Abstract is missing.
- Booting IoT Terminal Device Securely with eMMCSiyuan Ma, Yuewu Wang, Lingguang Lei, Yingjiao Niu, Haotian Shi, Jie Wang. 1-8 [doi]
- Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNNChenghua Tang, Chen Zhou, Min Hu, Mengmeng Yang, Baohua Qiang. 9-19 [doi]
- Truthfully Negotiating Usage Policy for Data SovereigntyChunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang. 20-27 [doi]
- GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain TechnologyYong Kuang, Hongyun Xu, Rui Jiang 0006, Zhikang Liu. 28-35 [doi]
- TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social MetricsYu'Ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan. 36-43 [doi]
- Efficiently Constructing Topology of Dynamic NetworksFengHua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li. 44-51 [doi]
- Hash Proof System with Auxiliary Inputs and Its ApplicationCailing Cai, Tsz Hon Yuen, Siu-Ming Yiu. 52-59 [doi]
- The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness ConsiderationGuozhong Wang, Chunling Peng, Yi Huang. 60-65 [doi]
- HashDroid:Extraction of malicious features of Android applications based on function call graph pruningPengfei Liu, Weiping Wang 0003, Hong Song, Shigeng Zhang, Yulu Hong. 66-73 [doi]
- Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game DesignSiyu Sun, Xiaoxuan Fan, Yunzhi Xia, Chenlu Zhu, Shenghao Liu, Lingzhi Yi. 74-82 [doi]
- A Lightweight Honeynet Design In the Internet of ThingsXiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao. 83-88 [doi]
- Graph Encryption for Shortest Path Queries with k Unsorted NodesMeng Li 0006, Jianbo Gao, Zijian Zhang 0001, Chaoping Fu, Chhagan Lal, Mauro Conti. 89-96 [doi]
- Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering SystemsJichao Bi, Shibo He, Fengji Luo, Jiming Chen 0001, Da-Wen Huang, Mingyang Sun. 97-104 [doi]
- TPIPD: A Robust Model for Online VPN Traffic ClassificationYongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen. 105-110 [doi]
- MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion DetectionJinghong Lan, Yanan Li, Bo Li, Xudong Liu. 111-116 [doi]
- A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT BotnetBinglai Wang, Yafei Sang, Yongzheng Zhang 0002, Shuhao Li, Xiaolin Xu. 117-122 [doi]
- SecretHunter: A Large-scale Secret Scanner for Public Git RepositoriesElliott Wen, Jia Wang, Jens Dietrich 0001. 123-130 [doi]
- SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol VulnerabilitiesRunhao Liu, Bo Yu 0008, Baosheng Wang, Jianbin Ye, Jianxin Huang, Xiangdong Kong. 131-138 [doi]
- Challenges and Approaches for Mitigating Byzantine Attacks in Federated LearningJunyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang. 139-146 [doi]
- Haxss: Hierarchical Reinforcement Learning for XSS Payload GenerationMyles Foley, Sergio Maffeis. 147-158 [doi]
- From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky MechanismJiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song. 159-166 [doi]
- IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTMJie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li, Xiaosong Zhang. 167-174 [doi]
- Mal-Bert-GCN: Malware Detection by Combining Bert and GCNZhenquan Ding, Hui Xu, Yonghe Guo, Longchuan Yan, Lei Cui 0003, Zhiyu Hao. 175-183 [doi]
- Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive LearningChuanxi Chen, Dengpan Ye, Hao Wang, Long Tang, Yue Xu. 184-191 [doi]
- DRSN with Simple Parameter-Free Attention Module for Specific Emitter IdentificationXiuhua Wen, Chunjie Cao, Yifan Li, Yang Sun. 192-200 [doi]
- Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based EncryptionYuan Shen 0005, Wei Song 0006, ChangSheng Zhao, Zhiyong Peng. 201-208 [doi]
- Deceiving Learning-based Sketches to Cause Inaccurate Frequency EstimationXuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li. 209-216 [doi]
- AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining MethodLigeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao. 217-224 [doi]
- EnShare: Sharing Files Securely and Efficiently in the Cloud using EnclaveYun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev. 225-232 [doi]
- Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference ModelChao Xia, Yaqi Liu, Qingxiao Guan, Sai Ma, Yu Nan, Jiahui Fu. 233-238 [doi]
- AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code RefactoringWeizhong Qiang, Hao Luo. 239-247 [doi]
- Security Support on Memory Controller for Heap Memory SafetyChaochao Zhang, Rui Hou. 248-257 [doi]
- CGDF-GNN: Cascaded GNN fraud detector with dual features facing imbalanced graphs with camouflaged fraudstersQichang Wan, Peisen Wang, Xiaobing Pei. 258-265 [doi]
- You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise NetworksLi Song, Qiongxiao Wang, Shijie Jia 0001, Jingqiang Lin, Linli Lu, Yanduo Fu. 266-273 [doi]
- CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property GraphJingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu. 274-282 [doi]
- Detecting Unknown Network Attacks with Attention Encoding and Deep Metric LearningChunlan Fu, Shirong Han, Gang Shen. 283-290 [doi]
- A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect DatasetsXiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen. 291-298 [doi]
- A Terminal Security Authentication Protocol for Zero-Trust Satellite IoTMinqiu Tian, Zifu Li, FengHua Li, Jin Cao, Chao Guo. 299-306 [doi]
- DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTMDongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu. 307-314 [doi]
- To Fix or Not to Fix: A Critical Study of Crypto-misuses in the WildAnna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini. 315-322 [doi]
- Bidirectional LSTM-based attention mechanism for CNN power theft detectionZhuoqun Xia, Kaixin Zhou, Jingjing Tan, Hongmei Zhou. 323-330 [doi]
- An Efficient Certificateless Authentication Scheme for Satellite InternetTongwei Liu, BaoKang Zhao, Wei Peng 0005. 331-338 [doi]
- tTree+: A Threat Tree Model for Representing Complex SemanticsZhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren 0002. 339-344 [doi]
- Data Poisoning Attack to X-armed BanditsZhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou. 345-351 [doi]
- Cdga: A GAN-based Controllable Domain Generation AlgorithmYou Zhai, Jian Yang, Zixiang Wang, Longtao He, Liqun Yang, Zhoujun Li 0001. 352-360 [doi]
- WBA: A Warping-based Approach to Generating Imperceptible Adversarial ExamplesChengyao Hua, Shigeng Zhang, Weiping Wang 0003, Zhankai Li, Jian Zhang. 361-368 [doi]
- Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6GJinbo Wen, Xiaojun Liu, Zehui Xiong, Meng Shen, Siming Wang, Yutao Jiao, Jiawen Kang, He Li. 369-374 [doi]
- Eye-based keystroke prediction for natural texts - a feasibility analysisJosé Reverte Cazorla, José MarÃa de Fuentes, Lorena González-Manzano. 375-382 [doi]
- "Comments Matter and The More The Better!": Improving Rumor Detection with User CommentsYang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li. 383-390 [doi]
- MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic DetectionWeiqing Huang, Xinbo Han, Meng Zhang, Min Li, Wen Liu, Zheng Yang, Haitian Yang. 391-398 [doi]
- A Comparative Study on the Security of Cryptocurrency Wallets in Android SystemMinfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang 0001, Gary Nan. 399-406 [doi]
- TFCFI:Transparent Forward Fine-grained Control-Flow Integrity ProtectionCairui She, Liwei Chen, Gang Shi. 407-414 [doi]
- Improved Zero-Knowledge Proofs for Commitments from Learning Parity with NoiseMengfan Wang, Guifang Huang, Hongmin Gao, Lei Hu. 415-421 [doi]
- An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower FieldChuang Wang, Yan Ding, Chenlin Huang, Liantao Song. 422-428 [doi]
- CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signatureZhuoqun Xia, Hongrui Li, Ke Gu. 429-434 [doi]
- Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR AnonymityHaili Sun, Yan Huang 0026, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou. 435-440 [doi]
- DRICP: Defect Risk Identification Using Sample Category PerceptionLixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang 0018. 441-448 [doi]
- Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion DetectionAbeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He. 449-456 [doi]
- Source Code Vulnerability Detection Using Vulnerability Dependency Representation GraphHongyu Yang, Haiyun Yang, Liang Zhang 0018, Xiang Cheng. 457-464 [doi]
- Code-based encryption algorithms for generating and verifying digital signatureAneta Poniszewska-Maranda, Kacper Pradzynski. 465-472 [doi]
- An Efficient and Secure Scheme of Verifiable Computation for Intel SGXWenxiu Ding, Wei Sun, Zheng Yan 0002, Robert H. Deng, Zhiguo Wan. 473-482 [doi]
- Intelligent Recognition Method of Web Application Categories Based on Multi-layer Simhash AlgorithmFuji Han, Dongjun Zhu. 483-489 [doi]
- Near Field Air-Gap Covert Channel AttackMordechai Guri. 490-497 [doi]
- Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-EncryptionWeiqi Dai, Zhenhui Lu, Xia Xie, Duoqiang Wang, Hai Jin 0001. 498-505 [doi]
- Shared Incentive System for Clinical Pathway ExperienceWeiqi Dai, Wenhao Zhao, Xia Xie, Song Wu 0001, Hai Jin 0001. 506-513 [doi]
- Dynamically Selected Mixup Machine UnlearningZhiwen Zhou, Ximeng Liu, Jiayin Li, Junxi Ruan, Mingyuan Fan. 514-524 [doi]
- Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier TransformAkito Yamamoto, Tetsuo Shibuya. 525-532 [doi]
- An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy ConstraintsYuzhe Li, Bo Li, Weiping Wang, Nan Liu. 533-540 [doi]
- Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data StreamsMuhammad Arsalan, Davide Di Matteo, Sana Imtiaz, Zainab Abbas, Vladimir Vlassov, Vadim Issakov. 541-546 [doi]
- Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud StorageXin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou. 547-555 [doi]
- Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoTHongjun Li, Fanyu Kong, Jia Yu 0005, Hanlin Zhang, Luhong Diao, Yunting Tao. 556-564 [doi]
- An enhanced MinHash encryption scheme for encrypted deduplicationQiaowen Jia, Guanxiong Ha, Hanwei Wang, Haoyu Ma, Hang Chen. 565-573 [doi]
- Extending Expressive Access Policies with Privacy FeaturesStefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl. 574-581 [doi]
- Robust Secure Aggregation with Lightweight Verification for Federated LearningChao Huang 0012, Yanqing Yao, Xiaojun Zhang, Da Teng, Yingdong Wang, Lei Zhou. 582-589 [doi]
- Privacy-Preserving Recommendation with Debiased ObfuscaitonChennan Lin, Baisong Liu, Xueyuan Zhang, Zhiye Wang, Ce Hu, Linze Luo. 590-597 [doi]
- Privacy-Preserving Robust Federated Learning with Distributed Differential PrivacyFayao Wang, Yuanyuan He, Yunchuan Guo, Peizhi Li, Xinyu Wei. 598-605 [doi]
- A Green Neural Network with Privacy Preservation and InterpretabilityDe-li, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang. 606-614 [doi]
- HyperMean: Effective Multidimensional Mean Estimation with Local Differential PrivacyTao Zhang, Bowen Deng, Lele Zheng, Ze Tong, Qi Li. 615-622 [doi]
- VoiceSketch: a Privacy-Preserving Voiceprint Authentication SystemBaochen Yan, Rui Zhang, Zheng Yan. 623-630 [doi]
- LLDP: A Layer-wise Local Differential Privacy in Federated LearningQian Chen, Hongbo Wang, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin 0001. 631-637 [doi]
- Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social MediaHervais Simo, Michael Kreutzer. 638-645 [doi]
- Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA)Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger. 646-655 [doi]
- Adap DP-FL: Differentially Private Federated Learning with Adaptive NoiseJie Fu, Zhili Chen, Xiao Han. 656-663 [doi]
- Privacy-Preserving Smart Lock System for IoT-enabled Rental House MarketsBo Wang, Lingling Wang, Hongliang Guo, Peng Zhou. 664-669 [doi]
- Kgastor: a Privacy By Design Knowledge Graph anonymized StoreMaxime Thouvenot, Philippe Calvez, Olivier Curé. 670-679 [doi]
- Utility-Aware Privacy-Preserving Federated Learning through Information BottleneckShaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu 0001. 680-686 [doi]
- FLightNER: A Federated Learning Approach to Lightweight Named-Entity RecognitionMacarious Abadeer, Wei Shi, Jean-Pierre Corriveau. 687-694 [doi]
- Federated Learning Scheme with Dual Security of Identity Authentication and VerificationYuting Xu, Mang Su, Jinpeng Hou, Chong Nie. 695-702 [doi]
- Secure and efficient publicly verifiable ridge regression outsourcing schemeOu Ruan, Shanshan Qin. 703-709 [doi]
- Privacy-Preserving Data Analysis without Trusted Third PartyAtsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto. 710-717 [doi]
- Privacy-Preserving Top-k Spatio-Textual Similarity JoinYiping Teng, Dongyue Jiang, Mengmeng Sun, Liang Zhao 0004, Li Xu, Chunlong Fan. 718-726 [doi]
- Privacy-preserving Decision Making Based on Q-Learning in Cloud ComputingZhipeng Zhou, Chenyu Dong, Donger Mo, Peijia Zheng. 727-732 [doi]
- Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal RepresentationQing Gu, Xiangling Ding, Dengyong Zhang, Ce Yang. 733-738 [doi]
- Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self Deep Matching NetworkYaqi Liu, Chao Xia, Qiang Cai, Xin Jin. 739-746 [doi]
- Deepro: Provenance-based APT Campaigns Detection via GNNNa Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng. 747-758 [doi]
- A General Backdoor Attack to Graph Neural Networks Based on Explanation MethodLuyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu. 759-768 [doi]
- APT Attribution for Malware Based on Time Series ShapeletsQinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou. 769-777 [doi]
- ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep LearningJuan Wang, Chenjun Ma, Ziang Li, Huanyu Yuan, Jie Wang. 778-785 [doi]
- A Novel Asynchronous Evolution Opinion Dynamics ModelXiao Xiao, Minghua Xu 0001, Han Xu. 786-791 [doi]
- SpecRNet: Towards Faster and More Accessible Audio DeepFake DetectionPiotr Kawa, Marcin Plata, Piotr Syga. 792-799 [doi]
- Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep LearningWei Sun, Zheng Yan 0002, Xi Xu, Wenxiu Ding, Lijun Gao. 800-809 [doi]
- Robust Document Image Forgery Localization Against Image BlendingWeipeng Liang, Li Dong 0006, Rangding Wang, Diqun Yan, Yuanman Li. 810-817 [doi]
- A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering DetectionXuejiao Luo, Xiaohui Han, Wenbo Zuo, Zhengyuan Xu, Zhiwen Wang, Xiaoming Wu. 818-826 [doi]
- Leveraging Model Poisoning Attacks on License Plate Recognition SystemsJian Chen, Yuan Gao, Yang Liu, Chen Wang 0011, Kai Peng 0001. 827-834 [doi]
- Smarkchain: An Amendable and Correctable Blockchain Based on Smart MarkersChin-Tser Huang, Laurent Njilla, Tieming Geng. 835-842 [doi]
- CNN-Based Autonomous Traffic Detection on Unknown Home Security CamerasShuhe Liu, Xiaolin Xu, Zhefeng Nan. 843-850 [doi]
- Implementation of one-time editable blockchain chameleon hash function construction schemeYixuan Qiao, Minghui Zheng, Jingyi Yang. 851-856 [doi]
- Data Integrity Verification Scheme Based on Blockchain Smart ContractKai Zhang, He Xiao, Qiuming Liu. 857-863 [doi]
- A Faster Blockchain Sharding Protocol for Decentralized LedgerDongdong Liu, Mingsheng Wang, Taotao Li, Ya Han. 864-873 [doi]
- Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty AdjustmentYuhang Ding, Zihan Yang, Bo Qin, Qin Wang 0008, Yanran Zhang, Qianhong Wu. 874-881 [doi]
- Practical Side-Channel Attack on Message Encoding in Masked KyberJian Wang, Weiqiong Cao, Hua Chen 0011, Haoyuan Li. 882-889 [doi]
- Efficient SM2 Hardware Design for Digital Signature of Internet of VehiclesMei Yang, Chong Liu, Huiyun Li, Cuiping Shao. 890-896 [doi]
- MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control SystemZhishen Zhu, Junzheng Shi, Chonghua Wang, Gang Xiong 0001, Zhiqiang Hao, Gaopeng Gou. 897-904 [doi]
- One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access ControlLifeng Guo, Huide Lei, Wei-Chuen Yau. 905-912 [doi]
- A Flow Attack Strategy based on Critical Links for Cyber-attackJiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang. 913-920 [doi]
- Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in EthereumJingyan Yang, Shang Gao 0006, Guyue Li, Rui Song, Bin Xiao 0001. 921-926 [doi]
- A quantum inspired differential evolution algorithm with multiple mutation strategiesJie Liu, Xingsheng Qin, Frank Jiang 0001. 927-934 [doi]
- A Multidimensional Blockchain Framework For Mobile Internet of ThingsHussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur R. Shahid, Omar J. Guerra, Joel Rodriguez. 935-944 [doi]
- CDEdit: Redactable Blockchain with Cross-audit and Diversity EditingXiaofeng Chen, Ying Gao. 945-952 [doi]
- VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GANXin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song, Zhongyuan Qin. 953-958 [doi]
- Development of Blockchain-based e-Voting System: Requirements, Design and Security PerspectiveMd Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu 0013, Md. Zakirul Alam Bhuiyan. 959-967 [doi]
- CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashingBaowei Wang, Bin Li, Yi Yuan, Changyu Dai, Yufeng Wu, Weiqian Zheng. 968-975 [doi]
- Dynamic and Diverse Transformations for Defending Against Adversarial ExamplesYongkang Chen, Ming Zhang, Jin Li, Xiaohui Kuang, Xuhong Zhang, Han Zhang. 976-983 [doi]
- A Hardware Security Isolation Architecture for Intelligent AcceleratorRui Gong, Lei Wang 0011, Wei Shi, Wei Liu, Jianfeng Zhang. 984-991 [doi]
- A Blockchain-based Privacy-Preserving Scheme for Cross-domain AuthenticationJunfeng Jiang, Yujian Zhang, Junhao Li. 992-999 [doi]
- Self-Supervised Adversarial Example Detection by Disentangled RepresentationZhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou 0001. 1000-1007 [doi]
- Multi-pipeline HotStuff: A High Performance Consensus for Permissioned BlockchainTaining Cheng, Wei Zhou 0011, Shaowen Yao 0001, Libo Feng, Jing He. 1008-1019 [doi]
- MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicleYixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu. 1020-1027 [doi]
- "The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine LearningStewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer. 1028-1035 [doi]
- 5G-A Capability Exposure Scheme based on Harmonized Communication and SensingLin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Jianzhi Wang, Lexi Xu, Sai Han, Yuwei Jia. 1036-1041 [doi]
- A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion DetectionLijian Liu, Jinguo Li. 1042-1047 [doi]
- A Compatible and Identity Privacy-preserving Security Protocol for ACARSXinwei Li, Qianyun Zhang, Lexi Xu, Tao Shang. 1048-1053 [doi]
- A formalization-based vulnerability detection method for cross-subject network componentsJinfu Chen 0001, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang. 1054-1059 [doi]
- A Heart Sound Classification Method Based on Residual Block and Attention MechanismYujie Chen, Wenliang Zhu, Jinke Xu, Junwei Zhang, Zhanpeng Zhu, Lirong Wang. 1060-1065 [doi]
- A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environmentRuixuan Liu, Muyang Lyu, Jiangrong Yang. 1066-1071 [doi]
- A K-Induction Method Extended with Value Analysis for C Program Safety VerificationHui Guo, Chunyan Hou, Jinsong Wang, Chen Chen 0012. 1072-1077 [doi]
- A Novel User Mobility Prediction Scheme based on the Weighted Markov Chain ModelYuwei Jia, Kun Chao, Xinzhou Cheng, Lin Lin, Lijuan Cao, Yi Li, Yuchao Jin, Zixiang Di, Chen Cheng. 1078-1083 [doi]
- A Secure Remote Password Protocol From The Learning With Errors ProblemHuapeng Li, Baocheng Wang. 1084-1090 [doi]
- A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded CalculationLei Shi, Peng Yin, Yang Ming, Shengguan Qu, Zhen Liu. 1091-1098 [doi]
- A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural NetworksHeng Li 0005, Zeyu Zhu, Peinan He, Yingze Yang, Bin Chen 0017, Jun Peng 0001, Zhiwu Huang. 1099-1106 [doi]
- A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using BlockchainKealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak. 1107-1114 [doi]
- Action-Manipulation Attack and Defense to X-Armed BanditsZhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou. 1115-1122 [doi]
- Adversarial Attacks on Deep Learning-Based Methods for Network Traffic ClassificationMeimei Li, Yiyan Xu, Nan Li, Zhongfeng Jin. 1123-1128 [doi]
- AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G NetworksTian Xiao, Guoping Xu, Bei Li, Lexi Xu, Xinzhou Cheng, Feibi Lyu, Guanghai Liu, Yi Zhang, Qingqing Zhang. 1129-1135 [doi]
- An Attribute-attack-proof Watermarking Technique for Relational DatabaseShuguang Yuan 0003, Chi Chen, Ke Yang, Tengfei Yang, Jing Yu. 1136-1143 [doi]
- An Empirical Study Towards SAR Adversarial ExamplesZhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao. 1144-1148 [doi]
- An End-to-End Multi-label classification model for Arrhythmia based on varied-length ECG signalsYanfang Dong, Wenqiang Cai, Wenliang Zhu, Lirong Wang. 1149-1154 [doi]
- An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structureHuamei Qi, Li Jie, Wangping Xiong. 1155-1161 [doi]
- An Improved Actor-Critic Method for Auto-Combating In Infantry VehiclesRuizhu Chen, Rong Fei, Lili Wu, Lu Yang. 1162-1167 [doi]
- Arteriovenous fistula stenosis classification method based on Auxiliary Wave and TransformerJinke Xu, Junwei Zhang, Yujie Chen, Gang Ma, Zhanpeng Zhu, Lirong Wang. 1168-1172 [doi]
- Automatic Association of Cross-Domain Network TopologySai Han, Zelin Wang, Guangquan Wang, Qiukeng Fang, Hongbing Ma, Lin Lin, Lexi Xu, Heng Zhang. 1173-1178 [doi]
- Battery Aging-Robust Driving Range Prediction of Electric BusHeng Li 0005, Zhijun Liu, Yongting Liu, Hui Peng, Rui Zhang, Jun Peng 0001, Zhiwu Huang. 1179-1186 [doi]
- Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded DevicesMichal Borowski, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier. 1187-1192 [doi]
- Big Data based Potential Fixed-Mobile Convergence User MiningQingqing Zhang, Tao Zhang, Shikun Jiang, Qiang Zhang, Yuhui Han, Xinzhou Cheng, Yunyun Wang, Xin He, Tian Xiao. 1193-1198 [doi]
- Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOMZhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang. 1199-1204 [doi]
- Cache Top-level domain locally: make DNS respond quickly in mobile networkHaisheng Yu 0001, Yan Liu, Lihong Duan, Sanwei Liu, Wenyong Wang, Dong Liu, Zirui Peng, Daobiao Gong. 1205-1210 [doi]
- CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTemDavide Micale, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè 0002. 1211-1218 [doi]
- CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applicationsHannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002, Tuomo Lahtinen, Lauri Sintonen. 1219-1226 [doi]
- CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applicationsHannu Turtiainen, Andrei Costin, Timo Hämäläinen 0002, Tuomo Lahtinen, Lauri Sintonen. 1227-1234 [doi]
- Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and CountermeasuresWanjia Zheng, Kazumasa Omote. 1235-1242 [doi]
- Collaborative Improvement of User Experience and Network Quality Based on Big DataChuntao Song, Jie Gao, Fan Zhang, Tao Zhang, Yi Zhang, Lixia Liu, Bei Li, Yong Wang, Lexi Xu. 1243-1248 [doi]
- Confusing Traffic against Intra-domain Webpage Fingerprinting AttacksWeilin Yang, Zhonghui Du, Yonghui Wu, Yi Tang. 1249-1254 [doi]
- Coverage Estimation of Wireless Network Using Attention U-NetFeibi Lyu, Xinzhou Cheng, Lexi Xu, Liang Liu, Jinjian Qiao, Lu Zhi, Zixiang Di, Tian Xiao, Chen Cheng. 1255-1260 [doi]
- Create Persona of Elderly Users by Clustering Analysis of NeedsXiaoying Li, Guangxiang Zhang, Yuzhou Wu, Yang Yang, Yuelei Wang, Zhen Liu. 1261-1265 [doi]
- Data Driven based Malicious URL Detection using Explainable AISaranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala. 1266-1272 [doi]
- Denoising method of ECG signal based on Channel Attention MechanismJunwei Zhang, Rui-bao, Lirong Wang, Jinke Xu, Yujie Chen, Xueqin Chen. 1273-1277 [doi]
- Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling RobotXinhe Pu, Xiaofang Yuan, Liangsen Li, Weiming Ji. 1278-1285 [doi]
- Detection of impurity content in wheat based on cone-beam CTGangyang Wang, Chunhua Zhu, Jianhou Wang. 1286-1289 [doi]
- DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart ContractSiqi He, Xiaofei Xing, Guojun Wang. 1290-1295 [doi]
- Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An ExplorationXinqing Du, Xin Hu 0006, Yin Wang, Weidong Wang. 1296-1301 [doi]
- EEG classification algorithm of motor imagery based on CNN-Transformer fusion networkHaofeng Liu, Yuefeng Liu, Yue Wang, Bo Liu, Xiang Bao. 1302-1309 [doi]
- End-to-End Speech Recognition Technology Based on Multi-Stream CNNHao Xiao, Yuan Qiu, Rong Fei, Xiongbo Chen, Zuo Liu, Zongling Wu. 1310-1315 [doi]
- Energy-efficient and Traffic-aware VNF Placement for Vertical Services in 5G NetworksYi Yue, Wencong Yang, Xiao Liang, Xihuizi Meng, Rong Huang, Xiongyang Tang. 1316-1322 [doi]
- False Data Injection Attack Detection in a Platoon of CACC in RSUKai Gao, Xiangyu Cheng, Hao Huang, Xunhao Li, Tingyu Yuan, RongHua Du. 1324-1329 [doi]
- Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environmentMingyu Yang, Tao Yang, Haiyang Wang, Hao Li, Tianming Li, Biao Hu. 1330-1332 [doi]
- Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle EnvironmentYanghui Zhang, Kai Gao, Shuo Huang, Xunhao Li, RongHua Du. 1333-1339 [doi]
- Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access ControlBoshen Shan, Yuanzhi Yao, Weihai Li, Xiaodong Zuo, Nenghai Yu. 1340-1347 [doi]
- Guide Tracking Method Based On Particle Filter FusionZilong Wang, Junhuai Li. 1348-1353 [doi]
- Hierarchical Classification of Android Malware TrafficGiampaolo Bovenzi, Valerio Persico, Antonio Pescapè, Anna Piscitelli, Vincenzo Spadari. 1354-1359 [doi]
- Holmes: An Efficient and Lightweight Semantic Based Anomalous Email DetectorPeilun Wu, Hui Guo. 1360-1367 [doi]
- Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix EncodingBin Ge, Ting Wang, Chenxing Xia, Gaole Dai. 1368-1375 [doi]
- Listing the ingredients for IFTTT recipesShirin Kalantari, Danny Hughes, Bart De Decker. 1376-1383 [doi]
- Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile NetworkYuting Zheng, Yi Li, Yuchao Jin, Xiaomeng Zhu, Lexi Xu, Tian Xiao, Bei Li, Xinzhou Cheng. 1384-1389 [doi]
- Measurement of Malware Family Classification on a Large-Scale Real-World DatasetQinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou. 1390-1397 [doi]
- MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image SynthesisXingfu Wang, Xiangyu Li, Ammar Hawbani, Liang Zhao 0004, Saeed Hamood Alsamhi. 1398-1403 [doi]
- Multi-channel Live Video Processing Method Based on Cloud-edge CollaborationZhen Guo, Pengzhou Zhang, Junjie Xia, Zhe Zhou, Juan Cao. 1404-1409 [doi]
- Multimodal Graph Reasoning and Fusion for Video Question AnsweringShuai Zhang, Xingfu Wang, Ammar Hawbani, Liang Zhao 0004, Saeed Hamood Alsamhi. 1410-1415 [doi]
- On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy TrafficHongce Zhao, Shunliang Zhang, Zhuang Qiao, Xianjin Huang, Xiaohui Zhang. 1416-1423 [doi]
- PAPR Suppression in Radar Communication Integration System Based on Subcarrier ReservationBiao Yang, Shanshan Zhao, Hongfei Du, Minju Yi, Ziwei Liu. 1424-1428 [doi]
- Performance Analysis for Bearings-only Geolocation Based on Constellation of SatellitesJinzhou Li, Shouye Lv, Liu Yang, Sheng Wu, Yang Liu, Qijun Luan. 1429-1434 [doi]
- Performance Analysis of IEEE 802.11p for the Internet of Vehicles with Bursty Packet ErrorsNing Wang, Jia Hu. 1435-1440 [doi]
- Personalized User Profiles-based Insider Threat Detection for Distributed File SystemWu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin. 1441-1446 [doi]
- Pre-training Fine-tuning data Enhancement method based on active learningDeqi Cao, Zhaoyun Ding, Fei Wang, Haoyang Ma. 1447-1454 [doi]
- Redactable Blockchain with K-Time Controllable EditingYong Li, Zhenghao Zhang, Xi Chen, Ruxian Li, Liang Zhang. 1455-1461 [doi]
- Research and Application of 5G Edge AI in Medical IndustryShangyu Tang, Mingde Huo, Yi Du, Yuwen Huo, Yan Zhang, Lexi Xu, Ying Ji, GuoYu Zhou. 1462-1466 [doi]
- Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and CNNMingyue Li, Rong Fei. 1467-1472 [doi]
- Research on 5G Network Capacity and ExpansionXiaomeng Zhu, Yi Li, Yuting Zheng, Rui Xia, Lexi Xu, Bei Li, Zixiang Di, Lu Zhi, Xinzhou Cheng. 1473-1478 [doi]
- Research on Capability Building of Mobile Network Data Analysis and VisualizationJian Guan, Xinzhou Cheng, Kun Chao, Xin He, Yuwei Jia, Lexi Xu, Yunyun Wang, Tian Xiao, Bei Li. 1479-1484 [doi]
- Research on Enterprises Loss in Regional Economic Risk ManagementHeng Zhang, Wenyu Li, Lianbo Song, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu, Sai Han. 1485-1490 [doi]
- Research on Intelligent 5G Remote Interference Avoidance and Clustering SchemeTian Xiao, Bei Li, Zixiang Di, Guanghai Liu, Lexi Xu, Jian Guan, Zhaoning Wang, Chen Cheng, Yi Li. 1491-1497 [doi]
- Research on OTFS Systems for 6GBei Li, Tian Xiao, Kai Zhou, Lexi Xu, Guanghai Liu, Bo Wang, Jie Gao, Jian Guan, Zixiang Di. 1498-1503 [doi]
- Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data AnalysisJie Gao, Lixia Liu, Tao Zhang, Shenghao Jia, Chuntao Song, Lexi Xu, Yang Wu, Bei Li, Yunyun Wang, Xinjie Hou. 1504-1509 [doi]
- Research on Voice Quality Evaluation Method Based on Artificial Neural NetworkZixiang Di, Tian Xiao, Yi Li, Xinzhou Cheng, Bei Li, Lexi Xu, Xiaomeng Zhu, Lu Zhi, Rui Xia. 1510-1515 [doi]
- Robust Perception for Autonomous Vehicles using Dimensionality ReductionShivam Garg, Nandish Chattopadhyay, Anupam Chattopadhyay. 1516-1521 [doi]
- SCEVD: Semantic-enhanced Code Embedding for Vulnerability DiscoveryJoseph Gear, Yue Xu 0001, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson. 1522-1527 [doi]
- Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking EnvironmentsLukasz Krzywiecki, Hannes Salin. 1528-1533 [doi]
- Smart Grid Data Aggregation Scheme Based on Local Differential PrivacyLei Zhang, Dong Mao, Zuge Chen, Yubo Song, Liquan Chen, Zhongyuan Qin. 1534-1539 [doi]
- Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation NetworksLei Cheng, Shuaijun Liu, Lixaing Liu, Hailong Hu, Jingyi Chen, Xiandong Meng, Pengcheng Ding. 1540-1544 [doi]
- Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail EffectDejia Lin, Yongdong Wu, Wensheng Gan. 1545-1550 [doi]
- Technical architecture of integrated big data platformYuan Liu, Yanmei Liu, Minjing Zhong. 1551-1556 [doi]
- Telecom Big Data assisted Algorithm and System of Campus Safety ManagementChen Cheng, Xinzhou Cheng, Shikun Jiang, Xin Zhao, Yuhui Han, Tao Zhang, Lijuan Cao, Yuwei Jia, Tian Xiao, Bei Li. 1557-1562 [doi]
- Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoostYi Zhang, Fan Zhang, Chuntao Song, Xinzhou Cheng, Chen Cheng, Lexi Xu, Tian Xiao, Bei Li. 1563-1568 [doi]
- TINKER: A framework for Open source Cyberthreat IntelligenceNidhi Rastogi, Sharmishtha Dutta, Alex Gittens, Mohammed J. Zaki, Charu C. Aggarwal. 1569-1574 [doi]
- Towards logical specification of adversarial examples in machine learningMarwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka. 1575-1580 [doi]
- Towards the Concept of Trust Assurance CaseEmilia Cioroaica, Barbora Buhnova, Daniel Schneider 0001, Ioannis Sorokos, Thomas Kuhn 0001, Emrah Tomur. 1581-1586 [doi]
- Trusted Hart for Mobile RISC-V SecurityVladimir Ushakov, Sampo Sovio, Qingchao Qi, Vijayanand Nayani, Valentin Manea, Philip Ginzboorg, Jan-Erik Ekberg. 1587-1596 [doi]
- Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government applicationDaniel Dalalana Bertoglio, Luis G. B. Schüler, Avelino F. Zorzo, Roben Castagna Lunardi. 1597-1604 [doi]
- User Analysis and Traffic Prediction Method based on Behavior SlicingXin He, Lijuan Cao, Yuwei Jia, Kun Chao, Miaoqiong Wang, Chao Wang, Yunyun Wang, Runsha Dong, Zhenqiao Zhao. 1605-1610 [doi]
- Vehicle Classification System with Mobile Edge Computing Based on Broad LearningXiting Peng, Naixian Zhao, Lexi Xu, Shi Bai. 1611-1617 [doi]