Abstract is missing.
- Research on Offense and Defense of DDos Based on Evolutionary Game TheoryTengteng Zhao, Wei Zhang, Xiaolong Li, Wenjing Wang, Xu Niu, Hui Guo. 3-15 [doi]
- A Method of Data Distribution and Traceability Based on BlockchainBin Gu, Yunfeng Zou, Dongyang Cai, Huanyu Fan. 16-27 [doi]
- Data Provenance in Large-Scale DistributionYunan Zhu, Wei Che, Chao Shan, Shen Zhao. 28-42 [doi]
- A Vulnerability Detection Algorithm Based on Transformer ModelFujin Hou, Kun Zhou, Longbin Li, Yuan Tian, Jie Li, Jian Li. 43-55 [doi]
- Research on Video Falsity Detection Based on Publisher and Publishing Environment FeaturesXvhao Xiao, Xiaojun Li, Junping Yao, Shaochen Li, Bilal Anwar. 56-70 [doi]
- Intrusion Detection Model Based on KNN-AE-DNNHongtao Chen, Shuo Guo, Yanbo Shi, Weixuan Wei, Kaidi Wang. 71-83 [doi]
- A Framework for Unknown Traffic Identification Based on Neural Networks and Constraint InformationLu Kang, Qingbing Ji, Lvlin Ni, Jiaxin Li. 84-96 [doi]
- An Efficient Certificate-Based Encryption Scheme Without Random OraclesLan Guo, Yang Lu, Qing Miao, Guangao Zu, Zhongqi Wang. 97-107 [doi]
- A Rational Hierarchical Quantum State Sharing ProtocolHuali Zhang, Bichen Che, Zhao Dou, Hengji Li, Yu Yang, Xiubo Chen, Jian Li. 108-119 [doi]
- Blockchain-Based Efficient Incentive Mechanism in CrowdsensingQiulu Jiang, Wunan Wan, Zhi Qin, Jinquan Zhang, Hui Han, Shibin Zhang, Jinyue Xia. 120-132 [doi]
- BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex ScenariosHuailin Pu, Wunan Wan, Zhi Qin, Jinquan Zhang, Qiulu Jiang, Shibin Zhang, Jinyue Xia. 133-143 [doi]
- Thoughts on the Application of Low-Interactive Honeypot Based on Raspberry Pi in Public Security Actual Combat, LIHRPJing Shi, Mingyang Chen, Jiazheng Jiao. 144-156 [doi]
- Multi-objective Dual-Route Planning Algorithm for Grid Communication NetworkXiaojun Gou, Shunhui Luo, Liang Xiao. 157-170 [doi]
- Blockchain Cross-Chain Research Based on Verifiable Ring SignaturesZhe Li, Zhiwei Sheng, Wunan Wan, Shibin Zhang, Zhi Qin, Jinquan Zhang, Jinyue Xia. 171-183 [doi]
- A Routing Algorithm for Node Protection in Wireless Sensor Network Based on Clustering Ant Colony StrategyXiao Feng, Yuanzheng Wang, Tengfei Dong, Yingxia Liao, Yixin Zhang, Yi Lin. 184-193 [doi]
- Deep Learning Network Intrusion Detection Based on Network TrafficHanyang Wang, Sirui Zhou, Honglei Li, Juan Hu, Xinran Du, Jinghui Zhou, Yunlong He, Fa Fu, Houqun Yang. 194-207 [doi]
- A Survey of Consensus Mechanism Based on Reputation ModelYuanshen Li, Jieren Cheng, Hui Li, Yuming Yuan, Victor S. Sheng. 208-221 [doi]
- A Survey on Ethereum Illicit DetectionMeng Li. 222-232 [doi]
- Detect Adversarial Examples by Using Feature AutoencoderHongwei Ye, Xiaozhang Liu, Anli Yan, Lang Li, Xiulai Li. 233-242 [doi]
- Effect of Language Mixture on Speaker Verification: An Investigation with Amharic, English, and Mandarin ChineseFirew Tadele, Jianguo Wei, Kiyoshi Honda, Ruiteng Zhang, Wenhao Yang. 243-256 [doi]
- A WGAN-Based Method for Generating Malicious Domain Training DataKaixin Zhang, Bing Huang, Yunfeng Wu, Chuchu Chai, Jiufa Zhang, Zhengjing Bao. 257-270 [doi]
- A Data Reconciliation Model Based on QLDPC for Satellite-Ground Quantum Key Distribution NetworkWenting Zhou, Jie Liu, Bao-Feng, Xiao-ye, Tianbing Zhang, Yuxiang Bian, Wenjie Liu. 271-279 [doi]
- Noise Simulation-Based Deep Optical WatermarkingFeng Wang, Hang Zhou 0007, Han Fang, Weiming Zhang, Nenghai Yu. 283-298 [doi]
- Behavior Steganography in Social Network via Secret SharingXuan Zhu, Qun Mo, Fengyong Li, Lei Zhang, Chuan Qin 0001. 299-308 [doi]
- A Chaotic Image Encryption Algorithm Based on Sub-block Spiral Scans and Matrix MultiplicationYongjin Xian, Xingyuan Wang, Xiaoyu Wang, Qi Li 0029, Bin Ma. 309-322 [doi]
- Robust Video Watermarking Using Normalized Zernike MomentsShiyi Chen, Yi Chen 0008, Yanli Chen, LiMengNan Zhou, Hanzhou Wu. 323-336 [doi]
- An Improved Image Authentication Method Using QR Code Watermarking ApproachXiaomei Liu, Bolin Zhang, Yuchen Wen, Xin Tang, Haibo Su. 337-348 [doi]
- A Cyberspace Security Knowledge System Based on Knowledge GraphBin Ma, Dongqi Li, Chunpeng Wang, Jian Li 0034, Gang Li, Xinan Cui. 349-362 [doi]
- Multi-carrier Steganography Algorithm Based on Executable ProgramZuwei Tian, ZhiChen Gao. 363-372 [doi]
- Efficient Fragile Privacy-Preserving Audio Watermarking Using Homomorphic EncryptionRuopan Lai, Xiongjie Fang, Peijia Zheng, Hongmei Liu 0001, Wei Lu 0001, Weiqi Luo. 373-385 [doi]
- Robust Multi-watermarking Algorithm for Medical Images Using Patchwork-DCTYuan Li, JingBing Li, Chunyan Shao, Uzair Aslam Bhatti, Jixin Ma 0001. 386-399 [doi]
- Spatial Image Steganography Using a Correlational ModelJiangqun Ni, Yichen Tong, Xianglei Hu, Wenkang Su, Xiangui Kang. 400-411 [doi]
- Spatial Image Steganography Incorporating Adjacent DependenciesYichen Tong, Jiangqun Ni, Wenkang Su, Xianglei Hu. 412-423 [doi]
- A Trust-Based Malicious Detection Scheme for Underwater Acoustic Sensor NetworksKun Liang, Shijie Sun, Xiangdang Huang, Qiuling Yang, N. Xiong Neal. 427-440 [doi]
- Multi-level Federated Learning Mechanism with Reinforcement Learning Optimizing in Smart CityShaoyong Guo, Baoyu Xiang, Liandong Chen, HuiFeng Yang, Dongxiao Yu. 441-454 [doi]
- A Scheme to Improve the Security of IoT CommunicationJunjie Fu, Xiaoliang Wang 0002, Yuzhen Liu, Qing Yang, Frank Jiang 0001. 455-468 [doi]
- Energy Efficiency Maximization for UAV and Electric Vehicle Assisted Mobile Edge Computing on the Edge SideQiang Tang, LinJiang Li, Jin Wang, Gwang-Jun Kim, Bin Tang. 469-481 [doi]
- Risk Assessment of Electric Energy Metering Automation System Based on Bayesian NetworkWeihua Li, Shaocheng Wu, Yue Ma, Tao Liu, Yali Bai, Jinxin Zuo. 482-495 [doi]
- Dynamic Encryption of Power Internet of Things Data Based on National Secret AlgorithmJing Zhou, Qian Wu, Jin Li, Jiaxin Li. 496-506 [doi]
- Research on Power Mobile Internet Security Situation Awareness Model Based on Zero TrustZaojian Dai, Nige Li, Yong Li, Guoquan Yuan, Xinjian Zhao, Ran Zhao, Fan Wu. 507-519 [doi]
- A New Transparent File Encryption Method Based on SM4 for Android PlatformYuheng Li, Yongzhong Li, Shipeng Zhang. 520-531 [doi]
- Calibration of Multi-dimensional Air Pressure Sensor Based on LSTMTao Wang, Pengyu Liu 0001, Wenjing Zhang, Xiaowei Jia, Yanming Wang, Jiachun Yang. 532-543 [doi]
- A Survey of Traffic Classification Technology for Smart Home Based on Machine LearningJie Chen, Yaping Liu, Shuo Zhang, Bing Chen, Zhiyu Han. 544-557 [doi]
- Efficiency Improvement Method of Flyback Switching Power Supply Based on Quasi-ResonanceJianbin Liu, Sha Li, Zhe Zhang, Jie Zhang. 558-571 [doi]
- Distributed State Estimation for Topology Random Switching in Sensor NetworksPeng Yan, Yao Xiang. 572-585 [doi]
- Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and StorageXuetao Bai, Shanshan Tu, Muhammad Waqas, Aiming Wu, Yihe Zhang, Yongjie Yang. 586-597 [doi]
- Mobile Internet Access Control Strategy Based on Trust PerceptionLu Chen, Xinjian Zhao, Ran Zhao, Guoquan Yuan, Song Zhang, Shi Chen, Fan Wu. 598-611 [doi]
- Fine-Grained Access Control for Power Mobile Service Based on PA Network Under Zero-Trust FrameworkYong Li, Lu Chen, Nige Li, Ziang Lu, Zaojian Dai, Fan Wu. 612-624 [doi]
- Multi-device Continuous Authentication Mechanism Based on Homomorphic Encryption and SVM AlgorithmWei Gan, Xuqiu Chen, Wei Wang, Lu Chen, Jiaxi Wu, Xian Wang, Xin He, Fan Wu. 625-638 [doi]
- A Binary Code Vulnerability Mining Method Based on Generative Adversarial NetworksJi Lai, Shuo Li, Qigui Yao. 639-650 [doi]
- Simulation Research on Iron Core Air Gap of Energy-Taking Current Transformer (CT) Based on AnsysPingping Yu, Zihui Xu, Xiaodong Zhao, Eugene Murray. 651-662 [doi]
- A Rapid Device Type Identification Method Based on Feature Reduction and Dynamical Feature Weights AssignmentXiuting Wang, Xiangyang Luo, Shaoyong Du, Lingling Li, Yang Yang, Fenlin Liu. 663-677 [doi]
- MGDP: Architecture Design of Intelligent Detection Platform for Marine Garbage Based on Intelligent Internet of ThingsNing Cao 0002, Yansong Wang, Xiaofang Li, Rongning Qu, Yuxuan Wang, Zhikun Liang, Zijian Zhu, Chi Zhang, Dongjie Zhu. 678-688 [doi]
- Dark Chain Detection Based on the IP AddressJingwen Fang, Qian Shao, Zhongyi Xu, Penghui Li, Baotong Chen, Haoliang Lan. 689-699 [doi]
- High-Reliability Mapping Algorithm Based on Network Topology Characteristics in Network Slicing EnvironmentZhonglu Zou, Hao Xu, Yin Yuan. 700-709 [doi]
- New Generation Power System Security Protection Technology Based on Dynamic DefenseXiaowei Chen, HeFang Jiang, Shaocheng Wu, Tao Liu, Tong An, Zhongwei Xu, Man Zhang, Muhammad Shafiq. 710-721 [doi]