Abstract is missing.
- Accurate Moving Distance Estimation via Multi-modal Fusion from IMU Sensors and WiFi SignalJing Xu, Hongyan Qian, Yanchao Zhao. 3-15 [doi]
- Accurate UHF Tag Authentication Using Near-Field CapabilitiesCui Zhao, Han Ding, Kaiyan Cui, Fan Liang. 16-26 [doi]
- ADFL: An Improved Algorithm for American Fuzzy Lop in Fuzz TestingChenxin Wang, Shunyao Kang. 27-36 [doi]
- An Improved Distributed PCA-Based Outlier Detection in Wireless Sensor NetworkWentian Zheng, Lijun Yang, Meng Wu. 37-49 [doi]
- An Improved IoT Notion-Based Authentication and Key Agreement Protocol for Heterogenous Ad Hoc Wireless Sensor NetworkYuxia Zhang, Xin Zhang, Fengtong Wen. 50-62 [doi]
- Appliance Recognition Based on Continuous Quadratic ProgrammingXiaodong Liu, Qi Liu. 63-72 [doi]
- Application of BlockChain in Internet of ThingsYanhan Yang, Yaming Yang, Jinlian Chen, Mingzhe Liu. 73-82 [doi]
- Assessment of Haze Effects in Human Lives: A Case Study of Investigation in NanjingChen Jin, Zeshui Xu, Guizhi Wang. 83-93 [doi]
- Association Analysis of Firmware Based on NoSQL DatabaseGongbo Wang, Weiyu Dong, Rui Chang. 94-105 [doi]
- Authentication of Quantum Dialogue Under NoiseDong-fen Li, Rui-Jin Wang, Daniel Adu-Gyamfi, Jin-lian Chen, Ya-Ming Yang, Ming-Zhe Liu. 106-117 [doi]
- Automatic Integrated Exhaust Fan Based on AT89S51 Single Chip MicrocomputerShengqian Ma, Fanchen Meng, Yanruixuan Ma, Jisong Su. 118-127 [doi]
- Bring Intelligence to Ports Based on Internet of ThingsSuying Li, Zhenzhou Ma, Peitao Han, Siyang Zhao, Peiying Guo, Hepeng Dai. 128-137 [doi]
- Centroid Location Technology Based on Fuzzy Clustering and Data ConsistencyShanliang Xue, Mengying Li, Peiru Yang. 138-147 [doi]
- Classification of Car Scratch Types Based on Optimized BP Neural NetworkXing Zhang, Liang Zhou. 148-158 [doi]
- Comparative Study of CNN and RNN for Deep Learning Based Intrusion Detection SystemJianjing Cui, Jun Long, Erxue Min, Qiang Liu, Qian Li. 159-170 [doi]
- Composite Structure Health Monitoring Review Based on FBG SensorYajie Sun, Yanqing Yuan, Lihua Wang. 171-179 [doi]
- Correlation Analysis of Alarm Data Based on Fuzzy Rule in Power NetworkWenting Jiang, Yan Chen, Yingqian Liao. 180-190 [doi]
- Coverage Holes Recovery Algorithm of Underwater Wireless Sensor NetworksMin Cui, Fengtong Mei, Qiangyi Li, Qiangnan Li. 191-204 [doi]
- Decision Stump and StackingC-Based Hybrid Algorithm for Healthcare Data ClassificationSunil Kr. Jha, Parimala Paramasivam, Zhaoqing Pan, Jinwei Wang. 205-216 [doi]
- Design and Development of Wheat Production Information Management System Based on Internet of ThingsZiqing Zhang, Pingzeng Liu. 217-227 [doi]
- Design of Indoor LED Intelligent Dimming and Color Modulation System Based on ZigbeeChun-ling Jiang, Song Xue. 228-240 [doi]
- Detecting PLC Program Malicious Behaviors Based on State VerificationTianyou Chang, Qiang Wei, Wenwen Liu, Yangyang Geng. 241-255 [doi]
- Detection Method of Hardware Trojan Based on Wavelet Noise Reduction and Neural NetworkXiaopeng Li, Fei Xiao, Ling Li, Jiangjiang Shen, Fengchen Qian. 256-265 [doi]
- Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning AlgorithmNing Liu, Min Yang, Hang Zhang, Chen Yang, Yang Zhao, JianChao Gan, Shibin Zhang. 266-275 [doi]
- Distribution of CA-Role in Block-Chain SystemsYue Fu, Rong Du, Dagang Li. 276-285 [doi]
- DoS Attacks Intrusion Detection Algorithm Based on Support Vector MachineLingren Wang, JingBing Li, Jieren Cheng, Uzair Aslam Bhatti, Qianning Dai. 286-297 [doi]
- Dynamic-Enabled Defense Strategy Base on Improved CVSS for the Home InternetChunru Zhou, Min Lei, Kunchang Li, Li Xu, Wei Bi. 298-307 [doi]
- Energy Efficient Smart Irrigation System Based on 6LoWPANXiawei Jiang, Weidong Yi, Yongrui Chen, Hao He. 308-319 [doi]
- Enhancing Named-Based Caching in NDNZhiqiang Ruan, Haibo Luo, Wenzhong Lin. 320-330 [doi]
- Farmland Intelligent Information Collection System Based on NB-IoTJianyong Zhang, Pingzeng Liu, Wang Xue, Zhao Rui. 331-343 [doi]
- FRDV: A DTN Routing Based on Human Moving Status in Urban EnvironmentsWenzao Li, Bing Wan, Zhan Wen, Jianwei Liu, Yue Cao, Tao Wu 0010, Jiliu Zhou. 344-355 [doi]
- High Speed Pharmaceutical Packaging Detection System Based on Genetic Algorithm and Memory OptimizationBin Ma, Qi Li. 356-368 [doi]
- Identifying Influential Spreaders by Temporal Efficiency Centrality in Temporal NetworkKai Xue, Junyi Wang. 369-383 [doi]
- Identifying Rumor Source of Online Social Networks in the SEIR ModelYousheng Zhou, Chujun Wu. 384-394 [doi]
- Intelligent Control System of Cucumber Production in the Greenhouse Based on Internet of ThingsLiyang, Pingzeng Liu, Bangguo Li, Xueru Yu. 395-406 [doi]
- Intelligent Poultry Environment Control System Based on Internet of ThingsYuQun, Zhang Yan, Wang-Xiu Li, Li Bao-quan. 407-417 [doi]
- Internet of Things Security Analysis of Smart CampusLei Wang, Kunqin Li, Xianxiang Chen. 418-428 [doi]
- Linked-Behaviors Profiling in IoT Networks Using Network Connection Graphs (NCGs)Hangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu. 429-439 [doi]
- Location Privacy-Preserving Scheme Based on Multiple Virtual MapsShaojun Yan, Haihua Liang, Xinpeng Zhang. 440-452 [doi]
- Low-Power Listen Based Driver Drowsiness Detection System Using SmartwatchShiyuan Zhang, Hui He, Zhi Wang, Mingze Gao, Jinsong Mao. 453-464 [doi]
- Malware Collusion Attack Against Machine Learning Based Methods: Issues and CountermeasuresHongyi Chen, Jinshu Su, Linbo Qiao, Yi Zhang, Qin Xin 0001. 465-477 [doi]
- Monitoring Home Energy Usage Using an Unsupervised NILM Algorithm Based on Entropy Index Constraints Competitive Agglomeration (EICCA)Kondwani M. Kamoto, Qi Liu. 478-490 [doi]
- Monitoring of Root Privilege Escalation in Android KernelXueli Hu, Qi Xi, Zhenxing Wang. 491-503 [doi]
- Network Defense Decision-Making Method Based on Stochastic Differential Game ModelShirui Huang, Hengwei Zhang, Jindong Wang, Jianming Huang. 504-516 [doi]
- Noise Modeling and Analysis for Indoor Broadband Power Line CommunicationZhouwen Tan, Hongli Liu, Ziji Ma, Yun Cheng. 517-527 [doi]
- Optimization Algorithm for Freight Car Transportation Scheduling Optimization Based on Process Scheduling OptimizationChangchun Dong, Liang Zhou. 528-538 [doi]
- Power Data Cleaning Method Based on Isolation Forest and LSTM Neural NetworkXingNan Li, Yi Cai, Wenhong Zhu. 539-550 [doi]
- Power Missing Data Filling Based on Improved k-Means Algorithm and RBF Neural NetworkZhan Shi, XingNan Li, Zhuo Su. 551-562 [doi]
- Properties Emulation on TD-LTE Electric Power Wireless PrivateShujie Lu, Jia Yu, Ji Zhu. 563-573 [doi]
- Spatial Search for Two Marked Vertices on Hypercube by Continuous-Time Quantum WalkXi Li, Hanwu Chen, Zhihao Liu, Wenjie Liu 0001, Mengke Xu. 574-583 [doi]
- Research and Application of Access Control TechnologyYixiang Jiang, Limei Fang. 584-593 [doi]
- Research and Implementation on the Traceability Equipment of the Whole Agricultural Industrial ChainJianyong Zhang, Pingzeng Liu, Bangguo Li, Changqing Song. 594-605 [doi]
- Research of Subnetting Based on Huffman CodingRanran Li, Yongbin Zhao, Qing Xu, Xiaolin Qi. 606-616 [doi]
- Research on Application of ATC Operation Security Based on Data MiningZhaoyue Zhang, Jing Zhang, Sen Wang. 617-625 [doi]
- Research on Application of Network Security Technology Based on Data MiningNing Wang, Yanyan Qin, Shuyang Guo. 626-635 [doi]
- Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of ThingsKe Jia, Xiaoming Ju, Hongbin Zhang. 636-647 [doi]
- Research on Building Energy Consumption Acquisition System Based on ConfigurationQinghao Zeng, Renjun Tang, Xianjun Chen, Hang Pan, Jinlong Chen, Hui Zhou. 648-657 [doi]
- Research on Feedback Effects Between Perception of Internet Word of Mouth and Online Reviews Based on Dynamic EndogeneityJinhai Li, Yunlei Ma, Huisheng Zhu, Youshi He. 658-669 [doi]
- Research on Fire Image Detection Technology Base on RBFLi Jin, Li Li. 670-681 [doi]
- Research on Indoor Positioning Method Based on Visible Light Communication TechnologyHongwei Zhu, Yajun Liu, Yingjiu Guo, Jing Jiang. 682-690 [doi]
- Research on Real-Time Storage Technology of UAV Freight Stream DataXiao Long, Liang Zhou, Hongyuan Zheng. 691-700 [doi]
- Research on Syndrome Classification and Risk Factors Extraction of Tibetan Medicine Based on ClusteringChaoyi Liu, Lei Zhang, Lu Wang, Xiaolan Zhu, Xiaoying Wang. 701-711 [doi]
- Research on Two-Factor Identity Authentication System Based on Smart Phone and User PasswordLin Hou, Laiwen Wei, Chen Wang, Andi Wang, Jian Xu 0004. 712-723 [doi]
- Review on Blockchain Application for Internet of ThingsQin Zhou, Yaming Yang, Jinlian Chen, Mingzhe Liu. 724-733 [doi]
- Rumor Spreading Model Considering Rumor's Attraction in Heterogeneous Social NetworksLing-Ling Xia, Bo Song, Liang Zhang 0015. 734-745 [doi]