Abstract is missing.
- Data-Driven Security Analysis of Machine Learning SystemsChao Shen. [doi]
- Edge-Centric Intelligent Computing: Intelligence, Privacy and ApplicationsXiangyang Li 0001. [doi]
- Private and Fast Routing in Credit NetworksJianwei Long, Chi Zhang, Chenyu Li, Lingbo Wei, Qibin Sun, Xia Zhang. 1-7 [doi]
- CARA-BAN: Clone Attack Resistant Authentication Scheme in Body Area Networks Using Channel CharacteristicsMubarak Umar, Xuening Liao, Bello Ahmad Muhammad, Hafsa Kabir Ahmad. 8-15 [doi]
- Physical Layer Authentication Utilizing Carrier Frequency Offset in Dynamic MIMO SystemsYangyang Liu, Pinchang Zhang. 16-21 [doi]
- Incremental-Compensation based Robust Topology Control for Micro/Nano Satellite NetworkYuyu Hu, Zhao Li, Jingling Li, Zhixian Chang, Yang Xu, Jia Liu. 22-28 [doi]
- On Eavesdropping Region Characterization in Hybrid Wireless CommunicationsQianyue Qu, Yuanyu Zhang, Shoji Kasahara. 29-34 [doi]
- Improve IoT Streaming QoS by Determining the Message Propotion in CoAPRu Yang, Sungwon Lee, Junho Seo, Murad Khan, Dongkyun Kim. 35-40 [doi]
- Design of A Time Synchronization Mechanism for Underwater Acoustic NetworksJianping Wang, Cui-Ling Jiao. 41-46 [doi]
- On CPRI based Front-hauling over Residential Power LinesMai Hassan, Syed Hassan Raza Naqvi, Pin-Han Ho. 47-52 [doi]
- Deep Learning as a Service Based on Encrypted DataXinhong Hei 0001, Xiaolong Liang, Yichuan Wang, Wenjiang Ji, Lei Zhu. 53-58 [doi]
- Traffic Flow Modeling for UAV-Enabled Wireless NetworksAbada Abderrahmane, Bin Yang 0010, Tarik Taleb. 59-64 [doi]
- Online Placing and Pricing for Cloud Container Clusters: An Auction ApproachRenli Zhang, Ruiting Zhou. 65-72 [doi]
- CPWF: Cross-Platform Website Fingerprinting Based on Multi-Similarity LossShihao Wang, Liangmin Wang, Shangnan Yin, Hui Zhao, Hao Shentu. 73-80 [doi]
- Differential Privacy Preserving Naive Bayes Classification via Wavelet TransformWenru Tang, Yihui Zhou, Mingshuang Li, Laifeng Lu. 81-85 [doi]
- K-modes Based Categorical Data Clustering Algorithms Satisfying Differential PrivacyMingshuang Li, Yihui Zhou, Wenru Tang, Laifeng Lu. 86-91 [doi]
- Time Constrained Emergency Data Backup and Service Migration in Cloud Data CentersLisheng Ma, Bin Yang 0010. 92-95 [doi]
- Intra-Datacenter Bandwidth Resource Allocation for Bursty Large-Scale Traffic in Polled OLTGuochun Li, Binbin Ye, Rentao Gu, Qize Guo, Zhiyun Gu. 96-101 [doi]
- Adaptive Meek Technology for Anti-Traffic AnalysisHaoyao Xie, Liangmin Wang, Shangnan Yin, Hui Zhao, Hao Shentu. 102-107 [doi]
- Energy-saving Hybrid Network Integrating WSNs and Crowd SensingXiaoxia Song, Wenmei Nie, Hong-Ying Liu, Yong Li. 108-113 [doi]
- Research on SDN intrusion detection based on online ensemble learning algorithmLin Zhang, Hongle Du. 114-118 [doi]
- On security of UAV integrated system with network codingYanbo Yang, Yongxing Du, Jiawei Zhang, Liyong Zhou, Weijian Hu, Lingfang Li. 119-123 [doi]
- On the Applicability of Users' Operation-action Characteristics for the Continuous Authentication in IIoT ScenariosGuozhu Zhao, Pinchang Zhang, Xiaohong Jiang. 124-129 [doi]
- Rational Delegation Learning Outsourcing Scheme Based on Game TheoryKang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan. 130-135 [doi]
- A Conceptual Framework for Detecting Learning Style in an Online Education Using Graph Representation LearningBello Ahmad Muhammad, Zhenqiang Wu, Hafsa Kabir Ahmad. 136-140 [doi]
- Pulse-detecting Approach with Adjustable PRIs Using Interferences Blanking in TACAN SystemDi Zhao, Jichao Jiao, Weijie Tan. 141-146 [doi]
- Adaptive Beamforming Planning for Multicast mmWave CommunicationXiaoxiao Liu, Haoran Mei, Limei Peng. 147-151 [doi]
- Concentration-Shifting-based Modulation Scheme for Molecular Communication System with a Mobile TransmitterZhen Jia, Xuening Liao, Xialei Zhang. 152-156 [doi]
- Protection method of continuous location uploading based on local differential privacyXiongjian Wang, Weidong Yang. 157-161 [doi]
- On Jamming Power Optimization for Secure and QoS-Aware Routing in Ad Hoc NetworksYang Xu, Kehan Yang, Yu Wang, Zhao Li, Tao Zhang, Jia Liu. 162-166 [doi]
- A Unified Trust Service Scheme for Heterogeneous Identity AllianceGuishan Dong, Yuxiang Chen, Yao Hao, Jian Bai, Zhaolei Zhang, Sijie Liao. 167-173 [doi]
- Study on Learner's Facial Expression RecognitionLei Yang, Chao Qi. 174-179 [doi]
- Message Delivery Probability of 3D MANETs Under Erasure CodingWu Wang, Bin Yang, Shikai Shen, Guoxing Shi, Yuejuan Liu. 180-185 [doi]
- A Blockchain based model for Curbing Doctors Shopping and Ensuring Provenance ManagementShekha Chenthara, Hua Wang 0002, Khandakar Ahmed, Frank Whittaker, Ke-ji. 186-192 [doi]
- Covert Outage Analysis for Random Wireless Networks Under Warden CollusionShuangrui Zhao, Jia Liu, Yulong Shen, Xiaohong Jiang. 193-197 [doi]
- UniRoam: An Anonymous and Accountable Authentication Scheme for Cross-Domain AccessFarooq Ahmed, Xudong Li, Yukun Niu, Chi Zhang, Lingbo Wei, Chengjie Gu. 198-205 [doi]
- B-SDN: A Novel Blockchain-based Software Defined Network ArchitectureWei Tong, Wensheng Tian, Xuewen Dong, Lingxiao Yang, Shiyang Ma, Hua Lu 0015. 206-212 [doi]
- Nesterov Accelerated Gradient-based Algorithm for the Allocation Problem of NFV ServiceZhonghui Wu, Xingyan Chen, Changqiao Xu, Shujie Yang. 213-220 [doi]
- Secure Spatial Query Scheme with Access Pattern ObfuscationQing Ren, Feng Tian 0004, Laifeng Lu. 221-228 [doi]
- Anomaly detection frameworks for outlier and pattern anomaly of time series in wireless sensor networksCong Gao, Yanping Chen 0009, Zhongmin Wang, Hong Xia, Ning Lv. 229-232 [doi]
- Security Analysis and Design of Authentication Key Agreement Protocol in Medical Internet of ThingsJiaxing Guo, Siqi Lu, Chunxiang Gu, Xi Chen, Fushan Wei. 233-240 [doi]
- VPN Traffic Classification Based on Payload Length SequencePing Gao, Guangsong Li, Yanan Shi, Yang Wang. 241-247 [doi]
- Simulated Annealing Algorithm Based Temperature-Aware Routing Scheme for Intrabody NanonetworksShumaila Javaid, Zhenqiang Wu, Hamza Fahim, Farhana Javed. 248-253 [doi]
- Evolutionary dynamics games based on edge diversity in complex networksJiawang Chen, Bo Liu, Mubarak Umar. 254-258 [doi]
- Secure Off-chain Payment in Consortium Blockchain SystemLingxiao Yang, Xuewen Dong, Wei Tong, Shiyang Ma, Hui Qiao, Siyu Xing. 259-264 [doi]
- QMPS: Q-learning based Message Prioritizing and Scheduling Algorithm for Flying Ad hoc NetworksJun Li, Ming Chen. 265-270 [doi]
- Network Flow Analytics: Multi-Class Classification of DDoS Attacks Based on OKNNIrenee Mungwarakarama, Xinhong Hei 0001, Yichuan Wang, Wenjiang Ji, Xinyu Jiang. 271-276 [doi]
- An Invocation Chain Test and Evaluation Method Based on Knowledge GraphYue Zhao, Yarang Yang, Bo Tian, Tianle Zhang. 277-281 [doi]
- Adversarial Examples Detection Using Random Projections of ResidualsKaijun Wu, Anjie Peng, Yao Hao, Qi Zhao. 282-285 [doi]
- Optimal Asynchronous FHMA System with Generalized Orthogonal Hopping PatternsBo Tian, Kaijun Wu, Yao Hao, Xue Wang, Hao Zhang, Dongyu Yang. 286-291 [doi]
- A Framework for Audit Analysis of Heterogeneous Logs from PaaSYanning Du, Yichuan Wang, Lei Zhu, Wenjiang Ji, Xin Song, Yida Yang, Long Pan. 292-297 [doi]
- Emotion-Related Rich-Club Organization in Dynamic Brain NetworkZhongmin Wang, Rui Zhou. 298-303 [doi]
- Fault Diagnosis and Location based on Graph Neural Network in Telecom NetworksJiajin He, Hui Zhao. 304-309 [doi]
- Evaluation of Random Forest for Complex Human Activity Recognition Using Wearable SensorsAiguo Wang, Huihui Chen, Chundi Zheng, Liang Zhao, Jinjun Liu, Lulu Wang. 310-315 [doi]
- MagNet with Randomization Defense against Adversarial ExamplesFangwei Wang, Guofang Chai, Qingru Li, Changguang Wang. 316-320 [doi]
- An Adaptive Model Update Object Tracking Algorithm based on DenseNet FeaturesSugang Ma, Lei Zhang, Lei Pu, Xiaobao Yang, Zhiqiang Hou. 321-325 [doi]
- $k$-Anonymity Based Location Data Query Privacy Protection Method in Mobile Social NetworksHongtao Li, Lingxia Gong, Bo Wang, Feng Guo, Jie Wang, Tao Zhang. 326-334 [doi]
- Crowdsourcing Answer Integration Algorithm For Big Data EnvironmentHong Xia, Yongkang Zhang, Han Wang, Yanping Chen 0009, Zhongmin Wang. 335-341 [doi]
- TMPTCP: A Lightweight Trust Extension for Multipath-TCPBoyang Wu, Hewu Li, Qian Wu, Jiang Zhou, Jun Liu. 342-347 [doi]
- Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoTXinDi Ma, Junying Zhang, Jianfeng Ma 0001, Qi Jiang 0001, Sheng Gao, Kang Xie. 348-354 [doi]
- A Study of Learned KD Tree Based on Learned IndexYongxin Peng, Wei Zhou, Lin Zhang, Hongle Du. 355-360 [doi]
- High capacity reversible data hiding algorithm based on central predictionFang Ren, Feiyuan Xue, Xuemei Yao. 361-367 [doi]
- Android Malware Detection Based on Call Graph via Graph Neural NetworkPengbin Feng, Jianfeng Ma 0001, Teng Li 0003, XinDi Ma, Ning Xi 0002, Di Lu. 368-374 [doi]
- Efficient partially policy-hidden with multi-authority for access control scheme in Internet of ThingsYan Liu 0051, Ruizhong Du. 375-380 [doi]
- JSTIFuzz: Type-Inference-based JavaScript Engine FuzzingYuli Wang, Xiaoqing Gong, Hao Chen, Jing Li, Baoying Liu, Shuai Cao. 381-387 [doi]
- Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy ProtectionKun Niu, Changgen Peng, Youliang Tian, Weijie Tan. 388-393 [doi]
- Experimental Security Analysis of SDN Network by Using Packet Sniffing and Spoofing Technique on POX and Ryu ControllerYubaraj Gautam, Bishnu Prasad Gautam, Kazuhiko Sato. 394-399 [doi]
- A Conceptual Framework for Top- N Recommendation Using Attributed Bipartite Graph EmbeddingHafsa Kabir Ahmad, Zhenqiang Wu, Bello Ahmad Muhammad. 400-404 [doi]
- Predict Onset Age of Hypertension Using CatBoost and Medical Big DataHuanhuan Zhao, Zuchang Ma, Yining Sun. 405-409 [doi]
- Online Teaching Gestures Recognition Model Based on Deep LearningYuying Gu, Jingxyan Hu, Yihui Zhou, Laifeng Lu. 410-416 [doi]
- Dynamic Action Recognition Under Simulated Prosthetic VisionYing Zhao, Dantong Xu, Tie Wang, Yanchun Ren. 417-421 [doi]
- Body Part Localization and Pose Tracking by Using Deepercut Algorithm for King Cobra's BBL (Biting Behavior Learning)Bishnu Prasad Gautam, Yusuke Noda, Ramji Gautam, Hari Prasad Sharma, Kazuhiko Sato, Sangam B. Neupane. 422-429 [doi]
- Searchable encryption scheme with limited search scope for group usersHaiyang Peng, Guishan Dong, Yao Hao, Yue Zhao, Yuxiang Chen. 430-435 [doi]
- A study on exercise recommendation method using Knowledge Graph for computer network courseLei Zhu, Yaolin Liu, Xinhong Hei 0001, Yichuan Wang, Haining Meng, Jiuyuan Jiao, Long Pan. 436-442 [doi]
- A Dummy-Based Privacy Protection Scheme for Location-Based Services under Spatiotemporal CorrelationYiqing Diao, Ayong Ye, Baorong Cheng, Jiaomei Zhang, Qiang Zhang. 443-447 [doi]
- Design of Educational Resources-oriented Fair Recommendation System Based on Consortium BlockchainTingting Zhao, Guo Sun, Xia Feng, Liangmin Wang. 448-453 [doi]
- A Fault Diagnosis Model of Pumping Unit Based on BP Neural NetworkLiumei Zhang, Qiuyuan Du, Tianshi Liu, Jiao Li. 454-458 [doi]
- A PUF-based Scheme for Identify Trusted Mobile Phone AccessoriesLiang Li, Zhao Huang, Yin Chen, Maofan Du, Quan Wang, Jinhui Liu. 459-463 [doi]
- Resilient Data Retrieval in Vehicular Named Data NetworkingZihan Wu, Shunrong Jiang, Liangmin Wang. 464-469 [doi]