Abstract is missing.
- A Multi-step Attack Detection Framework for the Power System NetworkJu Yang, Liang Zhou, Le Wang 0008, Shudong Li, Ziqing Lin, Zhaoquan Gu. 1-8 [doi]
- A Novel Network Security Situation Awareness Model for Advanced Persistent ThreatKai Chen, Jingxian Zhu, Lansheng Han, Shenghui Li, Pengyi Gao. 9-16 [doi]
- NiNSRAPM: An Ensemble Learning Based Non-intrusive Network Security Risk Assessment Prediction ModelJun-Zheng Yang, Feng Liu, Yuan-Jie Zhao, Lu-Lu Liang, Jia Yin Qi. 17-23 [doi]
- Shock Trap: An active defense architecture based on trap vulnerabilitiesQuan Hong, Yang Zhao, Jian Chang, Yuxin Du, Jun Li, Lidong Zhai. 24-31 [doi]
- Capability-based Component Security Mechanism for Microkernel OSJiajia Yi, Meng Li, Kun Xiao, Lirong Chen, Lei Luo, Rui Xu. 32-39 [doi]
- A Survey of Obfuscation and Deobfuscation Techniques in Android Code ProtectionRunsheng Guo 0001, Qichao Liu, Man Zhang, Ning Hu, Hui Lu 0005. 40-47 [doi]
- A Survey on Data Poisoning Attacks and DefensesJiaxin Fan, Qi Yan, Mohan Li, Guanqun Qu, Yang Xiao. 48-55 [doi]
- Model Checking for Microarchitectural Data Sampling SecurityQian Ke, Chunlu Wang, Haixia Wang, Yongqiang Lyu, Zihan Xu, Dongsheng Wang 0002. 56-63 [doi]
- MANAGE: A Novel Malware Evolution Model based on Digital GenesYu Zhang, Qingzhong Liu, Yuanquan Shi. 64-70 [doi]
- Automated Crash Analysis and Exploit Generation with Extendable Exploit ModelZhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang. 71-78 [doi]
- WREP: A lightweight event real-time processing engine for IoTLei Feng, Yuanfei Zhang, Zhiqiang Hao, Chonghua Wang. 79-85 [doi]
- A Hierarchical Terminal Recognition Approach based on Network Traffic AnalysisLingzi Kong, Daoqi Han, Junmei Ding, Mingrui Fan, Yueming Lu. 86-93 [doi]
- A virtualization-based security architecture for industrial control systemsYuqiang Zhang, Zhiqiang Hao, Ning Hu, Jiawei Luo, Chonghua Wang. 94-101 [doi]
- Research and Application of Intelligent Vehicle Cybersecurity Threat ModelHaitao Zhang, Lei Luo, Ruikun Li, Jiajia Yi, Yun Li, Lirong Chen. 102-109 [doi]
- SMRT: An Effective Malicious Node Resistance Design for MixnetsJincai Zou, Zhihan Tan, Yaya Huang, Yixing Chen 0005, Yuqiang Zhang, Ning Hu. 110-117 [doi]
- Stealth: A Heterogeneous Covert Access Channel for Mix-netYixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Yaya Huang, Ning Hu. 118-125 [doi]
- An Asterisk-shaped Patch Attack for Object DetectionFashan Dong, Binyue Deng, Haiyang Yu, Wenrong Xie, Huawei Xu, Zhaoquan Gu. 126-133 [doi]
- Multiple Sequential Network Attacks Detection Based on DTW-HMMHaitian Liu, Rong Jiang 0001, Bin Zhou 0004, Xing Rong, Juan Li, Aiping Li. 134-141 [doi]
- Knowledge Graph of Artificial Intelligence in Medicine: A Scientometric AnalysisJinlei Liu, Wenchao Dan, Nuo Cheng, Wenjing Lian, Peirong Qu, Hui Zhang, Yueling Zhang, Jie Wang. 142-153 [doi]
- End-to-end training image-text matching networkDepeng Wang, Yibo Sun, Chen Hong. 154-159 [doi]
- Topic Modeling for Short Texts Via Dual View Collaborate optimizationWei Liu, Yutao Huang, Yibing Guo, Ye Wang, Binxing Fang, Qing Liao 0001. 160-166 [doi]
- NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker RecognitionJunjian Zhang, Hao Tan, Binyue Deng, Jiacen Hu, Dong Zhu, Linyi Huang, Zhaoquan Gu. 167-174 [doi]
- TFHM: A Traffic Feature Hiding Scheme Based on Generative Adversarial NetworksYaya Huang, Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Zhihan Tan, Ning Hu. 175-182 [doi]
- Anomaly Detection from Log Data Sequences with PerturbationsYixiang Chen, Linhao Ye, Yufeng Ye, Peng Zhang, Qinfeng Tan. 183-190 [doi]
- A DNS-based Data Exfiltration Traffic Detection Method for Unknown SamplesRuiling Gan, Jiawen Diao, Xiang Cui, Shouyou Song. 191-198 [doi]
- A method of network traffic anomaly detection based on Packet Window TransformerCheng Fang, Wenjie Mi, Ping Han, Lidong Zhai. 199-205 [doi]
- Light-weight Unsupervised Anomaly Detection for Encrypted Malware TrafficShangbin Han, Qianhong Wu, Han Zhang 0009, Bo Qin. 206-213 [doi]
- Research on industrial Robot system security based on Industrial Internet PlatformXiao Gong, Mengwei Li, Zhengbin Zhao, Dengqi Cui. 214-218 [doi]
- Privacy Protection Management Model for Internet of Things DataYundan Yang, Fenghui Duan, Maosheng Zhang, Junjie Liu, Jin Li, Yueming Lu. 219-226 [doi]
- optimizing Diffusion Layer with AVX Shuffling: A Study on SKINNYJinhai Chen, Zheng Gong, Yufeng Tang, Yupeng Zhang, Bin Li. 227-233 [doi]
- Automated Vulnerability Discovery System Based on Hybrid ExecutionTong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang. 234-241 [doi]
- A Method Combining Text Classification and Keyword Recognition to Improve Long Text Information MiningLang Liu, Yuejiao Wu, Lujun Yin, Junxiang Ren, Ruiling Song, Guoqiang Xu. 242-248 [doi]
- Defense Against Query-Based Black-Box Attack With Small Gaussian-NoiseZiqi Zhu, Bin Zhu, Huan Zhang, Yu Geng, Le Wang 0008, Denghui Zhang, Zhaoquan Gu. 249-256 [doi]
- A novel Tri-training algorithm based on Evidence TheoryHongshun He, Zhipeng Zhang, Lei Yang, Yang Li, Jiakang Shi. 257-261 [doi]
- Anchor graph semi-supervised learning method based on Evidence TheoryHongshun He, Wei Yu, Lei Yang, Yang Li, Luyu Sun. 262-267 [doi]
- The Power Analysis Based on Mean-Ridge RegressionXiaonian Wu, Nian Tong, Ruanlian Zhang, Yongzhuang Wei. 268-274 [doi]
- FAVT: A Feature-Anchored Video Data Trading MechanismJiashun Zhou, Na Wang, Aodi Liu, Xuehui Du. 275-282 [doi]
- A Data Encoding Method for Multipath Anonymous TransmissionZhihan Tan, Yaya Huang, Yixing Chen 0005, Yuqiang Zhang, Jincai Zou, Ning Hu. 283-290 [doi]
- Research on One-way Data Transmission Technology Based on RDMAYuanpeng Yang, Hongbo Wang, Xiaofeng Wang, Yuan Liu. 291-298 [doi]
- Research on the Characteristics and Security Risks of the Internet of Vehicles DataJun Sun, Dong Liu, Yang Liu, Chuang Li, Yumeng Ma. 299-305 [doi]
- An efficient anonymous authentication and supervision system based on blockchainWeiyou Liang, Yujue Wang, Yong Ding 0005, Haibin Zheng, Hai Liang, Huiyong Wang. 306-313 [doi]
- Hybrid butterfly optimization algorithm-based support vector machine for botnet command-and-control channel detectionKai Chen, Jietong Su, Lansheng Han, Shenghui Li, Pengyi Gao. 314-321 [doi]
- Data traceability scheme of industrial control system based on digital watermarkJun Sun, Yang Li, Ge Zhang, Liangyu Dong, Zitao Yang, Mufeng Wang, Jiahe Cai. 322-325 [doi]
- Design and Implementation of Network Traffic Analysis System for Power Grid Metering SystemTao Liu, Honghao Liang, Xiaowei Chen, Zimeng Li, Lingzi Kong, Jin Li, Yueming Lu. 326-332 [doi]
- Modeling Unseen Entities from a Semantic Evidence View in Temporal Knowledge GraphsChen Guo, Tianxiu Wang, Yang Lin, Hao Chen, Haiyang Yu, Chengwei Zhu, Jing Qiu. 333-339 [doi]
- A Survey on Threat Hunting: Approaches and ApplicationsLei Chen, Rong Jiang 0001, Changjian Lin, Aiping Li. 340-344 [doi]
- SpeechHide: A Hybrid Privacy-preserving Mechanism for Speech Content and Voiceprint in Speech Data SharingYu Hu, Ran Li, Simin Wang, Fuqiang Tao, Zhe Sun. 345-352 [doi]
- LISP-TBCNN: An AutoCAD Malware Detection ApproachHuanyu Chi, Zekun Fei, Peinuo Li, Boyu Yang, Zhi Wang, Li Gu. 353-359 [doi]
- AISLE: Self-supervised Representation Learning for the Investigation of Advanced Persistent ThreatZian Jia, Xiaosu Wang, Yun Xiong, Yao Zhang 0009, Jinjing Zhao. 360-366 [doi]
- Fuzzing DBMS via NNLMYabin Li, Yuanping Nie, Xiaohui Kuang. 367-374 [doi]
- A Survey of Human-machine Collaboration in FuzzingQian Yan, Minhuan Huang, Huayang Cao. 375-382 [doi]
- An Automatic Code Generation Method Based on Sequence Generative Adversarial NetworkHanwen Sun, Yuanping Nie, Xiang Li 0078, Minhuan Huang, Jianwen Tian, Wei Kong. 383-390 [doi]
- NAFuzzer: Augmenting Network Protocol Fuzzers via Automatic Template and Seed GenerationKe Yan, Bo Yu 0008, Yong Tang, Xiangdong Kong, Chen Chen, Jin Lei. 391-398 [doi]
- DeepCov: Coverage Guided Deep Learning Framework FuzzingJiawei Wu, Senyi Li, Junqiang Li, Long Luo, Hongfang Yu, Gang Sun. 399-404 [doi]
- Network Security Intrusion Detection and Mass Alarms Under Cluster Computing PlatformFeng Li, Fei Shu, Mingxuan Li, Bin Wang. 405-412 [doi]
- Cross-Security Domain Dynamic Orchestration Algorithm of Network Security FunctionsWeidong Xiao, Xu Zhang, Dongbin Wang. 413-419 [doi]
- AGDB: A Dictionary-based Malicious Domain Detection Method based on Representation FusionYou Zhai, Hao Dong, Zhoujun Li 0001, Liqun Yang, Longtao He. 420-425 [doi]
- A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target DefenseKun Guo, Yibo Gao, Dongbin Wang, Hui Zhi, Tao Zhang, Yueming Lu. 426-431 [doi]
- FLYFDetect: A Smart Home Privacy Protection Framework via Federated LearningBing Chen, Yaping Liu, Shuo Zhang, Jie Chen, Zhiyu Han. 432-439 [doi]
- Security Evaluation Model of Blockchain System Based on Combination Weighting and Grey ClusteringJiahao Qi, Ziyu Guo, Yueming Lu, Jiaqi Gao, Yihong Guo, Fanyao Meng. 440-447 [doi]
- TLD-WF: Surfing Freely Under Website Fingerprinting AttacksLing Liu, Xin Liu, Yue Zhao, Ning Hu. 448-454 [doi]
- MASCA: A Multimodal Abstractive Summarization Model Based on Core Words Fusion AttentionXiaohan Yin, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu. 455-461 [doi]
- TAFM: Topic-Attention FM-encoder for Text GenerationDongye He, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu. 462-469 [doi]
- Adversarial Example Attacks against ASR Systems: An OverviewXiao Zhang, Hao Tan, Xuan Huang, Denghui Zhang, Keke Tang, Zhaoquan Gu. 470-477 [doi]
- Prediction of Real Popularity based on Sample DebiasLiang Li, Liqun Gao, Feng Xie, Bin Zhou. 478-482 [doi]
- Leveraging Multi-aspect Semantics for Conversation Structure ModelingTuwen Guo, Xi Zhang, Lirong Qiu. 483-490 [doi]
- A combined-CNN model of TLS Traffic Recognition and ClassificationYunfan Tian, Dongxin Liu, Laifu Wang, Bowen Hu. 491-497 [doi]
- A Review of Provenance Graph based APT Attack Detection: Applications and DevelopmentsYang Lv, Shaona Qin, Zifeng Zhu, Zhuocheng Yu, Shudong Li, Weihong Han. 498-505 [doi]
- A Novel Framework For Malicious Encrypted Traffic Classification At Host Level And Flow LevelHaitao Zhang, Lei Luo, Yun Li, Lirong Chen, Xiaobo Wu. 506-511 [doi]
- A Review of Attribution Technical for APT AttacksYangyang Mei, Weihong Han, Shudong Li, Xiaobo Wu, Kaihan Lin, Yulu Qi. 512-518 [doi]
- A SQL Blind Injection Method Based on Gated Recurrent Neural NetworkJiahui Zheng, Junjian Li, Chao Li, Ran Li. 519-525 [doi]
- A timestamp-based covert data transmission method in Industrial Control SystemJie Lu, Yong Ding 0005, Zhenyu Li, Chunhui Wang. 526-532 [doi]
- Research on Lightweight Blockchain Technology Based on Edge ComputingMaosheng Zhang, Ruohan Cao, Fenghui Duan, Yundan Yang, Yueming Lu, Man Zhang, Xu Lu. 533-539 [doi]
- Access Control Mechanism for Edge NodesFenghui Duan, Yundan Yang, Maosheng Zhang, Songqi Wu, Yueming Lu, Man Zhang, Xu Lu. 540-547 [doi]
- New Integral distinguishers for I - Presentâ„¢, TANGRAM and CHAMJun Li, Xueying Qiu, Lingchen Li, Chenghui Zhu, Xiaonian Wu. 548-555 [doi]
- Display Design Based on Virtual Reality Technology VR-Platform PlatformJun-Zhu Zhang, Yu-Gao Zheng. 556-563 [doi]
- Research on Multi-Model Fusion for Named Entity Recognition Based on Loop Parameter Sharing Transfer LearningHaoran Ma, Zhaoyun Ding. 564-569 [doi]
- Classification of Diabetic Retinopathy Based on B-ResNetZhang Ying. 570-575 [doi]
- A Survey on Knowledge Graph EmbeddingQi Yan, Jiaxin Fan, Mohan Li, Guanqun Qu, Yang Xiao. 576-583 [doi]
- Image Art Innovation based on Extended Reality TechnologyFeng Ye. 584-587 [doi]
- Application of Virtual Simulation in Digital Exhibition and PerformanceLing Zou, Jing Li. 588-591 [doi]
- SATMask: Spatial Attention Transform Mask for Dense Instance SegmentationQuanzhong Mao, Lijuan Sun, Jingchen Wu, Yutong Gao, Xu Wu, Lirong Qiu. 592-598 [doi]
- The final security problem in IOT: Don't count on the canary!Qian Zhou, Hua Dai 0003, Liang Liu 0006, Kai Shi, Jie Chen, Hong Jiang. 599-604 [doi]
- Industrial Defect Detection Through Computer Vision: A SurveyYunjie Tang, Kai Sun, Danhuai Zhao, Yan Lu, Jiaju Jiang, Hong Chen. 605-610 [doi]
- VCFN-Video Computing Force NetworkYichuan Wu, Meng Guo, Lei Yang, Wei Yu. 611-615 [doi]
- 10 Gigabit industrial thermal data acquisition and storage solution based on software-defined networkGe Zhang, Zheyu Zhang, Jun Sun, Zun Wang, Rui Wang, Shirui Wang, Chengyun Xie. 616-619 [doi]
- Time-Lock Encryption for Multiple Consecutive Periods and its ApplicationYuewu Lian, Haitao Zhan, Peiheng Zhang, Mingwu Zhang. 620-626 [doi]
- Secure outsourced VANET data in clouds with designated supervisorMeng Zhao, Yong Ding 0005, Tong Zhang, Xiaochun Zhou. 627-632 [doi]
- Information dissemination model of recommendation platform based on network communityRiming Wu, Yiliang Han, Kaiyang Guo, Kai Liu. 633-641 [doi]
- A Novel Mobile Instant Messaging SystemYichuan Wu, Jianping Zheng, Meng Guo. 642-645 [doi]
- DESEND: A Fast Device Event Signature Extraction And Detection Method for Smart HomeJie Chen, Yaping Liu, Shuo Zhang, Zebin Guo, Bing Chen, Zhiyu Han. 646-652 [doi]