Abstract is missing.
- Cross-Domain Recommendation System Based on Tensor Decomposition for Cybersecurity Data AnalyticsYuan Wang, Jinzhi Wang, Jianhong Gao, Shengsheng Hu, Huacheng Sun, Yongli Wang. 3-19 [doi]
- Density Peak Clustering Algorithm Based on Differential Privacy PreservingYun Chen, Yunlan Du, Xiaomei Cao. 20-32 [doi]
- An Automated Online Spam Detector Based on Deep Cascade ForestKangyang Chen, Xinyi Zou, Xingguo Chen, Huihui Wang. 33-46 [doi]
- Multiplex PageRank in Multilayer Networks Considering ShuntXiao Tu, Guo-Ping Jiang, Yurong Song. 47-58 [doi]
- LogGAN: A Sequence-Based Generative Adversarial Network for Anomaly Detection Based on System LogsBin Xia 0003, Junjie Yin, Jian Xu 0009, Yun Li 0009. 61-76 [doi]
- Security Comparison of Machine Learning Models Facing Different Attack TargetsZhaofeng Liu, Zhen Jia, Wenlian Lu. 77-91 [doi]
- Adversarial Training Based Feature SelectionBinghui Liu, KeJi Han, Jie Hang, Yun Li 0009. 92-105 [doi]
- Application of DeepWalk Based on Hyperbolic Coordinates on Unsupervised ClusteringShikang Yu, Yang Wu, Yurong Song, Guoping Jiang, Xiaoping Su. 106-118 [doi]
- HoneyGadget: A Deception Based ROP Detection SchemeXin Huang, Fei Yan, Liqiang Zhang, Kai Wang. 121-135 [doi]
- LET-Attack: Latent Encodings of Normal-Data Manifold Transferring to Adversarial ExamplesJie Zhang, Zhihao Zhang. 136-150 [doi]
- New Robustness Measures of Communication Networks Against Virus AttacksYinwei Li, Bo Song, Xu Zhang, Guo-Ping Jiang, Yurong Song. 151-162 [doi]
- Application and Performance Analysis of Data Preprocessing for Intrusion Detection SystemShuai Jiang, Xiaolong Xu. 163-177 [doi]
- Anonymous IoT Data Storage and Transaction Protocol Based on Blockchain and Edge ComputingZhi Qiao, Congcong Zhu, Zhiwei Wang, Nianhua Yang. 181-189 [doi]
- Incentive Mechanism for Bitcoin Mining Pool Based on Stackelberg GameGang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu. 190-198 [doi]
- Automated Ransomware Behavior Analysis: Pattern Extraction and Early DetectionQian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges. 199-214 [doi]
- Behavior Flow Graph Construction from System Logs for Anomaly AnalysisHang Ling, Jing Han, Jiayi Pang, Jianwei Liu, Jia Xu, Zheng Liu. 215-223 [doi]
- Knowledge Graph Based Semi-automatic Code Auditing SystemYin Hongji, Chen Wei. 224-231 [doi]
- Effective Matrix Factorization for Recommendation with Local Differential PrivacyHao Zhou, Geng Yang, Yahong Xu, Weiya Wang. 235-249 [doi]
- Fully Anonymous Blockchain Constructed Based on Aggregate Signature and Ring SignatureTianfu Chen, Zhenghua Qi, Jiagen Cheng. 250-261 [doi]
- FDIA-Identified Overloaded Power LinesDatian Peng, Jianmin Dong, Qinke Peng, Bo Zeng, Zhi-Hong Mao. 262-277 [doi]
- Optimal Key-Tree for RFID Authentication Protocols with Storage ConstraintsShao-hui Wang, Yan-Xuan Zhang, Changbo Ke, Fu Xiao, Ruchuan Wang. 278-292 [doi]
- Towards Realizing Authorized Encrypted Search with Designed Access PolicyLin Mei, Chungen Xu, Lei Xu 0019, Zhongyi Liu, Xiaoling Yu, Zhigang Yao. 293-307 [doi]
- Forward Private Searchable Encryption with Conjunctive Keywords QueryZhigang Yao, Chungen Xu, Lei Xu 0019, Lin Mei. 308-322 [doi]
- PAFR: Privacy-Aware Friends Retrieval over Online Social NetworksYuxi Li, Fucai Zhou, Zifeng Xu. 323-338 [doi]
- An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid DevicesZhiwei Wang, Zhiyuan Cheng 0006, Nianhua Yang. 339-353 [doi]
- Implicit-Key Attack on the RSA CryptosystemMengce Zheng, Honggang Hu. 354-362 [doi]
- High-Efficiency Triangle Counting on the GPUYang Wu, Shikang Yu, Yurong Song, Guoping Jiang, Xiao Tu. 363-370 [doi]
- A New Pairing-Free Certificateless Signature Scheme for Internet of ThingsZhenchao Zhang, Yali Liu, Xinchun Yin, Xincheng Li. 371-379 [doi]