Abstract is missing.
- Understanding Privacy-Preserving Techniques in Digital CryptocurrenciesYue Zhang 0011, Keke Gai, Meikang Qiu, Kai Ding. 3-18 [doi]
- LNBFSM: A Food Safety Management System Using Blockchain and Lightning NetworkZhengkang Fang, Keke Gai, Liehuang Zhu, Lei Xu 0016. 19-34 [doi]
- Reputation-Based Trustworthy Supply Chain Management Using Smart ContractHaochen Li, Keke Gai, Liehuang Zhu, Peng Jiang, Meikang Qiu. 35-49 [doi]
- Content-Aware Anomaly Detection with Network Representation LearningZhong Li, Xiaolong Jin, Chuanzhi Zhuang, Zhi Sun. 50-64 [doi]
- Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle TreeKai He, Jiaoli Shi, Chunxiao Huang, Xinrong Hu. 65-80 [doi]
- IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing SystemAnyuan Deng, Jiaoli Shi, Kai He, Fang Xu. 81-92 [doi]
- Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and IntegrationHao Jin, Chen Xu, Yan Luo, Peilong Li. 93-109 [doi]
- Blockchain Meets DAG: A BlockDAG Consensus MechanismKeke Gai, Ziyue Hu, Liehuang Zhu, Ruili Wang, Zijian Zhang 0001. 110-125 [doi]
- Dynamic Co-located VM Detection and Membership Update for Residency Aware Inter-VM Communication in Virtualized CloudsZhe Wang, Yi Ren, Jianbo Guan, Ziqi You, Saqing Yang, Yusong Tan. 126-143 [doi]
- An Attack-Immune Trusted Architecture for Supervisory Intelligent TerminalDongxu Cheng, Jianwei Liu 0001, Zhenyu Guan, Jiale Hu. 144-154 [doi]
- A Simulation Study on Block Generation Algorithm Based on TPS ModelShubin Cai, Huaifeng Zhou, Ningsheng Yang, Zhong Ming 0001. 155-169 [doi]
- Improving iForest for Hydrological Time Series Anomaly DetectionPengpeng Shao, Feng Ye, Zihao Liu, Xiwen Wang, Ming Lu, Yupeng Mao. 170-183 [doi]
- Machine Learning-Based Attack Detection Method in HadoopNingwei Li, Hang Gao, Liang Liu, Jianfei Peng. 184-196 [doi]
- Profiling-Based Big Data Workflow Optimization in a Cross-layer Coupled Design FrameworkQianwen Ye, Chase Q. Wu, Wuji Liu, Aiqin Hou, Wei Shen. 197-217 [doi]
- Detection of Loose Tracking Behavior over Trajectory DataJiawei Li, Hua Dai 0003, Yiyang Liu, Jianqiu Xu, Jie Sun, Geng Yang. 218-230 [doi]
- Behavioral Fault Modelling and Analysis with BIP: A Wheel Brake System Case StudyXudong Tang, Qiang Wang, Weikai Miao. 231-250 [doi]
- H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical NetworksTianbo Wang, Chunhe Xia. 251-269 [doi]
- Design of Six-Rotor Drone Based on Target Detection for Intelligent AgricultureChenyang Liao, Jiahao Huang, Fangkai Zhou, Yang Lin. 270-281 [doi]
- Consensus in Lens of Consortium Blockchain: An Empirical StudyHao Yin, Yihang Wei, Yuwen Li, Liehuang Zhu, Jiakang Shi, Keke Gai. 282-296 [doi]
- Collaborative Design Service System Based on Ceramic Cloud Service PlatformYu Nie, Yu Liu, Chao Li, Hua Huang, Fubao He, Meikang Qiu. 297-308 [doi]
- Towards NoC Protection of HT-Greyhole AttackSoultana Ellinidou, Gaurav Sharma 0006, Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat. 309-323 [doi]
- Cross-shard Transaction Processing in Sharding BlockchainsYizhong Liu, Jianwei Liu, Jiayuan Yin, Geng Li, Hui Yu, Qianhong Wu. 324-339 [doi]
- Lexicon-Enhanced Transformer with Pointing for Domains Specific Generative Question AnsweringJingying Yang, Xianghua Fu, Shuxin Wang, Wenhao Xie. 340-354 [doi]
- Design of Smart Home System Based on Collaborative Edge Computing and Cloud ComputingQiangfei Ma, Hua Huang, Wentao Zhang, Meikang Qiu. 355-366 [doi]
- Classification of Depression Based on Local Binary Pattern and Singular Spectrum AnalysisLijuan Duan, Hongli Liu, Huifeng Duan, Yuanhua Qiao, Changming Wang. 367-380 [doi]
- Cloud Allocation and Consolidation Based on a Scalability MetricTarek Menouer, Amina Khedimi, Christophe Cérin, Congfeng Jiang. 381-395 [doi]
- Adversarial Attacks on Deep Learning Models of Computer Vision: A SurveyJia Ding, Zhiwu Xu. 396-408 [doi]
- FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal ShardingYizhong Liu, Jianwei Liu, Dawei Li, Hui Yu, Qianhong Wu. 409-425 [doi]
- DSBFT: A Delegation Based Scalable Byzantine False Tolerance Consensus MechanismYuan Liu 0002, Zhengpeng Ai, Mengmeng Tian, Guibing Guo, Linying Jiang. 426-440 [doi]
- A Privacy-Preserving Approach for Continuous Data PublicationMengjie Zhang, Xingsheng Zhang, Zhijun Chen, Dunhui Yu. 441-458 [doi]
- Web Attack Detection Based on User Behaviour SemanticsYunyi Zhang, Jintian Lu, Shuyuan Jin. 459-474 [doi]
- A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on BlockchainWenhao Dai, Xiaozhuo Gu, Yajun Teng. 475-493 [doi]
- IncreAIBMF: Incremental Learning for Encrypted Mobile Application IdentificationYafei Sang, Mao Tian, Yongzheng Zhang 0002, Peng Chang, Shuyuan Zhao. 494-508 [doi]
- A Multi-level Features Fusion Network for Detecting Obstructive Sleep Apnea Hypopnea SyndromeXingfeng Lv, Jinbao Li. 509-519 [doi]
- BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location ProofZhen Lin, Yuchuan Luo, Shaojing Fu, Tao Xie. 520-536 [doi]
- Indoor Positioning and Prediction in Smart Elderly Care: Model, System and ApplicationsYufei Liu, Xuqi Fang, Fengyuan Lu, Xuxin Chen, Xinli Huang. 537-548 [doi]
- Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service PlatformXinxin Liu, Hua Huang, Meikang Qiu, Meiqin Liu. 549-563 [doi]
- Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature SurveyYujuan Wen, Fengyuan Lu, Yufei Liu, Peijin Cong, Xinli Huang. 564-579 [doi]
- Towards a Secure Communication of Data in IoT Networks: A Technical Research ReportBismark Tei Asare, Kester Quist-Aphetsi, Laurent Nana. 580-591 [doi]
- Efficient Thermography Guided Learning for Breast Cancer DetectionVishwas Rajashekar, Ishaan Lagwankar, Durga Prasad S. N, Rahul Nagpal. 592-600 [doi]
- PTangle: A Parallel Detector for Unverified Blockchain TransactionsAshish Christopher Victor, Akhilarka Jayanthi, Atul Anand Gopalakrishnan, Rahul Nagpal. 601-608 [doi]
- DOS-GAN: A Distributed Over-Sampling Method Based on Generative Adversarial Networks for Distributed Class-Imbalance LearningHongtao Guan, Xingkong Ma, Siqi Shen. 609-622 [doi]
- Effective Sentiment Analysis for Multimodal Review Data on the WebPeiquan Jin, Jianchuan Li, Lin Mu, Jingren Zhou, Jie Zhao 0006. 623-638 [doi]
- An Energy-Efficient AES Encryption Algorithm Based on Memristor SwitchDanghui Wang, Chen Yue, Ze Tian, Ru Han, Lu Zhang. 639-653 [doi]
- Digital Currency Investment Strategy Framework Based on RankingChuangchuang Dai, Xueying Yang, Meikang Qiu, Xiaobing Guo, Zhonghua Lu, Beifang Niu. 654-662 [doi]
- Authentication Study for Brain-Based Computer Interfaces Using Music StimulationsSukun Li, Meikang Qiu. 663-675 [doi]
- An Ensemble Learning Approach to Detect Malwares Based on Static InformationLin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Siliang Suo. 676-686 [doi]
- Automatic Medical Image Report Generation with Multi-view and Multi-modal Attention MechanismShaokang Yang, Jianwei Niu 0002, Jiyan Wu, Xuefeng Liu. 687-699 [doi]