Abstract is missing.
- Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoTMande Xie, Jifei Hu, Haibo Hong. 3-18 [doi]
- DNS Rebinding Detection for Local Internet of Things DevicesXudong He, Jian Wang, Jiqiang Liu, Zhen Han, Zhuo Lv, Wei Wang 0012. 19-29 [doi]
- Low-Speed Injection Attack Detection on CAN BusChundong Wang 0002, Chuang Li, Tongle An, Xiaochun Cheng. 30-43 [doi]
- User Similarity-Aware Data Deduplication Scheme for IoT ApplicationsYuan Gao, Hequn Xian, Yan Teng. 44-52 [doi]
- Analysis Model of Node Failures and Impact for AANETLixia Xie, Liping Yan, Guangquan Xu, Jiyong Zhang. 55-64 [doi]
- Deep Attention Model with Multiple Features for Rumor IdentificationLina Wang, Wenqi Wang, Tong Chen, Jianpeng Ke, Benxiao Tang. 65-82 [doi]
- Defending Poisoning Attacks in Federated Learning via Adversarial Training MethodJiale Zhang, Di Wu, Chengyong Liu, Bing Chen 0002. 83-94 [doi]
- Multi-type Source Code Defect Detection Based on TextCNNXiaomeng Wang, Zhibin Guan, Wei Xin, Jiajie Wang. 95-103 [doi]
- Noninvasive Research on Cardiac Electrical Activity by Non-Gaussian Prior Bayesian Matching PursuitLu Bing, Yudong Li, Wen Si. 104-110 [doi]
- Video Investigation Analysis System Enhanced by Explicable ModelJun Xing, Guangquan Xu, Chengbo Yin. 111-117 [doi]
- Application of Blockchain Technology to the Credit Management of Supply ChainRong Tan, Yudong Li, Jing Zhang, Wen Si. 121-132 [doi]
- Data Auditing for the Internet of Things Environments Leveraging Smart ContractFang Peng, Hui Tian 0002, Hanyu Quan, Jing Lu. 133-149 [doi]
- Design a Proof of Stake Based Directed Acyclic Graph ChainHaibo Tian, Huizhi Lin, Fangguo Zhang. 150-165 [doi]
- Design of Personal Credit Information Sharing Platform Based on Consortium BlockchainJing Zhang, Rong Tan, Yudong Li. 166-177 [doi]
- Evil Chaincode: APT Attacks Based on Smart ContractZhenyu Li, Yujue Wang, Sheng Wen, Yong Ding 0005. 178-196 [doi]
- NoPKI - a Point-to-Point Trusted Third Party Service Based on Blockchain Consensus AlgorithmWei-Yang Chiu, Weizhi Meng 0001, Christian Damsgaard Jensen. 197-214 [doi]
- The Research on Covert Communication Model Based on Blockchain: A Case Study of Ethereum's Whisper ProtocolZhijie Zhang, Lejun Zhang, Waqas Rasheed, Zilong Jin, Tinghuai Ma, Huiling Chen 0001, Guangquan Xu. 215-230 [doi]
- A New Face Detection Framework Based on Adaptive Cascaded NetworkGangting Liu, Jianhong Lin, Yifan Ding, Shihong Yang, Yunhua Xu. 233-242 [doi]
- Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular NetworksChenkai Tan, Zhengjun Jing, Shaoyi Bei. 243-253 [doi]
- Detecting Intrusions in Railway Signal Safety Data Networks with DBSCAN-ARIMAYuming Fan, Kaiyuan Tian, Xuyu Wang, Zhuo Lv, Jian Wang. 254-270 [doi]
- Dynamic Trajectory for Visual Perception of Abnormal BehaviorChangqi Zhang, Jiang Yu, Yudong Li, Wen Si. 271-282 [doi]
- Fuzzy Petri Nets Based Information System Security Situation Assessment ModelHongyu Yang, Yuhao Feng, Guangquan Xu, Jiyong Zhang. 283-293 [doi]
- Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding StrategiesHao Peng, Can Liu, Dandan Zhao, Zhaolong Hu, Jianmin Han. 294-304 [doi]
- Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different NetworksHao Peng, Can Liu, Dandan Zhao, Jianmin Han, Zhonglong Zheng. 305-314 [doi]
- Security Assessment for Cascading Failures of Cyber-Physical Systems Under Target Attack StrategyHao Peng, Zhen Qian, Zhe Kan, Hongxia Ye, Zian Fang, Dandan Zhao. 315-327 [doi]
- Heterogeneous Deniable Authenticated Encryption ProtocolChunhua Jin, Ge Kan, Guanhua Chen, Changhui Yu, Chengjie Xu. 331-346 [doi]
- Identify-Based Outsourcing Data Auditing Scheme with LatticeHan Wang, Xu an Wang, Jiasen Liu, Chuan Lin. 347-358 [doi]
- A Security Problem Caused by the State Database in Hyperledger FabricZhen Gao, Dongbin Zhang, Jiuzhi Zhang. 361-372 [doi]
- Efficient Boolean SSE: A Novel Encrypted Database (EDB)Xueling Zhu, Huaping Hu, Shaojing Fu, Qing Wu, Bo Liu. 373-387 [doi]
- Research on Database Anomaly Access Detection Based on User Profile ConstructionXuren Wang, Zhou Fang, Dong Wang, Anran Feng, Qiuyun Wang. 388-399 [doi]
- An Effective Occlusion Edge Prediction Method in Light Field Depth EstimationChao Zhou, Qian Zhang 0033, Bin Wang, Yunzhang Du, Tao Yan, Wen Si. 403-416 [doi]
- DexFus: An Android Obfuscation Technique Based on Dalvik Bytecode TranslationNaitian Hu, Xingkong Ma, Fuqiang Lin, Bo Liu, Tong Lu. 419-431 [doi]
- Robust Android Malware Detection Based on Attributed Heterogenous Graph EmbeddingYonghao Gu, Liangxun Li, Yong Zhang. 432-446 [doi]
- A Network Traffic Classification Method Based on Hierarchical ClusteringYong Ma, Yang Hu, Chang Cai. 449-458 [doi]
- DPC: A Delay-Driven Prioritized TCP Congestion Control Algorithm for Data Center NetworksXianliang Jiang, Jiahua Zhu, Guang Jin. 459-474 [doi]
- SA Dots: A Sensitive and Self-adaptable Framework for Cross-Region DDoS ProcessingLi Su, Meiling Chen, Wei Li, Peng Ran, Yang Sun. 475-488 [doi]
- Characterizing the Security Threats of Disposable Phone NumbersYanan Cheng, Han Wang, Zhaoxin Zhang, Ning Li. 491-507 [doi]
- Efficient Discrete Distribution Estimation Schemes Under Local Differential PrivacyWenlong Dun, Youwen Zhu. 508-523 [doi]
- Privacy Prediction of Lightweight Convolutional Neural NetworkShiyin Yang, Yongbiao Li, Dehua Zhou, Linfeng Wei, Qingqing Gan. 524-537 [doi]
- Privacy-Preserving and Outsourced Density Peaks Clustering AlgorithmShaopeng Liang, Haomiao Yang, Qixian Zhou, Minglu Zhang. 538-552 [doi]
- The Socio-economic Impacts of Social Media Privacy and Security ChallengesFeras N. Al-Obeidat, Anoud Bani-Hani, Oluwasegun A. Adedugbe, Munir Majdalawieh, Elhadj Benkhelifa. 553-563 [doi]
- Automatic Repair of Semantic Defects Using Restraint MechanismsYukun Dong, Li Zhang 0053, Shanchen Pang, Hao Liu, Wenjing Yin, Mengying Wu, Meng Wu, Haojie Li. 567-583 [doi]
- Code Property Graph-Based Vulnerability Dataset Generation for Source Code DetectionZhibin Guan, Xiaomeng Wang, Wei Xin, Jiajie Wang. 584-591 [doi]
- A Hybrid Quantum Secret Sharing Scheme Based on Mutually Unbiased BasesDan-Li Zhi, Zhi-Hui Li, Li-juan Liu, Zhao-Wei Han. 595-607 [doi]
- A Novel Method to Improve Security and Imperceptibility of Image SteganographyKymbat Taalaibekova, Xianjin Fang, Zhifeng Xu. 611-627 [doi]
- Multi-resolution Steganalysis of JPEG Images Using the Contrast of DCT CoefficientsJiang Yu, Changqi Zhang, Yudong Li, Wen Si. 628-640 [doi]
- A Key Business Node Identification Model for Business Process Based on AE-VIKOR MethodLixia Xie, Huiyu Ni, Guangquan Xu, Jiyong Zhang. 643-653 [doi]
- An Adaptive Utility Quantification Strategy for Penetration Semantic Knowledge MiningYichao Zang, Tairan Hu, Rongrong Cao, Junhu Zhu. 654-666 [doi]
- RF-AdaCost: WebShell Detection Method that Combines Statistical Features and OpcodeWenzhuang Kang, Shangping Zhong, Kaizhi Chen, Jianhua Lai, Guangquan Xu. 667-682 [doi]