Shudong Li, Xiaobo Wu, Weihong Han, Xiaojing Luo. 635-639 [doi]
- Smart grid terminal security assessment method based on subjective and objective comprehensive weightingShaocheng Wu, Yue Ma, HeFang Jiang, Tao Liu, Jinxin Zuo, Tong Peng. 640-647 [doi]
- Intelligent Device Identification Method Based on Network Packet FingerprintLe Yao, Honglin Zhuang, Zhechao Lin, Jiaxiang Gu. 648-653 [doi]
- The Overview of SPIN in Software Model CheckingYaning Zheng, Kaiqi Ru, Xuewei Feng, Dongxia Wang 0001. 654-661 [doi]
- Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Practical ApproachWei Kong, Huayang Cao, Jianwen Tian, Xiaohui Kuang. 662-669 [doi]
- High Efficient and Secure Chaos-Based Compressed Spectrum Sensing in Cognitive Radio IoT NetworkYuan Fang, Lixiang Li 0001, Yixiao Li, Haipeng Peng. 670-676 [doi]