Abstract is missing.
- A Web Services Testing Approach based on Difference Measurement and Adaptive Random TestingZufa Zhang, Jianqiang Dai, Lingling Zhao, Songling Qin. 1-5 [doi]
- Android Malware Detection Combined with Static and Dynamic AnalysisJianing Zhang, Xingtao Zhuang, Yunfang Chen. 6-10 [doi]
- Semantic-based Malware Behavior Description: Past and FuturePing Yang, Hui Shu, Xiaobing Xiong, Fei Kang. 11-19 [doi]
- An Automatic Testing Platform for Object-oriented Software based on Code CoverageBo Liu, Honghe Ge, Jinfu Chen, Qihao Bao. 20-24 [doi]
- Secure Email Login Based on Lightweight Asymmetric IdentitiesKaige Yang, Shenghui Su. 25-29 [doi]
- Location Privacy Protection Scheme Based on Location ServicesChen Yang, Wei Yan. 30-33 [doi]
- Mobile Phone Number Privacy Scheme Based on Lightweight Hash MappingQingqing Chang, Shenghui Su. 34-39 [doi]
- SSL Malicious Traffic Detection Based On Multi-view FeaturesRui Dai, Chuan Gao, Bo Lang, Lixia Yang, Hongyu Liu, Shaojie Chen. 40-46 [doi]
- A Method of Detecting the Abnormal Encrypted Traffic Based on Machine Learning and Behavior CharacteristicsBin Kong, Zhangpu Liu, GuangMing Zhou, Xiaoyan Yu. 47-50 [doi]
- An Efficient, Secure and Reliable Search Scheme for Dynamic Updates with BlockchainHan Li, Chonglin Gu, Yi Chen, Wenye Li. 51-57 [doi]
- Embedded Authentication and Blockchain in Micro-courseWu-Chuan Yang, Lien-Yuan Ting. 58-62 [doi]
- Differentially Private Graph Clustering Algorithm Based on Structure SimilarityZijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, Wenfen Liu. 63-68 [doi]
- Abnormal Network Traffic Detection based on Leaf Node Density RatioHuajun Liu, Zhanghui Liu, Yanhua Liu, Xiaoling Gao. 69-74 [doi]
- Research on Automatically Switched Optical Network Security Based on Quantum Key DistributionYanyan Chen, Wenxian Han. 75-78 [doi]
- A Comprehensive Assessment Method of Asset Importance for Key Asset ProtectionXiaoling Gao, Yanhua Liu, Yanbin Qiu, Huajun Liu. 79-83 [doi]
- A Combined Prediction Method of Industrial Internet Security Situation Based on Time SeriesYingying Qi, Wenli Shang, Xiaojun He. 84-91 [doi]
- Effective Scrambling Scheme for Physical Layer SecurityEnjian Bai, Fangyuan Qin, Sijing Chen. 92-96 [doi]
- Attack Intent Analysis Method Based on Attack Path GraphBiqiong Chen, Yanhua Liu, Shijin Li, Xiaoling Gao. 97-102 [doi]
- Deep Security Analysis of DCS for Ship's Nuclear Power System based on Improved DEMATELYu-Kun. 103-108 [doi]
- A Polynomial Time Algorithm for Scheduling on Processing Time ConstraintsXuerong Yue, Jiji Gao, Zhibin Chen. 109-113 [doi]
- Simulation Environment of Evaluation and Optimization for Moving Target Defense: A SimPy ApproachXinli Xiong, Linru Ma, Chao Cui. 114-117 [doi]
- A Note on Polynomial-time Solvability for Edge Packing on GraphsJiaxin Liu, Xuerong Yue, Zhibin Chen. 118-122 [doi]
- Fault-injection Attack and Improvement of a CRT-RSA Exponentiation AlgorithmFanyu Kong, Guoqiang Yang, Huiyi Liu, Yali Jiang, Chengyu Hu, Dashui Zhou. 123-127 [doi]
- Design and Implementation of Integrated Access VPN GatewayHua Jiang, Jinpo Fan, Gang Zhang, Ronglei Hu. 128-132 [doi]
- Wireless Signal Identification in 230MHz Band Based on Interference Cleaning and Convolutional Neural NetworkYucheng Wang, Daohua Zhu, Qing Wu, YaJuan Guo, Chonghai Yang, Wenjiang Feng. 133-136 [doi]
- Power Allocation Based on Geometric Programming for Non-orthogonal Multiple Access Heterogeneous NetworksXin Song, Xue Huang, Haijun Qian. 137-141 [doi]
- Multi-source Landmark Fusion based on Machine LearningWen Yang, Meijuan Yin, Xiaonan Liu, Can Wang, Shunran Duan. 142-148 [doi]
- Research on Improvement of Wireless Sensor Network Location Algorithm Based on DV-HopQipeng He, Cong Dai, Rong-si, Jianwen Lin. 149-153 [doi]
- Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDNPhan The Duy, Le Duy An, Van-Hau Pham. 154-158 [doi]
- Deterministic Controlled Remote State Preparation of Arbitrary Real-parameter Multi-qubit States via Three-qubit Entangled StatesKaihang Zhou, Lei Shi, Jiahua Wei, Yang Xue, Jie Tang. 159-163 [doi]