Abstract is missing.
- Data Poisoning Attacks to Session-Based Recommender SystemsYueqi Zhang, Ruiping Yin, Zhen Yang 0004. 1-6 [doi]
- Detecting IMAP Credential Stuffing Bots Using Behavioural BiometricsAshley Barkworth, Rehnuma Tabassum, Arash Habibi Lashkari. 7-15 [doi]
- Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog ComputingAiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang 0007, Xuetao Bai. 16-22 [doi]
- Leveraging Zero-Payload Packets to Detect Mobile Malware based on Network TrafficRuihai Ge, Yongzheng Zhang 0002, Shuhao Li, Guoqiao Zhou, Guangze Zhao. 23-29 [doi]
- Model Heterogeneous Federated Learning for Intrusion Detection based on knowledge distillationTiaokang Gao, Xiaoning Jin, Yingxu Lai. 30-35 [doi]
- Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing NetworksYongjie Yang 0007, Shanshan Tu, Haishuang Yan, Yihe Zhang, Aiming Wu, Xuetao Bai. 36-42 [doi]
- AuthAttLyzer: A Robust defensive distillation-based Authorship Attribution frameworkAbhishek Chopra, Nikhill Vombatkere, Arash Habibi Lashkari. 43-50 [doi]
- Identity-based Linkable Blind Ring Signature Scheme on LatticeXue Liao, Yihua Zhou, Jiawei Xu, Shuaikun Xing, Wei Zou, Jin Zhou, Qi Wang, Zhenhu Ning. 51-57 [doi]
- Identity-Based Authentication Protocol for Trustworthy IP AddressXiaoyan Wu, Xiaofeng Wang, Qianqian Xing. 58-63 [doi]
- Embedded Real-time System Trusted Protection Technology for Supply Chain ScenariosJin Zhou, Zhenhu Ning, Qi Wang, Yuchen Wang. 64-68 [doi]
- Activity Attribute-Based User Behavior Model for Continuous User AuthenticationLuthfi Azhari, Ari Moesriami Barmawi. 69-76 [doi]
- Accountable Policy-Based Sanitizable Signature for Medical Data SharingYang Yang, Zengtao Wei, Minming Huang. 77-84 [doi]
- Research on vulnerability assessment of physical protection system based on combined weighting-two-dimensional cloud modelAiguo Li, Wenhao Yan. 85-89 [doi]
- A trusted construction mechanism for sever based on trusted hard diskYu Hong, Zhenhu Ning. 90-97 [doi]
- MURAS: An Efficient Multi-Value-Proof-Based Remote Attestation Scheme for Cloud PlatformYanshuang Gui, Miaomiao Yang, Haishuang Yan, Yayun Guo, Qixu Wang, Xingshu Chen. 98-104 [doi]
- Hardware Implementation of SPONGENT Lightweight Hash AlgorithmHeera G. Wali, Nalini C. Iyer, Shraddha B. Hiremath. 105-109 [doi]
- Multi-objective optimization algorithm for indoor positioning sensor deployment based on wireless networkAiguo Li, Jie Yang. 110-116 [doi]
- A Post-quantum Secure Aggregation for Federated LearningShisong Yang, Yuwen Chen, Shanshan Tu, Zhen Yang 0004. 117-124 [doi]
- Impact of Common Mode Current Induced by Transformer on Electromagnetic Radiation in Digital Isolation ChipYidong Yuan, Tianmeng Zhang, Chaoyi Wang, Lu Tian, Jinchun Gao. 125-130 [doi]
- Status and Key Technologies of UAV-boat Cross-domain Collaborative DevelopmentSiyuan Yang, Yuhao Sun. 131-139 [doi]
- A mutual authentication and key establishment scheme for peer to peer network scenarioYunwen Chen, Zheng Li, Weiru Wang. 140-145 [doi]
- Trusted authentication mechanism oriented to network computing offloading at the perception layerWei Zheng, Naixin Kang, Tao Ye, Haining Tan. 146-151 [doi]
- Trust evaluation model based on improved Bayesian theory for the Internet of ThingsXiaoliang Wang, Feng Zhang, Yanbo Ma, Wenjuan Dai, Yingying Jin. 152-158 [doi]
- A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional ClusteringMansoor Khan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas, Hisham Alasmary, Muhammad Waqas. 159-167 [doi]
- Insights on Cooperative Defense for Multiple Industrial Security TechnologiesMing Wan, Minglei Hao, Yang Li, Jianming Zhao, Ying Li. 168-173 [doi]
- Trusted Authentication Mechanism for Perceptual layer-oriented Network RoutingWei Zheng, Naixin Kang, Tao Ye, Qi Wang. 174-179 [doi]
- Anti-jamming based on Reinforcement Learning in Power System Sensing NetworkShaojie Luo, Minhao Jin, Rongjie Han, Kexin Sun. 180-184 [doi]
- Traffic offloading based on content sharing in D2D for Smart GridChong Tan, Han Chen, Songlei Zhang, Di Zhai, Yang Lu, Hong Liu. 185-190 [doi]
- Federated Learning Assisted IoT Malware Detection Using Static AnalysisMadumitha Venkatasubramanian, Arash Habibi Lashkari, Saqib Hakak. 191-198 [doi]
- Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of VehiclesHaoyu Yu, Shanshan Tu, Yihe Zhang. 199-204 [doi]
- SPoW: A solution to the problem of centralization of computing powerXuetao Bai, Shanshan Tu, Haishuang Yan, Yongjie Yang 0007, Aiming Wu, Yihe Zhang. 205-210 [doi]
- Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement LearningYihe Zhang, Shanshan Tu, Muhammad Waqas 0001, Yongjie Yang 0007, Aiming Wu, Xuetao Bai. 211-218 [doi]
- Smart Contract Vulnerability Detection Based on Critical Combination Path and Deep LearningSu-Juan Qin, Zhao Liu, Feixiang Ren, Chong Tan. 219-226 [doi]
- Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement LearningYihe Zhang, Shanshan Tu, Shengju Zhang, Yongjie Yang 0007, Aiming Wu, Xuetao Bai. 227-233 [doi]