Abstract is missing.
- Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic ConsistencyXuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao. 1-12 [doi]
- Reversible data hiding based on improved rhombus predictor and prediction error expansionXin Tang, Linna Zhou, Dan Liu, Boyu Liu, Xinyi Lü. 13-21 [doi]
- A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer NetworksDapeng Qu, Jiankun Zhang, Zhenhuan Hou, Ming Wan, Bo Dong. 22-29 [doi]
- SeRoT: A Secure Runtime System on Trusted Execution EnvironmentsJingbin Liu, Yu Qin, Dengguo Feng. 30-37 [doi]
- Robust Scheduling for Large-Scale Distributed SystemsYoung Choon Lee, Jayden King, Young Ki Kim, Seok-Hee Hong. 38-45 [doi]
- Adaptive Random Test Case Generation Based on Multi-Objective Evolutionary SearchChengying Mao, Linlin Wen, Tsong Yueh Chen. 46-53 [doi]
- Improving Efficiency of Key Enumeration Based on Side-Channel AnalysisWei Yang, Anmin Fu, Hailong Zhang 0001, Chanying Huang. 54-61 [doi]
- Robust Spatial-spread Deep Neural Image WatermarkingMarcin Plata, Piotr Syga. 62-70 [doi]
- DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized MarketplaceHa Xuan Son, Hai Trieu Le, Nadia Metoui, Nghia Duong-Trung. 71-78 [doi]
- Modeling and Analysis of RabbitMQ Using UPPAALRan Li, Jiaqi Yin, Huibiao Zhu. 79-86 [doi]
- User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public BlockchainXiaohu Zhou, Vitor Jesus, Yonghao Wang, Mark Josephs. 87-96 [doi]
- A Unified Host-based Intrusion Detection Framework using Spark in CloudMing Liu 0021, Zhi Xue, Xiangjian He. 97-103 [doi]
- TA-HRT: A temperature-aware scheduler for heterogeneous real-time multicore systemsYanshul Sharma, Zinea Das, Alok Das, Sanjay Moulik. 104-111 [doi]
- Reducing the Price of Protection: Identifying and Migrating Non-Sensitive Code in TEEYin Liu, Eli Tilevich. 112-120 [doi]
- Fairness Testing of Machine Learning Models Using Deep Reinforcement LearningWentao Xie, Peng Wu. 121-128 [doi]
- Cyclic Bayesian Attack Graphs: A Systematic Computational ApproachIsaac Matthews, John C. Mace, Sadegh Soudjani, Aad van Moorsel. 129-136 [doi]
- Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in CryptocurrencyQi Feng, Debiao He, Min Luo, Zengxiang Li, Kim-Kwang Raymond Choo. 137-147 [doi]
- Password Policies vs. Usability: When Do Users Go "Bananas"?Roberto Dillon, Shailey Chawla, Dayana Hristova, Barbara Göbl, Suzana Jovicic. 148-153 [doi]
- Malware Classification on Imbalanced Data through Self-AttentionYu Ding, Shupeng Wang, Jian-xing, Xiaoyu Zhang, ZiSen Oi, Ge Fu, Qian Qiang, Haoliang Sun, Jianyu Zhang. 154-161 [doi]
- Novel design of Hardware Trojan: A generic approach for defeating testability based detectionNing Zhang, Zhiqiang Lv, Yanlin Zhang, Haiyang Li, Yixin Zhang, Weiqing Huang. 162-173 [doi]
- TRUVIN: Lightweight Detection of Data-Oriented Attacks Through Trusted Value IntegrityMunir Geden, Kasper Rasmussen. 174-181 [doi]
- LURK: Server-Controlled TLS DelegationIoana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan. 182-193 [doi]
- Malware Detection Based on Term Frequency Analysis of GPRs FeaturesFang Li, Ziyuan Zhu, Chao Yan, Bowen Chen, Dan Meng. 194-201 [doi]
- Secure Outsourcing of Multi-Armed BanditsRadu Ciucanu, Pascal Lafourcade 0001, Marius Lombard-Platet, Marta Soare. 202-209 [doi]
- NLabel: An Accurate Familial Clustering Framework for Large-scale Weakly-labeled MalwareYannan Liu, Yabin Lai, Kaizhi Wei, Liang Gu, Zhengzheng Yan. 210-216 [doi]
- Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of ThingsXuyang Ding, Feng Xiao, Man Zhou, Zhibo Wang. 217-224 [doi]
- VALID: Voltage-Based Lightweight Intrusion Detection for the Controller Area NetworkOleg Schell, Marcel Kneib. 225-232 [doi]
- Densely Connected Residual Network for Attack RecognitionPeilun Wu, Nour Moustafa, Shiyi Yang, Hui Guo. 233-242 [doi]
- Optimized FPGA Implementation of Elliptic Curve Cryptosystem over Prime FieldsGuoqiang Yang, Fanyu Kong, Qiuliang Xu. 243-249 [doi]
- FTPB: A Three-stage DNS Tunnel Detection Method Based on Character Feature ExtractionKemeng Wu, Yongzheng Zhang, Tao Yin. 250-258 [doi]
- De-randomizing the Code Segment with Timing Function AttackTianning Zhang, Miao Cai, Diming Zhang, Hao Huang. 259-267 [doi]
- Unmasking Windows Advanced Persistent Threat ExecutionRory Coulter, Jun Zhang 0010, Lei Pan 0002, Yang Xiang 0001. 268-276 [doi]
- Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud DataChangchun Yin, Hao Wang, Lu Zhou, Liming Fang 0001. 277-284 [doi]
- VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud StorageChan Fan, Xiaolei Dong, Zhenfu Cao, Jiachen Shen. 285-292 [doi]
- Program Slice based Vulnerable Code Clone DetectionXiaonan Song, Aimin Yu, Haibo Yu, Shirun Liu, Xin Bai, Lijun Cai, Dan Meng. 293-300 [doi]
- Doc2vec-based Insider Threat Detection through Behaviour Analysis of Multi-source Security LogsLiu Liu, Chao Chen, Jun Zhang, Olivier De Vel, Yang Xiang. 301-309 [doi]
- C2BID: Cluster Change-Based Intrusion DetectionTiago Fernandes, Luis Dias, Miguel Correia 0001. 310-319 [doi]
- TEADS: A Defense-aware Framework for Synthesizing Transient Execution AttacksTianlin Huo, Wenhao Wang 0001, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li. 320-327 [doi]
- One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the CloudBenjamin Semal, Konstantinos Markantonakis, Keith Mayes, Jan Kalbantner. 328-336 [doi]
- ReDex: Unpacking Android Packed Apps by Executing Every MethodJiajin Cai, Tongxin Li, Can Huang, Xinhui Han. 337-344 [doi]
- Awareness of Secure Coding Guidelines in the Industry - A first data analysisTiago Espinha Gasiba, Ulrike Lechner, Maria Pinto-Albuquerque, Daniel Méndez Fernández. 345-352 [doi]
- IoT Attacks: Features Identification and ClusteringJunaid Haseeb, Masood Mansoori, Harith Al-Sahaf, Ian Welch. 353-360 [doi]
- Estimating Loss Due to Cyber-attack in the Presence of UncertaintyHoang Hai Nguyen, David M. Nicol. 361-369 [doi]
- STIDM: A Spatial and Temporal Aware Intrusion Detection ModelXueying Han, Rongchao Yin, Zhigang Lu, Bo Jiang, Yuling Liu, Song Liu, Chonghua Wang, Ning Li. 370-377 [doi]
- Partial-SMT: Core-scheduling Protection Against SMT Contention-based AttacksXiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen. 378-385 [doi]
- Family Identification of AGE-Generated Android Malware Using Tree-Based FeatureGuga Suri, Jianming Fu, Rui Zheng, Xinying Liu. 386-393 [doi]
- Towards a Theory of Special-Purpose Program ObfuscationMuhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig. 394-401 [doi]
- Protecting the Intellectual Property of Deep Neural Networks with Watermarking: The Frequency Domain ApproachMeng Li, Qi Zhong, Leo Yu Zhang, Yajuan Du, Jun Zhang, Yong Xiangt. 402-409 [doi]
- Uncovering the Hidden Dangers: Finding Unsafe Go Code in the WildJohannes Lauinger, Lars Baumgärtner, Anna-Katharina Wickert, Mira Mezini. 410-417 [doi]
- Traffic Classification of User Behaviors in Tor, I2P, ZeroNet, FreenetYuzong Hu, Futai Zou, Linsen Li, Ping Yi. 418-424 [doi]
- MAUSPAD: Mouse-based Authentication Using Segmentation-based, Progress-Adjusted DTWDong Qin, Shen Fu, George T. Amariucai, Daji Qiao, Yong Guan. 425-433 [doi]
- Improving the Effectiveness of Grey-box Fuzzing By Extracting Program InformationYu Fu, Siming Tong, Xiangyu Guo, Liang Cheng 0004, Yang Zhang, Dengguo Feng. 434-441 [doi]
- Evaluating the Soundness of Security Metrics from Vulnerability Scoring FrameworksJoe Samuel, Khalil Aalab, Jason Jaskolka. 442-449 [doi]
- SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge KnowledgeYi Li, Xi Xiao, Xiaogang Zhu, Xiao Chen, Sheng Wen, Bin Zhang. 450-457 [doi]
- Mind the GAP: Security & Privacy Risks of Contact Tracing AppsLars Baumgärtner, Alexandra Dmitrienko, Bernd Freisleben, Alexander Gruler, Jonas Höchst, Joshua Kühlberg, Mira Mezini, Richard Mitev, Markus Miettinen, Anel Muhamedagic, Thien Duc Nguyen, Alvar Penning, Dermot Frederik Pustelnik, Filipp Roos, Ahmad-Reza Sadeghi, Michael Schwarz, Christian Uhl. 458-467 [doi]
- Far from classification algorithm: dive into the preprocessing stage in DGA detectionMingkai Tong, Guo Li, Runzi Zhang, Jianxin Xue, Wenmao Liu, Jiahai Yang. 468-474 [doi]
- ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge ComputingMinghui Li, Yang Li, Liming Fang 0001. 475-482 [doi]
- Phishing Web Page Detection Using Optimised Machine LearningJordan Stobbs, Biju Issac 0001, Seibu Mary Jacob. 483-490 [doi]
- Asset-Oriented Threat ModelingNan Messe, Vanea Chiprianov, Nicolas Belloir, Jamal El Hachem, Régis Fleurquin, Salah Sadou. 491-501 [doi]
- A11 Your PLCs Belong to Me: ICS Ransomware Is RealisticYipeng Zhang, Zhonghao Sun, Liqun Yang, Zhoujun Li, Qiang Zeng 0001, Yueying He, Xiaoming Zhang. 502-509 [doi]
- Automated Enforcement of the Principle of Least Privilege over Data Source AccessHaoqi Wu, Zhengxuan Yu, Dapeng Huang, Haodong Zhang, Weili Han. 510-517 [doi]
- Extending Registration and Authentication Processes of FIDO2 External Authenticator with QR CodesChengqian Guo, Quanwei Cai 0001, Qiongxiao Wang, Jingqiang Lin. 518-529 [doi]
- BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial ServicesZhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen 0001, Yang Xiang 0001. 530-538 [doi]
- FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability DetectionDefu Cao, Jing Huang, Xuanyu Zhang, Xianhua Liu 0001. 539-546 [doi]
- Secure Coded Matrix Multiplication against Cooperative Attack in Edge ComputingLuqi Zhu, Jin Wang, Lianmin Shi, Jingya Zhou, Kejie Lu, Jianping Wang 0001. 547-556 [doi]
- A Measurement Study of IoT-Based Attacks Using IoT Kill ChainJunaid Haseeb, Masood Mansoori, Ian Welch. 557-567 [doi]
- Modeling and Verification of Spatio-Temporal Intelligent Transportation SystemsTengfei Li, Xiaohong Chen, Haiying Sun, Jing Liu, Jiajia Yang, Chenchen Yang, Junfeng Sun. 568-575 [doi]
- Secure Outsourcing Algorithms of Modular Exponentiations in Edge ComputingTianyi Zhang, Jian Wang. 576-583 [doi]
- Joint Learning for Document-Level Threat Intelligence Relation Extraction and Coreference Resolution Based on GCNXuren Wang, Mengbo Xiong, Yali Luo, Ning Li, Zhengwei Jiang, Zihan Xiong. 584-591 [doi]
- Anomaly Detection on MIL-STD-1553 Dataset using Machine Learning AlgorithmsFrancis Onodueze, Darsana Josyula. 592-598 [doi]
- Privacy-Preserving Ride-Hailing with Verifiable Order-Linking in Vehicular NetworksMeng Li 0006, Jianbo Gao, Yifei Chen, Jingcheng Zhao, Mamoun Alazab. 599-606 [doi]
- Flowverine: Leveraging Dataflow Programming for Building Privacy-Sensitive Android ApplicationsEduardo Gomes, Igor Zavalyshyn, Nuno Santos 0001, João Silva, Axel Legay. 607-614 [doi]
- Prihook: Differentiated context-aware hook placement for different owners' smartphonesChen Tian 0004, Yazhe Wang, Peng Liu, Yu Wang, Ruirui Dai, Anyuan Zhou, Zhen Xu. 615-622 [doi]
- Improving Laplace Mechanism of Differential Privacy by Personalized SamplingWen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu. 623-630 [doi]
- Differential Privacy Preservation in Interpretable Feedforward-Designed Convolutional Neural NetworksDe-li, Jinyan Wang, Zhou Tan, Xianxian Li, Yuhang Hu. 631-638 [doi]
- Practical and Secure Circular Range Search on Private Spatial DataZhihao Zheng, Zhenfu Cao, Jiachen Shen. 639-645 [doi]
- Dataset Construction and Analysis of Screenshot MalwareHugo Sbaï, Jassim Happa, Michael Goldsmith, Samy Meftali. 646-655 [doi]
- zkrpChain: Privacy-preserving Data Auditing for Consortium Blockchains Based on Zero-knowledge Range ProofsShiwei Xu, Xiaowen Cai, Yizhi Zhao, Zhengwei Ren, Lingjuan Wu, Huanguo Zhang, Le Du, Yan Tong. 656-663 [doi]
- On the Role of Data Anonymization in Machine Learning PrivacyNavoda Senavirathne, Vicenç Torra. 664-675 [doi]
- Heimdall: Illuminating the Hidden Depths of Third-party Tracking in Android ApplicationsThomas Cory, Philip Raschke, Axel Küpper. 676-682 [doi]
- A Privacy-preserving Data Collection and Processing Framework for Third-party UAV ServicesTianyuan Liu, Hongpeng Guo, Claudiu Danilov, Klara Nahrstedt. 683-690 [doi]
- On the Comparison of Classifiers' Construction over Private InputsMina Sheikhalishahi, Nicola Zannone. 691-698 [doi]
- Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy WayMuqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang. 699-706 [doi]
- Multi-Party Private Set Intersection in Vertical Federated LearningLinpeng Lu, Ning Ding. 707-714 [doi]
- MLTracer: Malicious Logins Detection System via Graph Neural NetworkFucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng. 715-726 [doi]
- Data Analytics-enabled Intrusion Detection: Evaluations of ToN IoT Linux DatasetsNour Moustafa, Mohiuddin Ahmed, Sherif Ahmed. 727-735 [doi]
- CMIRGen: Automatic Signature Generation Algorithm for Malicious Network TrafficRunzi Zhang, Mingkai Tong, Lei Chen, Jianxin Xue, Wenmao Liu, Feng Xie. 736-743 [doi]
- A Novel Violation Tracing Model for Cloud Service AccountabilityXiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu. 744-750 [doi]
- Detection of Hate Tweets using Machine Learning and Deep LearningLida Ketsbaia, Biju Issac 0001, Xiaomin Chen. 751-758 [doi]
- Use of Bash History Novelty Detection for Identification of Similar Source Attack GenerationJack Hance, Jeremy Straub. 759-766 [doi]
- Measurement Unit Placement Against Injection Attacks for the Secured Operation of an IIoT-based Smart GridAdnan Anwar, S. M. Abu Adnan Abir. 767-774 [doi]
- Cross Platform IoT- Malware Family Classification based on Printable StringsYen-Ting Lee, Tao Ban, Tzu-Ling Wan, Shin-Ming Cheng, Ryoichi Isawa, Takeshi Takahashi 0001, Daisuke Inoue. 775-784 [doi]
- ALBFL: A Novel Neural Ranking Model for Software Fault Localization via Combining Static and Dynamic FeaturesYuQing Pan, Xi Xiao, Guangwu Hu, Bin Zhang, Qing Li, Haitao Zheng 0002. 785-792 [doi]
- Towards a Robust Classifier: An MDL-Based Method for Generating Adversarial ExamplesBehzad Asadi, Vijay Varadharajan. 793-801 [doi]
- Avoiding Geographic Regions in TorMatthew J. Ryan, Morshed U. Chowdhury, Frank Jiang 0001, Robin Doss. 802-809 [doi]
- Identifying Cross-Version Function Similarity Using Contextual FeaturesPaul Black, Iqbal Gondal, Peter Vamplew 0001, Arun Lakhotia. 810-818 [doi]
- Scalable and Accurate Binary Search Method based on Simhash and Partial TraceYunan Zhang, Aidong Xu, Yixin Jiang. 818-826 [doi]
- An Analytics Framework for Heuristic Inference Attacks against Industrial Control SystemsTaejun Choi, Guangdong Bai, Ryan K. L. Ko, Naipeng Dong, Wenlu Zhang, Shunyao Wang. 827-835 [doi]
- Forensic Analysis of Dating Applications on Android and iOS DevicesShinelle Hutchinson, Neesha Shantaram, Umit Karabiyik. 836-847 [doi]
- Federated TON_IoT Windows Datasets for Evaluating AI-based Security ApplicationsNour Moustafa, Marwa Keshk, Essam Soliman Debie, Helge Janicke. 848-855 [doi]
- Privacy-Encoding Models for Preserving Utility of Machine Learning Algorithms in Social MediaSara Salim, Nour Moustafa, Benjamin Turnbull. 856-863 [doi]
- Generation of malicious webpage samples based on GANMengxiang Wan, Hanbing Yao, Xin Yan. 864-869 [doi]
- A Flexible Attentive Temporal Graph Networks for Anomaly Detection in Dynamic NetworksDali Zhu, Yuchen Ma, YinLong Liu. 870-875 [doi]
- FPGA based Blockchain System for Industrial IoTLei Xu 0012, Lin Chen, Zhimin Gao, Han-Yee Kim, Taeweon Suh, Weidong Shi. 876-883 [doi]
- Address-based SignatureHandong Cui, Tsz Hon Yuen. 884-891 [doi]
- Cryptanalysis of a Chaos-based Block Cryptosystem Using Multiple Samples Correlation Power AnalysisShunsheng Zhang, Yuling Luo, Lvchen Cao, Junxiu Liu. 892-898 [doi]
- Adversarial Attacks on Time-Series Intrusion Detection for Industrial Control SystemsGiulio Zizzo, Chris Hankin, Sergio Maffeis, Kevin Jones. 899-910 [doi]
- Netspot: a simple Intrusion Detection System with statistical learningAlban Siffer, Pierre-Alain Fouque, Alexandre Termier, Christine Largouët. 911-918 [doi]
- Cache side-channel attacks detection based on machine learningZhongkai Tong, Ziyuan Zhu, Zhanpeng Wang, Limin Wang, Yusha Zhang, Yuxin Liu. 919-926 [doi]
- Exploit Internal Structural Information for IoT Malware Detection Based on Hierarchical Transformer ModelXiaohui Hu, Rui Sun, Kejia Xu, Yongzheng Zhang, Peng Chang. 927-934 [doi]
- Inference Attacks on Physical Layer Channel State InformationPaul Walther, Thorsten Strufe. 935-942 [doi]
- A non-discriminatory approach to ethical deep learningEnzo Tartaglione, Marco Grangetto. 943-950 [doi]
- Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart ContractsAmjad Qashlan, Priyadarsi Nanda, Xiangian He. 951-958 [doi]
- Blockchain-based Verifiable Credential Sharing with Selective DisclosureRahma Mukta, James Martens, Hye-Young Paik, Qinghua Lu 0001, Salil S. Kanhere. 959-966 [doi]
- Blockchain-enabled Collaborative Intrusion Detection in Software Defined NetworksWenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou 0002, Sang-Yoon Chang. 967-974 [doi]
- Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control TechniqueMingfu Xue, Zhiyu Wu, Can He, Jian Wang 0038, Weiqiang Liu. 975-982 [doi]
- SCPORAM: a hardware support scheme for protecting memory access patternsZhanpeng Wang, Ziyuan Zhu, Limin Wang, Zhongkai Tong, Chao Yan. 983-990 [doi]
- QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-roleZhujun Zhang, Dali Zhu, Wei Fan. 991-997 [doi]
- Privacy-Preserving Public Verification of Ethical Cobalt SourcingKilian Becher, J. A. Gregor Lagodzinski, Thorsten Strufe. 998-1005 [doi]
- A Computation Offloading Model over Collaborative Cloud-Edge Networks with Optimal Transport TheoryZhuo Li, Xu Zhou, Yang Liu, Congshan Fan, Wei Wang. 1006-1011 [doi]
- A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a RandomnessYizhong Liu, Jianwei Liu, Yiming Hei, Wei Tan, Qianhong Wu. 1012-1019 [doi]
- Revocable and Offline-Verifiable Self-Sovereign IdentitiesAndreas Abraham, Stefan More, Christof Rabensteiner, Felix Hörandner. 1020-1027 [doi]
- Blockchain based End-to-end Tracking System for Distributed IoT Intelligence Application Security EnhancementLei Xu 0012, Zhimin Gao, Xinxin Fan, Lin Chen, Han-Yee Kim, Taeweon Suh, Weidong Shi. 1028-1035 [doi]
- Time is Money: Countering Griefing Attack in Lightning NetworkSubhra Mazumdar 0001, Prabal Banerjee, Sushmita Ruj. 1036-1043 [doi]
- Preventing a Fork in a Blockchain - David Fighting GoliathPrzemyslaw Kubiak, Miroslaw Kutylowski. 1044-1051 [doi]
- Golden-Chip-Free Hardware Trojan Detection Through Thermal Radiation Comparison in Vulnerable AreasTing Su, Jiahe Shi, Yongkang Tang, Shaoqing Li. 1052-1059 [doi]
- A Feedback-Driven Lightweight Reputation Scheme for IoVRohan Dahiya, Frank Jiang 0001, Robin Doss. 1060-1068 [doi]
- Modelling Attacks in Blockchain Systems using Petri NetsMd. Atik Shahriar, Faisal Haque Bappy, A. K. M. Fakhrul Hossain, Dayamoy Datta Saikat, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Md. Zakirul Alam Bhuiyan. 1069-1078 [doi]
- BONIK: A Blockchain Empowered Chatbot for Financial TransactionsMd. Saiful Islam Bhuiyan, Abdur Razzak, Md. Sadek Ferdous, Mohammad Jabed Morshed Chowdhury, Mohammad Ashraful Hoque, Sasu Tarkoma. 1079-1088 [doi]
- Towards Network Traffic Monitoring Using Deep Transfer LearningHarsh Dhillon, Anwar Haque. 1089-1096 [doi]
- A three-stage machine learning network security solution for public entitiesStanislaw Saganowski. 1097-1104 [doi]
- Multi-Input Functional Encryption: Efficient Applications from Symmetric PrimitivesAlexandros Bakas, Antonis Michalas. 1105-1112 [doi]
- Factors Affecting Users' Disclosure Decisions in Android Runtime Permissions ModelRawan Baalous, Ronald Poet. 1113-1118 [doi]
- Towards a Lightweight Continuous Authentication Protocol for Device-to-Device CommunicationSyed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss. 1119-1126 [doi]
- Secure and Privacy Preserving Method for Biometric Template Protection using Fully Homomorphic EncryptionArun Kumar Jindal, Imtiyazuddin Shaik, Vasudha, Srinivasa Rao Chalamala, Rajan M. A, Sachin Lodha. 1127-1134 [doi]
- Trusted Network Slicing among Multiple Mobile Network OperatorsMuhammad Jehanzaib Yousuf, Mingjun Wang, Zheng Yan 0002, Fawad Khan. 1135-1140 [doi]
- A Scoring System to efficiently measure Security in Cyber-Physical SystemsAndreas Aigner, Abdelmajid Khelil. 1141-1145 [doi]
- Towards a new deep learning based approach for the password predictionManaz Kaleel, Nhien-An Le-Khac. 1146-1150 [doi]
- DANTE: Predicting Insider Threat using LSTM on system logsQicheng Ma, Nidhi Rastogi. 1151-1156 [doi]
- VGG-based side channel attack on RSA implementationQi Lei, Chao Li, Kexin Qiao, Zhe Ma, Bo Yang. 1157-1161 [doi]
- Deep Learning for Password Guessing and Password Strength Evaluation, A SurveyTao Zhang, Zelei Cheng, Yi Qin, Qiang Li, Lin Shi. 1162-1166 [doi]
- Metrics to Enhance the Resilience of Cyber-Physical SystemsMichel Barbeau, Frédéric Cuppens, Nora Cuppens, Romain Dagnas, Joaquín García-Alfaro. 1167-1172 [doi]
- Independent Worker Selection In CrowdsourcingAng Li, Wenjun Jiang, Xueqi Li, Xinrong Chen, Guojun Wang 0001. 1173-1178 [doi]
- Towards Collaborative Intrusion Detection Enhancement against Insider Attacks with Multi-Level TrustWenjuan Li 0001, Weizhi Meng 0001, Hui Zhu. 1179-1186 [doi]
- A Function-Centric Risk Assessment Approach for Android ApplicationsMin Li, Haroon Elahi, Tao Peng 0011, Fang Qi, Guojun Wang. 1187-1193 [doi]
- SCAFFISD: A Scalable Framework for Fine-grained Identification and Security Detection of Wireless RoutersFangzhou Zhu, Liang Liu 0006, Weizhi Meng 0001, Ting Lv, Simin Hu, Renjun Ye. 1194-1199 [doi]
- Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V KeystoneKuniyasu Suzaki, Kenta Nakajima, Tsukasa Oi, Akira Tsukamoto. 1200-1208 [doi]
- A Privacy-Preserving Data Inference Framework for Internet of Health Things NetworksJames Jin Kang, Mahdi Dibaei, Gang Luo, WenCheng Yang, James Xi Zheng. 1209-1214 [doi]
- RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection MethodYizhen Sun, Yiman Xie, Weiping Wang 0003, Shigeng Zhang, Yuxi Wu, Jingchuan Feng. 1215-1221 [doi]
- Image Self-Recovery Based on Authentication Feature ExtractionTong Liu, Xiaochen Yuan. 1222-1227 [doi]
- Do My Emotions Influence What I Share? Analysing the Effects of Emotions on Privacy Leakage in TwitterManasi Mittal, Muhammad Rizwan Asghar, Arvind Tripathi. 1228-1235 [doi]
- Robustness analysis and defence strategy of an interdependent networks model based on closeness centralityJinfang Sheng, Yan Hu, Kerong Guan, Bin Wang, Xiaoxia Pan, Wenjun Kang. 1236-1241 [doi]
- A Framework for Measuring IoT Data Quality Based on Freshness MetricsFatma Mohammed, A. S. M. Kayes, Eric Pardede, Wenny Rahayu. 1242-1249 [doi]
- RevBloc: A Blockchain-based Secure Customer Review SystemXiuli Fang, Muhammad Rizwan Asghar. 1250-1259 [doi]
- Face2Face Manipulation Detection Based on Histogram of Oriented GradientsAmr Megahed, Qi Han 0002. 1260-1267 [doi]
- Analysis and modelling of multi-stage attacksSaurabh Chamotra, Ferdous Ahmed Barbhuiya. 1268-1275 [doi]
- Cyber Situation Awareness Monitoring and Proactive Response for Enterprises on the CloudHootan Alavizadeh, Hooman Alavizadeh, Julian Jang-Jaccard. 1276-1284 [doi]
- Explicitly Privacy-Aware Space Usage AnalysisSanjiv S. Jha, Simon Mayer, Tanja Schneider. 1285-1290 [doi]
- Towards A Transparent and Privacy-preserving Healthcare Platform with Blockchain for Smart CitiesAbdullah Al Omar, Abu Kaisar Jamil, Md. Shakhawath Hossain Nur, Md Mahamudul Hasan, Rabeya Bosri, Md. Zakirul Alam Bhuiyan, Mohammad Shahriar Rahman. 1291-1296 [doi]
- BML: A Data Mapping Language for Blockchain PlatformsBa-Lam Do, Quang-Thang Nguyen, Thang Nguyen, Tien Thao Nguyen, Thanh-Chung Dao, Binh Minh Nguyen. 1297-1303 [doi]
- Semantic Location Privacy Protection Algorithm Based on Edge Cluster GraphTao Lu, Hongyun Xu, Kai Tian, Cenxi Tian, Rui Jiang 0002. 1304-1309 [doi]
- Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019Dimuth Lasantha, Biplob Ray. 1310-1317 [doi]
- Security Challenges and Solutions for 5G HetNetAakanksha Sharma, Venki Balasubramanian, Alireza Jolfaei. 1318-1323 [doi]
- Privacy Smells: Detecting Privacy Problems in Cloud ArchitecturesImmanuel Kunz, Angelika Schneider, Christian Banse. 1324-1331 [doi]
- BlockSLAP: Blockchain-based Secure and Lightweight Authentication Protocol for Smart GridWeizheng Wang, Huakun Huang, Lejun Zhang, Zhaoyang Han, Chen Qiu, Chunhua Su. 1332-1338 [doi]
- SecureESFS: Sharing Android External Storage Files in A Securer WayShan Liang, Yuewu Wang, Lingguang Lei, Jiwu Jing, Quan Zhou. 1339-1347 [doi]
- PPFQ: Privacy-Preserving Friends Query over Online Social NetworksYuxi Li, Fucai Zhou, Zifeng Xu. 1348-1353 [doi]
- Dynamic flow redirecton scheme for enhancing control plane robustness in SDNDong Liang, Qinrang Liu, Yanbin Hu, Tao Hu 0002, Binghao Yan, Haiming Zhao. 1354-1359 [doi]
- Prov-IoT: A Security-Aware IoT Provenance ModelFariha Tasmin Jaigirdar, Carsten Rudolph, Chris Bain. 1360-1367 [doi]
- Are Smart Home Devices Abandoning IPV Victims?Ahmed Alshehri, Malek Ben Salem, Lei Ding 0003. 1368-1375 [doi]
- A Practical Privacy-Preserving Algorithm for Document DataTomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji. 1376-1383 [doi]
- TORP: Load Balanced Reliable Opportunistic Routing for Asynchronous Wireless Sensor NetworksMuhammad Umar Farooq, Xingfu Wang, Ammar Hawbani, Asad Khan, Adeel Ahmed, Fisseha Teju Wedaj. 1384-1389 [doi]
- CPN Model Checking Method of Concurrent Software Based on State Space PruningTao Sun, Jing Yang, Wenjie Zhong. 1390-1394 [doi]
- An Arithmetic Differential Privacy Budget Allocation Method for the Partitioning and Publishing of Location InformationYan Yan, Xin Gao, Adnan Mahmood, Yang Zhang, Shuang Wang, Quan Z. Sheng. 1395-1401 [doi]
- IoT-Sphere: A Framework To Secure IoT Devices From Becoming Attack Target And Attack SourceSyed Ghazanfar Abbas, Muhammad Husnain, Ubaid Ullah Fayyaz, Farrukh Shahzad, Ghalib A. Shah, Kashif Zafar. 1402-1409 [doi]
- Membership Inference Attacks: Analysis and MitigationMd Shamimur Rahman Shuvo, Dima Alhadidi. 1410-1419 [doi]
- Bearicade: secure access gateway to High Performance Computing systemsTaha Al-Jody, Violeta Holmes, Alexandros Antoniades, Yazan Kazkouzeh. 1420-1427 [doi]
- Enhancing Cyber Security Using Audio Techniques: A Public Key Infrastructure for SoundAnthony Phipps, Karim Ouazzane, Vassil T. Vassilev. 1428-1436 [doi]
- Group Communication Needs No Consistent Transcript DistributionKlaus Herberth. 1437-1443 [doi]
- Name-Signature Lookup System: A Security Enhancement to Named Data NetworkingZhicheng Song, Pushpendu Kar. 1444-1448 [doi]
- Feature importance in Android malware detectionVasileios Kouliaridis, Georgios Kambourakis, Tao Peng 0011. 1449-1454 [doi]
- iTES: Integrated Testing and Evaluation System for Software Vulnerability Detection MethodsChi Zhang, Jinfu Chen, Saihua Cai, Bo Liu, Yiming Wu, Ye Geng. 1455-1460 [doi]
- Plant Taxonomy In Hainan Based On Deep Convolutional Neural Network And Transfer LearningWei Liu, Wenlong Feng, Mengxing Huang, Guilai Han, Jialun Lin. 1461-1466 [doi]
- Research on Stitching and Alignment of Mouse Carcass EM ImagesJing Zhu, Hongyu Ge, Ao Cheng, Ruobing Zhang, Lirong Wang. 1468-1471 [doi]
- A Simple Analysis of Multimodal Data FusionJiangchang Cheng, Yinglong Dai, Yao Yuan, Hongli Zhu. 1472-1475 [doi]
- Pyramid Pooling Channel Attention Network for esophageal tissue segmentation on OCT imagesDeyin Li, Miao Zhang, Wei Shi, Huimin Zhang, Duoduo Wang, Lirong Wang. 1476-1480 [doi]
- Atrial Fibrillation Classification Using Convolutional Neural Networks and Time Domain Features of ECG SequenceMixue Deng, Lishen Qiu, Hongqing Wang, Wei Shi, Lirong Wang. 1481-1485 [doi]
- Design and implementation of a multifunctional ECG analysis software systemDong Wang, Lishen Qiu, Wei Shi, Hongqing Wang, Xiangxiang Xu, Lirong Wang. 1486-1491 [doi]
- A Four-Feature Keyword Extraction Algorithm Based on Word Length Priority ratioHui Kang, Lingfeng Lu, Hang Su. 1492-1498 [doi]
- Research and Improvement of Community Discovery Algorithm Based on Spark for Large Scale Complicated NetworksHui Kang, Shengquan Chen, Lingfeng Lu, Chenkun Meng. 1499-1508 [doi]
- An Investigation of Assistive Products for the ElderlyXiaoying Li, Huai-bin Wang, Yuqiong Liu, Yuefei Wang, Zhen Liu. 1509-1514 [doi]
- An impedance control method of lower limb exoskeleton rehabilitation robot based on predicted forward dynamicsYuefei Wang, Zhen Liu, Liucun Zhu, Xiaoying Li, Huaibin Wang. 1515-1518 [doi]
- An Automatic Vulnerability Scanner for Web ApplicationsHaibo Chen, Junzuo Chen, Jinfu Chen, Shang Yin, Yiming Wu, Jiaping Xu. 1519-1524 [doi]
- An Automatic Vulnerability Classification System for IoT SoftwaresHaibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao. 1525-1529 [doi]
- Policy Evaluation and Dynamic Management Based on Matching Tree for XACMLHongzhaoning Kang, Gang Liu 0006, Quan Wang 0006, Runnan Zhang, Zichao Zhong, Yumin Tian. 1530-1535 [doi]
- Fined-grained Aspect Extraction from Online Reviews for Decision SupportZhaoli Liu, Qindong Sun, Zhihai Yang, Kun Jiang, Jinpei Yan. 1536-1541 [doi]
- A Password Strength Evaluation Algorithm based on Sensitive Personal InformationXinchun Cui, Xueqing Li, Yiming Qin, Ding Yong. 1542-1545 [doi]
- Prediction of high precision ignition process in the condition of multi flow area coupling of micro solid rocket motorGaofei Wei, Qiang Cai, Meng Li, Rui Dong, Yang Liu. 1546-1551 [doi]
- Exploiting User Selection Algorithm for Securing Wireless Communication NetworksXiaoying Qiu, Guangda Li, Xuan Sun, Zhiguo Du. 1552-1555 [doi]
- Easy-to-implement Campus Electronic Anonymous Voting SystemRuxian Zhang, Zhaoju Zhang, Hong Di. 1556-1559 [doi]
- Hypergraph Attention NetworksChaofan Chen, Zelei Cheng, Zuotian Li, ManYi Wang. 1560-1565 [doi]
- Search & Catch: Detecting Promotion Infection in the Underground through Search EnginesRonghai Yang, Jia Liu, Liang Gu, Yurong Chen. 1566-1571 [doi]
- Image Authentication using QR Code Watermarking Approach based on Image SegmentationXiaomei Liu, Xin Tang. 1572-1577 [doi]
- A Semi-Supervised Learning Scheme to Detect Unknown DGA Domain Names based on Graph AnalysisFan Yan, Jia Liu, Liang Gu, Zelong Chen. 1578-1583 [doi]
- A PHP and JSP Web Shell Detection System With Text Processing Based On Machine LearningHan Zhang, Ming Liu 0021, Zihan Yue, Zhi Xue, Yong Shi, Xiangjian He. 1584-1591 [doi]
- A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) PrimesWei Ren 0002. 1592-1597 [doi]
- SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart ContractsXiaohan Hao, Wei Ren 0002, Wenwen Zheng, Tianqing Zhu. 1598-1605 [doi]
- A Security Model and Implementation of Embedded Software Based on Code ObfuscationJiajia Yi, Lirong Chen, Haitao Zhang, Yun Li, Huanyu Zhao. 1606-1613 [doi]
- Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTMYan Lin, Guosheng Xu, Guoai Xu, Yudong Chen, Dawei Sun. 1614-1621 [doi]
- Enhancing the Security of Numeric Comparison Secure Simple Pairing in Bluetooth 5.0Dongkun Hou, Jie Zhang, Ka Lok Man. 1622-1629 [doi]
- 3P3: Strong Flexible Privacy for BroadcastsDavid Mödinger, Franz J. Hauck. 1630-1637 [doi]
- Efficient Revocable Attribute-Based Encryption with Hidden PoliciesDominik Ziegler 0001, Alexander Marsalek. 1638-1645 [doi]
- On the Usefulness of User Nudging and Strength Indication Concerning Unlock Pattern SecurityThomas Hupperich, Katharina Dassel. 1646-1654 [doi]
- Unbounded Key-Policy Attribute-based Encryption with Black-Box TraceabilityYunxiu Ye, Zhenfu Cao, Jiachen Shen. 1655-1663 [doi]
- An Efficient Vulnerability Extrapolation Using Similarity of Graph Kernel of PDGsJingxiang Zeng, Xiaofan Nie, Liwei Chen, Jinfeng Li, Gewangzi Du, Gang Shi. 1664-1671 [doi]
- Opportunistic Tracking in Cyber-Physical SystemsSamaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Lei Pan 0002. 1672-1679 [doi]
- An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly DetectionJinghui Xu, Yu Wen, Chun Yang, Dan Meng. 1680-1687 [doi]
- Differential Privacy Images Protection Based on Generative Adversarial NetworkRen Yang, Xuebin Ma, Xiangyu Bai, Xiangdong Su. 1688-1695 [doi]
- DP-Eclat: A Vertical Frequent Itemset Mining Algorithm Based on Differential PrivacyShengyi Guan, Xuebin Ma, Wuyungerile Li, Xiangyu Bai. 1696-1703 [doi]
- More efficient SM9 algorithm based on bilinear pair optimization processingXianze Liu, Jihong Liu, Bifei Jiang, Haozhen Jiang, Zhi Yang. 1704-1710 [doi]
- SeWG: Security-enhanced WireGuard for Android Based on TEEYongkang Wu, Yiwei Shan, Zhichao Wang, Pengcheng Zhang, Min He, Jihong Liu. 1711-1717 [doi]
- Differential privacy preserving data publishing based on Bayesian networkXuejian Qi, Xuebin Ma, Xiangyu Bai, Wuyungerile Li. 1718-1726 [doi]
- Implementing Network Attack Detection with a Novel NSSA Model Based on Knowledge GraphsYixuan Wang, Yujun Li, Xiang Chen, Yeni Luo. 1727-1732 [doi]
- UIDroid: User-driven Based Hierarchical Access Control for Sensitive InformationLuping Ma, Dali Zhu, Shunliang Zhang, Xiaohui Zhang, Shumin Peng, Ya Li. 1733-1740 [doi]
- TrustyShare: A Sharing Scheme using ARM TrustZoneYongkang Wu, Langyue He, Yiwei Shan, Pengcheng Zhang, Min He, Zhi Yang. 1741-1747 [doi]
- SmartLED: Smartphone-based covert channels leveraging the notification LEDLorena González-Manzano, Sergio Bernardez, José María de Fuentes. 1748-1755 [doi]
- Semantic redirection obfuscation: A control flow obfuscation based on Android RuntimeZhichao Wang, Yiwei Shan, Zhi Yang, RuoYi Wang, Shuang Song. 1756-1763 [doi]
- Blockchain based PKI and Certificates Management in Mobile NetworksJunzhi Yan, Xiaoyong Hang, Bo Yang, Li Su, Shen He. 1764-1770 [doi]
- Monitoring Social Media for Vulnerability-Threat Prediction and Topic AnalysisShin-Ying Huang, Tao Ban. 1771-1776 [doi]
- Android Malware Classification Using Machine Learning and Bio-Inspired Optimisation AlgorithmsJack Pye, Biju Issac 0001, Nauman Aslam, Husnain Rafiq. 1777-1782 [doi]
- LTMS: A Lightweight Trust Management System for Wireless Medical Sensor NetworksMuhammad Shadi Hajar, M. Omar Al-Kadri, Harsha K. Kalutarage. 1783-1790 [doi]
- Trust and Believe - Should We? Evaluating the Trustworthiness of Twitter UsersTanveer Khan, Antonis Michalas. 1791-1800 [doi]
- Trust Aware Continuous Authorization for Zero Trust in Consumer Internet of ThingsTheo Dimitrakos, Tezcan Dilshener, Alexander Kravtsov, Antonio La Marra, Fabio Martinelli, Athanasios Rizos, Alessandro Rosetti, Andrea Saracino. 1801-1812 [doi]
- pcSVF: An Evaluation of Side-Channel Vulnerability of Port ContentionXiaoyang Liu, Ziyuan Zhu. 1813-1819 [doi]
- A Multi-Layer Industrial-IoT Attack Taxonomy: Layers, Dimensions, Techniques and ApplicationSyed Ghazanfar Abbas, Fabiha Hashmat, Ghalib A. Shah. 1820-1825 [doi]
- A Semantic Model-based Security Engineering Framework for Cyber-Physical SystemsAndreas Aigner, Abdelmajid Khelil. 1826-1833 [doi]
- Attribute-Based Data Access Control for Multi-Authority SystemAhmad Salehi S., Carsten Rudolph, Marthie Grobler. 1834-1841 [doi]
- DNRTI: A Large-scale Dataset for Named Entity Recognition in Threat IntelligenceXuren Wang, Xinpei Liu, Shengqin Ao, Ning Li, Zhengwei Jiang, Zongyi Xu, Zihan Xiong, Mengbo Xiong, Xiaoqing Zhang. 1842-1848 [doi]
- AndroTIME: Identifying Timing Side Channels in the Android APIGerald Palfinger, Bernd Prünster, Dominik Julian Ziegler. 1849-1856 [doi]
- FIDOnuous: A FIDO2/WebAuthn Extension to Support Continuous Web AuthenticationEric Klieme, Jonathan Wilke, Niklas van Dornick, Christoph Meinel. 1857-1867 [doi]
- A Blockchain-based Key Management Protocol for Secure Device-to-Device Communication in the Internet of ThingsMohamed Ali Kandi, Djamel Eddine Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal. 1868-1873 [doi]
- Finding Geometric Medians with Location PrivacyEyal Nussbaum, Michael Segal 0001. 1874-1881 [doi]
- Security and Privacy Analysis of mhealth Application: A Case StudyWanrong Zhao, Hossain Shahriar, Victor Clincy, Md Zakirul Alam Bhuiyan. 1882-1887 [doi]
- Enabling Security Analysis of IoT Device-to-Cloud TrafficEda Zhou, Joseph Turcotte, Lorenzo De Carli. 1888-1894 [doi]
- Towards A New Approach to Identify WhatsApp MessagesRick Cents, Nhien-An Le-Khac. 1895-1902 [doi]
- Efficient Off-Chain Transaction to Avoid Inaccessible Coins in CryptocurrenciesHossein Rezaeighaleh, Cliff C. Zou. 1903-1909 [doi]
- Assessing the Similarity of Smart Contracts by Clustering their InterfacesMonika Di Angelo, Gernot Salzer. 1910-1919 [doi]
- Securing Manufacturing Using BlockchainZahra Jadidi, Ali Dorri, Raja Jurdak, Colin J. Fidge. 1920-1925 [doi]
- SCUR: Smart Contracts with a Static Upper-bound on Resource UsageMarkus Knecht, Burkhard Stiller. 1926-1934 [doi]
- SSIBAC: Self-Sovereign Identity Based Access ControlRafael Belchior, Benedikt Putz, Günther Pernul, Miguel Correia 0001, André Vasconcelos, Sérgio Guerreiro. 1935-1943 [doi]
- A Privacy-Preserving Crowdsensing System with Muti-BlockchainTao Peng 0011, Jierong Liu, Jianer Chen, Guojun Wang 0001. 1944-1949 [doi]
- A Blockchain-based Vehicle-trust Management Framework Under a Crowdsourcing EnvironmentDawei Wang, Xiao Chen 0003, Haiqin Wu, Ruozhou Yu, Yishi Zhao. 1950-1955 [doi]
- Permission Token Segmentation Scheme based on Blockchain Access ControlJinshan Shi, Ru Li. 1956-1964 [doi]
- A blockchain-based pattern for confidential and pseudo-anonymous contract enforcementNicolas Six, Claudia Negri Ribalta, Nicolas Herbaut, Camille Salinesi. 1965-1970 [doi]
- Detecting Online Game Malicious Chargeback by using k-NNYu-Chih Wei, You-Xin Lai, Hai-Po Su, Yu-Wen Yen. 1971-1976 [doi]
- A novel Q-Learning Algorithm Based on the Stochastic Environment Path Planning ProblemLi Jian, Fei Rong, Tang Yu. 1977-1982 [doi]
- Boosting Homograph Attack Classification Using Ensemble Learning and N-gram ModelTran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001. 1983-1988 [doi]
- Survey on Blockchain and Deep LearningYizhuo Zhang, Yiwei Liu, Chi-Hua Chen. 1989-1994 [doi]
- Special-purpose Model Extraction Attacks: Stealing Coarse Model with Fewer QueriesRina Okada, Zen Ishikura, Toshiki Shibahara, Satoshi Hasegawa. 1995-2000 [doi]
- A low-cost method for accurate localization of traffic participantsMaozhu Liao, Shengdong Chen, Chuangjie Zheng, Feng Yuan. 2001-2006 [doi]
- Integration of 5G, VANETs and Blockchain TechnologyMuhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing. 2007-2013 [doi]
- Aquatic Drone Control Using Inertial Sensors - Comparative Filtering MethodsMihaela Hnatiuc, Oana Geman, Dragos Vicoveanu, George Motru. 2014-2019 [doi]
- Factors affecting trust in the autonomous vehicle: A survey of primary school students and parent perceptionsYingying Ma, Shuo Li 0003, Shaotian Qin, Yue Qi. 2020-2027 [doi]
- Prediction of Radio Frequency Spectrum OccupancyHubert Kyeremateng-Boateng, Marvin A. Conn, Darsana Josyula, Manohar Mareboyana. 2028-2034 [doi]