Abstract is missing.
- Spectrum Utilization Improvement for Multi-Channel Cognitive Radio Networks with Energy HarvestingWendi Sun, Xiaoying Liu 0001, Kechen Zheng, Yang Xu, Jia Liu. 1-7 [doi]
- Wiretapping or Jamming: On Eavesdropper Attacking Strategy in mmWave Ad Hoc NetworksYuanyu Zhang, Ji He, Qianyue Qu, Zhiwei Zhang. 8-14 [doi]
- Covert Communication in D2D Underlaying Cellular NetworkRanran Sun, Bin Yang 0010, Shenghui Zhao. 15-22 [doi]
- Calibrating Privacy Budgets for Locally Private Graph Neural NetworksWentao Du, Xinyu Ma, Wenxiang Dong, Dong Zhang, Chi Zhang, Qibin Sun. 23-29 [doi]
- Physical Layer Authentication Using MmWave Channel State InformationYangyang Liu, Pinchang Zhang, Xufei Li. 30-33 [doi]
- Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport ProtocolYanwen Liu, Wei Su, Lizhuang Tan. 34-40 [doi]
- Covert Authentication at the Physical LayerXufei Li, Shuiguang Zeng, Yangyang Liu. 41-46 [doi]
- Beam Selection Algorithm for Beamspace HAP-MIMO Systems Based on Statistical CSIShiyi Zou, Lingge Jiang, Pingping Ji, Chen He 0001, Di He, Guorong Zhang. 47-51 [doi]
- Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information TheoryZe Yang, Youliang Tian. 52-58 [doi]
- Energy-efficient UAV Trajectory Planning Based On Flexible Data RateMuhammad Fawad Khan, Limei Peng. 59-62 [doi]
- Covert MIMO Communication in Two-hop Relay SystemsHe Zhu, Huihui Wu, Xiaohong Jiang 0001. 63-68 [doi]
- Buffer-Aided Relay Selection for Wireless Cooperative Relay Networks with Untrusted RelaysCheng Zhang, Xuening Liao, Zhenqiang Wu, Guoyong Qiu. 69-74 [doi]
- Privacy-Preserving Federated Generative Adversarial Network for IoTHui Wang, Yani Han, Shaojing Yang, Anxiao Song, Tao Zhang. 75-80 [doi]
- Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel CharacteristicsMubarak Umar, Xuening Liao, Jiawang Chen. 81-87 [doi]
- Random verifiable multi-server searchable encryption schemeYu He, Youliang Tian, Hua Xu. 88-93 [doi]
- Detecting Http Flooding Attacks Based on Uniform ModelDalia Nashat, S. Khairy. 94-98 [doi]
- Privacy-Preserving Proximity Detection Framework for Location-Based ServicesChen Yang, Zhen Jia, Shundong Li. 99-106 [doi]
- Comparative study of symmetric cryptographic algorithmsAlibek Nurgaliyev, Hua Wang. 107-112 [doi]
- Research on PDCCH Channel in 5G NR SystemTianyi Liang, Huijie Zhu. 113-118 [doi]
- Exact Evaluation of Total Variation Distance in Covert CommunicationsAhmed Salem, Huihui Wu, Xiaohong Jiang 0001. 119-124 [doi]
- Privacy protection scheme for edge computing based on function encryptionYuanhang He, Lei Chen, Yi Ni, Yuyao Wang, Jiangtao Li, Yufeng Li. 131-135 [doi]
- Online Scheduling of Machine Learning Jobs in Edge-Cloud NetworksJingping She, Ne Wang, Ruiting Zhou, Chen Tian 0001. 136-143 [doi]
- Emergency Virtual Machine Online Migration in Cloud Data CentersZhonghua Xie, Tao Tao, Lisheng Ma. 144-149 [doi]
- Energy-saving mechanism based on tidal characteristic in computing power networkRan Pang, Hui Li, Yuefeng Ji, Guangquan Wang, Chang Cao. 150-154 [doi]
- Petri net modeling and vulnerability analysis of the HeartbleedYichuan Wang, He Wang, Xinhong Hei 0001, Wenjiang Ji, Lei Zhu. 155-160 [doi]
- A fine-grained petri model for SQL time-blind injectionGuiling Zhang, Yaling Zhang, Yichuan Wang, Lei Zhu, Wenjiang Ji. 161-167 [doi]
- Dynamic Overhead Queue-based Efficient Service Delivery at Edge for Adaptive Live StreamingZichen Feng, Changqiao Xu, Han Xiao, Yongpu Jia, Zhongyi Ding, Zhaoyang Liu. 168-173 [doi]
- A Modified Vehicular Handover Scheme in Non-standalone 5G Networks With the Assistance of Multi-access Edge ComputingGaofeng Hong, Qili Wen, Wei Su 0006. 174-180 [doi]
- A Game Theory Perspective on IP Routing Protocols EvaluationPin Chen, Naijie Gu. 181-185 [doi]
- Research on Data Security of Unmanned Aerial VehiclesYuxiang Chen, Yao Hao, Kaijun Wu, Zhongqiang Yi, Haiyang Peng, Sijie Liao. 186-193 [doi]
- CD-SR: A Real-time Anomaly Detection Framework for Continuous Concept DriftZhongyi Ding, Shujie Yang, Zhaoyang Liu, Tengchao Ma, Zichen Feng, Ming-Ze Wang. 194-199 [doi]
- On the Applicability of Multi-Characteristics for the Continuous Authentication in IIoT ScenariosGuozhu Zhao, Pinchang Zhang, Lisheng Ma. 200-205 [doi]
- Performance Analysis for Dual-Hop Covert Communication System with Outdated CSIJiaqing Bai, Ji He, Xiaohong Jiang 0001, Lijun Chen. 206-211 [doi]
- The Cooperative Authentication Mechanism and Performance Evaluation for Unmanned SystemsYue Zhao, Yarang Yang, Yiru Niu, Dongyu Yang, Bo Tian, Yao Hao, Kaijun Wu. 212-216 [doi]
- Monitoring System of Carbon Neutralization Forestland in Plateau based on Edge ComputingYanchun Kong, Weibin Su, Gang Xu. 217-221 [doi]
- Review of Research on the Curriculum for Artificial Intelligence and Industrial Automation based on Edge ComputingMingbo Pan, Weibin Su, Yikai Wang. 222-226 [doi]
- Experimental Demonstration of End-to-End Service Orchestration Architecture based on Northbound APIYanxia Tan, Yong Zhang, Yanlei Zheng, Yacheng Liu, Guangquan Wang, Yuefeng Ji. 227-230 [doi]
- Heterogeneous Network Embedding With Enhanced Event Awareness Via Triplet NetworkZhi Qiao, Bo Liu, Bo Tian, Yu Liu. 231-235 [doi]
- A Method for Fast Outlier Detection in High Dimensional Database LogXin Song, Yichuan Wang, Lei Zhu, Wenjiang Ji, Yanning Du, Feixiong Hu. 236-241 [doi]
- Shellshock Bash Vulnerability Modeling Analysis Based on Petri NetLiumei Zhang, Xi Deng, Yichuan Wang. 242-247 [doi]
- Transmission Characteristics of Photonic Crystal Fiber Filled with Magnetic FluidWu Wang, Yuejuan Liu, Shikai Shen. 248-253 [doi]
- Multi-domain Feature Extraction for Human Activity Recognition Using Wearable SensorsAiguo Wang, Yue Meng, Jinjun Liu, Shenghui Zhao, Guilin Chen. 254-259 [doi]
- CLSDRL: A routing optimization method for traffic feature extractionHong Xia, Jianguo Li, Yanping Chen 0009, Ning Lv, Zhongmin Wang, Qingyi Dong. 260-264 [doi]
- A Proposal of Large Scale Network Route Optimization Technique Based on Genetic AlgorithmYusuke Noda, Bishnu Prasad Gautam. 265-271 [doi]
- Fatigue Detection Technology for Online LearningJunjie Lu, Chao Qi. 272-277 [doi]
- Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function SchemesXu an Wang, Yunxuan Su, Jindan Zhang. 278-281 [doi]
- Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese networkSugang Ma, Zixian Zhang, Lei Zhang, Yanping Chen, Xiaobao Yang, Lei Pu, Zhiqiang Hou. 282-287 [doi]
- A Modified K-means User Grouping Design for HAP Massive MIMO SystemsGuorong Zhang, Lingge Jiang, Pingping Ji, Shiyi Zou, Chen He 0001, Di He. 288-292 [doi]
- A New Symmetric Information Hiding Scheme Based on Cover RandomnessFang Ren, Mingyu Yu, Haiyan Xiu, Wei Hou. 293-300 [doi]
- Network Traffic Oriented Malware Detection in IoT (Internet-of-Things)Wangwang Wang, Yunchun Zhang, Chengjie Li, Xuchenming Sun, Yuting Zhong, Xin Zhang. 301-307 [doi]
- An Improved Method of Median Filtering Forensics for Enhanced Image Security DetectionKaijun Wu, Wanli Dong, Yunfei Cao, Xue Wang, Qi Zhao. 308-312 [doi]
- A Recommendation Scheme with Reputation-Based Incentive Mechanism on Consortium BlockchainQingyi Ye, Tingting Zhao, Guo Sun, Xia Feng. 313-318 [doi]
- A survey on security and privacy threats to federated learningJunpeng Zhang, Mengqian Li, Shuiguang Zeng, Bin Xie, Dongmei Zhao. 319-326 [doi]
- NLEU: A Semantic-based Taint Analysis for Vetting Apps in AndroidYuanqing Liu, Ning Xi, Yongbo Zhi. 327-333 [doi]
- Research on A Vulnerability Detection Technology for Network Topology SecurityJianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu. 334-337 [doi]
- Network Intrusion Detection based of Semi-Supervised Ensemble Learning Algorithm for Imbalanced DataZhang Lin. 338-344 [doi]
- TPLI: A Traceable Privacy-preserving Logistics Information Scheme via BlockchainXiaoguo Lin, Pujie Jing, Chuntang Yu, Xia Feng. 345-350 [doi]
- Network application vulnerability detection based on fuzzing technologyChen Chong, Zou Ping. 351-355 [doi]
- An efficient authentication scheme based on Zero Trust for UAV swarmDongyu Yang, Yue Zhao, Kaijun Wu, Xiaoyu Guo, Haiyang Peng. 356-360 [doi]
- Expression Tree-based Policy Conflict Detection AlgorithmXue Wang, Hao Zhang, Kaijun Wu. 361-366 [doi]
- On the Robustness of Complex System With Percolation Theory Under Node AttackXiaoteng Yang, Wenbo Zhang, Bo Liu, Hong Su. 367-372 [doi]
- The Trade-off Between Privacy and Utility in Local Differential PrivacyMengqian Li, Youliang Tian, Junpeng Zhang, Dandan Fan, Dongmei Zhao. 373-378 [doi]
- Access Control Scheme Supporting Attribute Revocation in Cloud ComputingYachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen. 379-384 [doi]
- The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular DistanceRui Li, Zilan Yang. 385-389 [doi]
- Implementation and Analysis of Hybrid DRAM PUFs on FPGAYu Zheng, Zhao Huang, Liang Li, Changjian Xie, Quan Wang, Zili Wu. 390-394 [doi]
- Graph Neural Networks for Privacy-Preserving Recommendation with Secure HardwareSisong Ru, Bingbing Zhang, Yixin Jie, Chi Zhang, Lingbo Wei, Chengjie Gu. 395-400 [doi]
- Exploration of Simulation Teaching Mode for Intelligent Information Network CourseYue He, Hui Li, Yiming Li, Qiang Wu, Yuefeng Ji, Rentao Gu, Shaobin Fan. 401-407 [doi]
- Dyn-GCN: Graph Embedding via Dynamic Evolution and Graph Convolutional Network for Personal RecommendationZhihui Wang, Jianrui Chen, Peijie Wang, Tingting Zhu 0005. 408-413 [doi]
- You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on ScreensZhihao Xu, Kezhang Lin, Zhiwei Zhang, Wangzhe Xu, Kui Liu, Bin Wang, Xinghui Zhu, Jiadong Chen. 414-419 [doi]
- Chinese named entity recognition method for the field of network security based on RoBERTaXiaoyan Zhu 0003, Yu Zhang, Lei Zhu, Xinhong Hei 0001, Yichuan Wang, Feixiong Hu, Yanni Yao. 420-425 [doi]
- Design of Binocular Stereo Vision System Via CNN-based Stereo Matching AlgorithmYan Jiao, Pin-Han Ho. 426-431 [doi]
- Heterogeneous Flow Scheduling using Deep Reinforcement Learning in Partially Observable NFV EnvironmentChun Jen Lin, Yan Luo, Liangmin Wang. 432-436 [doi]
- A Secure Identifier-to-Locator Mapping Mechanism in Smart Identifier NetworkJiahui Sun, Ningchun Liu, Shuai Gao, Wei Su 0006. 437-442 [doi]
- A Fine-tuning-based Adversarial Network for Member Privacy PreservingXiangyi Lu, Qing Ren, Feng Tian 0004. 437-442 [doi]
- Signature Scheme Based on The SM2 Algorithm in FabricYaling Zhang, Hongyun Wang, Yichuan Wang, Wenjiang Ji, Lei Zhu. 443-448 [doi]
- Novel Firewall Application for Mitigating Flooding Attacks on an SDN NetworkYubaraj Gautam, Kazuhiko Sato, Bishnu Prasad Gautam, Norio Shiratori. 449-455 [doi]
- UAV Deployment with Flexible Height Under SINR ConstraintKe Zhao, Limei Peng. 456-460 [doi]
- Cold-start Recommendation Method Based on Homomorphic EncryptionTianci Zhou, Yong Zeng 0002, Yixin Li, Zhongyuan Jiang, Zhihong Liu, Teng Li. 461-465 [doi]
- Joint Task Offloading and Resource Allocation via Proximal Policy Optimization for Mobile Edge Computing NetworkLingling An, Zhuo Wang, Jiahao Yue, Xiaoliang Ma. 466-471 [doi]
- Network Construction Using Overlapping Histogram under Local Differential PrivacyCuicui Niu, Zhengzhi Pan, Wuchao Shi, Hai Liu. 472-479 [doi]
- AttentionAE: Autoencoder for Anomaly Detection in Attributed NetworksKenan Qin, Yihui Zhou, Bo Tian, Rui Wang. 480-484 [doi]
- Construction of MDS Matrices Based on the Primitive Elements of the Finite FieldYou Wu, Xin-feng Dong, Jin-Bo Wang, Wen-zheng Zhang. 485-488 [doi]
- Privacy-Preserving and Efficient Range Counting in IoT NetworksRuiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu. 489-494 [doi]
- A permission generation and configuration method based on Rules and FP-Growth algorithmLei Zhu, Ziheng Zhang, Xinhong Hei 0001, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He. 495-500 [doi]
- Deep Learning for GPS Spoofing Detection in Cellular-Enabled UAV SystemsYongchao Dang, Chafika Benzaïd, Bin Yang, Tarik Taleb. 501-506 [doi]
- Characterizing and Improving the Probability of Correct Phase Ambiguity Resolution for Uniform Circular Array Phase InterferometersM.-Y. You, B.-H. Shi, Y.-X. Ye, K. Huang. 507-512 [doi]
- ConvCatb: An Attention-based CNN-CATBOOST Risk Prediction Model for Driving SafetyXinhong Hei 0001, Hao Zhang, Wenjiang Ji, Yichuan Wang, Lei Zhu, Yuan Qiu 0001. 513-519 [doi]
- A Driving Risk Prediction Approach Based on Generative Adversarial Networks and VANET for Autonomous TramsWenjiang Ji, Jiangcheng Yang, Yichuan Wang, Lei Zhu, Yuan Qiu 0001, Xinhong Hei 0001. 520-526 [doi]
- Wet Aggregate Stability Predicting of Soil in Multiple Land-Uses Based on Support Vector MachineRui-zhi Zhai, De-shun Yin, Jian-Ping Wang, Li-li Yuan, Ziheng Shangguan. 527-531 [doi]