Abstract is missing.
- Detection for Pulmonary Nodules using RGB Channel Superposition Method in Deep Learning FrameworkYishuang Meng, Ping Yi, Xuejun Guo, Wen Gu, Xin Liu, Wei Wang, Ting Zhu. 1-8 [doi]
- VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix MultiplicationLiang Hui, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Hongyuan Chen, Yunong Liang. 1-8 [doi]
- A Group based Dynamic Mix Zone Scheme for Location Privacy Preservation in VANETsQingyuan Li, Hao Wu, Lei Liu, Bin Pan, Lan Dong. 1-5 [doi]
- Detection of DGA Domains Based on Support Vector MachineYu Chen, Sheng Yan, Tianyu Pang, Rui Chen. 1-4 [doi]
- PU Learning in Payload-based Web Anomaly DetectionYuxuan Luo, Shaoyin Cheng, Chong Liu, Fan Jiang. 1-5 [doi]
- A Case Study for Practical Issues of DCT Based Bitmap Selective Encryption MethodsHan Qiu 0001, Nathalie Enfrin, GĂ©rard Memmi. 1-7 [doi]
- Total Eclipse: How To Completely Isolate a Bitcoin PeerAdja Elloh Yves-Christian, Badis Hammi, Ahmed Serhrouchni, Houda Labiod. 1-7 [doi]
- Energy-Aware Distribution of Data Fragments in Unattended Wireless Sensor NetworksHong-Beom Choi, Young-Bae Ko, Keun Woo Lim. 1-8 [doi]
- VTET: A Virtual Industrial Control System Testbed for Cyber Security ResearchYaobin Xie, Wei Wang, Faren Wang, Rui Chang. 1-7 [doi]
- Research and Applications of the Key Technology of Intelligent Operation and Maintenance System Architecture for Transmission Power CablesChenbin Wu, Yunjie Zhou, Xiaojuan Jiang, Yinbai Xu, Xiaodi Wang, He He. 1-5 [doi]
- An adaptive authentication and authorization scheme for IoT's gateways: a blockchain based approachAchraf Fayad, Badis Hammi, Rida Khatoun. 1-7 [doi]
- Classification of botnet families based on features self-learning under Network Traffic CensorshipZhihong Zhou, Lihong Yao, Jianhua Li, Bin Hu, Chen Wang, Zhenglong Wang. 1-7 [doi]
- Least Cost Precision Marketing Based on User Profiles in Social NetworksMengyi Chen, Li Pan. 1-8 [doi]
- A Novel Android Malware Detection Approach Using Operand SequencesPeng Zhang, Shaoyin Cheng, Songhao Lou, Fan Jiang 0005. 1-5 [doi]
- Dispatching and Distributing Energy in Energy Internet under Energy DilemmaYunlong Hu, Ping Yi, Yu Sui, Zongrui Zhang, Yao Yao, Wei Wang 0190, Ting Zhu. 1-5 [doi]
- Least Cost Rumor Community Blocking optimization in Social NetworksJianguo Zheng, Li Pan. 1-5 [doi]
- Fully Secure Traceable and Revocable-Storage Attribute-Based Encryption with Short Update Keys via Subset Difference MethodHuijie Lian, Guangbo Wang, QingXian Wang. 1-8 [doi]
- Data Hiding for Color Image by Rubik's CubeChih-Wei Shiu, Wien Hong, Jeanne Chen, Tung-Shou Chen, Wan-Yi Ji. 1-5 [doi]
- "My autonomous car is an elephant": A Machine Learning based Detector for Implausible DimensionJean Philippe Monteuuis, Jonathan Petit, Jun Zhang, Houda Labiod, Stefano Mafrica, Alain Servel. 1-8 [doi]
- An Improved Group-based Influence Maximization Method in Social NetworksDanhua Huang, Li Pan. 1-6 [doi]
- Research on Civil Airborne Task Scheduling Test Platform Supporting Provable Data PossessionGaobo Sun, Shuyu Li, Zhanchun Kang. 1-6 [doi]
- Assessing Industrial Control System Attack Datasets for Intrusion DetectionXuelei Wang, Ernest Foo. 1-8 [doi]
- Multi-SDN Based Cooperation Scheme for DDoS Attack DefenseBoren He, Futai Zou, Yue Wu. 1-7 [doi]
- A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing SystemXiaoliang Wang, Junhua Tang, Mengdi Yu, Gubei Yin, Jianhua Li. 1-6 [doi]
- Caching Strategy for Scalable Video Coding in Information-Centric NetworkingJunhua Tang, Shuli Zhao, Yue Wu 0010, Jianhua Li. 1-6 [doi]
- Machine Learning-based RF Jamming Detection in Wireless NetworksZhutian Feng, Cunqing Hua. 1-6 [doi]
- Performance Modeling towards Interrupt System of Virtualized Cryptography DeviceLei Sun, Shuai Li, Songhui Guo, Yingxin Xu. 1-6 [doi]
- Image Mapping through MetadataCaleb Riggs, Tanner Douglas, Kanwalinderjit Gagneja. 1-8 [doi]
- SDKSE: A Secure Dynamic Keyword Searchable Encryption Scheme for Email SystemsHongyuan Chen, Zhenfu Cao, Xiaolei Dong, Jiachen Shen. 1-6 [doi]