Abstract is missing.
- AMAD: Improving Adversarial Robustness Without Reducing AccuracyYujie Lin, Ximeng Liu, Nan Jiang. 1-14 [doi]
- Multi-party Secure Comparison of Strings Based on Outsourced ComputationXin Zhang, Chao Shan, Yunfeng Zou. 15-30 [doi]
- Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned BlockchainZui Luo, Chang Chen, Wangjie Qiu. 31-38 [doi]
- Overview of DDoS Attack Research Under SDNLei Guo, Shan Jing, Chuan Zhao. 39-53 [doi]
- A Medical Image Segmentation Method Based on Residual Network and Channel Attention MechanismSikai Liu, Fei Wu, Jinghong Tang, Bo Li. 54-60 [doi]
- Performance Improvement of Classification Model Based on Adversarial Sample GenerationQian Jiang, Jie Kang, Zhendong Wu. 61-74 [doi]
- Research on Detection Method of Large-Scale Network Internal Attack Based on Machine LearningChang Liu, Chaozhong Long, Yuchuan Yu, Ziqi Lin. 75-88 [doi]
- Federated Community Detection in Social NetworksZhiwei Zheng, Zekai Chen, Ximeng Liu, Nan Jiang. 89-103 [doi]
- A Textual Adversarial Attack Scheme for Domain-Specific ModelsJialiang Dong, Shen Wang, Longfei Wu, Huoyuan Dong, Zhitao Guan. 104-117 [doi]
- An Improved Conv-LSTM Method for Gear Fault DetectionYang Zhang, Jianwu Zhang, Guanhong Zhang, Hong Li. 118-129 [doi]
- Extracting Random Secret Key Scheme for One-Time Pad Under Intelligent Connected VehicleJunjie Chu, Mu Han, Shidian Ma. 130-143 [doi]
- Semi-supervised Learning with Nearest-Neighbor Label and Consistency RegularizationGuolin Zheng, Zuoyong Li, Wenkai Hu, Haoyi Fan, Fum Yew Ching, Zhaochai Yu, Kaizhi Chen. 144-154 [doi]
- Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part IShu Gong, Gang Hua 0002. 155-164 [doi]
- Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle NetworkSimin Li, Mu Han. 165-179 [doi]
- Dynamic Momentum for Deep Learning with Differential PrivacyGuanbiao Lin, Hu Li, Yingying Zhang, Shiyu Peng, Yufeng Wang, Zhenxin Zhang, Jin Li. 180-190 [doi]
- An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPPYuhui Huang, Xin Xie 0002, Weiye Ning, Dengquan Wu, Zixi Li, Hao Yang 0013. 191-201 [doi]
- PCB Defect Detection Method Based on Improved RetinaNetYusheng Xu, Xinrong Cao, Rong Hu, Pantea Keikhosrokiani, Zuoyong Li. 202-213 [doi]
- A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine LearningXiaoyu Zhang, Ye Jin. 214-227 [doi]
- Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan ProvinceShu Gong, Gang Hua 0002. 228-237 [doi]
- Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell DetectionZhonghua Peng, Rong Hu, Fuen Wang, Haoyi Fan, Yee Wei Eng, Zuoyong Li, Liwei Zhou. 238-253 [doi]
- DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly DetectionShicheng Li, Xiaoguo Yang, Haoming Zhang, Chaoyu Zheng, Yugen Yi. 254-265 [doi]
- A Lattice-Based Aggregate Signature Based on Revocable IdentityYang Cui, Huayu Cheng, Fengyin Li, Domenico Santaniello. 266-274 [doi]
- Research and Design of an Emergency Supply Assurance Monitoring System in the Post-epidemic ContextYongbo Li. 275-282 [doi]
- Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale FusionFei Peng, Shao-hua Meng, Min Long. 283-298 [doi]
- Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision ProcessYiting Zhang, Ming Liu, Jianan Guo, Zhaojie Wang, Yilei Wang, Tiancai Liang, Sunil Kumar Singh. 299-308 [doi]
- Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part IIShu Gong, Gang Hua 0002, Xiaomei Zhang. 309-320 [doi]
- Machine Learning Based Method for Quantifying the Security Situation of Wireless Data NetworksJie Xu. 321-334 [doi]
- Overlapping Community Discovery Algorithm Based on Three-Level Neighbor Node InfluenceShishuang Chen, Guanru Huang, Sui Lin, Wenchao Jiang, Zhiming Zhao. 335-344 [doi]
- Content-Aware Deep Feature MatchingWeice Wang, Zuoyong Li, Xiangpan Zheng, Taotao Lai, Pantea Keikhosrokiani. 345-354 [doi]
- F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error MapsFei Peng, Xin-lin Zhang, Min Long. 355-369 [doi]
- An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting ModelZhang Ling, Ma Zongxin, Yan MingYu, Jiang Wenchao, Muhammad. 370-381 [doi]
- A Certificateless-Based Blind Signature Scheme with Message RecoveryXiao Li, Mengwen Wang, Fengyin Li. 382-389 [doi]
- Fault Detection of Rolling Bearings by Using a Combination Network ModelTingting Chen, Guanhong Zhang, Tong Wu. 390-399 [doi]
- zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKsJiahui Huang, Teng Huang, Jiehua Zhang. 400-410 [doi]
- Research on Influential Factors of Online Learning Behavior Based on Big DataFangqin Ma, Junhan Qiu. 411-421 [doi]
- Short Speech Key Generation Technology Based on Deep LearningZhengyin Lv, Zhendong Wu, Juan Chen. 422-435 [doi]
- Domain Adversarial Interaction Network for Cross-Domain Fault DiagnosisWeikai Lu, Jian Chen, Hao Zheng, Haoyi Fan, Eng Yee Wei, Xinrong Cao, Deyang Zhang. 436-446 [doi]
- A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on BlockchainXueqing Sun, Xiao Li, Fengyin Li. 447-454 [doi]
- Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger FabricPengfei Huang, Wanqing Jie, Arthur Sandor Voundi Koe, Ruitao Hou, Hongyang Yan, Mourad Nouioua, Phan Duc Thien, Jacques Mbous Ikong, Camara Lancine. 455-468 [doi]
- Research on Key Technologies for the Trusted Perception of Network Information for Big DataYuxiang Li, Fakariah Hani Mohd Ali. 469-478 [doi]
- Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule NetworkLanwei Zeng, Yudong Wang, Chang Zhu, Wenchao Jiang, Jiaxing Li. 479-494 [doi]
- Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule AlgorithmTeng Peng, Xiaohong Wang. 495-509 [doi]
- Towards Differentially Private Contrastive LearningWenjun Li, Anli Yan, Taoyu Zhu, Teng Huang, Xuandi Luo, Shaowei Wang. 510-520 [doi]
- Two-Stage High Precision Membership Inference AttackShi Chen, Yubin Zhong. 521-535 [doi]
- Secure Storage Method for Network Resources of Professional Works Based on Decision Tree AlgorithmBomei Tan, Rong Yu. 536-549 [doi]
- Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature AnalysisJiaoxing Xu. 550-564 [doi]
- A Broad Learning System Based on the Idea of Vertical Federated LearningJunrong Ge, Xiaojiao Wang, Fengyin Li, Akshat Gaurav. 565-574 [doi]
- PAMP: A New Atomic Multi-Path Payments Method with Higher Routing EfficiencyJianan Guo, Lei Shang, Yilei Wang, Tiancai Liang, Zhaojie Wang, Hui An. 575-583 [doi]
- Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud ApplicationNa Wang 0003, Jian Jiao, Shangcheng Zhang, Jianwei Liu, Kaifa Zheng, Junsong Fu, Jiawen Qiao. 584-608 [doi]
- A Event Extraction Method of Document-Level Based on the Self-attention MechanismXueming Qiao, Yao Tang, Yanhong Liu, Maomao Su, Chao Wang 0003, Yansheng Fu, Xiaofang Li, Mingrui Wu, Qiang Fu, Dongjie Zhu. 609-619 [doi]