Abstract is missing.
- Requirements and Potential Key Technologies of Security for 6G Mobile NetworkHaitao Du, Shen He, Li Su, Jie Bai, Ru Yan. 1-6 [doi]
- A Review of Authentication Methods in Internet of DronesYuyang Huang, Jian Mu, Yuzhen Wang, Renmin Zhao. 7-12 [doi]
- Data Security Storage Scheme For UAV Cluster Based On Distributed StorageKaijun Wu, Bo Tian, Xue Wang. 13-17 [doi]
- PHY-Layer Authentication with Hardware Impairments in UAV-Aided Communication SystemsYulin Teng, Pinchang Zhang, Yangyang Liu, Xin Liu. 18-22 [doi]
- A Risk Path Detection Based Trusted Delivery Mechanism in Integrated Satellite and Terrestrial InternetJun Liu, Tianyu Zhang, Hewu Li, Qian Wu, Shaowen Zheng, Lu Lu. 23-27 [doi]
- Learning Based Preamble Collision Detection of Cellular Random Access by Physical Layer FeaturesYi Yin, Dongmei Zhao, Xufei Li, Shuiguang Zeng. 28-33 [doi]
- A Survey of Trust Assessment Technology Research for Edge ComputingLei Chen, Fei Yu, Siyuan Ni, Yuyao Wang, Yuanhang He. 34-39 [doi]
- Hybrid Resource Sharing Solution in Virtual Wireless NetworksBoyou Yi, Baoquan Ren, Jie Zhan. 40-45 [doi]
- A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag DataHan Li, Zhiwei Zhang, Hao Duan, Yi He, Ning Xi 0002. 46-51 [doi]
- LMIPv6ATK:A Labeled Dataset Containing Multiple ICMPV6-DDOS AttacksSiyuan Li, Liumei Zhang, Yu Han. 52-57 [doi]
- On UAV-IRS-Aided Covert Communication of D2D-Enabled Cellular NetworksSibo Wang 0011, Bin Yang 0010, Wu Wang, Shikai Shen, Xiaohong Jiang 0001. 58-63 [doi]
- A Novel Detector Based on Adaptive Bistable Stochastic Resonance for Spectrum Sensing at Low Signal-to-Noise RatioJin Liu, Zan Li, Qiguang Miao, Li Yang. 64-71 [doi]
- Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service AttacksTong Zhang, Wei Wei, Yichuan Wang, Xi Deng, Lei Zhu 0011, Wenjiang Ji. 72-77 [doi]
- Evolutionary Equilibrium of Mining Pools Under DDoS Attack in Blockchain SystemXiao Liu, Zhao Huang, Quan Wang 0006. 78-83 [doi]
- A Robust and Scalable One-PUF-to-Many Authentication and Key Agreement Scheme for Mobile Communication NetworkYiteng Wang, Zhe Ren, Wei Wang. 84-91 [doi]
- A Game Theory-Based Strategy for Allocating and Offloading Computing Resources in 5G NetworksYuan Yuan 0001, Wei Su. 92-97 [doi]
- Research on Privacy Preserving Computing Technology in Edge ComputingYuyao Wang, Lei Chen, Siyuan Ni, Fei Yu, Yuanhang He, Qiang Fang, Yuzheng Zhou. 98-103 [doi]
- Block Transmission Scheduling Strategy Based on Deadline PriorityLei Huang, Huiling Shi, Wei Zhang, Kun Yu. 104-109 [doi]
- Research on Safe-Content Distribution Technology in VANETsJinyu Fan, Jiayi Li, Chunjiao Li, Yuheng Du, Yahan Lyu. 110-115 [doi]
- A Survey of Edge Computing Resource Allocation Strategies Based on Federated LearningSiyuan Ni, Yuanhang He, Lei Chen, Yuyao Wang, Fei Yu. 116-121 [doi]
- Jamming with Zero-Forcing Beamforming for Covert Communication in MIMO SystemsHe Zhu, Huihui Wu, Xiaohong Jiang 0001. 122-126 [doi]
- Covert Terahertz Communication for UAV-Aided Wireless Relay SystemsXinzhe Pi, Bin Yang 0010, Xiaohong Jiang 0001. 127-132 [doi]
- Joint Deployment of LAU and HAU for Hierarchical Space-Air-Ground CommunicationsJiang Mo, Ke Zhao, Limei Peng. 133-137 [doi]
- Joint Covert and Secure Communications for Intelligent Reflecting Surface (IRS)-Aided Wireless NetworksYihuai Yang, Shikai Shen, Yumei She, Wu Wang, Bin Yang 0010, Yangshui Gao. 138-142 [doi]
- E-PBFT: An Improved Consensus Mechanism Based on PBFTWeigang Ma, Yichuan Wang, Dengfang Hu, Zhoukai Wang. 143-149 [doi]
- Enhancing Robustness Against Heterogeneity via Class-Difficulty Based WeightsTeng Liu, Menghan Shang, Haoshuo Li, Tao Zhang. 150-155 [doi]
- Research on Lightweight Human Pose Estimation Model Based on Knowledge DistillationGuoyi Cao, Wanghao Mo, Zhaozhen Wu, Yaqi Shen. 156-162 [doi]
- A Survey on Automatic Discover Approach by Using Static Analysis for Smart Contract VulnerabilityYifan Deng, Liangmin Wang, Liang Wang, Jiayi Li, Quan-yong. 163-168 [doi]
- A Novel On-Demand Service Architecture for Efficient Cloud-Edge CollaborationYaling Zhang, Jingjing Chen, Yichuan Wang, Yeqiu Xiao, Xiaoxue Liu. 169-174 [doi]
- Trajectory and Offloading Policy Optimization in Age-of-Information-Aware UAV-Assisted MEC SystemsYulu Yang, Jingce Yang, Han Xu, Jing Hu 0002, Tiecheng Song. 175-180 [doi]
- A Study on a Reduced Indicator System for the Network Security Situational Assessment ModelHongbin Zhang, Yikang Bai, Dongmei Zhao, Bin Liu, Ying Xu. 181-186 [doi]
- A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKsYichuan Wang, Jianhuan Tie, Xinhong Hei 0001, Li Zhao, Xiaohui Zhang. 187-192 [doi]
- Privacy-Preserving Multi-User Joint Data Logistic Regression Inference SchemeYubao Zhang, Lin Tang, Lixuan Che, Chaozhang Liu, Entang Li, Hongwei Xing, Jianhui Zhang, Guandong Di. 193-201 [doi]
- A Survey on Cross-Chain Asset Transfer Schemes: Classification, Challenges, and ProspectsLu Lin, Jiayi Li, Yuzhen Wang, Qiong Wang. 202-208 [doi]
- ST-MobileNetV3: A Lightweight Network Model for Strawberry Disease IdentificationJianping Wang 0004, Zhiyu Li, Guohong Gao, Yingying Lv, Yuxin Ma, Guanglan Chen. 209-214 [doi]
- A Decentralized Quality Management Scheme for Content ModerationYanhua Niu, Shuai Gao, Hongke Zhang, Yuanjia Gong. 215-220 [doi]
- Failure-Aware Service Request Protection in LEO Satellite Constellation NetworksXin Guo, Jiandong Wang, Zhiwei Zhang, Lisheng Ma. 221-225 [doi]
- SRv6-based In-band Network Telemetry: Architecture and StrategyKun Yu, Su-Ruo Li. 226-230 [doi]
- Research on Secure Data Circulation and Sharing Protection Technology Framework for Power Monitoring SystemWeicong Huang, Jieying Zhou, Minghui Jin, Zheng Han, Sijia Wei. 231-238 [doi]
- enDRTS: Deep Reinforcement Learning Based Deterministic Scheduling for Chain Flows in TSNDong Yang 0001, Kai Gong, Weiting Zhang, Kuo Guo, Jia Chen. 239-244 [doi]
- A Rapid Configuration Mechanism Based on Load Measurement for NETCONF in SDN NetworksLingui Ma, Fan Yang, Tingting Chen. 245-250 [doi]
- A Time Slot Averaging Algorithm for Delay Sensitive Service of Small Particle Time in Slicing Packet NetworksChangduo Wu, Fan Yang, Ting Zheng. 251-255 [doi]
- Spatial-Temporal Correlation-Based Prediction Model for Node and Link Residual Resources in NFV NetworksJiahong Lai, Fan Yang, Chaoran Ying, Wenchao Song. 256-261 [doi]
- GraphMal: A Network Malicious Traffic Identification Method Based on Graph Neural NetworkLei Zhang, Huiling Shi, Kuichao Zhang, Hongyang Sun 0002, Wei Zhang 0049. 262-267 [doi]
- An ASN.1 UPER Encoding Based Fuzzing Method for Radio Resource Control ProtocolRui Wang, Donglan Liu, Xin Liu, Lei Ma, Hao Zhang, Yong Wang, Zhenghao Li, Fangzhe Zhang, Lili Sun. 268-273 [doi]
- On the Topology Scaling of Interplanetary NetworksXiaojian Tian, Zuqing Zhu. 274-280 [doi]
- Deep Reinforcement Learning-Based Task Offloading Over In-Network Computing and Multi-Access Edge ComputingZhao Ming, Qize Guo, Hao Yu, Tarik Taleb. 281-286 [doi]
- A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoVWeigang Ma, Yaping Yu, Yichuan Wang, Xiaoxue Liu, Zhoukai Wang. 287-292 [doi]
- EDF: Enhanced Deep Fingerprinting attacks on WebsitesJipeng Cui, Zhongyuan Jiang. 293-299 [doi]
- Security Risk Assessment of Image Classification Model Based on ANP-TOPSISZhiheng Zhang, Zeyu Liu, Li Yang, Tingbo Zhe, Jian Wu. 300-306 [doi]
- Research on Activation Functions in Machine Learning Based Network CodingXin Zhang, Yanbo Yang, Baoshan Li, Minchao Li, Teng Li 0003, Jiawei Zhang 0011. 307-312 [doi]
- A Digital Twin Framework for Logical RangeZheng Dang, Hao Chen 0019, Xinhong Hei 0001, Yilong Liu. 313-317 [doi]
- Covert Communication-Assisted Computation Offloading Schemes in Blockchain-Enabled IoTYutong Wang, Yu'e Jiang, Yu Feng. 318-323 [doi]
- A Dimensional Perspective Analysis on the Cybersecurity Risks and Opportunities of ChatGPT-Like Information SystemsChunhui Hu, Jianfeng Chen. 324-331 [doi]
- Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoTYang Li, Qingyang Zhang, Jun Cheng, Yiyuan Zhou, Jie Cui 0004, Hong Zhong 0001. 332-338 [doi]
- Product Retrieval Based on Subtractive Angular Margin LossWei Wei, Feng Zang, Liben Huang, Mingxiao Bai. 339-343 [doi]
- Efficient Fine-Grained Forward Secure Encryption Scheme Based on Attributes in Mobile HealthcareLifeng Guo, Mengfei Jia, Zhuoheng Xu, Xialei Zhang. 344-349 [doi]
- Research on Cross-Chain Consensus Models in Complex Trust EnvironmentsChaozhang Liu, Lin Tang, Lixuan Che, Yubao Zhang, Hongwei Xing, Jianhui Zhang, Entang Li, Xiangyang Li. 350-358 [doi]
- New Traceable and Revocable Attribute Based Encryption on LatticesLifeng Guo, Lingxia Wang, Xueke Ma, Xialei Zhang. 359-364 [doi]
- An Efficient and Scalable Consensus for Main Blockchain in the Multi-Chain NetworkXinlu Zhuang, Zeyu Xiao, Haoping Qin, Yunjie Ge. 365-371 [doi]
- UAV Camera Re-localization Based on Image RetrievalFeng Zang, Liben Huang, Wei Wei, Weiqi Shen. 372-377 [doi]
- Taxi Station Location Model Based on Spatio-Temporal Demand CubeLulu Gao, Xiaonan Li, Zhicheng Wei. 378-383 [doi]
- A Delay Guarantee Mechanism Based on Active and Passive Measurement in SDN NetworksQiong Di, Chaoran Ying, Fan Yang, Qing Yu, Yaxin Ren. 384-389 [doi]
- A Local Differential Privacy Based Method to Preserve Link Privacy in Mobile Social NetworkJun Yan, Yi Tian, Wenli Wang, Yijun Zhang, Yihui Zhou, Laifeng Lu. 390-396 [doi]
- Scaling Blockchain via a Lightweight Tree-based Sharding SystemZhenyu Guan, Yang Zhang, Shizhong Li, Ruonan Chen, Dawei Li. 397-403 [doi]
- Distributed Storage Method for Data Security Sharing and ExchangeXiaolong Chen, Yue Zhao, Qi Zhao. 404-409 [doi]
- Cloud Data Deduplication Scheme Based on BlockchainPengliang Shi, Dongning Hao. 410-415 [doi]
- A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual FeaturesFangwei Wang, Man Yan, Qingru Li, Changguang Wang. 416-421 [doi]
- Joint Distribution Analysis of Multi-Dimensional Randomized ResponseWenli Wang, Yijun Zhang, Jun Yan, Yihui Zhou, Laifeng Lu. 422-427 [doi]
- Online Tobacco Width Detection Based on Skeleton Detection AlgorithmHuayuan Jiang, Xin Xie, Jianan Fan, Shicong Hou, Huan Chen. 428-433 [doi]
- STGAT: A Spatio-Temporal Graph Attention Network for Travel Demand PredictionTaoyi Zhang, Yubo Wang, Zhicheng Wei. 434-439 [doi]
- Classification of Hash Functions Based on Anti-Attack AbilityYu Wang, Naijie Gu. 440-446 [doi]
- GNN-Based Data Rate Maximization in Double Intelligent Reflecting Surface (IRS)-Aided Communication SystemKaixin Li, Limei Peng, Pin-Han Ho. 447-452 [doi]
- Cost-Sensitive Cold Start Latency Optimization Mechanism in Function-as-a-ServiceRuiyan Liu, Tengchao Ma, Yiting Huang, Qingzhao An, Lin Yan, Jiangyuan Li. 453-458 [doi]
- DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined NetworksWenjiang Ji, Yixin Yang, Yaling Zhang, Yichuan Wang, Mengjie Tian, Yuan Qiu 0001. 459-464 [doi]
- ML-Based Detection Approaches for Covert Communication with Multi-D Signal FeaturesJi He, Xiaodan Zhang, Baoquan Ren, Hongjun Li, Tianzhu Hu, Xiangwu Gong, Xudong Zhong. 465-470 [doi]
- Privacy Enhanced Federated Learning via Privacy Masks and Additive Homomorphic EncryptionCong Shen, Wei Zhang 0013. 471-478 [doi]
- The Differential Privacy Framework for Convolutional Neural Network using PATE, ADLM and SGD modelsSuwan Tang, Wu Wang. 479-483 [doi]
- A Text Classification Method of Network Public Opinion Based on Information FusionLei Zhu, Miaoqing Wen, Tong Zhang, Yichuan Wang, Jing Wang, Mingsong Yang, Bing Ma. 484-489 [doi]
- PPKD: Privacy-preserving Knowledge Distillation for Large ModelMengfan Xu, Jin Li, Yingying Liu. 490-496 [doi]
- Topological Loss on Graph Auto-EncodersJie Gao, Zhihong Liu, Yong Zeng 0002. 497-501 [doi]
- Hierarchical Clustering Combination Method Using Intuitionistic Fuzzy Similarity in Software Module ClusteringHong Xia, Bo Wang, Yongkang Zhang, Yanping Chen 0006. 502-507 [doi]
- Leverage Generative Adversarial Network for Enhancing Fairness and UtilityQiuling Chen, Ayong Ye, Fengyu Wu, Huang Zhang. 508-513 [doi]
- DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-VehiclesZiwen Wang, Baihe Ma, Zhihong Liu, Yong Zeng 0002, Zhe Wang, Kaichao Shi. 514-519 [doi]
- Defense Against Adversarial Attacks via Adversarial Noise Denoising Networks in Image RecognitionChengxuan Li, Zhou Yang, Yang Xiao, Haozhao Liu, Yuning Zhang, Qingqi Pei. 520-526 [doi]
- Improving Bipartite Networks Embedding with Partially Available Vertex ContentShuang Yang, Li Li. 527-531 [doi]
- UD-YOLOv5s: Recognition of Cattle Regurgitation Behavior Based on Upper and Lower Jaw Skeleton Feature ExtractionGuohong Gao, Chengchao Wang, Jianping Wang 0004, Yingying Lv. 532-538 [doi]
- A Comparison of Finetune and Meta Learning Methods for Few-Shot Object Detection in Sonar ImagesWei Wei, Feng Zang, Liben Huang, Wei Xue. 539-544 [doi]
- A Light-Weighted Machine Learning Based ECU Identification for Automotive CAN SecurityJini Li, Man Zhang, Yu Lai. 545-550 [doi]
- Radiofrequency Fingerprint Feature Extraction and Recognition Using a Coordinate Attention-Guided Deep Residual Shrinkage NetworkYinglin Wang, Chunjie Cao, Yifan Li, Qianlin Dong, Haoran Li, Jingzhang Sun. 551-557 [doi]
- Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram GenerationHikofumi Suzuki, Akiyoshi Iwasa, Takumi Uchiyama, Katsumi Wasaki. 558-567 [doi]
- A Deep Model Intellectual Property Protection Method Supporting Public VerificationYumeng Shen, Feng Tian 0004, Qiaoling Lu, Kemeng Cui. 568-573 [doi]
- Resisting Membership Inference Attacks by Dynamically Adjusting Loss TargetsXihua Ma, Youliang Tian, Zehua Ding. 574-579 [doi]
- A Detection Method for Alzheimer's Disease Based on Long-Term Visual FeaturesMeng Huang, Shenghui Zhao, Kaichuan Sun, Yuyan Zhao. 580-587 [doi]
- FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret SharingXianyu Mu, Youliang Tian, Jinbo Xiong, Shuai Wang, Boxiang Gong. 588-594 [doi]
- B-Pet: The PET Model with Parameter-Efficient LearningQi Zheng, Haizheng Yu. 595-600 [doi]
- OP Mask R-CNN: An Advanced Mask R-CNN Network for Cattle Individual Recognition on Large FarmsJianping Wang 0004, Xueyan Zhang, Guohong Gao, Yingying Lv. 601-606 [doi]
- Least Co-Residence: A Novel Virtual Migration Algorithm for Mitigating Side-Channel AttacksWei Dong, Zan Zhou 0001, Shujie Yang, Yibo Lian, Hongjing Li, Changqiao Xu. 607-612 [doi]
- GAN-Based Covert Communications Against an Adversary with Uncertain Detection Threshold in Federated Learning NetworksYu Feng, Yu'e Jiang, Yutong Wang. 613-618 [doi]
- Real-Time Semantic Segmentation Algorithm Based on Tversky Loss Function and Mixed PoolingPeng Xu, Ziyi Zhao, Sugang Ma. 619-624 [doi]
- Privacy-preserving Federated Learning Against Byzantine Attack via Top-k IndexesMenghan Shang, Ze Tong, Teng Liu, Tao Zhang 0029. 625-630 [doi]
- Correction Algorithm of Multi-Person Pose Estimation Based on Improved YOLOv5Jinyuan Zhao, Di Jia, Qian Wang. 631-636 [doi]
- Locally Differential Private Federated Learning with Controllable Perturbation DomainsYuhua Wang, Jianming Zhu. 637-644 [doi]
- Joint Location and Power Optimization for Secure Communications in Multi-UAVs Enabled Cellular NetworksFei Deng, KaiGuo Qian, Shikai Shen, Sunyan Hong, Bin Yang 0010, XuanXuan Li, Jun He. 645-648 [doi]
- An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETsChangbing Bi, Youliang Tian, Ta Li, Shihong Wu, Hua Zhou. 649-654 [doi]
- A Deep Reinforcement Learning Approach for Online Taxi DispatchingYubo Wang, Taoyi Zhang, Zhicheng Wei. 655-660 [doi]
- Covert Communication in the D2D-Enabled Cellular Network with Multiple Non-Colluding WardensJingsen Jiao, Huihui Wu, Ranran Sun, Qifeng Miao, Yizhi Cao. 661-666 [doi]
- Research on NAS-Oriented Blockchain Aggregation Consensus AlgorithmLin Tang, Yubao Zhang, Lixuan Che, Chaozhang Liu, Hongwei Xing, Jianhui Zhang, Entang Li, ChongHao Xu. 667-673 [doi]
- A Novel Construction Technology of Microservice Multi-Instance System Automatic Deployment and UpgradeRuiqi Zeng, Yiru Niu, Lanfei Qiao. 674-679 [doi]
- A Novel Configurable RO-Obfuscated PUF Design with Machine Learning ImmunityLu Fan, Zhao Huang, Junjun Wang, Lirong Zhou, Yi'an Zhu, Quan Wang 0006. 680-685 [doi]
- Web Service Category Recommendation with Feature Word Semantic Enhancement and tag Co-occurrenceGuoqing Pan, Yuan Chang, Haoquan Qi, Qiang Hu. 686-689 [doi]
- Challenges of Livecast Computing Network: A Contemporary SurveyQimiao Zeng, Yirong Zhuang, Jinxia Hai, Qing Pan, Zhifan Yin, Qi Chen, Jie Liang. 690-697 [doi]
- The Design Method of Micro-Unit Cryptographic Service FrameworkQi Zhao, Bo Tian, Yiming Liu. 698-704 [doi]
- Physical-Sensing Inconsistency Vulnerability Mitigation for Multi-UAV CrowdsensingYujuan Cao, Zhao Liu, Wuhe Axi, DaWei Wei, Ning Xi 0002. 705-710 [doi]
- Performance Evaluation for Grant-Free NOMA System Using Hybrid SCMA-OFDMZijian Chen, Limei Peng. 711-715 [doi]