Abstract is missing.
- A Gray-Box Vulnerability Discovery Model Based on Path CoverageChunlai Du, Xingbang Tan, Yanhui Guo. 3-12 [doi]
- Quantum Network Coding Based on Entanglement DistributionTao Shang, Ran Liu, Chengran Fang, Jianwei Liu. 13-24 [doi]
- Moving Target Defense in Preventing SQL InjectionKaiyu Feng, Xiao Gu, Wei Peng, Dequan Yang. 25-34 [doi]
- Design and Security Analysis of Certificateless Aggregate Signature SchemeLi Cui, Yang Heng, Wu Gang. 35-45 [doi]
- SuperEye: A Distributed Port Scanning SystemZibo Li, Xiangzhan Yu, Dawei Wang, Yiru Liu, Huaidong Yin, Shoushuai He. 46-56 [doi]
- An Improved Multi-classification Algorithm for Imbalanced Online Public Opinion DataXige Dang, Xu Wu, Xiaqing Xie, Tianle Zhang. 57-66 [doi]
- NCGs: Building a Trustworthy Environment to Identify Abnormal Events Based on Network Connection Behavior AnalysisHangyu Hu, Xuemeng Zhai, Mingda Wang, Guangmin Hu. 67-78 [doi]
- Short Text Topic Recognition and Optimization Method for University Online CommunityXu Wu, Haitao Wu, Xiaqing Xie, Jin Xu, Tianle Zhang. 79-90 [doi]
- A Survey on Network Traffic IdentificationQiuping Zhu, Dong Li, Yi Xin, Xiangzhan Yu, Guocai Mu. 91-100 [doi]
- A Survey of Network Security Situational Awareness TechnologyChen Chen, Lin Ye, Xiangzhan Yu, Bailang Ding. 101-109 [doi]
- Multi-function Quantum Cryptography Protocol Based on Bell StateZheng-Tao, Xiang Gao, Shibin Zhang, Yan Chang, Jinyue Xia. 110-119 [doi]
- The Attack Case of ECDSA on Blockchain Based on Improved Simple Power AnalysisWunan Wan, Hao Chen, Jun Chen. 120-132 [doi]
- A Weight-Based Channel Estimation Implementation AlgorithmJian Liu, Yalin Yuan. 133-142 [doi]
- Multi-party Quantum Communication Complexity on Composite Boolean-Valued FunctionWenbin Yu 0002, Zangqiang Dong, Wenjie Liu 0001, Zhiguo Qu, Xiaolong Xu, Xiang-Yang Alex Liu. 143-154 [doi]
- BlockZone: A Blockchain-Based DNS Storage and Retrieval SchemeWentong Wang, Ning Hu, Xin Liu. 155-166 [doi]
- Robust Analysis of Grid System Based on Complex Network Attack ModeJun Xiang, Jiao Zhu, Shuyang Guo, Yue Chen, Zhizhong Qiao. 167-177 [doi]
- A Secure Data Aggregation Protocol in VANETs Based on Multi-key FHEBo Mi, Hongyang Pan, Darong Huang, Tiancheng Wei, Xingfeng Wang. 178-190 [doi]
- Research on SQL Injection and Defense TechnologyZongshi Chen, Mohan Li, Xiang Cui, Yanbin Sun. 191-201 [doi]
- A Review of the Factorization Problem of Large IntegersXinguo Zhang, Mohan Li, Yu Jiang, Yanbin Sun. 202-213 [doi]
- A Comparison of Machine Learning Algorithms for Detecting XSS AttacksXiaolong Chen, Mohan Li, Yu Jiang, Yanbin Sun. 214-224 [doi]
- A Survey of Privacy-Preserving Techniques for BlockchainYuchong Cui, Bing Pan, Yanbin Sun. 225-234 [doi]
- A Survey of Software Reverse Engineering ApplicationsZhuangyou Chen, Bing Pan, Yanbin Sun. 235-245 [doi]
- A Fast IP Matching Algorithm Under Large TrafficGuanjun Guo, Yi Xin, Xiangzhan Yu, Likun Liu, Houhua Cao. 246-255 [doi]
- An Effective Load Balance Using Link Bandwidth for SDN-Based Data CentersXiaosen Zeng, Dongbin Wang, Shuwen Han, Wenbin Yao, Zhao Wang, Rui Chen. 256-265 [doi]
- Zero-Day Vulnerability Risk Assessment and Attack Path Analysis Using Security MetricZiwei Ye, Yuanbo Guo, Ankang Ju. 266-278 [doi]
- Research on Content Extraction of Rich Text Web PagesHangfeng Yang, Hui Lu, Shudong Li, Mohan Li, Yanbin Sun. 279-287 [doi]
- Network Protocol Analysis Base on WeChat PC VersionWeixiang Chen, Hui Lu, Mohan Li, Yanbin Sun. 288-297 [doi]
- Bitcoin Network Size Estimation Based on Coupon Collection ModelRunnan Tan, Xiangyi Kong, Yu Zhang 0036, Qingfeng Tan, Hui Lu, Mohan Li, Yanbin Sun. 298-307 [doi]
- A Survey of the Software Vulnerability Discovery Using Machine Learning TechniquesJian Jiang, Xiangzhan Yu, Yan Sun, Haohua Zeng. 308-317 [doi]
- A Distributed Cryptanalysis Framework Based on Mobile PhonesChaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu. 318-331 [doi]
- A Novel Threshold Signature Scheme Based on Elliptic Curve with Designated VerifierYu Liu, Tong Liu. 332-342 [doi]
- A Congestion Control Methodology with Probability Routing Based on MNL for Datacenter NetworkRenhui Hou, Dongbin Wang, Yao Wang, Zhouyi Zhu. 343-352 [doi]
- Fast Failover for Link Failures in Software Defined NetworksZilong Yin, Dongbin Wang, Yinxing Zhao, Yaoyao Guo, Shuwen Han. 353-361 [doi]
- Steady-State Topology Discovery of Target Networks Based on Statistics MethodDi Yang, Yan Liu, Jing Chen. 362-374 [doi]
- A Novel Method for Weighted Throughput Fairness in Contention-Based WLANs with Multiple Priority LevelsChun Shi, Zhi-qun Zheng, Zhengjie Deng, Yu-juan Wang, Shu-Qian He. 375-384 [doi]
- Bitcoin Node Discovery: Large-Scale Empirical Evaluation of Network ChurnYu Zhang, Runan Tan, Xiangyi Kong, Qingfeng Tan, Xiangtao Liu. 385-395 [doi]
- DDoS Attack Situation Information Fusion Method Based on Dempster-Shafer Evidence TheoryWei Guo, Xiangyan Tang, Jieren Cheng, Jinying Xu, Canting Cai, Yulong Guo. 396-407 [doi]
- Webshell Detection Model Based on Deep LearningFangjian Tao, Chunjie Cao, Zhihui Liu. 408-420 [doi]
- A Security-Sensitive Function Mining Framework for Source CodeLin Chen, Chunfang Yang, Fenlin Liu, Daofu Gong, Shichang Ding. 421-432 [doi]
- Abstraction of Operations in Trusted Components Based on OR-Transition Colored Petri NetYong Yu 0009, Ming Jing, Detao Ji, Yuanyuan Wang, Zhongwen Xie, Shudong Li. 433-442 [doi]
- Trusted Component Decomposition Based on OR-Transition Colored Petri NetNa Zhao, Min Cao, Chenming Song, Shuang Shi, Yong Yu 0009, Shudong Li. 443-451 [doi]
- High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber RangeJiajun Xie, Chunrui Zhang, Fang Lou, Yu Cui, Lun An, Le Wang. 452-462 [doi]
- Playing First-Person-Shooter Games with A3C-Anticipator Network Based Agents Using Reinforcement LearningYibo Sun, Adil Khan, Kai Yang, Jiang Feng, Shaohui Liu. 463-475 [doi]
- Identify Influentials Based on User Behavior Across Different TopicsYong Quan, Yichen Song, Lu Deng, Yan Jia 0001, Bin Zhou 0004, Weihong Han. 476-487 [doi]
- Taylor Series Localization Algorithm Based on Semi-definite ProgrammingJianfeng Lu, Xuanyuan Yang. 488-497 [doi]
- Research on Pedestrian Attribute Recognition Based on Semantic Segmentation in Natural SceneXin Feng, Yangyang Li, Haomin Du, Hongbo Wang 0001. 498-509 [doi]
- An Evolving Network Model Based on a Triangular Connecting Mechanism for the Internet TopologyTao Tang, Guangmin Hu. 510-519 [doi]
- A New Quantum Private Query Protocol with Better Performance in Resisting Joint-Measurement AttackXi Chen, Shangjun He, Gonghua Hou, Lifan Yang, Lin Lin, Ruyi Chen, Ningcheng Yuan. 520-528 [doi]
- PPCSB: A Privacy-Preserving Electricity Consumption Statistics and Billing Scheme in Smart GridChenyang Li, Yuling Chen, Yu Yang, Chaochao Li, Yang Zeng. 529-541 [doi]
- Blockchain Private Key Storage Algorithm Based on Image Information HidingNing Wang, Yuling Chen, Yu Yang, Zigang Fang, Yizhe Sun. 542-552 [doi]
- Heuristic-Q: A Privacy Data Pricing Method Based on Heuristic Reinforcement LearningXi Chen, Jingjie Chen, Yuling Chen, Jinglan Yang, Deyin Li. 553-565 [doi]
- JPEGCNN: A Transform Domain Steganalysis Model Based on Convolutional Neural NetworkLin Gan, Jingjie Chen, Yuling Chen, Zhujun Jin, Wenxi Han. 566-577 [doi]
- Quantum Algorithm for Support Vector Machine with Exponentially Improved Dependence on PrecisionXiao Feng, Jincheng Li, Changgui Huang, Jinze Li, Ruyin Chen, Jinfa Ke, Zhenjiang Ma. 578-587 [doi]
- Reliability-Based and QoS-Aware Service Redundancy Backup Method in IoT-Based Smart GridYunmei Luo, Yuping Luo, Xueping Ye, Jun Lu, Shuqing Li. 588-598 [doi]
- A Privacy-Preserving Electricity Trading Scheme Based on BlockchainYu Xu, Zhoubin Liu, Lili Li, You Sun. 599-611 [doi]
- A Novel Facial Expression Recognition Scheme Based on Deep Neural NetworksZhuohua Liu, Hui Suo, Bin Yang. 612-622 [doi]
- Active Defense System of Industrial Control System Based on Dynamic Behavior AnalysisWenjin Yu, Yixiang Jiang, Yizhen Lin. 623-636 [doi]
- Research on Active Defense Technology of Smart Grid Control Terminal Based on Dynamic TrustXiao Liang, Yunpeng Li, Baohua Zhao, ZhiHao Wang, Ningyu An. 637-648 [doi]