Abstract is missing.
- AntiMal: an Approach of Malware Detection Employing Swin TransformerChenxi Lyu, Yinan Yao, Xiaodong Guo, Zihong Huang, Chen Dong, Yuanyuan Zhang, Zhenyi Chen. 1-5 [doi]
- CapSan-UB: Bug Capabilities Detector Based on Undefined BehaviorWei Zhao, Zhiwei Li, Ruilin Li, Chaojing Tang. 6-11 [doi]
- A Continuous Authentication Scheme for Digital Therapeutics Using Denoising AutoencoderChengling Wang, Yunru Ma, Yuexin Zhang, Ayong Ye, Li Xu. 12-18 [doi]
- Trusted Delivery Mechanisms for Software Supply Chains Based on Trusted Execution EnvironmentXiaozhou Wang, Jianfei Ye, Linjie Feng, Chenji Feng, Jun Chen. 19-25 [doi]
- A Cross-Domain Authentication Scheme for Electric Vehicle Intelligent Charging for Multiple Power Service ProvidersZhihao Li, Zhongwei Sun. 26-31 [doi]
- Webshell Detection Based On CodeBERT And Deep LearningLei Liu, Ziyou He. 32-39 [doi]
- A Module Placement Method for Digital Microfluidic Biochips Based on Security DesignZhongliao Yang, Yinan Yao, Xiaodong Guo, Peixin Huang, Jiayin Li, Yuzhong Chen, Xintian Liang. 40-45 [doi]
- Tackling Disinformation: Machine Learning Solutions for Fake News DetectionAbdur Rashid Sangi, Jyothish Nagaram, Akshara Sudulagunta, Sai Sandeep Talari, Vinay Malla, Murali Krishna Enduri, Satish Anamalamudi. 46-51 [doi]
- Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private BlockchainMao Wang, Shanshan Tu, Haoyu Yu, Peihe Yan. 52-61 [doi]
- pAFL: Adaptive Energy Allocation with Upper Confidence BoundRui Ma 0004, Xvhong Zhou, Xiajing Wang, Zheng Zhang, Jinman Jiang, Wei Huo. 62-68 [doi]
- A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble LearningYinan Yao, Chen Dong, Zhengye Xie, Yuqing Li, Xiaodong Guo, Yang Yang 0026, Xiaoding Wang. 69-76 [doi]
- Investigation of Creating Accessibility Linked Data Based on Publicly Available Accessibility DatasetsYufeng Li, Xu Yan, Mingxuan Xiao, Weimin Wang, Fei Zhang. 77-81 [doi]
- Marine litter detection based on YOLOv7 algorithm and data encryption protectionQiaowen Wu, Yaojie Ke, Zhanghui Liu, Yuanyuan Zhang, Qiyan Wu. 82-87 [doi]
- A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCMJianhui Huang, ChangXiang Shen, Jianbiao Zhang, Liang Wang, Ruqian Li. 88-93 [doi]
- Privacy-preserving Trajectory Data Release Hierarchical ModelQian Zhang, Xing Zhang, Wei Shi. 94-99 [doi]
- Blockchain-based Searchable Encryption Scheme for Spatial Text DataZhirun Lin, Yang Yang, Yonghua Zhan, Jiayin Li, Chen Dong 0002. 100-105 [doi]
- Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer AuthenticationXiaodong Guo, Chenxi Lyu, Zhenyi Chen, Xiaoding Wang, Ruishen Bao, Chen Dong. 106-111 [doi]
- A low-cost configurable hash computing circuit for PQC algorithmWentao Xi, Xingjun Wu, Kai Zhang. 112-116 [doi]
- Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocolLiang Ni, Hengsheng Zhou, Yawei Zhang, Xiaoyan Liu, Bingke Gu. 117-126 [doi]
- An improved particle swarm optimization algorithm for P300 Neural network recognizerWei Zou, Shanshan Tu, Zhenhu Ning, Jiawei Xu, Shuaikun Xing, Xue Liao. 127-135 [doi]
- Improved Meet-in-the-Middle Cryptanalysis on KupynaJinxing Xu, Jian Zou, Qiufu Lan, Jiayin Li. 136-143 [doi]
- A Certificateless Trusted Connection Protocol for Smart FactoriesNianhao Xiao, Long Wang, Jing Fan, Chunzhu Shi, Yutong Xie. 144-150 [doi]
- The differential meet-in-the-middle attack on FUTURE and CRAFTHan Lin, Jian Zou, Jiayin Li. 151-158 [doi]
- Convolutional Neural Network-Based Classification of Secured IEC 104 Traffic in Energy SystemsAntonin Bohacik, Eva Holasova, Radek Fujdiak, Jan Racka. 159-165 [doi]
- Selection of defense strategy for high-level network based on multistage APT attack-defense gameDaowei Chen, Hongsheng Yan, Wei Dai. 166-172 [doi]
- Identifying Industry Devices via Time Delay in DataflowOndrej Pospisil, Radek Fujdiak. 173-177 [doi]
- Optoelectronic Task Processing based on Multilevel Collaborative Computing Networks: An Optimization-based ApproachYanming Chen. 178-182 [doi]
- Environment monitoring solution for Flying Ad-hoc Networks based on certificateless aggregate signatureDandan Xing, Suzhen Cao, Yifan Zhang. 183-188 [doi]
- Multi-User Identity Authentication in Wireless Communication Based on Deep Learning and Data AugmentationPeihe Yan, Shanshan Tu, Mao Wang. 189-195 [doi]
- Intranet security detection based on image and deep transfer learningJian Jiao, Zhifei Liu, Lan Li. 196-202 [doi]
- Physical Layer Authentication Based on TransformerXin Ai, Qingqing Yue, Hongchen Li, Wenlong Li, Shanshan Tu, Sadaqat ur Rehman. 203-208 [doi]
- From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity EducationKarel Kuchar, Petr Blazek, Radek Fujdiak. 209-214 [doi]
- Automated Neural Network Structure Design for EfficientEva Holasova, Radek Fujdiak, Petr Blazek, Antonin Bohacik. 215-221 [doi]
- Detection of IoT Botnet Based on Convolutional Neural Network and Linear Support Vector MachineChangping Lai, Yinan Yao, Yuzhong Chen, Xintian Liang, Tianqi Cai, Yiqing Shi. 222-226 [doi]
- A Privacy Protecting Mechanism in UAV-MEC Network with Blockchain-Enabled Federated LearningChaoyang Zhu, Xiao Zhu, Zhenrong Zhang, Tuanfa Qin. 227-233 [doi]
- Security authentication protocol for Industrial Internet of ThingsBingquan Wang, Meili Cui, Junchen Gao. 234-240 [doi]
- Dynamic Trust Assessment Method for Mobile Network DevicesXiaozhou Wang, Jianfei Ye, Tong Liu, Yinjie Wang, Xuefang Li, Lin Lin. 241-245 [doi]
- A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E ApplicationsWenzhe Gu, Botao Feng, Yiyuan Luo, Jianchao Zheng, Yun Lu. 246-251 [doi]
- Multi-UAVs Cooperative Target Search with Communication ConstraintYanggege Zhang, Bo Zhang, Te Ma, Jie Hu 0001. 252-257 [doi]
- Enhancing UAV Swarm Routing with Multi-Agent Attention Reinforcement LearningNing Wu, Li Li, Xingyu Liu, Ziwen Wang, Tongyao Jia. 258-264 [doi]
- Nonstationary Network Traffic Prediction With RevIN-based LSTMZeyi Liu, Xiaodong Guo, Yinan Yao, Yuzhong Chen, Xin Yang, Jiayin Li. 265-269 [doi]
- Optimizing Wireless Mesh Network Gateway Deployment Using an Enhanced Sparrow Optimization AlgorithmYouwu Liu, Rajamohan Parthasarathy. 270-275 [doi]
- D2D communication resource allocation algorithm based on multi-agent reinforcement learningTaoshen Li, Zhijun Qi. 276-281 [doi]
- DROO-C Data Transfer in a Mobile Edge Computing Offloading FrameworkDa Chen, Feng Biao Zan, Xin Liu, Xuan Meng. 282-293 [doi]
- A Novel Network Traffic Prediction Method Based on Complete Ensemble Empirical Mode Decomposition with Adaptive NoiseJiayuan Zhong, Yuzhong Chen, Yiqing Shi, Yan Li, Peiqing Chen. 294-299 [doi]
- Comparison and Testing of Time Synchronization Accuracy between IEEE 1588v2 and IEEE 802.1ASShihui Duan, Renhe Yan, Jie Chen, Meihui Liu, Qichen Xu. 300-305 [doi]
- Multi-sensor data fusion method based on adaptive Kalman filteringAiguo Li, Zhuoping Qiang. 306-311 [doi]
- Learned Digital Back-Propagation for an optical-domain waveform integrated with communication and sensingZhiyi Chen, Peizhe Xin, Peng Zhan 0075, Menhua Zheng, Yuxiao Sun, Can Li, Ping Meng, Yajie Li, Yongli Zhao. 312-316 [doi]
- A Flexible Waveform Based on PSWFs Signal for Next-Generation CommunicationZhichao Xu, Faping Lu, Zhilin Zhang, Dongkai Yang, Xiguo Liu, Jiafang Kang, Yaozong Pan, Qi An. 317-322 [doi]
- A Phase Noise Suppression Method Based on Real-imaginary Alternating Pilots for Coherent Optical OFDM-OQAM Communication SystemsHangyu Zhao, Daobin Wang, Quansheng Huang, GuangFu Li, Kun Wen. 323-329 [doi]
- Increasing data rate of LoRa technology using frequency division multiplexJan Pospisil 0003, Radek Fujdiak. 330-334 [doi]
- A Novel Single-Station Tracking Algorithm towards High-Dynamic Targets in 3D SpaceJiaZi Gao, Xin Sun 0008, Zhengyu Song, Jun Wang, Tianwei Hou. 335-341 [doi]
- PracticalHAR: A Practical Method of Human Activity Recognition Based on Embedded Sensors of Mobile PhoneRuishen Bao, Jiayin Li, Yuzhong Chen, Kaihui Yang, Ziyang Chen, Yuanyuan Zhang. 342-349 [doi]
- A Hybrid Deep Learning Model for Breast Cancer Detection and ClassificationShanshan Tu, Wenlong Li, Xin Ai, Hongchen Li, Qingqing Yue, Sadaqat ur Rehman. 350-353 [doi]