Abstract is missing.
- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage ServerYinghua Zhang, Lei Wang, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun. 3-12 [doi]
- Virtualization of 5G Cellular Networks: A Combinatorial Share-Averse Auction ApproachYuanyuan Xu, Shan Li. 13-24 [doi]
- Equipment Fault Detection Based on SENCForestShanting Su, Xiangmao Chang, Yuan Qiu, Jing Li, Tong Li. 25-34 [doi]
- Research on Telemedical Monitoring System Based on Homomorphic EncryptionFei Xiao, Shaofeng Lin, Wei Tan, Fengchen Qian, Xiaopeng Li. 35-46 [doi]
- Phase Retrieval via Accelerated Gradient DescentYi Qin. 47-55 [doi]
- Anti-noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network ModelZhiguo Qu, Zhexi Zhang, Zhenwen Cheng. 56-67 [doi]
- A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid CloudsHua Dai 0003, Yan Ji, Liang Liu, Geng Yang, Xun Yi. 68-80 [doi]
- Application of Blockchain Technology in Agricultural Product Traceability SystemZhihua Wang, Pingzeng Liu. 81-90 [doi]
- Anonymous Authentication Scheme for Machine-to-machine Communication Based on Elliptic CurveYao Xiong, Chujun Wu. 91-103 [doi]
- Linear Complexity of r-ary Sequences Derived from Euler Quotients Modulo 2pRayan Mohammed, Xiaoni Du, Li Li. 104-112 [doi]
- An Improved Steganalysis Method Using Feature CombinationsZichi Wang, Zhenxing Qian, Xinpeng Zhang, Sheng Li 0006. 115-127 [doi]
- Research on Application of OFD Technology in Secure Electronic BillsShaokang Wang, Dan Liu, Jingning Sun, Yinping Bai, Zhaofeng Zhou. 128-139 [doi]
- Review on Text Watermarking Resistant to Print-Scan, Screen-ShootingGaopeng Xie, Yuling Liu, Guojiang Xin, Peng Yang. 140-149 [doi]
- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed ImageYujie Fu, Dongsheng Peng, Heng Yao, Chuan Qin. 150-160 [doi]
- An Landmark Evaluation Algorithm Based on Router Identification and Delay MeasurementTe Ma, Fenlin Liu, Fan Zhang, Xiangyang Luo. 163-177 [doi]
- Multiplicative Linear Secret Sharing Without InteractionBo Mi, Darong Huang, Jianqiu Cao, Ping Long, Hongyang Pan. 178-187 [doi]
- Positioning Improvement Algorithm Based on LoRa Wireless NetworksLongyu Zhou, Ning Yang, Ke Zhang. 188-198 [doi]
- Time-Aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor NetworksZhiqiang Ruan, Haibo Luo, Ge Xu. 199-210 [doi]
- An Implementation of CoAP-Based Semantic Resource Directory in CaliforniumYao Wang, Gengyu Wei. 211-222 [doi]
- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and EfficiencyMingxu Sun, Williams Dannah, Qi Liu, Xiaodong Liu. 223-231 [doi]
- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio NetworksYinghua Zhang, Yanfang Dong, Lei Wang, Jian Liu, Yunfeng Peng. 232-243 [doi]
- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO RadarSheng Liu, Jing Zhao, Wei Li. 244-252 [doi]
- Under-Determined Blind Source Separation Anti-collision Algorithm for RFID Based on Adaptive Tree GroupingXiaohong Zhang 0002, Qiuli Wang, Yungang Jin. 253-265 [doi]
- Design of a Peristaltic Pump Driven by Pneumatic Artificial MusclesHua Yan, Zhengyu Yang, Fei Ding, Shijie Xu, Dengyin Zhang. 266-275 [doi]
- An Approach to Deep Learning Service Provision with Elastic Remote InterfacesMingxu Sun, ZhiYun Yang, Hao Wu, Qi Liu, Xiaodong Liu. 276-286 [doi]
- Design of an IoT-Based Efficient Security Scheme in Home Wireless SystemFei Ding, Zhiliang Li, Chengwan Ai, Ruoyu Su, Dengyin Zhang, Hongbo Zhu. 287-296 [doi]
- Discussion on the Application of Industrial InternetYanruixuan Ma, Zhendan Li, Yanglijuan Liu, Huijie Liu, Shengqian Ma. 297-308 [doi]
- Performance Analysis of a NB-IoT Based Smart Lamp Solution with Application Enabled PlatformSijia Lou, En Tong, Fei Ding. 309-318 [doi]
- Mining Hypernym-Hyponym Relations from Social Tags via Tag EmbeddingMengyi Zhang, Tianxing Wu, Qiu Ji, Guilin Qi, Zhixin Sun. 319-328 [doi]
- Accurate and Fast DV-Hop Localization Algorithm in Irregular NetworksXiaoyong Yan, Xiang Feng, Zhixin Sun. 329-340 [doi]
- Shape Recognition with Recurrent Neural NetworkSongle Chen, Xuejian Zhao, Zhe Sun, Feng Xiang, Zhixin Sun. 341-350 [doi]
- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation ModelHuizong Li, Xiagnqian Wang, Bin Ge, Jie Wang, Yujie Ma, Chaoyu Yang, Haixia Gui. 351-361 [doi]
- Tobacco Intelligent Management System Based on Internet of ThingsLining Liu, Pingzeng Liu, Chao Zhang 0015, Xueru Yu, Jianyong Zhang, Yang Li, Jainghang Fu. 362-372 [doi]
- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection SystemJianyong Zhang, Pingzeng Liu, Xueru Yu, Jianhang Fu. 373-383 [doi]
- Analysis of Antenna Array Parameter Effect for Massive MIMO TransmissionLin Guo, Lijun Yang. 384-393 [doi]
- Intelligent Irrigation System of Balcony Flowers Based on Internet of ThingsJianhang Fu, Pingzeng Liu, Chao Zhang, Xueru Yu, Jianyong Zhang, Yang Li. 394-402 [doi]
- The Impact of Using Facebook on the Academic Performance of University StudentsSajida Karim, Hui He, Ghulam Ali Mallah, Asif Ali Laghari, Hina Madiha, Raja Sohail Ahmed Larik. 405-418 [doi]
- Robust Audio Watermarking Algorithm Based on Moving Average and DCTJinquan Zhang, Xizi Peng, Shibin Zhang. 419-429 [doi]
- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth AlgorithmTianxiao Xue, QingBao Li, Ping Zhang, Zhifeng Chen, Peijun Feng, Nan Luo. 430-441 [doi]
- Reversible Data Hiding in JPEG Images Based on Multiple Histograms ModificationXing Lu, Fangjun Huang, Hyoung Joong Kim. 442-454 [doi]
- Image Hashing Based on CS-LBP and DCT for Copy DetectionQi Shen, Yan Zhao. 455-466 [doi]
- KM ^3 SVM: A Efficient Min-Max Modular Support Vector Machine Based on ClusteringXiyuan Zheng, Xiaonan Fang, Yanyan Tan, Lili Meng, Huaxiang Zhang. 467-475 [doi]
- An Image Forensic Method for AI Inpainting Using Faster R-CNNXinyi Wang, He Wang, Shaozhang Niu. 476-487 [doi]
- Kernel Generalized Canonical Correlation and a New Feature Fusion StrategyLina Wei, Quansen Sun, Xizhan Gao. 488-500 [doi]
- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural NetworksYuhua Fan, Luping Zhou, Liya Fan, Jing Yang. 501-513 [doi]
- CABAC: A Content-Driven Attribute-Based Access Control Model for Big DataKe Ma, Geng Yang. 517-529 [doi]
- Calculation of Network Security Index Based on Convolution Neural NetworksHang Yang, Yan Jia 0001, Weihong Han, Yuan-Ping Nie, Shudong Li, Xiao-juan Zhao. 530-540 [doi]
- A Method to Defense APT Based on Dynamic ID TransformationDelei Nie, Hong Yu, Xiaobin Lu, Chao Cui. 541-550 [doi]
- Emergency Analysis Based on Affective Computing in Universities ForumLu Zhang, Xu Wu, Xiaqing Xie, Jin Xu, Tianle Zhang. 551-563 [doi]
- Network Attack and Defense Effectiveness Evaluation Based on Dematel MethodLiang Liu, Cheng Huang, Yong Fang, Zhenxue Wang. 564-575 [doi]
- Web Application-Layer DDoS Attack Detection Based on Generalized Jaccard Similarity and Information EntropyBo Li, Minghui Gao, Li Ma, Ye Liang, Guifeng Chen. 576-585 [doi]
- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line ModelYinghua Zhang, Lei Wang, Jian Liu, Yunfeng Peng, Jiapeng Pu, Guozhong Sun. 586-595 [doi]
- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's ChaosQianning Dai, JingBing Li, Uzair Aslam Bhatti, Jieren Cheng, Xiaobo Bai. 596-608 [doi]
- Security Analysis and Improvement of Elliptic Curve Digital Signature SchemeYamin Li, Ping Zhang. 609-617 [doi]
- Risk Taking Behavior in Crowdsourcing Adoption: The Case of WitkeyJie Jian, Xiaoming Yu, Yufei Yuan. 618-631 [doi]
- Anomaly Detection in Wireless Sensor Networks Based on KNNLingren Wang, JingBing Li, Uzair Aslam Bhatti, Yanlin Liu. 632-643 [doi]
- Comparison of the Legal Principle Foundation of Chinese and American Secret Information Access Control TechniqueLongjuan Wang, Fangming Tang. 644-657 [doi]