Abstract is missing.
- Penetration rate-equivalent inertia time constant function identification method of renewable energy power systemBaoyu Zhai, Xing Li, Qi Yang, Wanru Li, Ruizhe Sun, Bingtuan Gao. 1-6 [doi]
- Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes AgainKaiwei Zhang, Ailun Ma, Shanxiang Lyu, Jiabo Wang, Shuting Lou. 1-10 [doi]
- Explore Capabilities and Effectiveness of Reverse Engineering Tools to Provide Memory Safety for Binary ProgramsRuturaj K. Vaidya, Prasad A. Kulkarni, Michael R. Jantz. 11-31 [doi]
- Enhanced Mixup Training: a Defense Method Against Membership Inference AttackZongqi Chen, Hongwei Li 0001, Meng Hao, Guowen Xu. 32-45 [doi]
- Isogeny Computation on Twisted Jacobi IntersectionsZhi Hu, Lin Wang, Zijian Zhou. 46-56 [doi]
- EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMAGuangxia Xu, Yuqing Xu. 57-68 [doi]
- Out of Non-linearity: Search Impossible Differentials by the Bitwise Characteristic MatrixYunxiao Yang, Xuan Shen, Bing Sun 0001. 69-89 [doi]
- Message-Restriction-Free Commitment Scheme Based on Lattice AssumptionHideaki Miyaji, Yuntao Wang 0002, Atsuko Miyaji. 90-105 [doi]
- PUOKMS: Password-Protected Updatable Oblivious Key Management System for Cloud StorageShanshan Li, Chunxiang Xu. 106-125 [doi]
- OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration ControlYanjun Shen, Xingliang Yuan, Shifeng Sun, Joseph K. Liu, Surya Nepal. 126-146 [doi]
- Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECKYingjie Zhang, Lijun Lyu, Kexin Qiao, Zhiyu Zhang, Siwei Sun, Lei Hu. 147-167 [doi]
- Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA SecurityMriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida. 168-189 [doi]
- Ring Trapdoor Redactable Signatures from LatticeShao-Jun Yang, Xinyi Huang, Mingmei Zheng, Jinhua Ma. 190-208 [doi]
- WADS: A Webshell Attack Defender Assisted by Software-Defined NetworksBeiyuan Yu, Jianwei Liu 0001, Ziyu Zhou. 209-222 [doi]
- Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector ProblemXiulan Li, Yanbin Pan, Chengliang Tian. 223-241 [doi]
- Privacy-Preserving Support Vector Machines with Flexible Deployment and Error CorrectionWeican Huang, Ning Ding. 242-262 [doi]
- Lightweight EdDSA Signature Verification for the Ultra-Low-Power Internet of ThingsJohann Großschädl, Christian Franck, Zhe Liu 0001. 263-282 [doi]
- A Dummy Location Selection Algorithm Based on Location Semantics and Physical DistanceDongdong Yang, Baopeng Ye, Yuling Chen, Huiyu Zhou 0001, Xiaobin Qian. 283-295 [doi]
- DenseGAN: A Password Guessing Model Based on DenseNet and PassGANChaohui Fu, Ming Duan, Xunhai Dai, Qiang Wei, Qianqiong Wu, Rui Zhou. 296-305 [doi]
- Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class PermutationTao Ye, Yongzhuang Wei, Lingcheng Li, Enes Pasalic. 306-326 [doi]
- Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof ApproachJoseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li 0029, Kim-Kwang Raymond Choo. 327-344 [doi]
- A Novel Certificateless Multi-signature Scheme over NTRU LatticesXinjian Chen, Qiong Huang, Jianye Huang. 345-362 [doi]
- StrGAN for Generating Enhanced SamplesJunfeng Wu, Jinwei Wang, JunJie Zhao, Xiangyang Luo. 363-373 [doi]
- A Secure and Privacy-Preserving Data Transmission Scheme in the Healthcare FrameworkHuijie Yang, Tianqi Zhou, Chen Wang 0015, Debiao He. 374-391 [doi]