Abstract is missing.
- An Efficient Lattice-Based IBE Scheme Using Combined Public KeyYanfeng Shi, Shuo Qiu, Jiqiang Liu. 3-16 [doi]
- A Novel Location Privacy Protection Scheme with Generative Adversarial NetworkWenxi Wang, Weilong Zhang, Zhang Jin, Keyan Sun, Runlin Zou, Chenrong Huang, Yuan Tian. 17-27 [doi]
- Security, Safety and Privacy Issues of Unmanned Aerial Vehicle SystemsNajla Al-Nabhan. 28-39 [doi]
- A Trust Model for Evaluating Trust and Centrality Based on Entropy Weight Method in Social CommerceYonghua Gong, Lei Chen. 40-50 [doi]
- Digital Twins as Software and Service Development Ecosystems in Industry 4.0: Towards a Research AgendaYueqiang Xu, Tero Päivärinta, Pasi Kuvaja. 51-64 [doi]
- A Click Fraud Detection Scheme Based on Cost-Sensitive CNN and Feature MatrixXinyu Liu, Xin Zhang, Qianyun Miao. 65-79 [doi]
- Research on Table Overflow Ldos Attack Detection and Defense Method in Software Defined NetworksShengxu Xie, Chang-you Xing, Guomin Zhang, Jinlong Zhao. 80-97 [doi]
- Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized EnterprisesA. Ayoub, Vidyasagar M. Potdar, A. Rudra, H. Luong. 98-115 [doi]
- Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in LebanonA. Ayoub, Vidyasagar M. Potdar, A. Rudra, H. Luong. 116-134 [doi]
- Computationally Efficient Fine-Grain Cube CP-ABE Scheme with Partially Hidden Access StructureMiada Murad, Yuan Tian 0003, Mznah Al-Rodhaan. 135-156 [doi]
- The Impact of Organizational Culture on the Internal Controls Components of Accounting Information Systems in the City of Beirut, LebanonA. Ayoub, Vidyasagar M. Potdar, A. Rudra, H. Luong. 157-177 [doi]
- A Security Vehicle Network Organization Method for Railway Freight Train Based on Lightweight Authentication and Property VerificationCongdong Lv, Yucai Li. 178-189 [doi]
- Lightweight Identity Authentication Scheme Based on IBC Identity CryptographYongbing Lian, Xiaogang Wei. 190-198 [doi]
- Security Analysis and Improvement on Kerberos Authentication ProtocolGuangyao Yuan, Lihong Guo, Gang Wang. 199-210 [doi]
- Distributed Differential Privacy Protection System for Personalized RecommendationZongsheng Lv, Kaiwen Huang, Yuanzhi Wang, Ruikang Tao, Guanghan Wu, Jiande Zhang, Yuan Tian. 211-222 [doi]
- An Improved Dynamic Certificateless Authenticated Asymmetric Group Key Agreement Protocol with Trusted KGCHaiyan Sun, Lingling Li, Jianwei Zhang, Wanwei Huang. 223-237 [doi]
- Research on Medical Image Encryption Method Based on Chaotic Scrambling and Compressed SensingYubin Liu, Ming Pang. 238-246 [doi]
- Design and Optimization of Evaluation Metrics in Object Detection and Tracking for Low-Altitude Aerial VideoLi Wang, Xin Shu, Wei Zhang, Yunfang Chen. 247-262 [doi]
- People Flow Analysis Based on Anonymous OD Trip DataTianxu Sun, Yunlong Zhao, Zuowei Lian. 263-273 [doi]
- Agile Methods and Cyber-Physical Systems Development - A Review with Preliminary AnalysisMuhammad Ovais Ahmad. 274-285 [doi]
- Optimizing the Reservoir Connection Structure Using Binary Symbiotic Organisms Search Algorithm: A Case Study on Electric Load ForecastingLina Pan, Bo Zhang. 286-297 [doi]
- On the Character Relations Between Nodes for Data Forwarding in Mobile Opportunistic NetworksRuntong Zou, Xuecheng Zhang, Wei Jiang, Linfeng Liu 0001. 298-308 [doi]
- Research on Interference of LTE Wireless Network in Electric Power SystemShanyu Bi, Junyao Zhang, Weiwei Kong, Long Liu, Pengpeng Lv. 309-318 [doi]
- Research on High Reliability Planning Method in Electric Wireless NetworkZewei Tang, Chengzhi Jiang. 319-329 [doi]
- Research on Service Support Ability of Power Wireless Private NetworkYu Chen, Kun Liu, Ziqian Zhang. 330-339 [doi]
- A Method of UML Sequence Diagram Verification Based on a Graph GrammarZhan Shi, Chenrong Huang, Xiaoqin Zeng, Jiande Zhang, Lei Han 0002, Ying Qian. 340-351 [doi]
- A Bus Passenger Flow Estimation Method Based on POI Data and AFC Data FusionYuexiao Cai, Yunlong Zhao, Jinqian Yang, Changxin Wang. 352-367 [doi]
- Research Character Analyzation of Urban Security Based on Urban Resilience Using Big Data MethodYi Chen, Zhuoran Yang, Zhicong Ye, Hui Liu. 371-381 [doi]
- Privacy Issues in Big Data from Collection to UseAlaa A. Alwabel. 382-391 [doi]
- Trusted Query Method Based on Authorization Index and Triangular Matrix in Big DataLihong Guo, Haitao Wu, Jie Yang. 392-401 [doi]
- Microservice Architecture Design for Big Data in Tactical CloudLiyuan Tang, Haoren Hu, Zhonghua Wang, Jiansheng Wang, YaHui Li. 402-416 [doi]
- Using GitHub Open Sources and Database Methods Designed to Auto-Generate Chinese Tang Dynasty PoetryHai Yu, Zi-Xuan Li, Yu-Yan Jiang. 417-428 [doi]
- Distributed Image Retrieval Base on LSH Indexing on SparkZelei Hou, Chao Huang, Jiagao Wu, Linfeng Liu 0001. 429-441 [doi]
- A Blockchain Based Terminal Security of IoTDawei Li 0007, Xue Gao. 445-454 [doi]
- Key Factors Affecting Blockchain Adoption in OrganizationsAbubakar Mohammed, Vidyasagar M. Potdar, Li Yang. 455-467 [doi]
- An IoT-Based Congestion-Aware Emergency Evacuation ApproachNajla Al-Nabhan. 468-478 [doi]
- Directional Virtual Coordinate Approach for 3-D IoT Systems in Smart CitiesNajla Al-Nabhan, Aseel Bin Othman, Anura Jayasumana, Mahindre Gunjan. 479-498 [doi]
- Privacy Preservation of Future Trajectory Using Dummy Rotation Algorithm in Fog ComputingShadan Alhamed, Mznah AlRodhaan, Yuan Tian. 501-513 [doi]
- Enabling Secure and Efficient Data Sharing and Integrity Auditing for Cloud-Assisted Industrial Control SystemYuanfei Tu, Qingjian Su, Yang Geng. 514-528 [doi]
- An Evolutionary Task Offloading Schema for Edge ComputingPei Sun, Baojing Chen, Shaocong Han, Huizhong Shi, Zhenwei Yang, Xing Li. 529-540 [doi]
- Data Leakage Prevention System for Smart GridChengzhi Jiang, Song Deng. 541-549 [doi]
- Optimizing the Efficiency of Machine Learning TechniquesAnwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, Asad Masood Khattak. 553-567 [doi]
- Community Detection Based on DeepWalk in Large Scale NetworksYunfang Chen, Li Wang, Dehao Qi, Wei Zhang. 568-583 [doi]
- A Systematic Review of Artificial Intelligence and Machine Learning Techniques for Cyber SecurityRahman Ali, Asmat Ali, Farkhund Iqbal, Asad Masood Khattak, Saiqa Aleem. 584-593 [doi]
- Study on Indicator Recognition Method of Water Meter Based on Convolution Neural NetworkShuaicheng Pan, Lei Han, Yi Tao, Qingyu Liu. 594-602 [doi]
- A Deep Learning Approach for Anomaly-Based Network Intrusion DetectionNajwa Altwaijry, Ameerah ALQahtani, Isra Alturaiki. 603-615 [doi]
- Over-Sampling Multi-classification Method Based on Centroid SpaceHaiyong Wang, Weizheng Guan, Kaixin Zhang. 616-632 [doi]
- A Blockchain-Based IoT Workflow Management ApproachMing Jin, Chenchen Dou, Peichun Pan, Ming Wan, Biying Sun, Wenxuan Zhang. 633-644 [doi]
- Research on Identity-Based Cryptograph and Its Application in Power IoTXiaogang Wei, Yongbing Lian. 645-654 [doi]