Abstract is missing.
- A Time-aware Trust Management Heuristic for the Internet of VehiclesSarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni 0001. 1-8 [doi]
- Verifiable Conjunctive Keyword Search with Certificateless SearchableLinghan Zhang, F. Jiang, Xiaohu Tang. 9-16 [doi]
- Reliable Logging in Wireless IoT Networks in the Presence of Byzantine FaultsSara Alhajaili, Arshad Jhumka. 17-25 [doi]
- The Performance of Selfish Mining in GHOSTQing Xia, Wensheng Dou, Fengjun Zhang, Geng Liang. 26-33 [doi]
- Bidder Scalable M+1st-Price Auction with Public VerifiabilityPo-Chu Hsu, Atsuko Miyaji. 34-42 [doi]
- VEIN: High Scalability Routing Algorithm for Blockchain-based Payment Channel NetworksQianyun Gong, Chengjin Zhou, Le Qi, Jianbin Li, Jianzhong Zhang, Jingdong Xu. 43-50 [doi]
- TrustMod: A Trust Management Module For NS-3 SimulatorMuhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri. 51-60 [doi]
- Adaptive Clustering Ensemble Method Based on Uncertain Entropy Decision-MakingXiaomin Zhu 0001, Bowen Fei, Daqian Liu, Weidong Bao. 61-67 [doi]
- Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed AutomataJiaqi Yin, Huibiao Zhu, Yuan-fei. 68-75 [doi]
- Protecting the Ownership of Deep Learning Models with An End-to-End Watermarking FrameworkWei Zhang, Wenxue Cui, Feng Jiang, Chifu Yang, Ran Li. 76-82 [doi]
- Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real WorldWei Xia, Wei Wang, Xin He, Gang Xiong, Gaopeng Gou, Zhenzhen Li, Zhen Li. 83-90 [doi]
- RoBin: Facilitating the Reproduction of Configuration-Related VulnerabilityLigeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao. 91-98 [doi]
- Universal Website Fingerprinting Defense Based on Adversarial ExamplesChengshang Hou, Junzheng Shi, Mingxin Cui, Mengyan Liu, Jing Yu. 99-106 [doi]
- Rando: A General-purpose True Random Number Generator for Conventional ComputersRipon Patgiri. 107-113 [doi]
- You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android AppsPrashanthi Mallojula, Javaria Ahmad, FengJun Li, Bo Luo. 114-121 [doi]
- Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic SamplingWenjuan Li, Weizhi Meng 0001, Laurence T. Yang. 122-129 [doi]
- Anti-occlusion and Scale Adaptive Target Tracking Algorithm Based on Kernel Correlation FilterChuanyun Wang, Zhongrui Shi, Keyi Si, Yang Su, Zhaokui Li, Ershen Wang. 130-138 [doi]
- Secure Ranked Choice Online Voting System via Intel SGX and BlockchainXuechao Yang, Xun Yi, Andrei Kelarev. 139-146 [doi]
- MagikCube: Securing Cross-Domain Publish/Subscribe Systems with EnclaveShuran Wang, Dahan Pan, Runhan Feng, Yuanyuan Zhang 0002. 147-154 [doi]
- Security on SM2 and GOST Signatures against Related Key AttacksHandong Cui, Xianrui Qin, Cailing Cai, Tsz Hon Yuen. 155-163 [doi]
- Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight CiphersGao Wang, Gaoli Wang, Yu He. 164-171 [doi]
- Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and CountermeasuresBartosz Drzazga, Lukasz Krzywiecki, Hannes Salin. 172-179 [doi]
- Remote Attestation of Large-scale Virtual Machines in the Cloud Data CenterJie Cheng, Kun Zhang 0016, Bibo Tu. 180-187 [doi]
- DeepTrace: A Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural NetworksRunhao Wang, Jiexiang Kang, Wei Yin, Hui Wang, Haiying Sun, Xiaohong Chen, Zhongjie Gao, Shuning Wang, Jing Liu 0012. 188-195 [doi]
- Signature-Based Secure Trajectory Similarity SearchYiping Teng, Zhan Shi, Fanyou Zhao, Guohui Ding, Li Xu, Chunlong Fan. 196-206 [doi]
- A secure deduplication scheme based on data popularity with fully random tagsGuanxiong Ha, Hang Chen, Chunfu Jia, Ruiqi Li, Qiaowen Jia. 207-214 [doi]
- SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity KernelBingnan Zhong, Qingkai Zeng. 215-223 [doi]
- The Design of Secure Coded Edge Computing for User-Edge Collaborative ComputingMingyue Cui, Jin Wang, Jingya Zhou, Kejie Lu, Jianping Wang 0001. 224-231 [doi]
- A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITSXiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Jian Xu, Shi Bai, Yuan He 0002. 232-239 [doi]
- LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic DatasetZheyuan Gu, Gaopeng Gou, Chengshang Hou, Gang Xiong, Zhen Li. 240-249 [doi]
- The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge ComputingCong Cheng, Lingzhi Li 0001, Jin Wang, Fei Gu. 250-257 [doi]
- Secure Data Transmission with Access Control for Smart Home DevicesBiwen Chen, Lei Yang, Tao Xiang, Xiaoguo Li. 258-265 [doi]
- Secure Homomorphic Evaluation of Discrete Cosine Transform with High PrecisionZhiwei Cai, Huicong Zeng, Peijia Zheng, Ziyan Cheng, Weiqi Luo, Hongmei Liu. 266-272 [doi]
- Techniques for Securing 5G Network Services from attacksVijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar. 273-280 [doi]
- Techniques for Securing Control Systems from AttacksUday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar. 281-288 [doi]
- Overcoming security limitations of Secret Share techniques: the Nested Secret ShareAntonino Galletta, Javid Taheri, Maria Fazio, Antonio Celesti, Massimo Villari. 289-296 [doi]
- Enhancing Privacy Through DMMA: Decision-Making Method for AuthenticationMaksym Slavnenko, Yevhen Zolotavkin, Jay Jeong, Veronika Kuchta, Robin Doss. 297-308 [doi]
- Security Library for Safe Data Storage on Android PlatformAneta Poniszewska-Maranda, Lukasz Rogozinski, Witold Maranda. 309-316 [doi]
- Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple EavesdroppersJiaxing Cui, Zhengmin Kong, Jing Song, Weijun Yin, Xianjun Deng. 317-322 [doi]
- Effective RFID Localization Based on Fuzzy Logic For SecurityLicai Zhu, Hao Yang 0002, Shi Chen, ZhiPeng Yu. 323-330 [doi]
- White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced DecryptionDominik Ziegler 0001, Alexander Marsalek, Gerald Palfinger. 331-338 [doi]
- PCHEC: A Private Coded Computation Scheme For Heterogeneous Edge ComputingJiqing Chang, Jin Wang, Fei Gu, Kejie Lu, Lingzhi Li 0001, Jianping Wang. 339-346 [doi]
- A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing EnvironmentDayin Zhang, Xiaojun Chen 0004, Jinqiao Shi, Dakui Wang, Shuai Zeng. 347-354 [doi]
- Sybil Attacks and Defense on Differential Privacy based Federated LearningYupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng. 355-362 [doi]
- Achieving Efficient and Privacy-preserving Biometric Identification in Cloud ComputingChang Xu 0004, Lvhan Zhang, Liehuang Zhu, Chuan Zhang 0003, Kashif Sharif. 363-370 [doi]
- Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for ERM AlgorithmsYuzhe Li, Yong Liu, Bo Li, Weiping Wang 0005, Nan Liu. 371-378 [doi]
- Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS QueriesRuxue Wen, Rui Zhang, Kai Peng, Chen Wang. 379-386 [doi]
- A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical ThingsMengyao Peng, Jia Hu 0001, Hui Lin 0007, Xiaoding Wang, Wenzhong Lin. 387-396 [doi]
- DP-gSpan: A Pattern Growth-based Differentially Private Frequent Subgraph Mining AlgorithmJiangna Xing, Xuebin Ma. 397-404 [doi]
- Differential Privacy Preservation in Adaptive K-Nets ClusteringXiaohong Liu, Hanbo Cai, De-li, Xianxian Li, Jinyan Wang. 405-412 [doi]
- A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social NetworksTao Peng 0011, Wentao Zhong, Kejian Guan, Yipeng Zou, Jiawei Zhu, Guojun Wang 0001. 413-419 [doi]
- Dynamic Searchable Symmetric Encryption with Forward and Backward PrivacyYu Peng, Qin Liu 0001, Yue Tian, Jie Wu, Tian Wang 0001, Tao Peng 0011, Guojun Wang 0001. 420-427 [doi]
- Adaptive Clipping Bound of Deep Learning with Differential PrivacyYuhang Hu, De-li, Zhou Tan, Xianxian Li, Jinyan Wang. 428-435 [doi]
- Improving the Effect of Frequent Itemset Mining with Hadamard Response under Local Differential PrivacyXuebin Ma, Haijiang Liu, Shengyi Guan. 436-443 [doi]
- A Privacy-preserving Location Recommendation Scheme without Trustworthy EntityChangli Zhou, Jing Peng, Ying Ma, Qingfeng Jiang. 444-451 [doi]
- An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with RevocationXiaohan Yue, Lixin Yang, Xibo Wang, Shuaishuai Zeng, Jian Xu, Shi Bai, Yuan He. 452-459 [doi]
- A privacy-preserving framework for smart contracts based on stochastic model checkingTingting Bao, Yang Liu. 460-467 [doi]
- Towards Protecting Sensitive Text with Differential PrivacySam Fletcher, Adam Roegiest, Alexander K. Hudek. 468-475 [doi]
- Answering Why-not Questions on Top k Queries with Privacy ProtectionYiping Teng, Weiyu Zhao, Chuanyu Zong, Li Xu, Chunlong Fan, Huan Wang. 476-485 [doi]
- Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud ImagesDelin Chen, Peijia Zheng, Ziyang Chen, Ruopan Lai, Weiqi Luo, Hongmei Liu. 486-493 [doi]
- Privacy-Preserving Biometric Matching Using Homomorphic EncryptionGaëtan Pradel, Chris J. Mitchell. 494-505 [doi]
- Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline RevocationAndreas Abraham, Karl Koch, Stefan More, Sebastian Ramacher, Miha Stopar. 506-513 [doi]
- Effective Deep Learning-based Side-Channel Analyses Against ASCADJunkai Liu, Shihui Zheng, Lize Gu. 514-523 [doi]
- Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the EdgeJianhua Li, Ximeng Liu, Jiong Jin, Shui Yu. 524-531 [doi]
- ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box AccessGaoyang Liu, Shijie Wang, Borui Wan, Zekun Wang, Chen Wang. 532-539 [doi]
- Malware Classification by Learning Semantic and Structural Features of Control Flow GraphsBolun Wu, Yuanhang Xu, Futai Zou. 540-547 [doi]
- Automated Detection of Malware Activities Using Nonnegative Matrix FactorizationChansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue. 548-556 [doi]
- A Fast-Detection and Fault-Correction Algorithm against Persistent Fault AttackYukun Cheng, Mengce Zheng, Fan Huang, Jiajia Zhang, Honggang Hu, Nenghai Yu. 557-568 [doi]
- Multi-level Directed Fuzzing for Detecting Use-after-Free VulnerabilitiesYuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang. 569-576 [doi]
- DePL: Detecting Privacy Leakage in DNS-over-HTTPS TrafficFutai Zou, Dechao Meng, Wentao Gao, Linsen Li. 577-586 [doi]
- Analyzing Interoperability and Portability Concepts for Self-Sovereign IdentityAndreas Grüner, Alexander Mühle, Christoph Meinel. 587-597 [doi]
- DeepVuler: A Vulnerability Intelligence Mining System for Open-Source CommunitiesSusheng Wu, Bin Chen, Mingxu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang 0003. 598-605 [doi]
- Malicious Packages Lurking in User-Friendly Python Package IndexGenpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang. 606-613 [doi]
- A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAsXianwen Deng, Ruijie Zhao, Zhi Xue, Ming Liu, Libo Chen, Yijun Wang. 614-619 [doi]
- Robust Backdoor Attacks against Deep Neural Networks in Real Physical WorldMingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu. 620-626 [doi]
- MALUP: A Malware Classification Framework using Convolutional Neural Network with Deep Unsupervised Pre-trainingQian Qiang, Mian Cheng, Yuan Zhou, Yu Ding, Zisen Qi. 627-634 [doi]
- FLDDoS: DDoS Attack Detection Model based on Federated LearningJiachao Zhang, Peiran Yu, Le Qi, Song Liu, Haiyu Zhang, Jianzhong Zhang. 635-642 [doi]
- Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User TrustLin Wang, Kun Zhang 0016, Chen Li, Bibo Tu. 643-650 [doi]
- AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal LearningGang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao. 651-658 [doi]
- A Novel Android Malware Detection Method Based on Visible User InterfaceShuaishuai Tan, Zhiyi Tian, Xiaoxiong Zhong, Shui Yu, Weizhe Zhang, Guozhong Dong. 659-666 [doi]
- EnvFaker: A Method to Reinforce Linux Sandbox Based on Tracer, Filter and Emulator against Environmental-Sensitive MalwareChenglin Xie, Yujie Guo, Shaosen Shi, Yu Sheng, Xiarun Chen, Chengyang Li, Weiping Wen. 667-677 [doi]
- TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVMBoru Liu, Dan Tang, Yudong Yan, Zhiqing Zheng, Shihan Zhang, Jiangmeng Zhou. 678-685 [doi]
- Sensing Error Handling Bugs in SSL Library UsagesChi Li, Min Zhou 0001, Xinrong Han, Ming Gu 0001. 686-692 [doi]
- DeepTaskAPT: Insider APT detection using Task-tree based Deep LearningMohammad Mamun, Kevin Shi. 693-700 [doi]
- Git Leaks: Boosting Detection Effectiveness Through Endpoint VisibilityCarlo Farinella, Ali Ahmed, Craig Watterson. 701-709 [doi]
- A Digital Forensics Investigation of a Smart Scale IoT EcosystemGeorge Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson. 710-717 [doi]
- Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented DataR. G. Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma. 718-725 [doi]
- MAAC: Novel Alert Correlation Method To Detect Multi-step AttackXiaoyu Wang, Xiaorui Gong, Lei Yu, Jian Liu. 726-733 [doi]
- PGAN: A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection SystemZeyi Li, Yun Wang, Pan Wang, Haorui Su. 734-741 [doi]
- LP-UIT: A Multimodal Framework for Link Prediction in Social NetworksHuizi Wu, Shiyi Wang, Hui Fang 0002. 742-749 [doi]
- Cost-sensitive Heterogeneous Integration for Credit Card Fraud DetectionYuhua Ling, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang. 750-757 [doi]
- Depression Detection Using Asynchronous Federated OptimizationJinli Li, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang. 758-765 [doi]
- Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting AttackChengshang Hou, Junzheng Shi, Mingxin Cui, Qingya Yang. 766-773 [doi]
- VulChecker: Achieving More Effective Taint Analysis by Identifying Sanitizers AutomaticallyXiarun Chen, Qien Li, Zhou Yang, Yongzhi Liu, Shaosen Shi, Chenglin Xie, Weiping Wen. 774-782 [doi]
- Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH ResolversJiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang. 783-790 [doi]
- Towards Strengthening Deep Learning-based Side Channel Attacks with MixupZhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu. 791-801 [doi]
- DroidRadar: Android Malware Detection Based on Global Sensitive Graph EmbeddingQige Song, Yongzheng Zhang 0002, Junliang Yao. 802-809 [doi]
- MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity PoliciesDongrui Zeng, Ben Niu 0007, Gang Tan. 810-821 [doi]
- ReLF: Scalable Remote Live Forensics for AndroidRuipeng Zhang, Mengjun Xie, Jiang Bian 0001. 822-831 [doi]
- Frequency Domain Fusion Algorithm of Infrared and Visible Image Based on Compressed Sensing for Video Surveillance ForensicsChuanyun Wang, Guowei Yang, Dongdong Sun, Jiankai Zuo, Ershen Wang, Linlin Wang. 832-839 [doi]
- Virtual Static Security Analyzer for Web ApplicationsMihail Brinza, Miguel Correia, João Pereira. 840-848 [doi]
- Social Spammer Detection Based on Semi-Supervised LearningXulong Zhang, Frank Jiang 0001, Ran Zhang, Shupeng Li, Yang Zhou. 849-855 [doi]
- FIDS: Detecting DDoS Through Federated Learning Based MethodJingyi Li, Zikai Zhang, Yidong Li, Xinyue Guo, Huifang Li. 856-862 [doi]
- Gray Adversarial Attack Algorithm based on Multi-Scale Grid SearchChunlong Fan, Jici Zhang, Cailong Li, Zhenxin Zhang, Yiping Teng, Jianzhong Qiao. 863-870 [doi]
- An Interactive System for Unfair Rating Detection Models in a Customized PerspectiveKe Lv, Yuan Liu, Jienan Chen, Dongxia Wang, Zhihong Tian. 871-878 [doi]
- PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of ThingsLing Wang, Cheng Zhang, Zejian Luo, ChenGuang Liu, Jie Liu, Xi Zheng. 879-886 [doi]
- A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things EnvironmentsNickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke. 887-894 [doi]
- Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous VehiclesJiwei Guan, Xi Zheng, Chen Wang, Yipeng Zhou, Alireza Jolfaei. 895-902 [doi]
- Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted DataChangqing Gong, Zhaoyang Dong, Abdullah Gani, Han Qi. 903-910 [doi]
- ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin SystemXiaoqing Wang, Chunping Wang, Kun Zhou, Hongbing Cheng. 911-918 [doi]
- Complementary Context-Enhanced Concept Lattice Aware Personalized RecommendationWenqing Huang, Fei Hao, Guangyao Pang, Yifei Sun. 919-926 [doi]
- BERTDeep-Ware: A Cross-architecture Malware Detection Solution for IoT SystemsSalma Abdalla Hamad, Dai Hoang Tran, Quan Z. Sheng, Wei Emma Zhang. 927-934 [doi]
- A Blockchain Scheme Based on DAG Structure Security Solution for IIoTPengjie Zeng, Xiaoliang Wang 0002, Liangzuo Dong, Xinhui She, Frank Jiang 0001. 935-943 [doi]
- Automatically derived stateful network functions including non-field attributesBin Yuan, Shengyao Sun, Xianjun Deng, Deqing Zou, Haoyu Chen, Shenghui Li, Hai Jin 0001. 944-951 [doi]
- Phishing Web Page Detection with HTML-Level Graph Neural NetworkLinshu Ouyang, Yongzheng Zhang 0002. 952-958 [doi]
- A Feature-Flux Traffic Camouflage Method based on Twin Gaussian ProcessChangbo Tian, Yongzheng Zhang, Tao Yin. 959-966 [doi]
- A HEVC Video Steganography Algorithm Based on DCT/DST Coefficients with Improved VRCNNAijun Zhou, Xinghao Jiang, Zhaohong Li, Zhenzhen Zhang. 967-975 [doi]
- MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR SystemHuanyu Wu, Lunjie Li, Hye-Young Paik, Salil S. Kanhere. 976-987 [doi]
- Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure CategorizationMasaki Aota, Tao Ban, Takeshi Takahashi 0001, Noboru Murata. 988-996 [doi]
- How to Increase Smart Home Security and Privacy Risk PerceptionReyhan Duezguen, Peter Mayer, Benjamin Berens, Christopher Beckmann, Lukas Aldag, Mattia Mossano, Melanie Volkamer, Thorsten Strufe. 997-1004 [doi]
- An Adaptive Multi-pairwise Ranking with Implicit Feedback for RecommendationJianfang Wang, Zhiqiang Wu, Guang Chen, Detao Liu, Qiuling Zhang. 1005-1012 [doi]
- Multi-UAV Cooperative Obstacle Avoidance and Surveillance in Intelligent TransportationDaqian Liu, Weidong Bao, Bowen Fei, Xiaomin Zhu, Zhenliang Xiao, Tong Men. 1013-1020 [doi]
- Another Look at the Connection between CAN Signal Ringing & In-Vehicle ECU IdentificationYucheng Liu, Hao Wu, Xiangxue Li. 1021-1030 [doi]
- A Novel Security Framework for Edge Computing based UAV Delivery SystemAiting Yao, Frank Jiang 0001, Xuejun Li, Chengzu Dong, Jia Xu 0010, Yi Xu, Gang Li 0009, Xiao Liu 0004. 1031-1038 [doi]
- LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoWJiangFeng Ma, Xiangxue Li, Haifeng Qian. 1039-1048 [doi]
- Reinforcement-Learning-based IDS for 6LoWPANAryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope. 1049-1060 [doi]
- Accepted Influence Maximization under Linear Threshold Model on Large-Scale Social NetworksXiaojuan Yang, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Shu Fu, Baohua Qiang. 1061-1068 [doi]
- Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow RecordsPeipei Fu, Qingya Yang, Yangyang Guan, Bingxu Wang, Gaopeng Gou, Zhen Li, Gang Xiong, Zhenzhen Li. 1069-1076 [doi]
- BSA: Enabling Biometric-Based Storage and Authorization on BlockchainJie Ma, Bin Qi, Kewei Lv. 1077-1084 [doi]
- QuickLogS: A Quick Log Parsing Algorithm based on Template SimilarityLuyue Fang, Xiaoqiang Di, Xu Liu 0010, Yiping Qin, Weiwu Ren, Qiang Ding. 1085-1092 [doi]
- Energy Efficient Merkle Trees for BlockchainsCesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta 0001, Ladislau Bölöni. 1093-1099 [doi]
- BinDeep: Binary to Source Code Matching Using Deep LearningSaed Alrabaee, Kim-Kwang Raymond Choo, Mohammad Qbea'h, Mahmoud Khasawneh. 1100-1107 [doi]
- Efficient k Nearest Neighbor Query Processing on Public Transportation NetworkJiajia Li, Lingyun Zhang, Cancan Ni, Yunzhe An, Chuanyu Zong, Anzhen Zhang. 1108-1115 [doi]
- Hop-by-hop Accounting and Rewards for Packet dIspAtchingCaciano Machado, Renan R. S. dos Santos, Carla Merkle Westphall. 1116-1123 [doi]
- Dynamic Edge Association in Hierarchical Federated Learning NetworksWei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, Sahil Garg, Yang Zhang 0025, Dusit Niyato, Chunyan Miao. 1124-1131 [doi]
- Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel AttacksYusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng. 1132-1140 [doi]
- TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply ChainsSidra Malik, Naman Gupta, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak. 1141-1152 [doi]
- Wait or Reset Gas Price?: A Machine Learning-based Prediction Model for Ethereum Transactions' Waiting TimeAkshay M. Fajge, Subhasish Goswami, Arpit Srivastava, Raju Halder. 1153-1160 [doi]
- Policy Network Assisted Monte Carlo Tree Search for Intelligent Service Function Chain DeploymentZhihan Fu, Qilin Fan, Xu Zhang, Xiuhua Li, Sen Wang, Yueyang Wang. 1161-1168 [doi]
- Compressing the Bitcoin Blockchain using Incremental SnapshotsAlexander Marsalek, Thomas Zefferer. 1169-1176 [doi]
- Select-Storage: A New Oracle Design Pattern on BlockchainZhipeng Gao, Zijian Zhuang, Yijing Lin, Lanlan Rui, Yang Yang 0006, Chen Zhao, Zijia Mo. 1177-1184 [doi]
- A Deep Learning Model for Threat Hunting in Ethereum BlockchainElnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi. 1185-1190 [doi]
- On Application of Blockchain to Enhance Single Sign-On (SSO) SystemsSwapnoneel Roy, Sam Matloob, Debajyoti Mukhopadhyay. 1191-1195 [doi]
- EDKSAP : Efficient Double-Key Stealth Address Protocol in BlockchainCong Feng, Liang Tan, Huan Xiao, Xin Qi, Zheng Wen, Yang Liu. 1196-1201 [doi]
- Redactable Blockchain based on Unforgeable Signatures for Supporting Fast VerificationXiaocong Li, Changshe Ma. 1202-1207 [doi]
- A blind watermarking system based on deep learning modelLichao Zhang, Wangbin Li, Hailiang Ye. 1208-1213 [doi]
- Application of Bayesian Network Reasoning Algorithm in Emotion ClassificationZhiyi Mo, Yutong Xing, Zizhen Peng. 1214-1219 [doi]
- An Measurement Method of Oblique Wedge Rubbing Surface Abrasion Based on Point CloudHuanlong Liu, Bin Jiang, Zhengjie Wang, Hongyu Peng. 1220-1226 [doi]
- A Secured Real-Time IoMT Application for Monitoring Isolated COVID-19 Patients using Edge ComputingVenki Balasubramanian, Rehena Sulthana, Andrew Stranieri, G. Manoharan, Teena Arora, Ram Srinivasan, K. Mahalakshmi, Varun G. Menon. 1227-1234 [doi]
- Simple Online Unmanned Aerial Vehicle Tracking with TransformerYang Liu, Ershen Wang, Song Xu, Zhi Wang, Meizhi Liu, Wansen Shu. 1235-1239 [doi]
- Detection of Anomaly User Behaviors Based on Deep Neural NetworksZhaoyun Ding, Lina Liu, Donghua Yu, Songping Huang, Hang Zhang, Kai Liu. 1240-1245 [doi]
- Release of Trajectory Data based on Space Segmentation using Differential PrivacyYongxin Zhao, Wanqing Wu, Chaofan Di. 1246-1253 [doi]
- An Implementation and Optimization Method of RTLS Based on UWB for Underground MineZerui Fang, Shiyao Cui, Qing Su, Suzhen Wang. 1254-1258 [doi]
- Random Forest Algorithm Based on Differential Privacy ProtectionYaling Zhang, Pengfei Feng, Yao Ning. 1259-1264 [doi]
- An axis extract method for rotational parts based on point cloud normal linesHuanlong Liu, Zhengjie Wang, Yao Chen, Hongyu Peng. 1265-1269 [doi]
- Human Trajectory Prediction Using Stacked Temporal Convolutional NetworkYajie Wang, Jinli Ma, Zhao Pei, Jun Li. 1270-1274 [doi]
- Revisiting Anonymity and Privacy of BitcoinTianyu Zhao, Tao Zhang. 1275-1280 [doi]
- An inertia wheel pendulum control method based on actor-critic learning algorithmHuanlong Liu, Zhengjie Wang, Bin Jiang, Hongyu Peng. 1281-1285 [doi]
- Decentralized Policy Information Points for Multi-Domain EnvironmentsM. Ridwanur Rahman, Ahmad Salehi S., Carsten Rudolph. 1286-1293 [doi]
- Secure Development Strategy Model Framework for Security of Mobile ApplicationsAneta Poniszewska-Maranda, Lukasz Chomatek, Joanna Ochelska-Mierzejewska. 1294-1299 [doi]
- GEA-net: Global embedded attention neural network for image classificationYajie Wang, Zhiyang Wan, Zhao Pei, Chengcai Leng, Yuli Chen. 1300-1305 [doi]
- Design of Lightweight Intelligent Vehicle System Based on Hybrid Depth ModelZhuo Yan, Bin Lan, Shaohao Chen, Senyu Yu, Xingwei Wang, Zhuoqun Fang, Wei Chen, Chuanyun Wang, Xiangbin Shi. 1306-1311 [doi]
- Improved NS Cellular Automaton Model for Simulating Traffic Flows of Two-LaneZhuo Yan, Xingwei Wang, Bin Lan, Senyu Yu, Shaohao Chen, Zhuoqun Fang, Chuanyun Wang, Wei Chen, Xiangbin Shi. 1312-1317 [doi]
- A Filter Rank Based Pruning Method for Convolutional Neural NetworksHao Liu, Zhenyu Guan, Peng Lei. 1318-1322 [doi]
- A TDOA-Assisted Direct Position Determination for Efficient Geolocalization Using LEO SatellitesQianyun Zhang, Shijie Li, Jiting Shi, Zhenyu Guan. 1323-1327 [doi]
- Research and implementation of an analytical database testing platform in telecommunication industryChaolun Wang, Yuan Liu, Pengwei Ma, Jiafeng Tian, Siyuan Liu, Minjing Zhong, Chunyu Jiang. 1328-1333 [doi]
- C-V2X Large-scale Test Network Transmission Performance Data Analysis MethodKe Xu, Miaoqiong Wang, Yuming Ge, Rundong Yu, Jian Wang 0003, Jiachen Zhang. 1334-1339 [doi]
- Design of Digital Maincenter Platform for Smart Home Based on Big DataYuhan Liu, Yutao Zhang, Heng Zhang, Yongfeng Wang, Lianbo Song. 1340-1344 [doi]
- Overview of Beam Hopping Algorithms in Large Scale LEO Satellite ConstellationYuanpeng Li, YiLe Fan, Shuaijun Liu, Lixiang Liu, Wenge Yang. 1345-1351 [doi]
- Joint Power and Bandwidth Allocation for Internet of Vehicles Based on Proximal Policy Optimization AlgorithmSujie Xu, Xin Hu, Libing Wang, Yin Wang, Weidong Wang. 1352-1357 [doi]
- NR Shared Spectrum efficiency and utilization analysis based on big dataWei Wei, Yang Zhang, Zhongsheng Fan, Jinge Guo, Bao Guo, HuangTao Song. 1358-1362 [doi]
- Research and Application of Intelligent Antenna Feeder Optimization System based on Big DataMingxin Li, Mingde Huo, Lexi Xu, Xinzhou Cheng, Xin Zhao. 1363-1368 [doi]
- Research on Evaluation System of Relational Cloud DatabasePengwei Ma, Kai Wei, Chunyu Jiang, Junyi Li, Jiafeng Tian, Siyuan Liu, Minjing Zhong. 1369-1373 [doi]
- Design and Implementation of Intelligent Operation and Maintenance System for Big Data PlatformXu Liu, Ruoyu Li, Penghao Yue. 1374-1379 [doi]
- Research of Sharing and Compatibility for HIBS and Terrestrial Network in 900MHzTingting Wang, Yao Zhou, Yushan Pei, Fuchang Li. 1380-1385 [doi]
- A Non-Cooperative Data Center Energy Consumption Optimization Strategy Based on SDN StructureHongyu Peng, Fujian Sun, Kan Wang, Tianlu Hao, Dequan Xiao, Lexi Xu. 1386-1390 [doi]
- A Novel Architecture and Algorithm for Prediction of Students Psychological Health based on Big DataChen Cheng, Xinzhou Cheng, Yuting Zheng, Lijuan Cao, Yuhui Han, Yuwei Jia, Qingqing Zhang, Yi Zhang, Ya-Nan Zhang, Lexi Xu. 1391-1396 [doi]
- Analysis of the Application of Big Data in Banking SectorBinqi Cheng, Weijie Feng. 1397-1401 [doi]
- Automated Performance Benchmarking Platform of IaaS CloudXu Liu, Dongxu Fang, Peng Xu. 1402-1405 [doi]
- Base Station Prediction Analysis Scheme Based on Lasso Regression Machine Learning AlgorithmDong Wang, Yue Che, Chao Li, Yahui Chen, Hui Yin, Chunlian Zhang. 1406-1411 [doi]
- BRLR: A Routing Strategy for MANET Based on Reinforcement LearningYinghe Wang, Yu Tang. 1412-1417 [doi]
- Databench-T: A Transactional Database Benchmark for Financial ScenariosChunyu Jiang, Jiafeng Tian, Pengwei Ma. 1418-1421 [doi]
- Evaluation and Application of News Transmission Speed in New Media EnvironmentHeng Zhang, Yuhan Liu, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Wei Xia, Ciguang Yang. 1422-1427 [doi]
- Online Automatic Service Composition for Mobile and Pervasive ComputingZhaoning Wang, Bo Cheng 0001, Junliang Chen. 1428-1433 [doi]
- Privacy-Preserving Neural Architecture Search Across Federated IoT DevicesChunhui Zhang, Xiaoming Yuan, Qianyun Zhang, Guangxu Zhu, Lei Cheng, Ning Zhang. 1434-1438 [doi]
- Sharing and Compatibility Studies of EESS(active) and IMT System in 10-10.5 GHzJifeng Liu, Yao Zhou, Yiying Niu, Tingting Wang, Tao Zhang, Fuchang Li. 1439-1444 [doi]
- FedIM: An Anti-attack Federated Learning Based on Agent Importance AggregationZhipeng Gao, Chenhao Qiu, Chen Zhao, Yang Yang, Zijia Mo, Yijing Lin. 1445-1451 [doi]
- Matching Sensor Ontologies with Neural NetworkXingsi Xue, Haolin Wang, Yunmeng Zhao, Yikun Huang, Hai Zhu. 1452-1457 [doi]
- Trusted Artificial Intelligence: Technique Requirements and Best PracticesTao Zhang, Yi Qin, Qiang Li. 1458-1462 [doi]
- Multidimensional Observation of Blockchain SecurityMengjian Cai, Zhanli Sun, Xin Deng. 1463-1466 [doi]
- Construction of Knowledge Graph Based on Discipline Inspection and SupervisionYuefeng Liu, Wei Guo, Hanyu Zhang, Haodong Bian, Yingjie He, Xiaoyan Zhang, Yanzhang Gong, Jianmin Dong, Zhen Liu. 1467-1472 [doi]
- Prediction of remaining useful life of turbofan engine based on optimized modelYuefeng Liu, Xiaoyan Zhang, Wei Guo, Haodong Bian, Yingjie He, Zhen Liu. 1473-1477 [doi]
- Design and Implementation of Scanning Electron Microscope Image Acquisition Software SystemWei Shi, Mixue Deng, Dong Wang, Yuyun Yang, Deyin Li, Lirong Wang. 1478-1482 [doi]
- Research on Droplet Digital PCR Amplification SystemJie Zhang, Jiaqi Yan, Jinxian Wang, Jie Xu, Yilong Zhao, Gangyin Luo. 1483-1487 [doi]
- A multi-scale convolutional neural network for heartbeat classificationLesong Zheng, Miao Zhang, Lishen Qiu, Gang Ma, Wenliang Zhu, Lirong Wang. 1488-1492 [doi]
- An Automatic Algorithm for P/T-Wave Detection based on Auxiliary WaveformDuoduo Wang, Lishen Qiu, Wanyue Li, Wenliang Zhu, Lirong Wang. 1493-1497 [doi]
- Automated Classification of Atrial Fibrillation and Atrial Flutter in ECG Signals based on Deep LearningHuimin Zhang, Lishen Qiu, Wenliang Zhu, Wenqiang Cai, Lirong Wang. 1498-1502 [doi]
- Beat-to-beat Heart Rate Detection Based on Seismocardiogram Using BiLSTM NetworkYuhang Chen, Wenchang Xu, Wenliang Zhu, Gang Ma, Xiaohe Chen, Lirong Wang. 1503-1507 [doi]
- A new algorithm for demographic expansion based on multi-scene differentiated communication dataYuhui Han, Chen Cheng, Xinzhou Cheng, Lexi Xu, Yuchao Jin, Yuwei Jia, Jie Gao. 1508-1513 [doi]
- A Renewable Energy Certificate Trading System Based on BlockchainMing Gao, Xiaokun Yu, Lei Ren, Hongxiang Cai, Zhiyong Wang, Yuyang Zhou. 1514-1518 [doi]
- A Hybrid User Recommendation Scheme Based on Collaborative Filtering and Association RulesYuwei Jia, Kun Chao, Xinzhou Cheng, Jian Guan, Lijuan Cao, Yi Li, Chen Cheng, Yuchao Jin, Lexi Xu. 1519-1524 [doi]
- Preference Recommendation Scheme based on Social Networks of Mobile UsersLijuan Cao, Xinzhou Cheng, Lexi Xu, Chen Cheng, Yi Li, Yuwei Jia, Chuntao Song, Heng Zhang. 1525-1530 [doi]
- Cell Boundary Prediction and Base Station Location Verification based on Machine LearningYuchao Jin, Yi Li, Deyi Li, Xinzhou Cheng, Lexi Xu, Yuhui Han. 1531-1536 [doi]
- Investigation on Multi-Antenna Technologies Evolution from FDD LTE to NR FDDJinge Guo, Yang Zhang, Zhongsheng Fan, Wei Wei, Bao Guo, HuangTao Song. 1537-1541 [doi]
- Joint Offloading Decision and Resource Allocation of 5G Edge Intelligent Computing for Complex Industrial ApplicationMingxin Li, Mingde Huo, Xinzhou Cheng, Lexi Xu, Xiaojing Liu, Rui Yang. 1542-1547 [doi]
- Study on TDD Unsynchronized Interference from Outdoor to Indoor Scenario in 3.3-3.6 GHzYiying Niu, Yao Zhou, Tao Zhang, Fuchang Li. 1548-1553 [doi]
- Fault Diagnosis of 5G Voice Service Based on Multi-sources dataShiyu Zhou, Jie Miao, Xiqing Liu, Xinzhou Cheng, Zhenqiao Zhao, Xin Zhao. 1554-1558 [doi]
- Key technologies for 5G co-construction and shared base station data automatic configurationXiqing Liu, Hongshui Jing, Shiyu Zhou, Zhenqiao Zhao, Xinzhou Cheng, Lexi Xu. 1559-1563 [doi]
- Research on Productization and Development Trend of Data Desensitization TechnologyZhuo Wang, Kai Wei, Chunyu Jiang, Jiafeng Tian, Minjing Zhong, Yuan Liu, Yanmei Liu. 1564-1569 [doi]
- A Novel Method for Detecting Noise Segments in ECG SignalsWenliang Zhu, Gang Ma, Yuhang Chen, Lishen Qiu, Lesong Zheng, Lirong Wang. 1570-1574 [doi]
- Authentication and Access Control in 5G Device-to-Device CommunicationJithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph. 1575-1582 [doi]
- IdiffGrad: A Gradient Descent Algorithm for Intrusion Detection Based on diffGradWeifeng Sun, Yiming Wang, Kangkang Chang, Kelong Meng. 1583-1590 [doi]