Abstract is missing.
- Research on Optimization of Data Balancing Partition Algorithm Based on Spark PlatformSuzhen Wang, Zhiting Jia, Wenli Wang. 3-13 [doi]
- Research and Implementation of Dimension Reduction Algorithm in Big Data AnalysisSi-Yuan He, Shan Li, Chao Guo. 14-26 [doi]
- Exploring the Informationization of Land Reserve Archives ManagementYuxian Zhu. 27-40 [doi]
- Research and Implementation of Anomaly Detection Algorithm in Data MiningYang Zhou, Fazhou Liu, Shan Li, Chao Guo. 41-53 [doi]
- An Empirical Study on Data Sampling for Just-in-Time Defect PredictionHaitao Xu, Ruifeng Duan 0002, Shengsong Yang, Lei Guo. 54-69 [doi]
- Design and Implementation of Data Adapter in SWIMYangfei Sun, Yuanchun Jiang. 70-81 [doi]
- Encrypted Medical Records Search with Supporting of Fuzzy Multi-keyword and Relevance RankingXiehua Li, Gang Long, Sijie Li. 85-101 [doi]
- A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud ComputingZhaofeng Yu, Lin Ye, Hongli Zhang 0001, Dongyang Zhan. 102-111 [doi]
- A Computing Task Offloading Scheme for Mobile Edge ComputingBen Wang, Tingrui Li, Xun Han, Huahui Li. 112-123 [doi]
- Security Transmission Scheme of Sensitive Data for Mobile TerminalJicheng He, Minghui Gao, Zhijun Zhang, Li Ma, Zhiyan Ning, Jingyi Cao. 124-134 [doi]
- Efficient Utilization of Cache Resources for Content Delivery Network Based on BlockchainHongyan Zhang, Bo Liu, Long Qin, Jing Zhang, Weichao Gong. 135-146 [doi]
- A Dynamic Processing Algorithm for Variable Data in Intranet Security MonitoringChunru Zhou, Guo Wu, Junhao Li, Chunrui Zhang. 147-156 [doi]
- Personalized Recommendation of English Learning Based on Knowledge Graph and Graph Convolutional NetworkYuan Sun, Jiaya Liang, Pengchao Niu. 157-166 [doi]
- Optimizing Data Placement in Multi-cloud Environments Considering Data TemperaturePengwei Wang, Yi Wei, Zhaohui Zhang. 167-179 [doi]
- Detection of Virtual Machines Based on Thread SchedulingZhi Lin, Yubo Song, Jun-Bo Wang. 180-190 [doi]
- Graph Attention Network for Word EmbeddingsYunfei Long, Huosheng Xu, Pengyuan Qi, Liguo Zhang, Jun Li. 191-201 [doi]
- Firewall Filtering Technology and Application Based on Decision TreeYujie Jin, Qun Wang. 202-215 [doi]
- A DAPP Business Data Storage Model Based on Blockchain and IPFSXiangyan Tang, Hao Guo, Hui Li, Yuming Yuan, Jianghao Wang, Jieren Cheng. 219-230 [doi]
- IPv6-Darknet Network Traffic DetectionChenhuan Liu, Qiankun Liu, Shanshan Hao, CongXiao Bao, Xing Li. 231-241 [doi]
- Neural Control Based Research of Endogenous Security ModelTao Li, Xu Hu, Aiqun Hu. 242-252 [doi]
- Keyword Guessing Attacks on Some Proxy Re-Encryption with Keyword Search SchemesXuanang Yu, Yang Lu 0001, Jinmei Tian, Fen Wang. 253-264 [doi]
- A Post-quantum Certificateless Ring Signature Scheme for Privacy-Preserving of Blockchain Sharing EconomyMengwei Zhang, Xiubo Chen. 265-278 [doi]
- A Transaction Model of Bill Service Based on BlockchainXinyan Wang, Jianxun Guo, Dong Li, Xin Chen, Kailin Wang. 279-288 [doi]
- An N-gram Based Deep Learning Method for Network Traffic ClassificationXiaojuan Wang, Kaiwenlv Kacuila, Mingshu He. 289-304 [doi]
- Interpretability Framework of Network Security Traffic Classification Based on Machine LearningMingshu He, Lei Jin, Mei Song. 305-320 [doi]
- Random Parameter Normalization Technique for Mimic Defense Based on Multi-queue ArchitectureShunbin Li, Kun Zhang, Ruyun Zhang, Mingxing Zhu, Hanguang Luo, Shaoyong Wu. 321-331 [doi]
- Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of BlockchainRui Zhang, Zhaoxuan Li, Lijuan Zheng. 332-345 [doi]
- Covert Communication via Modulating Soft Label of Neural NetworkGen Liu, Hanzhou Wu, Xinpeng Zhang 0001. 349-359 [doi]
- DCDC-LSB: Double Cover Dark Channel Least Significant Bit SteganographyXin Zheng, Chunjie Cao, Jiaxian Deng. 360-375 [doi]
- Halftone Image Steganography Based on Reassigned Distortion MeasurementWenbo Xu, Wanteng Liu, Cong Lin, Ke Wang, Wenbin Wang, Wei Lu 0001. 376-387 [doi]
- Halftone Image Steganography Based on Maximizing Visual Similarity of Block UnitsXiaolin Yin, Mujian Yu, Lili Chen, Ke Wang, Wei Lu. 388-399 [doi]
- High Efficiency Quantum Image Steganography Protocol Based on ZZW FrameworkHanrong Sun, Zhiguo Qu. 400-411 [doi]
- Halftone Image Steganalysis by Reconstructing Grayscale ImageJunwei Luo, Cong Lin, Lingwen Zeng, Jifan Liang, Wei Lu. 412-423 [doi]
- Halftone Image Steganography Based on Minimizing Distortion with Pixel Density TransitionMujian Yu, Junwei Luo, Bozhi Xu, Guoliang Chen, Wei Lu. 424-436 [doi]
- Research and Implementation of Medical Information Protection and Sharing Based on BlockchainWei Fang, Xuelei Jia, Wei Jia. 437-449 [doi]
- LoRa Network Security Schemes Based on RF FingerprintSiqing Chen, Yu Jiang, Wen Sun. 453-465 [doi]
- Smart Home Based Sleep Disorder Recognition for Ambient Assisted LivingLulu Zhang, Shiqi Chen, Xuran Jin, Jie Wan. 466-475 [doi]
- Blockchain-Based Reliable Collection Mechanism for Smart Meter Quality DataYan Liu, Angang Zheng, Huaiying Shang, Lingda Kong, Guang Shen, Shuming Shen. 476-487 [doi]
- Power Blockchain Guarantee Mechanism Based on Trusted ComputingYong Yan 0002, Tianhong Su, Shaoyong Guo, Song Kang. 488-501 [doi]
- Analysis and Implementation of Distributed DTU Communication Method Based on DDS ProtocolYonggui Wang, Zhu Liu, Lvchao Huang. 502-513 [doi]
- Sensor Failure Detection Based on Programmable Switch and Machine LearningXiaolong Zhang, Rengbo Yang, Guangfeng Guo, Junxing Zhang. 514-525 [doi]
- A Solution to Reduce Broadcast Storm in VANETSubo He, Lei Xiang, Ying Wang, Minna Xia, Yaling Hong. 526-537 [doi]
- A Vehicle Intrusion Detection System Based on Time Interval and Data FieldsXun He, Zhen Yang, Yongfeng Huang. 538-549 [doi]
- An Authentication Mechanism for IoT Devices Based on Traceable and Revocable Identity-Based EncryptionFei Xia, Jiaming Mao, Zhipeng Shao, Liangjie Xu, Ran Zhao, Yunzhi Yang. 550-562 [doi]
- A Load-Balancing Algorithm for Power Internet of Things Resources Based on the Improved Weighted Minimum Number of ConnectionsMingming Zhang, Jiaming Mao, Lu Chen, Nige Li, Lei Fan, Leshan Shuang. 563-574 [doi]
- Research on Physical Layer Security Strategy in the Scenario of Multiple Eavesdroppers in Cognitive Wireless Networks Based on NOMAYuxin Du, Xiaoli He, Weijian Yang, Xinwen Cheng, Yongming Huang. 575-587 [doi]
- Opportunistic Network Performance Optimization Model Based on a Combination of Neural Networks and Orthogonal ExperimentsZhihan Qi, YunChao Pan, Hao Du, Na Zhang, ZongHan Bai, Gang Xu. 588-600 [doi]
- Security Analysis of Measurement Automation System Based on Threat IntelligenceShaocheng Wu, Tao Liu, Jin Li, HeFang Jiang, Xiaowei Chen, Xiaohong Cao. 601-610 [doi]
- A MOEA-D-Based Service Quality Matching Optimization Algorithm in Electric Power Communication NetworkQinghai Ou, Yanru Wang, Yongjie Li, Jizhao Lu, Hongkang Tian, Wenjie Ma, Hui Liu. 611-621 [doi]
- Abnormal Traffic Detection of Industrial Edge Network Based on Deep Nature LearningQi Liu, Bowen Zhang, Jianming Zhao, Chuanzhi Zang, Xibo Wang, Tong Li. 622-632 [doi]
- Recent Development, Trends and Challenges in IoT SecurityMorteza Talezari, Shanshan Tu, Sadaqat ur Rehman, Chuangbai Xiao, Basharat Ahmad, Muhammad Waqas 0001, Obaid Ur Rehman 0003. 633-646 [doi]
- Energy Optimization for Wild Animal Tracker Basing on Watchdog TechnologyZhenggang Xu, Wenhan Zhai, Chen Liang, Yunlin Zhao, Tian Huang, Minghui Zhou, Libo Zhou, Guiyan Yang, Zhiyuan Hu. 647-655 [doi]
- Performance Comparison of Curve Fitting and Compressed Sensing in Channel State Information Feature ExtractionXiaolong Wang, Xiaolong Yang, Mu Zhou, Liangbo Xie. 656-666 [doi]
- Dynamic Time Warping Based Passive Crowd Counting Using WiFi Received Signal StrengthMin Chen, Xiaolong Yang, Yue Jin, Mu Zhou. 667-677 [doi]
- Wi-Fi Indoor Positioning Using D-S Evidence TheoryZhu Liu, Yong Wang 0004, Yuexin Long, Yaohua Li, Mu Zhou. 678-687 [doi]
- A Hybrid Localization Algorithm Based on Carrier Phase Ranging in UHF RFID SystemZengshan Tian, Xixi Liu, Kaikai Liu, Liangbo Xie. 688-699 [doi]
- Trusted Digital Asset Copyright Confirmation and Transaction Mechanism Based on Consortium BlockchainShaoyong Guo, Cheng Huang, Yong Yan, Liandong Chen, Sujie Shao. 703-714 [doi]
- Automatic Source Camera Identification Technique Based-on Hierarchy Clustering MethodZhimao Lai, Yufei Wang, Weize Sun, Peng Zhang. 715-723 [doi]
- A Fast Tongue Image Color Correction Method Based on Gray World MethodGuojiang Xin, Lei Zhu, Hao Liang, Changsong Ding. 724-735 [doi]
- Evaluation of RGB Quantization Schemes on Histogram-Based Content Based Image RetrievalEzekiel Mensah Martey, Hang Lei, Xiaoyu Li, Obed Appiah, Nicodemus Songose Awarayi. 736-747 [doi]