Abstract is missing.
- Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature AlgorithmYunru Zhang, Min Luo, Kim-Kwang Raymond Choo, Li Li 0073, Debiao He. 3-19 [doi]
- A Novel Web Anomaly Detection Approach Based on Semantic StructureZishuai Cheng, Baojiang Cui, Junsong Fu. 20-33 [doi]
- A Malicious URL Detection Model Based on Convolutional Neural NetworkZhiqiang Wang 0006, Shuhao Li, Bingyan Wang, Xiaorui Ren, Tao Yang. 34-40 [doi]
- Security-Enhanced Timed-Release Encryption in the Random Oracle ModelKe Yuan, Yahui Wang, Yingming Zeng, Wenlei Ouyang, Zheng Li, Chunfu Jia. 41-51 [doi]
- Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box AttacksXiaowei Peng, Hequn Xian, Qian Lu, Xiuqing Lu. 52-61 [doi]
- An Elastic Data Processing Method Based on Data-Center-PlatformPan Zhang, Fenggang Lai, Jing Du, Zhangchi Ying, Rui Kong, Yi Zhou, Xiao Yu. 62-71 [doi]
- Adaptive Adversarial Attack on Graph Embedding via GANJinyin Chen, Dunjie Zhang, Xiang Lin. 72-84 [doi]
- Research on LDoS Attack Detection and Defense Mechanism in Software Defined NetworksShengxu Xie, Chang-you Xing, Guomin Zhang, Xianglin Wei, Guyu Hu. 85-96 [doi]
- Unsupervised Analysis of Encrypted Video Traffic Based on Levenshtein DistanceLuMing Yang, Yingming Zeng, Shaojing Fu, Yuchuan Luo. 97-108 [doi]
- An Efficient and Revocable Auditing Scheme for the Internet of ThingsJun-Feng Tian, Rui-Fang Guo. 109-119 [doi]
- A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement LearningShuoru Wang, Jiqiang Liu, Tong Chen 0007, He Li, Wenjia Niu, Endong Tong, Long Li, Minglu Song. 120-131 [doi]
- An Efficient Framework for Text Document Security and PrivacyUmair Khadam, Muhammad Munwar Iqbal, Leonardo Mostarda, Farhan Ullah. 132-140 [doi]
- A Real-Time Audio and Video Streaming Transmission Scheme for Social MediaJianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang. 143-152 [doi]
- UAV-Enabled Social Internet of Vehicles: Roles, Security Issues and Use CasesChaogang Tang, Xianglin Wei, Chong Liu, Haifeng Jiang, Huaming Wu, Qing Li 0001. 153-163 [doi]
- An Efficient Influence Maximization Algorithm Based on Social Relationship Priority in Mobile Social NetworksXinxin Zhang, Li Xu 0002, Min Gao. 164-177 [doi]
- Key Nodes Recognition in Opportunistic NetworkZhifei Wang, Gang Xu, Fengqi Wei, Zhihan Qi, Liqiang He. 178-188 [doi]
- A Novel Measure to Quantify the Robustness of Social Network Under the Virus AttacksBo Song, Zhengjun Jing, Y. Jay Guo, Ren Ping Liu, Qian Zhou. 189-200 [doi]
- Effectiveness Analysis of Traditional Chinese Medicine for Anti-Alzheimer's Disease Based on Machine LearningJingwen Lu, Peng Tang, Weidong Qiu, Hao Wang, Jie Guo. 203-214 [doi]
- A Methodology of Fake Cell Test Based on the RRC Redirection or Reselection Priorities from the 5G NetworkYanan Zhang, Chao Ma, Dong Wang, Tianyu Liu, Zhi Wu. 215-223 [doi]
- Keeping Privacy Data Secure Under Factory RecoveryLianfang Wang, Ye Wang, Gang Zhao, Lu Liu, Xiaohui Kuang. 224-233 [doi]
- An Intelligent File Transfer Optimization for Poor Network ConditionsMing Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang. 234-244 [doi]
- A VirtualXposed-Based Inline Hooking Framework for Android Native MethodsShuo Feng, Yu-an Tan, Gang Zhao, Xiaohui Kuang, Xiao Yu, Juan Wang. 245-253 [doi]
- An Android Data Protection Scheme for System-as-Root ArchitecturesKai Yang, Ling Pang, Bo Zhang, Gang Zhao, Xiaohui Kuang. 254-262 [doi]
- A Two-Fitness Resource Scheduling Strategy Based on Improved Particle Swarm OptimizationXueming Qiao, Meng Chen, Xiangkun Zhang, Weiyi Zhu, Yanhong Liu, Zhixin Huo, Ruiqi Sun, Dongjie Zhu. 263-277 [doi]
- Privacy-Preserving Nonlinear SVM Classifier Training Based on BlockchainNan Jia, Shaojing Fu, Ming Xu 0002. 278-288 [doi]
- A Novel Defending Scheme for Graph-Based Classification Against Graph Structure Manipulating AttackQuanyu Zhao, Fengqian Zhang, Yuan Zhang. 289-302 [doi]
- Privacy-Preserving Graph Operations for Social Network AnalysisPeng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu. 303-317 [doi]
- The Movie Recommendation System Based on Differential PrivacyMin Li, Yingming Zeng, Yue Guo, Yun Guo. 318-328 [doi]
- Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links StrategiesHao Peng, Can Liu, Dandan Zhao, Zhao-Long Hu, Jianmin Han, Jianfeng Lu 0002. 329-339 [doi]
- Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence ExtensionsYifei He, Jiqiang Liu, Endong Tong, Wenjia Niu, Xinyu Huang 0006, Ying Zhou, Chenyang Li, Liang Chang 0003. 340-354 [doi]
- Automatic Counting of Railway Tools Based on Deep LearningWei Wei, Jin Yang, Sikai Wang, Deng Chen, Yanduo Zhang, Zihang Zhang, Wei Liu, Gonghao Duan, Chaohui Zheng, Jianping Ju, Jianyin Tang. 355-368 [doi]
- Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of LinksHao Peng, Zhe Kan, Dandan Zhao, Jianmin Han, Zhaolong Hu. 369-378 [doi]
- Automatic Classification Analysis of Tibetan Folk Music Based on Adaboost AlgorithmYing Ma, Kaiyong Li, Jiayu Hou. 379-386 [doi]
- On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social SystemsJing Wang, Hongjie Zhang 0006, Lishong Shao, Li Li, Min Luo. 387-394 [doi]
- Advertising Strategy for Maximizing Profit Using CrowdSensing Trajectory DataKaihao Lou, Shuqiu Li, Funing Yang, Xingliang Zhang. 395-406 [doi]
- A Method for Community Partition Based on Information GranularityTianchu Hang, Yang Bai, Guishi Deng. 407-419 [doi]
- Forward Calculation for Improving the Sensitivity of Multiple Perturbations in Magnetic Induction Tomography Based on Brain Tissue StructureYi Lv. 420-432 [doi]
- Pair-Wise Convolution Network with Transformers for Sequential RecommendationJiangpeng Shi, Xiaochun Cheng, Jianfeng Wang. 433-445 [doi]