Abstract is missing.
- Chaotic Digital Image Encryption Based on Fourier TransformLan Zheng, Lei Liu. 1-7 [doi]
- SmartGate: Accelerate Cloud Gateway with SmartNICWei Yang, Chenming Chang. 8-14 [doi]
- Structure and key technologies of nuclear power plant network security situational awareness platformJunkai Wang, Deng Zhang, Hanjun Gao. 15-22 [doi]
- A Research of Improved Facial Expression Recognition Method Based on CBAM and Joint-normalization TechniquesChao Lv, Kaisheng Zhang. 23-30 [doi]
- Research on Multi-level Trust Mechanism of Internet of ThingsYun Zhu, Wenxiang Xu. 31-36 [doi]
- Research on Substation Quantum Secure Communication System Based on 5G Private Network TechnologyXiaojie Xie, Gang Yang, Lei An, Yun Ren, Xiao Wu, Xin Tong, Yanhua He, Xiaojie Chen. 37-44 [doi]
- Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural NetworkXiaomei Liu, YuJing Cao. 45-51 [doi]
- A Time-bound Data Access Control Scheme based on Attribute-based EncryptionYi Cai, Mingsheng Feng. 52-56 [doi]
- Robust watermarking based on dual-random phase encryption against collusion attacksLixuan Zhu, Bin Xu. 57-64 [doi]
- Research Progress of Location Privacy Protection Technology in the Internet EraRu Han, Jin Xu. 65-72 [doi]
- The Application and Practice of Computer Network Security Technology in Electronic Information EngineeringZhen Wang. 73-77 [doi]
- Data Visualization Analysis for Job Recruitment Based on Big DataLili Wang, Wei Chen 0002, Haoliang Wang. 78-83 [doi]
- Tag Anti-collision Algorithm for RFID in Underdetermined States Based on Local Sparse ConstraintsYuanshi Deng, Zhengwei Chang, Jun Zhao, Wei Pu, Xuanwen Ding, Ran Zhang, Hongyan Wang, Xiaopei Guo, Hongqiang Gong. 84-90 [doi]
- Bixi: A EB-level Object Storage System Based on CEPHZhijiang Zhang, Yanyong Zhang, Zhibing Wang. 91-96 [doi]
- Bluetooth AOA Localization Technology Based on LS and MUSIC AlgorithmsFuzhong Hao, Lei Liang, Nuannuan Li, Linhai Mu, Haiyan Zhi. 97-102 [doi]
- Adaptive Motion Compensation and Quantized Embedded Watermarking Against Collusion AttacksHongwei Niu, Lixuan Zhu. 103-110 [doi]
- Dynamic Heterogeneous Link Prediction Based on Hierarchical Attention ModelXiangming Ni, Yuhong Zhao, Yue Yao. 111-115 [doi]
- Constructing Dynamic Honeypot Using Machine LearningYingying Zhang, Yue Shi. 116-120 [doi]
- Access Control Management of Information System based on Homomorphism and Blockchain TechnologyJingli Han, Qing Xia, Zhaoli Wang. 121-125 [doi]
- Research on Application of Identity Authentication Encryption Technology in Blockchain SceneHuizhong Liu, Suli Ge, Gaifang Tan, Song Tang. 126-129 [doi]
- A K-means Algorithm for Blockchain the Construction of Data Privacy Security Monitoring SystemJixin Wei, Yanzhen Huang. 130-134 [doi]
- Improved Indoor Location Algorithm of Multilayer Perceptron based on RSSIChenyu Yang, Rong Fei, Junxuan Shi. 135-141 [doi]
- Design and Implementation of a Game Session Plugin based on Unreal EngineSiyao Wen, Dandan Li, Junlong Yuan, Jingbin Huang, Long Zhou. 142-149 [doi]
- A Topology Control Algorithm based on Theil's Entropy lmproved Potential Game for Wireless Sensor NetworksLiansuo Wei, Shenhao Huan, Longyu Ma. 150-158 [doi]
- FL Intelligent Wireless Network Optimization SystemYaowen Sun. 159-165 [doi]
- A Maximal Information Coefficient-based Feature Selection Method for Intrusion DetectionXibin Sun, Wenting Li, Jiwei Qiu, Di Han 0002. 166-170 [doi]
- Design of RFID Data Acquisition System for Manufacturing Execution SystemsFeng Li, Guangyue Jia, Chengbo Liu. 171-176 [doi]
- Data Cooperative Transmission and Resource Allocation Algorithm in Aviation CommunicationYingzhuo Zhang, Minghua Wang, Haochen Shi, Jingheng Zhang. 177-182 [doi]
- An Extensible and Traceable Data Operation Recording System Architecture and MethodQing Xia, Jingli Han, Zhaoli Wang. 183-187 [doi]
- Application of Knowledge Graph in Financial Information Security StrategyXin Ye, Shimin Wang, Han Wang, Qinwei Wei, Ting Yang, Yu Tao. 188-192 [doi]
- A Network Security Test Evaluation Model of Automobile Digital KeyBaizheng Wang, Qiang Zhang, Wen Shao, Kexun He, Xiyu Fang, Xuebin Shao. 193-199 [doi]
- Anomalous Traffic Detection in Campus Networks based on NetFlow and CNNYang Yang, Juxing Di, Wencheng Zhang, Fumei Yu. 200-203 [doi]
- Research and Implementationof National Commercial Cryptographic AlgorithmsWenjing Chen, Jingyi Liu. 204-210 [doi]
- NEMO Routing Optimization for Aviation Communication Based on Simulated Annealing AlgorithmCanyu Huang, Dongwei Zhang, Yingzhuo Zhang. 211-216 [doi]
- Application of Network Data Transmission Module Based on Advance Planning in Aerospace Measurement and Control Simulation FieldYuchuan Yang, Fan Xu, Bin Yin, Wanyu Li, Xiaochen Fan, Yiwen Hu. 217-221 [doi]
- The EEG Signal Encryption Scheme Based on Hyperchaotic System and Identity AuthenticationZhaoyang Liu, Ru Xue. 222-229 [doi]
- Research on All-Digital Simulation Method for OTN Optical Signal FaultJian Kang, Xiaodi Suo, Lu Liu, Xunshi Wang, Zhengjun He, Jinjun Chen. 230-235 [doi]
- Safety Equipment Management of cabinet Based on Intelligent Information Processing TechnologyZhengwei Chang, Yuanshi Deng, Xuanwen Ding, Wei Pu, Fuxiang Li, Lin Yang, Jun Zhao, Hongyan Wang. 236-246 [doi]
- Cross-Level Network Security Element Fusion Extraction Method Based on Deep LearningJianping Zhao, Huan Wang, Yichuan Wang, Hua Li, Yan Wang. 247-254 [doi]
- Research on Sensitive Frame Recognition Algorithm for Home Monitoring Video Based on Mixture of Gaussians Background ModelingYiting Yin, Jingxu Zhang, Liping Zhu, Guodong Li. 255-261 [doi]
- Frequency-domain Generative Adversarial Image Super-Resolution Algorithm Based on Phase Attention LossJipeng Zhou. 262-268 [doi]
- Simulation of Light Source Layout Characteristics for Tunnel Visible Light CommunicationXiuxia Zhang, Dongyuan Xing, Shuyi Wei. 269-273 [doi]
- Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature FusionXiaolong Li, Zhenhua Yan, Shuang Zhang, Xinghua Li, Feng Wang. 274-281 [doi]
- A Federated Learning based Botnet Detection Method for Industrial Internet of ThingsHao Zhou, Zhiwei Sheng. 282-288 [doi]
- Design and Application of Chaos Algorithm based on the Sprott-B SystemBoyi Zheng, Tao Li, Wenxia Xu, Liping Zhu. 289-294 [doi]
- Multi-image Multiplexing Pixel Synchronization Encryption based on Optical Scanning HolographyFengli Sun, Yan Wang. 295-301 [doi]
- Research on Power Intrusion Protection System Architecture Based on Edge Computing NodesHao Xu, Haoning Chen, Ying Nie, Yilin Li. 302-306 [doi]
- Weak signal detection technology based on improved background noise subtractionQi Liu, Sunqing Xu. 307-313 [doi]
- Application of Image Sharing and Encryption Based on Visual Cryptography in Networking Systems of AIMengting Liu. 314-318 [doi]
- Research on noise source localization technology based on improved DCS-SOMP algorithmJun Zhao, Qi Liu. 319-327 [doi]
- Trustless Layer for Secure Fog ComputingWen Li. 328-334 [doi]
- Performance Analysis of Different Intensity Modulation Techniques over Weak Turbulence ChannelDongya Xiao, Mingda Li, Zheng Xu. 335-340 [doi]
- A Method for Identifying Encrypted Webshell TrafficQi Wu, Shuo Wen, Boliang Liu. 341-349 [doi]
- Data Privacy Protection and Sharing in Smart Grid Based on Blockchain TechnologyWei Sun, Yu Wang, Junjie Ma, Xin Wang, Weihao Shi, Fei Jiao, Ningbo Liu. 350-355 [doi]
- Research on Network Intrusion Simulation and Adversarial Strategies Based on Generate Adversarial NetworksXing Zhao, Jie Heng, Qian Sun. 356-360 [doi]