Abstract is missing.
- scList: A PCRAM-based Hybrid Memory Management SchemeHongyu Wang, Xiaolei Tang, Liming Sheng, Wenqiang Li, Jun Shen, Jun Tao. 1-7  [doi]
- Open Portable Trusted Execution Environment framework for RISC-VMarouene Boubakri, Fausto Chiatante, Belhassen Zouari. 1-8  [doi]
- VFAT: A Personalized HAR Scheme Through Exploiting Virtual Feature Adaptation Based on Transfer LearningXiao Li 0014, Yufeng Wang 0001, Jianhua Ma, Qun Jin. 1-8  [doi]
- An Energy-aware Approach with Spectrum Detection in Wireless Sensor NetworksChengyi Yang, Feng Liu 0039, Siyuan Shen, Jiayin Qi. 1-7  [doi]
- Designing the Elements of a Fuzzy Hashing SchemeJonathan Oliver, Josiah Hagen. 1-6  [doi]
- An Image Enhancement Method for Few-shot ClassificationBenze Wu, Yirui Wu, Shaohua Wan. 1-7  [doi]
- PolarText: Single-stage Scene Text Detection with Polar RepresentationQiran Kong, Yirui Wu, Shaohua Wan. 1-8  [doi]
- PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular NetworksQi Tang, Jiachen Shen, Zhenfu Cao, Xiaolei Dong. 1-8  [doi]
- Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU ModelHaining Meng, Wei Li, Wenjiang Ji, Yi Zheng, Xinyu Tong, Xinhong Hei 0001. 8-14  [doi]
- Dynamically Interchangeable Framework for Component Behavior of Embedded Component SystemsRyota Shimomura, Hiroshi Oyama 0002, Takuya Azumi. 15-22  [doi]
- Private Estimation of Symptom Distribution for Infectious Disease Analysis in Edge ComputingXiaotong Wu, Xiaolong Xu 0001, Shaohua Wan, Lianyong Qi. 31-38  [doi]
- Multi-Agent Multi-Armed Bandit Learning for Offloading Delay Minimization in V2X NetworksNang Hung Nguyen, Phi-Le Nguyen, Hieu Dinh, Thanh-Hung Nguyen, Kien Nguyen. 47-55  [doi]
- A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular NetworksWeihui Qiu, Xin Yang, Ming Wei, Wei Ren, Tianqing Zhu. 56-63  [doi]
- Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIMZhijun Wu 0001, Jia Nie, Yue Yin, Hui Wang. 72-78  [doi]
- METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDNCong Wang, Yunhe Cui, Qing Qian, Guowei Shen, Hongfeng Gao, Saifei Li. 79-86  [doi]
- Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor NetworksBahman A. Sassani Sarrafpour, Abdulaziz Alomirah, Shaning Pang, Soshian Sarrafpour. 87-94  [doi]
- A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker CategorizationWaleed Bin Shahid, Haider Abbas, Baber Aslam, Hammad Afzal, Saad Bin Khalid. 95-101  [doi]
- Securing Remote Policy Enforcement by a Multi-Enclave based Attestation ArchitectureHendrik Meyer zum Felde, Mathias Morbitzer, Julian Schütte. 102-108  [doi]
- An Adaptive Edge-Based Steganography Algorithm for Hiding Text into ImagesBahman A. Sassani Sarrafpour, Reem A. Alomirah, Soshian Sarrafpour, Hamid Sharifzadeh. 109-116  [doi]
- A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary MalwareMuhammad Zia, Muhammad Faisal Amjad, Haider Abbas, zafar iqbal, Anique Azhar, Ahsan Yasin, Hasan Iesar. 117-124  [doi]
- New Dynamic Switch Migration Technique Based on Deep Q-learningLin Yao, Jia Li, Guowei Wu, Bin Wu. 125-130  [doi]
- Modification and Performance Improvement of Paillier Homomorphic CryptosystemYunting Tao, Fanyu Kong, Jia Yu 0005, Qiuliang Xu. 131-136  [doi]
- A Q- Learning based Routing Optimization Model in a Software Defined NetworkYupeng Wang, Xin Zhou, Xinyue Fan. 143-150  [doi]
- Dealing with the Domain Name Abuse: Issues and ApproachesXuebiao Yuchi, Zhiwei Yan, Kejun Dong, Hongtao Li, Guanggang Geng, Sachin Shetty. 166-173  [doi]
- Multi-objective optimization of water distribution networks via NSGA-II and Pseudo-WeightsSamar Ben Ammar, Mario G. C. A. Cimino, Pierfrancesco Foglia, Federico A. Galatolo, Issam Nouiri. 181-186  [doi]
- Is Blockchain Overrated?Asif Raza Kazmi, Mehreen Afzal, Haider Abbas, Shahzaib Tahir, Abdul Rauf. 187-192  [doi]
- Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint TrackingJunwei Tang, Ruixuan Li, Zhiqiang Xiong, Hongmu Han, Xiwu Gu. 193-200  [doi]
- A Image Enhancement Method for Few-shot ClassificationBenze Wu, Yirui Wu, Shaohua Wan. 201-207  [doi]