Abstract is missing.
- Implementation of a VR Preview Simulation System by Capturing the Human Body MovementsTomoyuki Ishida, Kyosuke Sakuma. 1-9 [doi]
- Projection Region Detection Model Based on BASNetYukang Zhao, Nan Guo, Xinbei Jiang. 10-19 [doi]
- Analysis of Epidemic Events Based on Event Evolutionary GraphKang Xie, Tao Yang, Rourong Fan, Guoqing Jiang. 20-29 [doi]
- Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business OperatorsMasahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi. 30-39 [doi]
- VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on BlockchainShuai Zhou, Tianhan Gao. 40-49 [doi]
- An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc NetworksCong Zhao, Nan Guo, Tianhan Gao, Jiayu Qi, Xinyang Deng. 50-58 [doi]
- Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software CJaehyuk Lee, Kangbin Yim, Kyungroul Lee. 59-66 [doi]
- PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File FormatHua Yang, Jingling Zhao, Baojiang Cui. 67-75 [doi]
- An Efficient Approach to Enhance the Robustness of Scale-Free NetworksSyed Minhal Abbas, Nadeem Javaid, Muhammad Usman, Shakira Musa Baig, Arsalan Malik, Anees Ur Rehman. 76-86 [doi]
- A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor NetworksUsman Aziz, Muhammad Usman Gurmani, Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Nadeem Javaid. 87-95 [doi]
- Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor NetworksSaba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Usman Gurmani, Nadeem Javaid. 96-107 [doi]
- Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTMMuhammad Asif, Benish Kabir, Pamir, Ashraf Ullah, Shoaib Munawar, Nadeem Javaid. 108-119 [doi]
- Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro GridsFaisal Shehzad, Muhammad Asif, Zeeshan Aslam, Shahzaib Anwar, Hamza Rashid, Muhammad Ilyas, Nadeem Javaid. 120-131 [doi]
- Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc NetworkQiang Gao, Tetsuya Shigeyasu, Chunxiang Chen. 132-143 [doi]
- Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP ProtocolYang Hu, Wenchuan Yang, Baojiang Cui, Xiaohui Zhou, Zhijie Mao, Ying Wang. 144-155 [doi]
- Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQNNobuki Saito, Tetsuya Oda, Aoto Hirata, Kyohei Toyoshima, Masaharu Hirota, Leonard Barolli. 156-167 [doi]
- Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma ModelYunli Li, Young Jin Chun. 168-178 [doi]
- Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh ClientsShinji Sakamoto, Yi Liu 0011, Leonard Barolli, Shusuke Okamoto. 179-187 [doi]
- Web Page Classification Based on Graph Neural NetworkTao Guo, Baojiang Cui. 188-198 [doi]
- Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep LearningKunlin Li, Baojiang Cui. 199-208 [doi]
- Improved Optimal Reciprocal Collision Avoidance Algorithm in Racing GamesWenyu Zhang, Tianhan Gao. 209-220 [doi]
- An Intelligent Travel Application Using CNN-Based Deep Learning TechnologiesKyungmin Lee, Mincheol Shin, Yongho Kim, Hae-Duck J. Jeong. 221-231 [doi]
- Reduced CNN Model for Face Image Detection with GAN OversamplingJiha Kim, Hyunhee Park. 232-241 [doi]
- Power Meter Software Quality Analysis Based on Dynamic Binary InstrumentationFeng Zhai, Lingda Kong, Yongjin Yu, Xin Ye. 242-252 [doi]
- DClu: A Direction-Based Clustering Algorithm for VANETs ManagementMarco Lapegna, Silvia Stranieri. 253-262 [doi]
- ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi Devices Using Physical Layer SecurityKhan Reaz, Gerhard Wunder. 263-275 [doi]
- Fuzzing with Multi-dimensional Control of Mutation StrategyHan Xu, Baojiang Cui, Chen Chen 0061. 276-284 [doi]
- An ELF Recovery Method for Linux Malicious Process DetectionZheng Wang, Baojiang Cui, Yang Zhang 0015. 285-294 [doi]
- A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and ClassificationJiatong Wu, Baojiang Cui, Chen Chen 0061, Xiang Long. 295-303 [doi]
- Simulation-Based Fuzzing for Smart IoT DevicesFanglei Zhang, Baojiang Cui, Chen Chen 0061, Yiqi Sun, Kairui Gong, Jinxin Ma. 304-313 [doi]
- On the Neighborhood-Connectivity of Locally Twisted Cube NetworksTzu-Liang Kung, Cheng-Kuan Lin, Chun-Nan Hung. 314-321 [doi]
- k-Connectedness of Crossed CubesYuan-Hsiang Teng, Tzu-Liang Kung. 322-329 [doi]
- Learning Performance Prediction with Imbalanced Virtual Learning Environment Students' Interactions DataHsing-Chung Chen, Eko Prasetyo, Prayitno, Sri Suning Kusumawardani, Shian-Shyong Tseng, Tzu-Liang Kung, Kuei-Yuan Wang. 330-340 [doi]
- An APP-Based E-Learning Platform for Artificial Intelligence Cross-Domain Application PracticesAnthony Y. H. Liao. 341-351 [doi]
- Automatic Control System for Venetian Blind in Home Based on Fuzzy Sugeno MethodHsing-Chung Chen, Galang Wicaksana, Agung Mulyo Widodo, Andika Wisnujati, Tzu-Liang Kung, Wen-Yen Lin. 352-361 [doi]
- Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software MaintenanceSen-Tarng Lai, Heru Susanto, Fang-Yie Leu. 362-372 [doi]
- Efficient Adaptive Resource Management for Spot Workers in Cloud Computing EnvironmentLung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu. 373-382 [doi]
- You Draft We Complete: A BERT-Based Article Generation by Keyword SupplementLi-Gang Jiang, Yi-Hong Chan, Yao-Chung Fan, Fang-Yie Leu. 383-392 [doi]
- A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR SystemsZhi-Qian Hong, Heru Susanto, Fang-Yie Leu. 393-402 [doi]
- Study on the Relationship Between Dividend, Business Cycle, Institutional Investor and Stock RiskYung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang. 403-411 [doi]
- The Choice Between FDI and Selling Out with Externality and Exchange RateChun-Ping Chang, Yung-Shun Tsai, Khunshagai Batjargal, Hong Nhung Nguyen, Shyh-Weir Tzang. 412-419 [doi]
- Performance of the Initial Public Offering in the Taiwan Stock MarketShyh-Weir Tzang, Chun-Ping Chang, Tsatsral Ochirbal, Bolor Sukhbaatar, Yung-Shun Tsai. 420-430 [doi]
- Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS)Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen. 431-437 [doi]
- Macroeconomic Variables and Investor SentimentMei-Hua Liao, Chun Min Wang, Ya-Lan Chan. 438-443 [doi]
- College Students' Learning Motivation and Learning Effectiveness by Integrating Knowledge Sharing, Action Research and Cooperative Learning in StatisticsTin-Chang Chang, I-Tien Chu, Pei-Shih Chen. 444-463 [doi]
- A Feasibility Study of the Introduction of Service Apartment Operation Model on Long-Term Care InstitutionsKuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Shu-Tzu Shih. 464-471 [doi]
- Research on the Integration of Information Technology into Aesthetic Teaching in KindergartensYa-Lan Chan, Pei-Fang Lu, Sue-Ming Hsu, Mei-Hua Liao. 472-477 [doi]
- A Simulation System for Analyzing Attack Methods in Controller Area Network Using Fuzzing MethodsMitsuki Tsuneyoshi, Masahiro Miwata, Daisuke Nishii, Makoto Ikeda, Leonard Barolli. 478-484 [doi]
- Combination of Pseudonym Changing with Blockchain-Based Data Credibility for Verifying Accuracy of Latest Vehicle Information in VANETsLei Zhao, Tianhan Gao. 485-493 [doi]
- Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software DWontae Jung, Kangbin Yim, Kyungroul Lee. 494-500 [doi]
- Web Crawler for an Anonymously Processed Information DatabaseHiroaki Kikuchi, Atsuki Ono, Satoshi Ito, Masahiro Fujita, Tadakazu Yamanaka. 501-510 [doi]
- A Scheme for Checking Similarity and Its Application in Outsourced Image ProcessingYunxuan Su, Xu an Wang, Yu Ge. 511-517 [doi]