Abstract is missing.
- LFL-COBC: Lightweight Federated Learning On Blockchain-based Device Contribution AllocationQiaoyang Li, Yanan Sun, Ning Xi. 1-7 [doi]
- Enhancing Privacy-Preserving Federated Learning: A Robust and Resilient ApproachZheng Yuan, Youliang Tian, Jinbo Xiong, Linjie Wang. 8-14 [doi]
- Analog Circuit Design of Normalized Bistable Stochastic Resonance Model and Its Application in Weak Signal ProcessingJin Liu, Zan Li 0001, Qiguang Miao, Li Yang, Peihan Qi, Danyang Wang. 15-20 [doi]
- System Security Assessment Method Integrating Risk Relationships of Open Source SoftwareHongbin Zhang, Qingqing Ren, Bin Liu, Dongmei Zhao, Ying Li, Mingyue Qi. 21-27 [doi]
- CAKA: Certificateless Authenticated Key Agreement Scheme for Satellite-assisted Unmanned-aerial-vehicle NetworkJian Mu, Xiaoyu Zhang, Renmin Zhao, Qiong Wang, Pujie Jing, Xia Feng. 28-34 [doi]
- A Service-Oriented Anonymous Authentication Scheme with Partial-Disclosure in C-ITSJunbo Huang, Youliang Tian, Kedi Yang, Linjie Wang. 35-41 [doi]
- A New Secrecy Metric for Relay-Eavesdropper ChannelMeiyun Xie, Xin Liu, Shuangrui Zhao, Yeqiu Xiao, Xiaohong Jiang 0001. 42-47 [doi]
- An HIV/AIDS model with gender differences and awareness differencesJiaqi Li, Ruoxia Yao, Yiping Tan, Jingwei Xuan, Yan Li. 48-53 [doi]
- A Blockchain-Based Dynamic Incentive Model in Mobile Edge ComputingZhiyin Chen, Feng Zhou, Youliang Tiana, Shuai Wanga. 54-59 [doi]
- Average AoI Minimization in UAV-Enabled Covert Communication SystemsYiwen Zhang, Shikai Shen, Bin Yang, Fei Deng, Yumei She, KaiGuo Qian, Riyu Wang, Kai Yang. 60-65 [doi]
- Energy aware and link-Stability Routing Protocol based on Differential Evolution for MANETsAbdelkader Mekkaoui, Omar Smail, Mohammed Rebbah. 66-71 [doi]
- Compiler Differentiation Detection Method for Binary SimilarityXiaoxue Liu, Xinwei Duan, Xinhong Hei 0001, Yichuan Wang, Xin Song. 72-77 [doi]
- A Schizophrenia Screening Method Based on Fine-grained Facial Features and Network Isolation Privacy ProtectionYueyue Zhu, Huiru Wang, Hanjuan Cai, Xin Zhang, Guozhu Zhao, Ying Sun, Leilei Zhu, Huanhuan Zhao. 78-83 [doi]
- Covert and Secure Communications in UAV-Aided Untrusted Relay SystemsKai Yang, Shikai Shen, Bin Yang, Fei Deng, Yumei She, KaiGuo Qian, Yiwen Zhang, Riyu Wang. 84-88 [doi]
- RPKI Sentinel: An Efficient RPKI-based Routing Emergency Control PlatformYuliang Wang, Mingwei Xu, Cuiyun Hua, Jiafu Zhang, Kang Li, Zongpeng Li, Bo Yang. 89-95 [doi]
- Probability analysis of system vulnerability distribution based on the matroid theoryYichuan Wang, Peipei Li, Xin Song, Yeqiu Xiao, Xiaoxue Liu. 96-101 [doi]
- Enabling Service Continuity Support for Low-Latency Services over Mobile Edge with Ubiquitous MobilityGuiliang Cai, Qiang Wu, Wei Su. 102-107 [doi]
- Utilizing Space-Time Coding Metasurface for FMCW Radar Spoofing in RIS-Assisted Communication SystemsKeshuang Han, Huangwenqing Shi, Runqing Wang, Pinchang Zhang. 108-111 [doi]
- Unveiling the Power of Collaboration: Detect DDoS Attacks on Proxies through Moving Target Defense with Multi-Proxy SynergyChangjun Ren, Lin Yan, Shujie Yang, Zan Zhou 0001, Yi Sun. 112-117 [doi]
- Security Enhancement Method for MQTT Based on TEEFangzhe Zhang, Donglan Liu, Fuhui Zhao, Xin Liu, Yingxian Chang, Rui Wang, Hao Zhang, Lili Sun, Shanjie Xu. 118-124 [doi]
- Defending Large Language Models Against Jailbreak Attacks Through Chain of Thought PromptingYanfei Cao, Naijie Gu, Xinyue Shen, Daiyuan Yang, Xingmin Zhang. 125-130 [doi]
- HiDS Data clustering algorithm based on differential privacyShuhui Fang, Xuejun Wan, Jun Wang, Lin Chai, Wenlin Pan, Wu Wang. 131-136 [doi]
- Optimizing Multimodal Federated Learning: Novel Approaches for Efficient Model Aggregation and Client SamplingCheng Wu, Hong Zhong, Guilin Chen, Naji Alhusaini, Shenghui Zhao, Yuchen Zhang. 137-146 [doi]
- Insider Threat Detection: A ReviewPhavithra Manoharan, Jiao Yin 0003, Hua Wang 0002, Yanchun Zhang, Wenjie Ye. 147-153 [doi]
- Defense Against Membership Inference Attacks on Imbalanced Dataset Using Generated DataQiaoling Lu, Feng Tian 0004, Jie Ren, Mengdi Li. 154-159 [doi]
- A Novel GNN-based Decoding Scheme for Sparse Code Multiple Access (SCMA)Zijian Chen, Limei Peng, Pin-Han Ho. 160-165 [doi]
- Trajectory Optimization for UAV-Enabled Covert CommunicationsRiyu Wang, Shikai Shen, Bin Yang, KaiGuo Qian, Fei Deng, Yumei She, Kai Yang, Yiwen Zhang 0001. 166-171 [doi]
- Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofingYuanyu Zhang, Jia-Ning Wang, Zhumeng Zheng, Yulong Shen, Yunsong Jiang, Mengfei Yang. 172-178 [doi]
- A Secure Routing Method by Neural Combination Optimization Decision Algorithm Based on Overlay NetworkKaijun Wu, Bo Tian, Xue Wang. 179-183 [doi]
- A Low-overhead and Real-time Service Recovery Mechanism for Data Center Networks with SDNZiqing Zhang, Jie Ma, Shuoyu Mao, Peng Liang 0014, Qi Liu. 184-189 [doi]
- A Novel Auralization Model for Network Security Situation AssessmentYeqiu Xiao, Yibin Ma, Yichuan Wang, Kun Jiang, Lanlan Cui. 190-195 [doi]
- Sudden Traffic Prediction Based on Gated Recurrent Unit in Low Earth Orbit Satellite NetworksYihua Peng, Wei Su, Jie Ma, Zhuojia Yang, Yuan Yuan, Lisheng Ma, Qi Liu, Peng Liang 0014. 196-201 [doi]
- Research on Malicious Attack Detection and Evaluation Methods based on Entropy Increase AnalysisXin Cao, Yu Han, Liumei Zhang, Yuanjiao Hu. 202-208 [doi]
- The Preservation of Weighted Graphs based on Shuffle differential privacy in Social NetworksYijun Zhang, Jun Yan, Yihui Zhou, Wenli Wang. 209-214 [doi]
- On Mobile Covert Communication in Wireless Networks with a Full-Duplex ReceiverQifeng Miao, Yizhi Cao, Ranran Sun, Ji He, Xiaochen Li, Huihui Wu. 215-221 [doi]
- Covert Communication for UAV-Assisted Wireless Systems with Probabilistic JammingLinying Tian, Chan Gao, Dong Zheng 0001, Qiuxia Zhao, Yu Shi. 222-228 [doi]
- Dynamic Resource Allocation for Differentiated Service Adaptation in FANETZhuojia Yang, Bin Yang, Wei Su, Yudong Ma, Yihua Peng, Qi Liu, Peng Liang 0014. 229-235 [doi]
- Reputation Based Privacy-Preserving in Location-Dependent Crowdsensing for VehiclesHuizhu Yang, Chao Yang, Qihang Wu, Weidong Yang. 236-241 [doi]
- Minimization of Age of Information for Satellite-Terrestrial Covert Communication with a Full-Duplex ReceiverYizhi Cao, Zewei Guo, Qifeng Miao, Ranran Sun, Ji He, Xiaochen Li. 242-246 [doi]
- Privacy-Preserving Physical Layer Authentication Exploiting Carrier Frequency Offset in UAV-aided Communication SystemsHuangwenqing Shi, Mu Niu, Yulin Teng, Pinchang Zhang. 247-251 [doi]
- Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network ModelRuinan Peng, Xinhong Hei 0001, Yichuan Wang, Xiaoxue Liu, Yeqiu Xiao. 252-257 [doi]
- A Service Customize Routing Method Based on Software Defined Network Using Deep Q-NetworkQiutong Zheng, Jie Ma, Qi Liu, Peng Liang. 258-262 [doi]
- CEDA-TQA: Context Enhancement and Domain Adaptation Method for Textbook QA Based on LLM and RAGXiaopu Wang, Jianing Sun, Chao Qi. 263-268 [doi]
- LLM4EduKG: LLM for Automatic Construction of Educational Knowledge GraphJianing Sun, Zhichao Zhang, Xueli He. 269-275 [doi]
- Source Camera Device Identification Combining Sensor Intrinsic Features and TagHui Tian, Haibao Chen, Yuyan Zhao, Pinchang Zhang, Yan Xu, Yangyang Liu. 276-281 [doi]
- A Novel Automatic Horizontal Extension Technology For Multi-instance Microservice SystemRuiqi Zeng, Yuxiang Chen. 282-286 [doi]
- Research on Code Virtualization Methods for Cloud ApplicationsZhoukai Wang, Zuoyan Xu, Yaling Zhang, Xin Song, Yichuan Wang. 287-292 [doi]
- A Novel Multipath Data Transmission Method with Traffic ObfuscationXinhong Hei 0001, Jianfeng Chen, Yichuan Wang, Xin Song, Lei Zhu 0011. 293-298 [doi]
- A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS AttacksZhao Huang, Xin Gao, Xiao Liu, Lu Fan, Junjun Wang, Quan Wang. 299-304 [doi]
- MQTT Third-party Library Porting Method and Application Based on the OpenHarmony Standard SystemYunwang Xu, Jiangong Yang, Dingyang Liang, Huan Chen. 305-310 [doi]
- Route Origin Authorization Emergency Synchronization Based on RPKI Relying Party CacheYuliang Wang, Mingwei Xu, Kang Li, Cuiyun Hua, Jiafu Zhang, Zongpeng Li, Bo Yang. 311-316 [doi]
- Physical Layer Authentication with Cascade Channel Characteristics in IRS-Assisted UAV Communication SystemRunqing Wang, Huangwenqing Shi, Keshuang Han, Pinchang Zhang. 317-320 [doi]
- Smart Contract Vulnerability Detection Based on Prompt-guided ChatGPTJiarun Ma, Shiling Feng, Jiahao Zeng, Jia Lu, Jie Chen. 321-326 [doi]
- Code obfuscation protection strategies for program running statesXin Song, Haonan Wang, Yichuan Wang, Xinhong Hei 0001, Wenjiang Ji. 327-332 [doi]
- Blockchain and Oracle-Driven Web3 Architecture for Data InteractionJian Li, Wei Tong 0003, Lingxiao Yang, Xiangshang Gao, Zesong Dong, Chen Wang. 333-338 [doi]
- Smart Garbage Design Based on Voice RecognitionZhijie Hu, Qing Kou, RuiBing Shen, PeiQiao Yang. 339-344 [doi]
- State Update Control Based on Deep Reinforcement Learning: Balancing AoI-Update CountsChang Wang, Yuan Yuan, Haoru Li, Zijian Wang, Qi Liu. 345-350 [doi]
- PreKGAT: Using Course Prerequisite Relation and Knowledge Graph Attention Network for Course RecommendationLiming Xu, Zhibo Zhao, Dingyang Liang. 351-356 [doi]
- Blockchain-based data security sharing and fair payment scheme in smart citiesYuan Zhou, Yaling Zhang. 357-363 [doi]
- Research on Big Data Analysis of Online Learning Behavior and Predictive of Learning EffectivenessLina Zhang, Xueya Zhang, Xinjie Li, Kangrui Ma. 364-368 [doi]
- MEC-assisted Vertical Handover Based on Improved DQN in Heterogeneous Internet of VehiclesZijian Wang, Yuan Yuan, Chang Wang, Qi Liu, Peng Liang 0014. 369-373 [doi]
- LightGCN-LSC: Lightweight Graph Convolution Network for Learning Style Classification in Online EducationWanying Suo, Bello Ahmad Muhammad, Bo Liu. 374-379 [doi]
- Deep Attention Fusion Network for Attributed Graph ClusteringCongrui Wang, Li Li, Fei Hao. 380-385 [doi]
- Towards Hierarchically Extracting Network TopologiesXiaoli Ma, Guangsen Chen, Haoxuan Zhang, Tao Qin. 386-392 [doi]
- Multi-source KPIs' root cause localization in online service systemsHong Xia, Jing Xu, Bo Xiao, Hui Jia, Cong Gao 0002, Yanping Chen 0006. 393-398 [doi]
- Few-Shot Malware Classification using Malware Variant and Model AugmentationYanni Liu, Ayong Ye, Yuanhuang Liu, Wenting Lu. 399-404 [doi]
- Research on Intelligent Big Data Collaborative Supervision System on Quality and Security PropertiesTianying Chen, Jianfeng Chen, Xiao Li. 405-410 [doi]
- ElNnGA: An Artificial Intelligence Empowered Scheme for Unknown Attack Recognition and Defense Strategy RecommendationJiale Quan, Yu Han, Liumei Zhang, Yuanjiao Hu. 411-417 [doi]
- SiamDTA: Dual-Template Siamese Network Visual Object Tracking Algorithm Based on Attention MechanismZhen Wan, Sugang Ma, Zixian Zhang, Siwei Sun. 418-423 [doi]
- UE-detectable Authentication and Key Agreement Method Resisting Serving Network ForgingJia Cao, Jiayue Zhou, Jianan Hong. 424-430 [doi]
- Hierarchical Policy Learning with Noisy Networks based Multi-round Conversational RecommendationYuyan Zhao, Haibao Chen, Boyu Li, Mengyuan Li, Siqing Tao, Hui Tian. 431-437 [doi]
- Lightweight Federated Learning Secure Aggregation ProtocolsXianyu Mu, Youliang Tian, Zhou Zhou 0005, Jinbo Xiong. 438-443 [doi]
- Segmentation of multi-residential activities based on spatial correlation and FWC-CPDHuifeng Hao, Shenghui Zhao, Guilin Chen, Shu Zhao, Yong Ge. 444-452 [doi]
- AAM-Sinc-MV1D: A Model of Short-term Speaker Recognition Based on The Raw WaveformYong Zhao, Liumei Zhang, Ximeng Liu, Yuanjiao Hu. 453-458 [doi]
- Transmit Power and Flying Location Optimization for Time-Efficient Covert Multicast in UAV-Enabled Wireless Communication SystemsWenhao Zhang, Ji He, Xiaohong Jiang. 459-464 [doi]
- Two-Factor Authentication for IIoT Systems Utilizing Environmental Background FeaturesYu Chen, Guozhu Zhao, Xu Han, Yichen Li, Chun Fang, Chongjie Wang, Yueyue Zhu. 465-471 [doi]
- An Anomaly Detection Model Training Method Based on LLM Knowledge DistillationYang Yang, Bo Tian, Fei Yu, Yuanhang He. 472-477 [doi]
- Divide-and-Conquer Based Traffic Classification: Towards A Cascaded ClassifierYuanjun Liu, Zhihong Liu, Yong Zeng 0002. 478-483 [doi]
- Efficient QoS Data Prediction Based on Tensor Kernel Paradigm-Tensor DecompositionHong Xia, Jing Xu, Qingyi Dong, Hui Jia, Yanping Chen. 484-489 [doi]
- A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private CloudsHan Li, Chuanwei Yang, Baitong Zha, Lifan Liu, Zhiwei Zhang, Shuo Zhong. 490-495 [doi]
- Multimodal Sentiment Analysis Network Based on Distributional Transformation and Gated Cross-Modal FusionYuchen Zhang, Hong Zhong, Guilin Chen, Naji Alhusaini, Shenghui Zhao, Cheng Wu. 496-503 [doi]
- Detecting Phishing URLs with GNN-based Network InferenceChangan Wang, Zhihong Liu, Yong Zeng. 504-509 [doi]
- Review on the Research Progress of Machine Learning in Network CodingNa Liu, Guanghui Shao, Yanbo Yang, Jiawei Zhang, Teng Li. 510-515 [doi]
- Continuous Smartphone User Authentication Based on Gesture-Sensor FusionGuiyuan Tang, Junqi Zhao, Zhijian Xu, Yuzi Wang, Hanzi Yang, Zhiwei Zhang. 516-522 [doi]
- Reducing Redundancy of Data Samples Method Based on Data-Importance AnalysisHuan Chen, Li Li, Yunwang Xu. 523-528 [doi]
- Improving the Accuracy of Anomaly Detection from System Audit Logs via Heterogeneous Provenance GraphsQiangyi Wu, Yiyu Xiang. 529-535 [doi]
- Detecting Source Code Vulnerabilities using High-Precision Code Representation and Bimodal Contrastive LearningJie Wang, Mengru Xu, Hao Chen. 536-541 [doi]
- Testing Object Detection Models For Autonomous Vehicles Against HazardsXiaodong Zhang, Jie Bao, Yulong Shen. 542-548 [doi]