Abstract is missing.
- The Research of Cryptosystem Recognition Based on Randomness Test's Return ValueZhicheng Zhao, Yaqun Zhao, Fengmei Liu. 3-15 [doi]
- Threshold Proxy Re-encryption and Its Application in BlockchainXi Chen, Yun Liu, Yong Li 0002, Changlu Lin. 16-25 [doi]
- Trace Representation of the Sequences Derived from Polynomial QuotientLiping Zhao, Xiaoni Du, Chenhuang Wu. 26-37 [doi]
- Unified Quantum No-Go Theorems of Pure StatesHui-Ran Li, Mingxing Luo, Hong Lai. 38-47 [doi]
- VideoChain: Trusted Video Surveillance Based on Blockchain for CampusMingda Liu, Jing Shang, Peng Liu 0029, Yijuan Shi, Mian Wang. 48-58 [doi]
- A Blind Quantization Watermarking Scheme for Screen Content ImageJun Wang, Wenbo Wan, Mingsheng Zhang, Liming Zou, Jiande Sun. 61-71 [doi]
- A Comprehensive Analysis of Interval Based Network Flow WatermarkingJin Shi, Li Zhang, Shuijun Yin, Weiwei Liu 0002, Jiangtao Zhai, Guangjie Liu, Yuewei Dai. 72-84 [doi]
- A Covert Communication Model Based on IPv6 MulticastYazhou Kong, Liancheng Zhang, Zhenxing Wang, Yi Guo, Wen Guo. 85-98 [doi]
- A Data Hiding Scheme with High Quality for H.264/AVC Video StreamsYi Chen 0008, Hongxia Wang 0001, Hanzhou Wu, Yanli Chen, Yong Liu. 99-110 [doi]
- A Domain Name Model of Anonymous Network Hidden ServiceYitong Meng, Jin-long Fei, Yan Chen, Yuefei Zhu. 111-122 [doi]
- A Layered Steganography Model Based on User InteractionsQuansheng Gao, Kaixi Wang. 123-134 [doi]
- A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data HidingBin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi. 135-146 [doi]
- A Multiple Watermarking Scheme for Content Authentication of OOXML Format DocumentsNiandong Liao, Caixia Sun, Lingyun Xiang, Feng Li. 147-159 [doi]
- A Novel Framework of Robust Video Watermarking Based on Statistical ModelLi Li 0014, Xin Li 0048, Tong Qiao, Xiaoyu Xu, Shanqing Zhang, Chin-Chen Chang. 160-172 [doi]
- A Novel Nonlocal Low Rank Technique for Fabric Defect DetectionJielin Jiang, Yan Cui, Yadang Chen, Guangwei Gao. 173-182 [doi]
- A Novel Steganography Scheme Based on Asymmetric Embedding ModelXianglei Hu, Haishan Chen, Jiangqun Ni, Wenkang Su. 183-194 [doi]
- A Novel Watermarking Technology Based on Posterior Probability SVM and Improved GAShiqin Liu, Minjun Zhao, Jixin Ma, Jiangyuan Yao, Yucong Duan, Xiaoyi Zhou. 195-207 [doi]
- A Secure Blind Watermarking Scheme Based on Dual Frequency Domains and Ergodic MatrixMinjun Zhao, Shiqin Liu, Chunjie Cao, Jiangyuan Yao, Xiaoyi Zhou. 208-220 [doi]
- Adaptive Robust Reversible Watermarking SchemeXiang Wang, Tianze Shu, Min Xie, Qingqi Pei. 221-230 [doi]
- An Improved Reversible Data Hiding Scheme with Large Payload Based on Image Local-ComplexityFang Cao, Yalei Zhang, Bowen An, Heng Yao, Zhenjun Tang. 231-241 [doi]
- An Improved Tamper Detection and Location Scheme for DOCX Format DocumentsGuojiang Xin, Xitong Qi, Changsong Ding. 242-251 [doi]
- An Information Hiding Algorithm for HEVC Videos Based on PU Partitioning ModesWen-chao Xie, Yi-yuan Yang, Zhao-hong Li, Jin-wei Wang, Min Zhang. 252-264 [doi]
- Attack on Deep Steganalysis Neural NetworksShiyu Li, Dengpan Ye, Shunzhi Jiang, Changrui Liu, Xiaoguang Niu, Xiangyang Luo. 265-276 [doi]
- Attention-Based Chinese Word EmbeddingYiyuan Liang, Wei Zhang, Kehua Yang. 277-287 [doi]
- Covert Communication by Exploring Statistical and Linguistical Distortion in TextHuanhuan Hu, Xin Zuo, Weiming Zhang, Nenghai Yu. 288-301 [doi]
- Fast Three-Phase Fabric Defect DetectionJielin Jiang, Yan Cui, Zilong Jin, Chunnian Fan. 302-312 [doi]
- Improving Testing Accuracy of Convolutional Neural Network for Steganalysis Using Segmented SubimagesYifeng Sun, Xiaoyu Xu, Haitao Song, Guangming Tang, Shunxiang Yang. 313-323 [doi]
- IPFRA: An Online Protocol Reverse Analysis MechanismXiaoming Zhang, Qian Qiang, Weisheng Wang, Zhanfeng Wang, Xianglin Wei. 324-333 [doi]
- Medical Image Watermarking Based on SIFT-DCT Perceptual HashingJialing Liu, JingBing Li, Jing Chen, Xiangxi Zou, Jieren Cheng, Jing Liu. 334-345 [doi]
- Network Storage Covert Channel Detection Based on Data Joint AnalysisGuangxin Fu, QingBao Li, Zhifeng Chen, GuangYu Zeng, Juanjuan Gu. 346-357 [doi]
- Optimal Resource Allocation for Underlay Cognitive Radio NetworksXiaoli He, Hong Jiang, Yu Song, He Xiao. 358-371 [doi]
- Reversible Data Embedding and Scrambling Method Based on JPEG ImagesYi Puyang, Zhaoxia Yin, Xinpeng Zhang. 372-381 [doi]
- Reversible Data Hiding for VideoDong Li, Yingnan Zhang, Ke Niu, Xiaoyuan Yang 0002. 382-391 [doi]
- Reversible Data Hiding in JPEG Images Based on Two-Dimensional Histogram ModificationSijin Cheng, Fangjun Huang. 392-403 [doi]
- Reversible Embedding to Covers Full of BoundariesHanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu. 404-415 [doi]
- Robust H.264/AVC Video Watermarking Without Intra Distortion DriftYue Li, Hong-Xia Wang. 416-427 [doi]
- Steganography by Constructing Marbling TextureZhenxing Qian, Lin Pan, Sheng Li, Xinpeng Zhang. 428-439 [doi]
- Style Transferring Based Data Hiding for Color ImagesYi Puyang, Zhenxing Qian, Zhaoxia Yin, Xinpeng Zhang. 440-449 [doi]
- Synthesis of Quantum Barrel ShiftersZhiqiang Li 0001, Gaoman Zhang, Wei Zhang, Hanwu Chen, Marek A. Perkowski. 450-462 [doi]
- Text Coverless Information Hiding Based on Word2vecYi Long, Yuling Liu. 463-472 [doi]
- Text Information Hiding Method Using the Custom ComponentsJianjun Zhang 0005, Yicheng Xie, Jun Shen, Lucai Wang, HaiJun Lin. 473-484 [doi]
- Text Semantic Steganalysis Based on Word EmbeddingXin Zuo, Huanhuan Hu, Weiming Zhang, Nenghai Yu. 485-495 [doi]
- The Assessment Research of Communication Jamming Effect Based on Grey Relational AnalysisRuowu Wu, Sen Wang, Hui Han, Xiang Chen, Xuhong Yin, Yun Lin. 496-505 [doi]
- The Phase and Amplitude Errors Frequency Dependence in L-Band Aperture Synthesis Radiometer Using External Noise SourcesShilin Li, Jing Wu, Taoyun Zhou, Dengzhun Wang, Zhuolin Gao. 506-517 [doi]
- Tracing System of Meat Supply Based on RFID and Two-Dimensional Code TechnologyXu Yang, Yongbin Zhao, Ranran Li, Fengfeng Li, Xiaolin Qi. 518-527 [doi]
- A Biometrics-Based Remote User Authentication Scheme Using Smart CardsJianming Cui, Rongquan Sui, Xiaojun Zhang, Hengzhong Li, Ning Cao 0002. 531-542 [doi]
- A BLF Generation Scheme with Clock Variance-Tolerance for Baseband Processor of EPC Gen2 UHF RFID TagLiangbo Xie, Wei Nie, Xiaolong Yang, Yong Wang, Mu Zhou. 543-552 [doi]
- A Design of Mobile Phone Privacy Protection Based on Block ChainKun Yang, Mingzhe Liu, Yaming Yang, Xin Jiang. 553-562 [doi]
- A Dominance-Based Constrained Optimization Evolutionary Algorithm for the 4-th Tensor Power Problem of Matrix MultiplicationLangping Tang, Yuren Zhou, Zefeng Chen. 563-575 [doi]
- A Kind of Agricultural Content Networking Information Fusion Method Based on OntologyDonghui Li, Cong Shen, Xiaopeng Dai, Haiwen Chen. 576-588 [doi]
- A Lightweight Graph-Based Model for Inter-networking Access ControlZhongmiao Kang, Wenting Jiang, Yan Chen. 589-597 [doi]
- A Method for Energy Consumption Audit and Intelligent Decision of Green BuildingsJinlong Chen, Mengke Jiang, Kun Xie, Zhen Guo, Hang Pan, Xianjun Chen. 598-607 [doi]
- A Mixed Mobile Charging Strategy in Rechargeable Wireless Sensor NetworksYang Yang 0006, Xiang yang Gong, Xuesong Qiu, Zhipeng Gao, Haitao Yu. 608-621 [doi]
- A Multi-controller Load Balancing Strategy for Software Defined WiFi NetworksSohaib Manzoor, Xiaojun Hei, Wenqing Cheng. 622-633 [doi]
- A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering AnalysisRongzhen Bian, Mingfu Xue, Jian Wang. 634-646 [doi]
- A Novel Part-Based Model for Fine-Grained Vehicle RecognitionYe Zhou, Jiabin Yuan, Xuwei Tang. 647-658 [doi]
- A Novel Photovoltaic Cell Simulator for Green Internet of ThingsZhe Wang 0011, Weidong Yi, Yongrui Chen, Ming Li. 659-670 [doi]
- A Review of Privacy-Preserving Machine Learning ClassificationAndy Wang, Chen Wang, Meng Bi, Jian Xu 0004. 671-682 [doi]
- A Self-organizing LSTM-Based Approach to PM2.5 ForecastXiaodong Liu, Qi Liu, Yanyun Zou, Guizhi Wang. 683-693 [doi]
- A Three-Factor Remote Authentication Scheme for Multi-server EnvironmentJianming Cui, Chen Chen, Xiaojun Zhang, Yihui Liu, Ning Cao 0002. 694-705 [doi]
- A VANET Anonymous Authentication Mechanism for Multi-level Application ScenariosXiaoliang Wang, Jianming Jiang, Baowei Wang, Zhihua Xia. 706-717 [doi]