Abstract is missing.
- Visual malware classification and detection method based on convolutional neural networkHua Huang, Hua-Sheng, Xingwang Han, Wenbin Zhang, Zilin Zhao. 1-8 [doi]
- An automated construction method for symmetric encryption round function models based on dynamic analysisGaolei Du, Yunge Sun, Junpeng Qu, Yong Fu. 1-6 [doi]
- An Encryption Algorithm Cycle Identification Method Based on Bit ExecutionYunge Sun, Gaolei Du, Junpeng Qu, Yong Fu. 7-12 [doi]
- Towards Blockchain Services Marketplace for More Efficient Blockchain DevelopmentHuynh Thanh Thien Pham, Frank Jiang 0001, Alessio Bonti, Lei Pan 0002, Junyu Lu, Mohamed Almorsy Abdelrazek. 13-23 [doi]
- An Empirical Case Study of Meta-IP Chain DAO: The Pioneer Tokenless DAOCaiyan Tang, Qi Cai, Chengzu Dong, Qin Wang 0008, Shiping Chen 0001, Mingyue Jiang. 24-31 [doi]
- Dynamic detection technology of encryption algorithm based on PinJunpeng Qu, Gaolei Du, Yunge Sun, Yong Fu. 32-37 [doi]
- An Efficient and Privacy-Preserving Load Monitoring and Billing Scheme in Smart GridYong Ding 0005, Enchang Yuan, Changsong Yang, Hai Liang, Huiyong Wang, Xinyong Peng. 38-45 [doi]
- A Perturbation-Based Privacy Leakage Defense Method for Federal LearningChangsong Yang, Sirui Huang, Yong Ding 0005, Hai Liang, Siyuan Jia, Xinyong Peng. 46-52 [doi]
- Unleashing the Potential of Decentralized Federated Learning in Healthcare: A Comprehensive Survey on Insights and ChallengesHaibo Cheng, Wenjian Liu, Youyang Qu, Kexue Fu, Qinyuan Wang. 53-60 [doi]
- Identifying Data Breaches in Dark Web through Prompt Active LearningHui Xiang, Yifan Wu, Xuebin Wang, Jinqiao Shi, Can Zhao 0005, Jiapeng Zhao. 61-68 [doi]
- *Changjian Li, Kai Chen, Han Yu, Yinxuan Huang, Xuechen Zhao, Jianfeng Zhang, Aiping Li. 69-76 [doi]
- Research on Key Technologies of Intelligent Management Platform for Medical Care Objects Based on Internet of Things and Digital TwinsWenbo Zhang, Lei He, Tao Shi, Shuang Gao, Yichen Zhao, Xing Wang, Lumin Xing, Yongmeng Li. 77-84 [doi]
- Smart Grid Attack Region Partitioning Strategy Based on Node ImportanceZilong Chen, Li Xu, Mohan Li, Yanbin Sun. 85-92 [doi]
- NEF-GGCN: Node-Edge Fusion Gated Graph Convolutional Networks For Skeleton-based Medical Action RecognitionJie Yao, Funing Xiang, Xuemei Wei, Kun Yuan. 93-100 [doi]
- Causal Attention Group Recommendation Integrating Social InformationLiancheng Xu, Xiaoqi Wu, Xiaoxiang Wang, Xinhua Wang 0003. 101-108 [doi]
- Community partition based source localization in early timeJinchen Shi, Yang Fang 0001, Zhen Tan, Hui Yang, Xiang Zhao 0002. 109-115 [doi]
- SLX: A Multi-class Network Intrusion Detection Method on Stacking Boosting AlgorithmZhitong Liu, Zhiqiang Zhang, Mengqing Cheng, Haonan Tan, Xinyao Tan, Le Wang 0008. 116-121 [doi]
- Vehicle Network Intrusion Detection Based on K-nearest Neighbor Variational Autoencoder Using Contrastive LearningChenyun Duan, Lei Du, Liyi Zeng, Zhaoquan Gu. 122-129 [doi]
- Modification Method for Internal Network Flow Anomaly Detection Based on Multi-timescale AnalysisXinyu Zhang, Junmei Ding, Yueming Lu. 130-137 [doi]
- SEAD: Self-aware Adversarial Detection for Black-box Reinforcement LearningChengyi Wang, Jinyin Chen, Haibin Zheng, Xuhua Pan. 138-145 [doi]
- An Abnormal Behavior Detection Method Based on User Behavior Correlation Feature Sequence ModelingYuting Zhou, Lijuan Sun, Jingchen Wu, Yutong Gao 0001, Xu Wu. 146-153 [doi]
- Optimization Design of Network Attack and Defense Scenarios in Intelligent ClustersChengyue Wang, Yang Liu, Yaojun Qiao, Daoqi Han, Yueming Lu. 154-161 [doi]
- Research on automobile data security risk analysis based on TARA methodDong Liu, Zhicheng Liu, Yang Liu, Biqing Qiu, Shirui Wang. 162-170 [doi]
- An Intelligent Retrieval System for Similar Information System Vulnerabilities Based on Knowledge GraphJunzhe Dong, Shuo Geng, Xiong Zhang. 171-176 [doi]
- Defense Against Graph Injection Attack in Graph Neural NetworksHanjin Tong, Tianqing Zhu, Faqian Guan, Wanlei Zhou 0001. 177-187 [doi]
- Cyber-Range: the Scientific Infrastructure for Cyberspace Security ResearchXing Zou, Ning Hu. 188-195 [doi]
- Leveraging LLM based Retrieval-Augmented Generation for Legal Knowledge Graph CompletionLai Jiang, Conghui Zheng, Xiaohan Zhang, Fuhui Sun, Xiaoyan Wang, Pan Li. 196-203 [doi]
- LLM & Bagging for 1-shot Joint IEYibin Fu, Zhaoyun Ding, Xiaojie Xu. 204-208 [doi]
- A Relation Semantic Enhancement Method for Large Language Model Based Knowledge Graph CompletionJiaqi Si, Xiaoye Ouyang, Xiaoling Zhu, Yi Zhang. 209-215 [doi]
- CyGPT: Knowledge Graph-Based Enhancement Techniques for Large Language Models in CybersecurityLu Ou, Xiaoya Ni, Wei Wu, Zhihong Tian. 216-223 [doi]
- Decode the Dark Side of the Language: Applications of LLMs in the Dark WebHongfan Chen, Yigang Diao, Hui Xiang, Yixuan Huo, Xiaqing Xie, Jiapeng Zhao, Xuebin Wang, Yanwei Sun, Jinqiao Shi. 224-231 [doi]
- LocatingGPT: A multi-modal document retrieval method based on retrieval-augmented generationZilong Chen, Peng Zhang 0047, Mingyang Xu, Xingjian Gao, Dan Liu, Xuebing Luo, Rencheng Huang, Tao Zhang 0026. 232-239 [doi]
- A Method for Generating Medical Text Data by Integrating Spatiotemporal Attributes and Implicit State TransitionsXu Yang, Lijuan Sun, Yutong Gao 0001, Sanchuan Guo, Xu Wu. 240-246 [doi]
- Hate Speech Detection in Network Perception Constrained ScenariosHaoyuan Zeng, Bo Qiao, Ye Wang, Bin Zhou. 247-254 [doi]
- StanceDigger: Achieving Efficient Text Stance Detection with Collaborative Attention and Consistent LearningYuliang Wei, Qi Li, Yang Liu, Chang Sun, Yongzheng Zhang. 255-262 [doi]
- An Aggregation Procedure Optimization Method by Leveraging Neighboring Prompt for GCN-based Knowledge Graph Completion ModelYashen Wang, Xiaoling Zhu, Tianzhu Chen, Yi Zhang. 263-270 [doi]
- Spherical Hierarchical Knowledge Graph Embeddings for Cybersecurity Knowledge Graph CompletionYao Lin, Dong Zhu, Chenhui Zhang, Zhiqiang Zhang, Le Wang. 271-278 [doi]
- A novel method of cybersecurity knowledge graph construction and storage optimization based on cyber rangeCui Luo, Haiyan Wang, Huaping Yuan, Zhaoqian Gu, Ning Hu. 279-286 [doi]
- Knowledge Graph Construction in the Context of Traditional Chinese Medicine: A reviewLei He, Wenbo Zhang, Tao Shi, Yichen Zhao, Xing Wang, Lumin Xing, Yongmeng Li. 287-293 [doi]
- Research on entity extraction method for rehabilitation medicine knowledge managementWeijie Deng, Zhaoyun Ding, Junqi Chen, Yi Wang. 294-299 [doi]
- CIL4EMTD: A Novel Class Incremental Learning Method for Encrypted Malware Traffic DetectionJiarui Li, Lei Du, Yilu Chen, Liyi Zeng, Hao Li 0027, Zhaoquan Gu. 300-307 [doi]
- Weapon Target Assignment Based on Deep Q-learningJianbo Qin, Yi Wang, Zhaoyun Ding. 308-313 [doi]
- Multi-Behavior Hypergraph Contrastive-Enhanced Transformer for Recommender SystemsWeixuan Sun, Jiuyang Tang, Yang Fang, Jinqiu Hong, Hao Xu, Mao Wang. 314-321 [doi]
- Node Fragility Reward Shaping Based on Reinforcement Learning in Intranet Penetration ScenarioYinghui Xu, Haonan Tan, Jianyu Deng, Le Wang. 322-328 [doi]
- Enhancing Adversarial Robustness: A Novel Bayesian Uncertainty-Based Ensemble Learning MethodYidong Chai, Yi Liu, MohammadReza Ebrahimi, Weifeng Li 0002, Balaji Padmanabhan, Yuanchun Jiang, Yezheng Liu 0001. 329-336 [doi]
- An Early Detection Model of Prostate Cancer Based on MRIYuankun Liu, Lumin Xing, Di Wang, Xin Nie, Xueyan Zhang, Di Wu, Wenjian Liu. 337-344 [doi]
- Enhancing CLAHE with Interval-Valued Fermatean Fuzziness for Robust Low-Light Image EnhancementHongpeng Wang, Duanfa Wang, Zhiqin Wang, Chenglong Li. 345-353 [doi]
- Reliability Measurement Of Vehicle Sensor Data Based On Historical PerceptionChenqing Guo, Jinxin Zuo, Yueming Lu, Weixuan Xie. 354-361 [doi]
- ST-LadderNet: Spatial-Temporal Correlation Stepply Enhanced Deep Learning Model for Urban Traffic PredictingFeixiang Shu, Lai Jiang, Conghui Zheng, Fuhui Sun, Xiaoyan Wang, Pan Li. 362-369 [doi]
- Continuous Verification of Catastrophic Recalling in Machine Unlearning via Adversarial TestingY. Neil Qu, Zonghao Ji, Lei Cui 0006, Chong Zhang, Lei Liu, Zhiyi Tian. 370-377 [doi]
- HGNNDroid: Android Malware Detection Based on Heterogeneous Graph Neural NetworkXingyu Liu, Xiaozhen Liu, Kegang Hao, Ke Wang, Xinglong Chen, Weina Niu. 378-384 [doi]
- The Ecological and Financial Impact Study of Electric Bus TransitionSijun Li, Jianqi Wang, Eric Li, Daren Liu, Yi Li. 385-391 [doi]
- Risk Analysis and Protection Suggestions for Artificial Intelligence Data SecurityBiqing Qiu, Dong Liu, Shunchao Cao, Chunxu Mu, Shen Yan, Yang Liu. 392-398 [doi]
- Multi-agent Assignment via Growth Assignment AlgorithmDongzhi Ge, Lidong He, Zhengguo Bian. 399-405 [doi]
- INN-based Robust JPEG Steganography Through Cover Coefficient SelectionFei Shang, Weixiang Zhao, Jingyang Wen, Xiangui Kang, Z. Jane Wang 0001. 406-413 [doi]
- A Universal Semantic-Based Method for Backdoor AttackSizheng Wu, Jun Li, Chao Li, YaWei Ren, Liyan Shen. 414-420 [doi]
- Lightweight Malicious Encrypted Traffic Detection Method Based on KL Image CompressionYuecheng Wen, Xiaotong Li, Haiqing Lv, Menglu Wang, Wenbo Zuo. 421-427 [doi]
- Bibliometric Analysis of Large Language Model Artificial Intelligence Based on Knowledge GraphXinxu Weng, Yuqing Wang, Shijing Weng, Juan Xiong, Lei Weng. 428-434 [doi]
- Online Health Information Adoption Behavior of Chronic Disease PatientsYanan Du, Xiaoli Zha, Min Li, Yueli Song. 435-440 [doi]
- An Encrypted Malicious Traffic Detection Method Based on Deeper Protocol FeaturesLei Chen, Yilu Chen, Chenwei Liu, Wenying Feng 0003. 441-445 [doi]
- A Data Dimensionality Reduction Method Based on Stacked Auto-Encoders with Self-AttentionSongming Han, Ying Ling, Ming Xie, Shaofeng Ming, Fuchuan Tang. 446-451 [doi]
- A Time-tightly Coupled UAV Control Scheduling SchemeYuanyuan Guo, Xianqiang Zhu, Qianzhen Zhang, Bin Liu. 452-456 [doi]
- Building an autonomous driving platform based on ROS and its safety analysisZelin Wei, Qiwei Chen, Rui Weng. 457-463 [doi]
- Analysis of Big Data Research Hotspots Based on Keyword Co-occurrenceNiuniu Zhang, Guohe Feng. 464-471 [doi]
- Intelligent Recognition Model for IoT Terminal Devices Based on Message Business Logic FeaturesFangliao Yang, Shi Zhu, Mingguang Li, Lailong Luo, Bangbang Ren, Yuhui Cai. 472-478 [doi]
- Trapping resource orchestration scheme based on electric power environmentTianfu Xu, Tianzhe Li, Qun He, Zhiyuan Luo, Naqin Zhou, Haoqin Chen, Rixuan Qiu. 479-486 [doi]
- Automatic Classification Based on the LSTM-SiTGRU Model for Plaintext and CiphertextSongming Han, Ying Ling, Ming Xie, Shaofeng Ming. 487-494 [doi]
- Anonymous Smart Grid System Based on Revocable Ring SignaturesXuhua Ai, Yiting Huang, Yuan Yin, Yun Dong, Qi Meng, Denghao Tu, Liyuan Zhang. 495-500 [doi]
- Research on fault early warning of industrial control system based on TCN-MKELMJiahan Dong, Tong Jin, Xiaohu Wang, Guangxin Guo, Qihang Zhou. 501-506 [doi]
- Time Series Anomaly Detection Based on Normalized Flow and Bayesian NetworksHonglei Yao, Donglan Liu, Yingxian Chang, Xin Liu, Chaofan Tang. 515-522 [doi]
- Research on Classification and Grading of Cross-Border Data in Free Trade Port ConstructionYukun Zhang, Xiaoli Qin, Yanzhao Tian, Shenjian Xiao. 533-540 [doi]
- Knowledge Base-Guided Modeling of ICS Device Behavior for Status PredictionLei Li, Shichao Zhang, Xin Liu, Donglan Liu, Rui Wang, Fangzhe Zhang, Fuhui Zhao, Shanjie Xu. 541-548 [doi]
- Research on Stochastic Feature Selection Optimization Algorithm Fusing Symmetric UncertaintyTing Wang, Qian Zhao, Sen Wang, Changqiang Jing. 549-554 [doi]
- SDCRT: An Anonymous Communication Network Routing Algorithm Based on SDN ArchitectureMingqian Yang, Wei Peng, Xiaowei Song, XiTing Ma, Ling Liu, Ning Hu. 555-562 [doi]
- Secure Two-party Newton InterpolationShuang Zhou, Zhigang Liu, Jian Liu, Han Jiang. 563-566 [doi]
- Encrypted Malicious Traffic Detection Based on Sample Selection Optimization and Data AugmentationRui Liang, Hanchong Zhang, Fuqiang Liu, Jinyun Zhang, Zhe Sun, Yanfei Song, Chao Li, Liang Zhang. 567-574 [doi]
- CloudNet: Building a Data-Plane for Anonymous Communication Network Based on Cloud ServiceXiaowei Song, Mingqian Yang, Wei Peng, Mengen Liang, Ling Liu, Ning Hu. 575-582 [doi]
- Conduit: An IPFS-based Hidden Access Channel for Mix-netWei Peng, Xiaowei Song, Mingqian Yang, Mengen Liang, Rui Wu, Ning Hu. 583-590 [doi]
- Reputation based Adaptive Federated Learning in Medical ScenariosLianhai Wang, Tianrui Liu, Yingxiaochun Wang, Xinlei Wang, Qi Li. 591-598 [doi]
- A Novel Method for Honeypot Anti-Identification against Modbus Fuzz Testing in Industrial Control SystemsYunhao Xu, Chao Li, Daiqi Gu, Zhewei Zhang, Zhe Sun, Yanfei Song. 599-606 [doi]
- Infringement Detection and Traceability Scheme Based on Ciphertext Feature ExtractionLianhai Wang, Xinlei Wang, Tianrui Liu, Yingxiaochun Wang, Qi Li. 607-614 [doi]
- A Short-Term Electric Load Forecasting Method Based on the Fusion of Global and Local FeaturesHaozhan Gu, Hangwei Tian, Jingchun Wang, Yumei Li. 615-620 [doi]
- Text Information Mining in Cyberspace: An Information Extraction Method Based on T5 and KeyBERTKuan Liu, Yumei Li, Yuanhua Qi, Ning Qi, Mengran Zhai. 621-628 [doi]
- Networked Vehicle Practices Based on Networked Firing RangesWenqi Zheng, Hao Ren, Siqi Yang, Zhi Chen, Jiajun Xie, Wenqiang Pan. 629-634 [doi]
- Research on liquid crystal display technology based on regional dynamic dimming algorithmZhitao Yu, Peng Sun, Mingle Zhou, Qianlong Liu, Shilong Zhao. 635-640 [doi]
- Ultra-high definition video quality assessment method based on deep learningWei Li 0168, Can He, Mingle Zhou, Hengyu Zhang, Wenlong Liu. 641-646 [doi]
- Incorporate Data Elements into the Digital Evaluation System of the NewEraWang Li, Hengyu Zhang, Hongze Xie, Xikai Ding, Qianlong Liu. 647-651 [doi]
- Research on the Distribution Characteristics of Standardized Big Data Resources Based on Data Visualization - - Taking Standardization Practice in Shandong Province as an ExampleJinyang Sun, Dongdong Peng, Zhe Lu, Mengran Zhai, Ning Qi, Yuanhua Qi. 652-659 [doi]
- Security and Privacy of Artificial Intelligence with Ethical ConcernsYihong Li. 660-667 [doi]
- Research on Government Data Governance in the Era of Large Language ModelMingxi Ji, Xueping Gu, Qinghong Guo, Xikai Ding. 668-671 [doi]
- Research on the Design of Government Data Governance Evaluation System under the Perspective of Digital GovernmentZirui Xu, Jinyang Sun, Zhe Lu, Delong Han. 672-676 [doi]
- Feature Aggregation Network for Memory-Based Industrial Anomaly DetectionMin Li, Delong Han, Rui Shao, Jinghui He. 677-683 [doi]
- Visible Light Positioning Method for Indoor Line-of-Sight Scene Based on Time Series CodingYonghao Yu, Yongde Guo, Dawei Zhao 0001, Kexue Fu, Yongwei Tang, Qinyuan Wang. 684-690 [doi]
- Aligning Users Across Social Networks Based on Hypergraph EmbeddingXia Wu, Zehan Li, Zijun Hu, Qing Zhao, Hangyu Hu. 691-698 [doi]
- Risk Modeling and Traceability of Boundary Attacks on Internet of Power Systems Based on Complex NetworksXin Li, Zhaoyang Qu, Tong Yu, Ming Xie, Fu Yu, Wei Ding. 699-705 [doi]
- Fairness of Large Music Models: From a Culturally Diverse PerspectiveQinyuan Wang, Bruce Gu, He Zhang, Yunfeng Li. 706-712 [doi]
- Contrastive Learning for Chest X-ray Classification: A Fusion of Topological Data Analysis and ResNetHao Ren, Zeyu Luo, Fengshi Jing, Xinyue Zhang, Han He, Yonghao Yu, Dawei Zhao 0001. 713-719 [doi]
- Scalable and Feasible Honeypot Solution for SMEs in Cloud EnvironmentsXiaodong Wang, Sazia Parvin, Sitalakshmi Venkatraman, Kiran Fahd, Amjad Gawanmeh. 720-725 [doi]
- A Framework for Vietnamese Question-Answering in Law DomainThang V. Q. Le, Dinh-Hong Vu, Van-Huy Pham 0001, Anh-Cuong Le 0001, Nguyen P. Nguyen. 726-731 [doi]
- Multiple Knowledge Graphs Semantic Interaction based on Graph Embedding and Matching ProcessingLing Wang 0011, Haoyu Hao, Xue Yan, Xiwei Wang, Tie Hua Zhou, Keun Ho Ryu. 732-737 [doi]
- Knowledge Points Semantic Classification Method based on Graph Embedding over Co-word NetworksTie Hua Zhou, Xiuting Jia, Xirao Xun, Tianshuo Bi, Ling Wang 0011. 738-743 [doi]
- Deep Learning-based Mortality Prediction of COVID-19 Patients with Cardiovascular DiseaseHuilin Zheng, Yingyi Liang, Daming Zhang, Kai Shi 0004, Luxi Dong, Xiaolan Xie. 744-749 [doi]
- Solution for prediction of customer behavior in call center systemsBattogtokh Azzaya, Sambuu Uyanga, Namsrai Oyunerdene. 750-753 [doi]
- A Model for Evaluating a Digital Transformation of Rural Areas of MongoliaDelgermaa Gankhuyag, Uyanga Sambuu, Enkhtuul Bukhsuren, Buyankhishig Bold. 754-761 [doi]
- A prognostic model based on five characteristic genes to predict the prognosis of patients with hepatocellular carcinomaLidi Wu, Yang Liu, Jiale Yang, Yongjun Piao. 762-769 [doi]
- Single-cell RNA sequencing analysis reveals transcriptional dynamics of immune cells during ovarian cancer metastasisYan Yan, Yukun Wang, Yiru Da, Yongjun Piao. 770-777 [doi]
- Generation of Synthetic Data for Sharing and Utilization in Healthcare DataHa Ye Jin Kang, Min Sam Ko, Kwang Sun Ryu. 778-781 [doi]
- Deciphering Myopia: Insights From Single-Cell Data and Machine Learning ApproachesJunwei Hu, Yule Zhang, Yongjun Piao. 782-788 [doi]
- Digital Contracts: A Sustainable and Secure Solution for Modern Businesses -A Case Study of E-Geree.mn in MongoliaJavkhlan Rentsendorj, Lkhamrolom Tsoodol, Munkhtsetseg Namsraidorj, Oyun-Erdene Namsrai. 789-792 [doi]
- Data Augmentation Based on Word Importance and Deep Back-Translation for Low-Resource Biomedical Named Entity RecognitionYu Wang, Meijing Li, Runqing Huang. 793-797 [doi]
- A new approach for non-contact, automated measurement of respiration rate using structured lightSumiyakhand Dagdanpurev, Darkhijav Davaasuren, Adiyabat Enkhjargal, Amartuvshin Renchin-Ochir. 798-801 [doi]
- Demand Response Scheme: Achieving Sustainability in Distributed Data ProcessingXueying Zhai, Yunfeng Peng, XiuPing Guo, Liang Zhang, Wei Zhang. 802-809 [doi]
- Improving Skin Lesion Classification based on Fusion Multi-Learning ModelsTrung-Phien Nguyen, Van-Dung Hoang, Minh-Luan Su, Thi-Nhat-Vy Nguyen, Trong-Tri Bui, Ba-Duy Nguyen. 810-817 [doi]
- Managing concurrent course selection requests in a web-based university management systemBaatarbileg Altangerel, Tulgaa Purevsuren, Oyun-Erdene Namsrai. 818-820 [doi]
- Implementing Unified Identity and Access Management System: Case Study for the National University of MongoliaLkhamrolom Tsoodol, Munkhnasan Tuvdendorj, Javkhlan Rentsendorj, Oyun-Erdene Namsrai. 821-824 [doi]
- Cultural Heritage Education in the MetaverseOyundolgor Khorloo, Enkhbayar Altantsetseg. 825-831 [doi]