Abstract is missing.
- Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal FeatureYan Xu, Jinxing Ma, Sheng Zhong. 3-18 [doi]
- Trusted Link-Separation Multipath Selection for Software-Defined Wireless Sensor Networks in Adversarial EnvironmentsPu Zhao, Wentao Zhao, Qiang Liu 0004, Anbang Wang. 19-32 [doi]
- Secure Radio Frequency DCS Watermark-Aided Physical Layer Authentication Design for NB-IoT SystemsHongqing Huang, Lin Zhang. 33-49 [doi]
- Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4Yifang Zhi, Li Yang 0005, Gaolei Yang, Yuehong Zhang. 50-64 [doi]
- High-Speed Network Attack Detection Framework Based on Optimized Feature SelectionZhicheng Luo, Weijia Ding, Anmin Fu, Zhiyi Zhang, Linjie Zhang. 65-78 [doi]
- CaaS: Enabling Congestion Control as a Service to Optimize WAN Data TransferJiahua Zhu, Xianliang Jiang, Guang Jin, Penghui Li. 79-90 [doi]
- Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning StructureShuaishuai Zhu, Yiliang Han, Xiaoyuan Yang 0002, Xuguang Wu. 91-99 [doi]
- CSKB: A Cyber Security Knowledge Base Based on Knowledge GraphKun Li, Huachun Zhou, Zhe Tu, Bohao Feng. 100-113 [doi]
- Improvements Based on JWT and RBAC for Spring Security FrameworkGongxuan Zhang, Mingyue Zhang, Xinyi Fan. 114-128 [doi]
- Decentralizing Privacy-Preserving Data Aggregation Scheme Using Blockchain in Smart GridHongbin Fan, Yining Liu 0002, Zhixin Zeng. 131-142 [doi]
- Local Differential Privacy for Data StreamsXianjin Fang, Qingkui Zeng, Gaoming Yang. 143-160 [doi]
- A Personalized Preservation Mechanism Satisfying Local Differential Privacy in Location-Based ServicesDatong Wu, Xiaotong Wu, Jiaquan Gao, Genlin Ji, Xiaolong Xu, Lianyong Qi, Wanchun Dou. 161-175 [doi]
- Location-Aware Privacy Preserving Scheme in SDN-Enabled Fog ComputingBruce Gu, Xiaodong Wang 0017, Youyang Qu, Jiong Jin, Yong Xiang 0001, Longxiang Gao. 176-190 [doi]
- PLFG: A Privacy Attack Method Based on Gradients for Federated LearningFeng Wu. 191-204 [doi]
- A Survey of Game Theoretical Privacy Preservation for Data Sharing and PublishingDatong Wu, Xiaotong Wu, Jiaquan Gao, Genlin Ji, Taotao Wu, Xuyun Zhang, Wanchun Dou. 205-216 [doi]
- Network Anomaly Detection Using Federated Learning and Transfer LearningYing Zhao, Junjun Chen, Qianling Guo, Jian Teng, Di Wu. 219-231 [doi]
- Variational Autoencoder Based Enhanced Behavior Characteristics Classification for Social Robot DetectionXiaolong Deng, Zhengge Dai, Mingdong Sun, Tiejun Lv. 232-248 [doi]
- A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITSYang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma 0001. 249-262 [doi]
- CVNNs-IDS: Complex-Valued Neural Network Based In-Vehicle Intrusion Detection SystemMu Han, Pengzhou Cheng, Shidian Ma. 263-277 [doi]
- Intrusion Detection Scheme for Autonomous Driving VehiclesWeidong Zhai, Zhou Su. 278-291 [doi]
- Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid AlgorithmChenjun Tang, Hai Liang, Yong Ding 0005, Yujue Wang, Shijie Tang. 292-305 [doi]
- Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud ComputingDuo Zhang, Xiaodong Zhang, Sheng Gao, Youliang Tian. 309-321 [doi]
- Rational Delegation of Computation Based on Reputation and Contract Theory in the UC FrameworkXiaoxia Jiang, Youliang Tian. 322-335 [doi]
- A PBFT Consensus Scheme with Reputation Value Voting Based on Dynamic ClusteringShenchen Zhu, Ziyan Zhang, Liquan Chen, Hui Chen, Yanbo Wang. 336-354 [doi]
- Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud StorageShanshan Li, Chunxiang Xu, Yuan Zhang, Xinsheng Wen. 355-368 [doi]
- Revocable Attribute-Based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoTHu Xiong, Jinhao Chen, Minghao Yang, Xin Huang. 369-383 [doi]
- A Multi-data Collaborative Encryption in Concealed Data Aggregation for WSNsLi Ma, Jia Geng, Dongchao Ma, Yingxun Fu, Ailing Xiao. 384-398 [doi]
- Multi-owner Encrypted Ranked Keyword Search Using Machine Learning TechniquesLaila Tul Badar, Chungen Xu, Ali Zakir. 399-412 [doi]
- Detection of Various Speech Forgery Operations Based on Recurrent Neural NetworkDiqun Yan, Tingting Wu. 415-426 [doi]
- Robust, Imperceptible and End-to-End Audio Steganography Based on CNNJie Wang 0028, Rangding Wang, Li Dong 0006, Diqun Yan. 427-442 [doi]
- Adversarial Examples Attack and Countermeasure for Speech Recognition System: A SurveyDonghua Wang, Rangding Wang, Li Dong 0006, Diqun Yan, Xueyuan Zhang, Yongkang Gong. 443-468 [doi]
- Enhancing Adversarial Examples with Flip-Invariance and Brightness-InvarianceWanping Liu, Zhaoping Li. 469-481 [doi]
- MLAB-BiLSTM: Online Web Attack Detection Via Attention-Based Deep Neural NetworksJun Yang, Mengyu Zhou, Baojiang Cui. 482-492 [doi]
- A Moving Target Tracking Algorithm Based on Motion State Estimation and Convolutional Neural NetworkYongMei Zhang, Jianzhe Ma, Qian Guo, Weifeng Lv. 493-517 [doi]
- Detecting Advanced Persistent Threat in Edge Computing via Federated LearningZitong Li, Jiale Chen, Jiale Zhang, Xiang Cheng 0004, Bing Chen. 518-532 [doi]
- Data Computing in Covert DomainZhenxing Qian, Zichi Wang, Xinpeng Zhang. 535-545 [doi]
- Post-processing for Enhancing Audio Steganographic UndetectabilityXueyuan Zhang, Rangding Wang, Li Dong 0006, Diqun Yan. 546-559 [doi]
- Steganalysis of Adaptive Steganography Under the Known Cover ImageJialin Li, Xiangyang Luo, Yi Zhang, Pei Zhang, Chunfang Yang, Fenlin Liu. 560-574 [doi]
- Improving Communication Efficiency for Encrypted Distributed TrainingMinglu Zhang, Qixian Zhou, Shaopeng Liang, Haomiao Yang. 577-590 [doi]
- A PoL Protocol for Spatiotemporal BlockchainYiwenjin Fu, Huahui Chen 0001, Jiangbo Qian, Yihong Dong. 591-605 [doi]
- Deep Learning-Based Reverse Method of Binary ProtocolChenglong Yang, Cai Fu, Yekui Qian, Hong Yao, Guanyun Feng, Lansheng Han. 606-624 [doi]
- Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning StructureShuaishuai Zhu, Yiliang Han. 625-639 [doi]
- AnonyTrust: An Anonymous Trust Authentication System for Pervasive Social NetworkingPu Wang, Limei He, Zheng Yan, Wei Feng. 643-660 [doi]
- Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern AnalysisMeng Shen, Junxian Duan, Ning Shang, Liehuang Zhu. 661-675 [doi]
- User Privacy-Preserving Scheme Based on Anonymous Authentication in Smart GridQichao Lai, Li Xu 0002, Manli Yuan, Feng Wang 0020, He Fang. 676-691 [doi]
- Behavior Prediction and Its Design for Safe Departure Intervals Based on Huang Yan-Pei ThoughtJun Hou, Yutao Song, Qianmu Li, Huaqiu Long, Jian Jiang. 695-710 [doi]
- Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game ApproachYu Wu, Li Pan, Fang Liu. 711-725 [doi]
- De-anonymizing Social Networks with Edge-Neighborhood Graph AttacksHongyan Zhang, Li Xu, Limei Lin, Xiaoding Wang. 726-737 [doi]
- User Grouping Privacy-Preserving Strategy Based on Edge Computing for Mobile CrowdsensingPeng Yang, Yan Zhang, Qiming Wu, Dapeng Wu 0001, Zhidu Li. 738-749 [doi]