Abstract is missing.
- Representation-enhanced APT Detection Using Contrastive LearningFengxi Zhou, Baoming Chang, Yu Wen, Dan Meng. 1-9 [doi]
- APM: An Attack Path-based Method for APT Attack Detection on Few-Shot LearningJiacheng Li, Tong Li 0001, Runzi Zhang, Di Wu, Hao Yue, Zhen Yang 0004. 10-19 [doi]
- Class-Targeted Poisoning Attacks against DNNsJian Chen, Jingyao Wu, Hao Yin, Qiang Li, Wensheng Zhang, Chen Wang. 20-27 [doi]
- EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPCXinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo, LuMing Yang. 28-37 [doi]
- Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge GraphsQi Yan, Mohan Li, Yanbin Sun. 38-45 [doi]
- The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel LeakagesJinze She, Wenhao Wang 0001, Zihao Wang. 46-53 [doi]
- Advanced Machine-Learning Technologies for Coronary Artery Disease Prediction Using Heterogeneous DataMalak Alqulaity, Po Yang. 54-61 [doi]
- Learning in the Dark: Privacy-Preserving Machine Learning using Function ApproximationTanveer Khan, Antonis Michalas. 62-71 [doi]
- Undermining License Plate Recognition: A Data Poisoning AttackBo Song, Yunpeng Yi, Ting Zhou, Junfeng Yang, Lei Liu. 72-78 [doi]
- Reducing Model Memorization to Mitigate Membership Inference AttacksMehrdad Sheikhjaberi, Dima Alhadidi. 79-88 [doi]
- Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous DrivingShuai Li, Yu Wen, Xu Cheng. 89-98 [doi]
- BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous DrivingShuai Li, Yu Wen, Huiying Wang, Xu Cheng. 99-108 [doi]
- Safety or Not? A Comparative Study for Deep Learning Apps on SmartphonesJin Au-Yeung, Shanshan Wang 0003, Yuchen Liu, Zhenxiang Chen. 109-116 [doi]
- Big Data Assisted Object Detection with Privacy ProtectionJianlin Zhang, Xiaoding Wang 0001, Hui Lin 0007. 117-124 [doi]
- FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection AttacksLinlin Su, Jinyan Wang, Zeming Gan, Xianxian Li. 125-132 [doi]
- FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow SequenceQuanbo Pan, Yang Yu, Hanbing Yan, Maoli Wang, Bingzhi Qi. 133-140 [doi]
- Fooling Object Detectors in the Physical World with Natural Adversarial CamouflageDandan Li, Yufeng Li 0002, Guiqi Zhang, Ke Sun, Jiangtao Li 0003. 141-148 [doi]
- Too Noisy, or Not Too Noisy? A Private Training in Machine LearningLukasz Krzywiecki, Grzegorz Zaborowski, Marcin Zawada. 149-156 [doi]
- DFedXGB: An XGB Vertical Federated Learning Framework with Data DesensitizationQing Yang, Youliang Tian, Jinbo Xiong. 157-164 [doi]
- Impact of Aggregation Function Randomization against Model Poisoning in Federated LearningSeyedsina Nabavirazavi, Rahim Taheri, Mohammad Shojafar, Sundararaja Sitharama Iyengar. 165-172 [doi]
- FL-TIA: Novel Time Inference Attacks on Federated LearningChamara Sandeepa, Bartlomiej Siniarski, Shen Wang 0006, Madhusanka Liyanage. 173-180 [doi]
- Scalable Federated Learning for Fingerprint Recognition AlgorithmChenzhuo Wang, Yanrong Lu, Athanasios V. Vasilakos. 181-188 [doi]
- FedRSM: Representational-Similarity-Based Secured Model Uploading for Federated LearningGengxiang Chen, Sheng Liu, Xu Yang, Tao Wang, Linlin You, Feng Xia 0001. 189-196 [doi]
- Defending against Adversarial Attacks in Federated Learning on Metric Learning ModelZhipin Gu, Jiangyong Shi, Yuexiang Yang, Liangzhong He. 197-206 [doi]
- Crowdsourcing-based Model Testing in Federated LearningYunpeng Yi, Hongtao Lv, Tie Luo, Junfeng Yang, Lei Liu, LiZhen Cui. 207-213 [doi]
- HDFL: Private and Robust Federated Learning using Hyperdimensional ComputingHarsh Kasyap, Somanath Tripathy, Mauro Conti. 214-221 [doi]
- Byzantine-Robust Federated Learning through Dynamic ClusteringHanyu Wang, Liming Wang, Hongjia Li. 222-230 [doi]
- FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware ClassifierChangnan Jiang, Chunhe Xia, Chen Chen, Huacheng Li, Tianbo Wang, Xiaojian Li. 231-240 [doi]
- HyperChain: A Dynamic State Sharding Protocol Supporting Smart Contracts to Achieve Low Cross-Shard and ScalabilityHengyu Pan, Cheng Qu, Haowen Zhang, Shuo Wang, Jing Li. 241-248 [doi]
- Efficient Covert Communication Scheme Based on EthereumYuanyuan Li, Wei Chen 0123, Xin Huang, Peng Han, Shenhai Zheng, Zhiqin Zhu. 249-256 [doi]
- Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph FeaturesZhenkun Luo, Shuhong Chen, Guojun Wang 0001, Hanjun Li 0005. 257-264 [doi]
- TI-DNS: A Trusted and Incentive DNS Resolution Architecture based on BlockchainYufan Fu, Jiuqi Wei, Ying Li, Botao Peng, Xiaodong Li. 265-274 [doi]
- Felix: A Model of Detecting Off-chain Abnormal States in Decentralized ApplicationsLianhai Wang, Qihao Huang, Wei Shao, Jinpeng Wang, Xiaoqian Liu, Fansheng Wang. 275-283 [doi]
- Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep LearningJinyao Zhu, Xiaofei Xing, Guojun Wang, Peiqiang Li. 284-291 [doi]
- A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in BlockchainShiyong Huang, Haocong Li, Ruoting Xiong, Wei Ren 0002, Jie He, Yi Ren 0001. 292-299 [doi]
- IHFBF: A High-Performance Blockchain Framework for Improving Hyperledger Fabric Permissioned ChainMin Xu, Xiaoding Wang 0001, Hui Lin 0007. 300-306 [doi]
- Rethinking Practical Blockchain-Based Symmetric Searchable Encryption ServicesJun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo. 307-317 [doi]
- A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash FunctionBhaskar Rongali, Satyajit Mohapatra, Sanjeet Kumar Nayak. 318-325 [doi]
- PrivOff: Secure and Privacy-Preserving Data Management for Distributed Off-Chain NetworksHtet Htet Hlaing, Hitoshi Asaeda. 326-333 [doi]
- ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium BlockchainsYuwei Xu, Ying Zhang, Haonan Shi, Jie Cao 0009. 334-341 [doi]
- VMR-Tree: Efficient and Verifiable Location-based kNN Queries on BlockchainYiping Teng, Lei Liu, Jiawei Qi, Haochun Pan, Chunlong Fan. 342-351 [doi]
- UNITE: Privacy-Aware Verifiable Quality Assessment via Federated Learning in Blockchain-Empowered CrowdsourcingLiangen He, Haiqin Wu, Liang Li, Jucai Yang. 352-360 [doi]
- FedJudge: Blockchain-based full-lifecycle trustworthy federated learning incentive mechanismJiuzheng Wang, Ruilin Zhang, Xinyi Li, Hao Yin. 361-368 [doi]
- HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural NetworksLiwen Xu, Xiang Lin, Jianhua Li, Min Bai, Liejun Wang. 369-378 [doi]
- Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission PolicyErol Gelenbe, Mohammed Nasereddin. 379-386 [doi]
- Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address for IoTChenghe Dong, Jianhong Zhang, Zongyi Lv, Ruxuan Zhang. 387-393 [doi]
- Investigating Fraud and Misconduct in Legitimate Internet Economy based on Customer ComplaintsWenrui Ma, Ying Cong, Haitao Xu, Fan Zhang, Zhao Li, Siqi Ren. 394-403 [doi]
- Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous SystemsZimian Liu, Han Qiu 0004, Rui Wang, Junhu Zhu, QingXian Wang. 404-411 [doi]
- Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email AttachmentsVinay Sachidananda, Sivaanandh Muneeswaran, Liu Yang, Kwok-Yan Lam. 412-421 [doi]
- GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow DiversificationYuanpei Li, Qinglei Zhou, Bin Li, Yan Zhuang. 422-433 [doi]
- Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk AssessmentMuna Al-Hawawreh, Robin Doss. 434-443 [doi]
- Measuring DNS-over-Encryption Performance Over IPv6Liang Jiao, Yujia Zhu, Baiyang Li, Qingyun Liu. 444-451 [doi]
- HackMentor: Fine-Tuning Large Language Models for CybersecurityJie Zhang, Hui-Wen, Liting Deng, Mingfeng Xin, Zhi Li, Lun Li, Hongsong Zhu, Limin Sun. 452-461 [doi]
- Extracting Length Field of Unknown Binary Network Protocol from Static TraceXiuwen Sun, Zhihao Wu, Jing Lin, Pengfei Fu, Jie Cui 0004, Hong Zhong 0001. 462-469 [doi]
- On ECG Signal Classification: An NAS-empowered Semantic Communication SystemHuanlai Xing, Huaming Ma, Zhiwen Xiao, Xinhan Wang, Bowen Zhao, Shouxi Luo, Li Feng, Lexi Xu. 470-476 [doi]
- Parallel Pattern Matching over Brotli Compressed Network TrafficXiuwen Sun, Guangzheng Zhang, Di Wu, Qingying Yu, Jie Cui 0004, Hong Zhong 0001. 477-484 [doi]
- Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation AnalysisRyosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan. 485-494 [doi]
- RCA-IDS: A Novel Real-time Cloud-based Adversarial IDS for Connected VehiclesZahra Pooranian, Mohammad Shojafar, Pedram Asef, Matthew Robinson, Harry Lees, Mark Longden. 495-503 [doi]
- Cerberus: Efficient OSPS Traffic Identification through Multi-Task LearningYuwei Xu, Xiaotian Fang, Jie Cao 0009, Rou Yu, Kehui Song, Guang Cheng 0001. 504-511 [doi]
- Topology construction method of anti-tracking network based on cross-domain decentralized gravity modelZhefeng Nan, Qian Qiang, Tianning Zang, Changbo Tian, Shuyuan Zhao, Shuhe Liu. 512-521 [doi]
- Push It Real Good: Towards Behavioral Access Control using the Door Handle Push-Down-Phase OnlyEric Klieme, Ben-Noah Engelhaupt, Vincent Xeno Rahn, Christoph Meinel. 522-530 [doi]
- FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER ModelChunyan Ma, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng. 531-538 [doi]
- SSdetector: Secure and Manageable Host-based IDS with SGX and SMMYoshimichi Koga, Kenichi Kourai. 539-548 [doi]
- A First Look at Digital Rights Management Systems for Secure Mobile Content DeliveryAmir Rafi, Carlton Shepherd, Konstantinos Markantonakis. 549-558 [doi]
- Towards Understanding Checkpointing in Transiently Powered IoT NetworksJawaher Alharbi, Adam P. Chester, Arshad Jhumka. 559-568 [doi]
- PANGA: Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber AttacksAlok Kumar Trivedi, Priyanka Bagade. 569-576 [doi]
- SRBR: Anti-selfish Routing Based on Social Similarity and Reputation Using Fuzzy LogicHaoxiang Wang, Yu'Ang Zhang, Yujie Song, Yue Cao 0002, Chee Yen Leow, Shihan Bao. 577-584 [doi]
- Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust ManagementOrvila Sarker, Hong Shen, M. Ali Babar. 585-594 [doi]
- Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM ApproachJavad Forough, Monowar H. Bhuyan, Erik Elmroth. 595-604 [doi]
- Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy Modeling and analyzingYumeng Cheng, Wangyang Yu, Xiaojun Zhai, Fei Hao 0001, Yuan Liu. 605-611 [doi]
- Temporal-Aware Lightweight Visual Tracking Method for Dynamic Traffic ScenesXuming Cen, Nan Hu 0002, Haozhe Wang, Shiyi Liu. 612-619 [doi]
- Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility StudyHamdi Friji, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Carnelli, Alexis Olivereau, Aftab Khan 0001. 620-627 [doi]
- Insider Threat Detection Based On Heterogeneous Graph Neural NetworkTian Tian, Yiru Gong, Bo Jiang, Junrong Liu, Huamin Feng, Zhigang Lu 0002. 628-635 [doi]
- Inter-slice Correlation Weighted Fusion for Universal Lesion DetectionMuwei Jian, Yue Jin, Rui Wang, Xiaoguang Li, Hui Yu 0001. 636-643 [doi]
- Anomaly Detection in Dynamic Networks through Edge-Tight Structure EmbeddingLiming Wang, Jiaxing Fan, Fengzhe Zhong, Yan Liu, Jinyang Liu. 644-651 [doi]
- A DGA Domain Name Detection Method Based on Two-Stage Feature ReinforcementHongyu Yang, Tao Zhang, Ze Hu, Liang Zhang, Xiang Cheng. 652-659 [doi]
- High-knowledge shilling attack detection method based on genetic co-forestLingvue Su, Yongli Wang. 660-667 [doi]
- REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain AnalysisWanshuang Lin, Chunhe Xia, Tianbo Wang, Chen Chen 0098, Yuan Zhao, Weidong Zhou. 668-675 [doi]
- LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step AttacksHuiran Yang, Jiaqi Kang, Yueyue Dai, Jiyan Sun, Yan Zhang, Huajun Cui, Can Ma. 676-685 [doi]
- IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion NetworksWen Liu, Degang Sun, Haitian Yang, He Zhu, Yan Wang. 686-693 [doi]
- MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional EncodingJingyu Liu, Chunfang Yang, Ma Zhu, Baojun Qi, Xueyuan Fu, Mengyang Zhou. 694-703 [doi]
- Towards Trust-Centric Networking: A General Model for Trust EvaluationAndrés F. Murillo, Ayoub Messous, Andikan Otung, Motoyoshi Sekiya. 704-711 [doi]
- TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart GlassesHélio Borges, Daniel Andrade, João Nuno Silva, Miguel Correia 0001. 712-721 [doi]
- Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider SelectionJerzy Konorski. 722-729 [doi]
- Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with PseudonymsGuangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, FengJun Li, Dingfeng Ye. 730-739 [doi]
- Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential Computing PlatformKetong Shang, Fang Lu, Ke Huang, Yu Qin, Wei Li, Wei Feng. 740-749 [doi]
- SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply ChainsMichael Eckel, Anirban Basu, Satoshi Kai, Hervais Simo Fhom, Sinisa Dukanovic, Henk Birkholz, Shingo Hane, Matthias Lieske. 750-761 [doi]
- Pldb: Protecting LSM-based Key-Value Store using Trusted Execution EnvironmentChenkai Shen, Lei Fan. 762-771 [doi]
- A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud NativeTian Hu, Shangyuan Zhuang, Jiyan Sun, YinLong Liu, Wei Ma, Hongchao Wang. 772-779 [doi]
- BiLSTM and VAE Enhanced Multi-Task Neural Network for Trust-Aware E-Commerce Product AnalysisShusuke Wani, Xiaokang Zhou, Shohei Shimizu. 780-787 [doi]
- TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User AuthenticationPeter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan 0001. 788-795 [doi]
- Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source SoftwareHaoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia 0001, Yuan Ma. 796-803 [doi]
- The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing SignaturesGuangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye. 804-813 [doi]
- A Broadband Subliminal Channel in Signatures Without Sharing the Signing KeyQinghua Hu, Chunxiang Xu, Wanpeng Li. 814-822 [doi]
- CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace ClusteringRuizhong Du, Jing Cui, Mingyue Li, Yuqing Zhang. 823-832 [doi]
- Sym-Fed: Unleashing the Power of Symmetric Encryption in Cross-Silo Federated LearningJinzhao Wang, Wenlong Tian, Ruixuan Li 0001, Junwei Tang, Xuming Ye, Yaping Wan, Zhiyong Xu 0003. 833-840 [doi]
- Securing an Efficient Lightweight AES AcceleratorRuoyu Huang, Abdullah Aljuffri, Said Hamdioui, Kezheng Ma, Mottaqiallah Taouil. 841-848 [doi]
- Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart EnvironmentsFengling Pang, Chingfang Hsu, Man Ho Au, Lein Harn, Ze Zhang, Li Long. 849-856 [doi]
- GenRex: Leveraging Regular Expressions for Dynamic Malware DetectionDominika Regéciová, Dusan Kolár. 857-864 [doi]
- Differential Privacy Frequent Closed Itemset Mining over Data StreamXuebin Ma, Shengyi Guan, Yanan Lang. 865-872 [doi]
- MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor AttackWeihong Zou, Shigeng Zhang, Weiping Wang, Jian Zhang, Xuan Liu. 873-880 [doi]
- UFADF: A Unified Feature Analysis and Detection Framework for Malicious Office DocumentsYang Hu, Jia Chen, Xin Luo. 881-888 [doi]
- EAMDM: An Evolved Android Malware Detection Method Using API ClusteringHongyu Yang, Youwei Wang, Liang Zhang, Ze Hu, Xiang Cheng, Laiwei Jiang. 889-895 [doi]
- SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority StrategyZhiwen Ren, Zehua Ma, Weiming Zhang 0001, Nenghai Yu. 896-903 [doi]
- Software Vulnerabilities Detection Based on a Pre-trained Language ModelWenlin Xu, Tong Li 0004, Jinsong Wang, Haibo Duan, Yahui Tang. 904-911 [doi]
- Crowdsensed Data-oriented Distributed and Secure Spatial Query SchemeYuxi Li, Fucai Zhou, Jingjing Chen, Dong Ji. 912-919 [doi]
- Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD ProcessorsDanping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng. 920-928 [doi]
- Self-attention is What You Need to Fool a Speaker Recognition SystemFangwei Wang, Ruixin Song, Zhiyuan Tan 0001, Qingru Li, Changguang Wang, Yong Yang. 929-936 [doi]
- SATBA: An Invisible Backdoor Attack Based on Spatial AttentionHuasong Zhou, Xiaowei Xu 0005, Xiaodong Wang, Leon Bevan Bullock. 937-945 [doi]
- MemInspect: Memory Forensics for investigating Fileless AttacksTao Leng, Yuedong Pan, Lixin Zhao, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dang Meng. 946-955 [doi]
- Towards Survivable In-Memory Stores with Parity Coded NVRAMZhixuan Wang, Guangping Xu, Hongzhang Yang, Yulei Wu. 956-963 [doi]
- Secure Synchronized Spatio-Temporal Trajectory Similarity SearchYiping Teng, Jiawei Qi, Lei Liu, Shiqing Wang, Li Xu, Chunlong Fan. 964-973 [doi]
- Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and RetrievalZeshi Zhang, Guangping Xu, Hongzhang Yang, Yulei Wu. 974-981 [doi]
- A lightweight and high-precision approach for bulky JavaScript engines fuzzingLianpei Zhou, Xi Xiao, Guangwu Hu, Hao Li, Xiangbo Wu, Tao Zhou. 982-989 [doi]
- Fuzz Testing for Rust Library FunctionsYongjian Guo, Xi Xiao, Yuanyi Lin, Hao Li, Xiangbo Wu, Tao Zhou. 990-997 [doi]
- Deanonymize Tor Hidden Services Using Remote Website FingerprintingMeiqi Wang, Muqian Chen, ZeYu Li, Xuebin Wang, Jinqiao Shi, Binxing Fang. 998-1005 [doi]
- SIMD Bootstrapping in FHEW SchemeMan Chen, Yuyue Chen, Zoe L. Jiang. 1006-1013 [doi]
- SQL injection attack sample generation based on IE-GANMingdi Xu, Bo Xie, Feng Cui, Chaoyang Jin, Yu Wang. 1014-1021 [doi]
- Random Chunks Generation Attack Resistant Cross-User Deduplication for Cloud StorageXin Tang, Yiteng Zhou, Yudan Zhu, Mingjun Fu, Luchao Jin. 1022-1030 [doi]
- FPHammer: A Device Identification Framework based on DRAM FingerprintingDawei Li, Di Liu, Yangkun Ren, Ziyi Wang, Yu Sun, Zhenyu Guan, Qianhong Wu, Jianwei Liu. 1031-1040 [doi]
- "A method like this would be overkill": Developers' Perceived Issues with Privacy-preserving Computation MethodsPatrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt. 1041-1048 [doi]
- Achieving Higher Level of Assurance in Privacy Preserving Identity WalletsBenjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen 0002. 1049-1059 [doi]
- CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulasTassos Dimitriou, Khazam Alhamdan. 1060-1067 [doi]
- Decentralized Matrix Factorization with Heterogeneous Differential PrivacyWentao Hu, Hui Fang 0002. 1068-1075 [doi]
- Integrating VirtIO and QEMU on seL4 for Enhanced Devices Virtualization SupportEverton de Matos, Conor Lennon, Eduardo K. Viegas, Markku Ahvenjärvi, Hannu Lyytinen, Ivan Kuznetsov, Joonas Onatsu, Anh Huy Bui. 1076-1085 [doi]
- Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within TextJianming Wu, Shuhong Chen, Guojun Wang 0001, Hao Wang, Hanjun Li 0005. 1086-1093 [doi]
- A Framework for Privacy Policy Enforcement for Connected Automotive SystemsAnis Bkakria, Lydia Brika. 1094-1102 [doi]
- Cropping Resilient Secret Image Sharing Scheme with Lossless RecoveryShengyang Luo, Yaqi Liu, Xuehu Yan, Chao Huang. 1103-1110 [doi]
- Robustness and Privacy for Green Learning under Noisy LabelsDe-li, Tiange Xia, Qiyu Li, Xianxian Li, Jinyan Wang. 1111-1118 [doi]
- SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image SynthesisYuting Yang, Lin Liu, Shaojing Fu, Jun-Jie Huang, Yuchuan Luo. 1119-1126 [doi]
- BAA: A Novel Decentralized Authorization System for Privacy-Sensitive Medical DataCong Zha, Yulei Wu, Zexun Jiang, Wenqian Zhao, Hao Yin. 1127-1136 [doi]
- Robustness Assessment of Biometric AuthenticatorsRomain Dagnas, Anis Bkakria, Reda Yaich. 1137-1146 [doi]
- MEDICALHARM - A Threat Modeling designed for Modern Medical DevicesEmmanuel Kwarteng, Mumin Cebe. 1147-1156 [doi]
- SharpEye: Identify mKCP Camouflage Traffic through Feature OptimizationYuwei Xu, Zizhi Zhu, Yunpeng Bai, Lilanyi Wu, Kehui Song, Guang Cheng 0001. 1157-1164 [doi]
- RUE: Realising Unlearning from the Perspective of EconomicsMingjian Tang 0002, Weiqi Wang, Chenhan Zhang, Shui Yu 0001. 1165-1172 [doi]
- MENDER: Multi-level Feature Fusion Discovery Framework for Exposed ICS Remote Management Devices in the WildLiuxing Su, Zhenzhen Li, Gaopeng Gou, Zhen Li, Gang Xiong 0001, Chengshang Hou. 1173-1180 [doi]
- Fine-Grained Task Scheduling Combining DDPG and Path Selection in LEO Satellite NetworksGaowei Zhang, Xu Zhou, Xiaobo Zhang. 1181-1186 [doi]
- Affinity-Based Resource and Task Allocation in Edge Computing SystemsWenbing Zou, Xiulei Liu, Shoulu Hou, Ye Zhang, Lin Miao, Yi Gong, Ning Li. 1187-1195 [doi]
- Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the WildGergely Tuskó, Weizhi Meng 0001, Brooke Lampe. 1196-1205 [doi]
- Distributed Dependent Task Offloading in CPU-GPU Heterogenous MEC: A Federated Reinforcement Learning ApproachHualong Huang, Zhekai Duan, Wenhan Zhan, Yichen Liu, Zhi Wang, Zitian Zhao. 1206-1213 [doi]
- LWVN: A Lightweight Virtual Network View Method to Defend Lateral MovementDegang Sun, Guokun Xu, Weijie Wang, Yan Wang, Qiujian Lv, Xinxing Zhou, Zhiqi Li. 1214-1221 [doi]
- Membership Inference Attacks against GNN-based Hardware Trojan DetectionKento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa. 1222-1229 [doi]
- Analysing Utility Loss in Federated Learning with Differential PrivacyAnastasia Pustozerova, Jan Baumbach, Rudolf Mayer. 1230-1235 [doi]
- Ripple20 Vulnerabilities Detection using a Featureless Deep Learning ModelSarah Binhulayyil, Shancang Li. 1236-1240 [doi]
- ConFunc: Enhanced Binary Function-Level Representation through Contrastive LearningLongfei Li, Xiaokang Yin 0001, Xiao Li, Xiaoya Zhu, Shengli Liu. 1241-1248 [doi]
- TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat DetectionXiming Li 0005, Linghui Li, Xiaoyong Li 0003, Binsi Cai, Bingyu Li. 1249-1257 [doi]
- EFwork: An Efficient Framework for Constructing a Malware Knowledge GraphChen Chen, Chunhe Xia, Tianbo Wang, Wanshuang Lin, Yuan Zhao, Yang Li. 1258-1265 [doi]
- Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack DetectionShuyu Chen, Dawei Lin, Zhenping Xie, Hongbo Wang. 1266-1271 [doi]
- GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P NetworksBadr Bellaj, Aafaf Ouaddah, Abdellatif Mezrioui, Noël Crespi, Emmanuel Bertin. 1272-1278 [doi]
- On-graph Machine Learning-based Fraud Detection in Ethereum Cryptocurrency TransactionsHelen Milner, Md. Redowan Mahmud, Mahbuba Afrin, Sashowta G. Siddhartha, Sajib Mistry, Aneesh Krishna. 1279-1285 [doi]
- CWGAN-GP: Fuzzing Testcase Generation Method based on Conditional Generative Adversarial NetworkZhongyuan Qin, Jiarong Fan, Zeru Li, Xujian Liu, Xin Sun. 1286-1293 [doi]
- Pooling Under the Sun: A Mining Pool Centralized Revisit and SolutionKundu Chen, Jie Luo. 1294-1299 [doi]
- A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using BlockchainXu Yang, Ao Wang, Qiuhao Wang, Saiyu Qi, Yong Qi. 1300-1305 [doi]
- EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain DatabasesJingxian Cheng, Saiyu Qi, Yong Qi, Jianfeng Wang, Qin Jiang, Di Wu 0062. 1306-1311 [doi]
- Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-StampingKarolina Bak, Hannes Salin, Karol Niczyj, Lukasz Krzywiecki. 1312-1317 [doi]
- Referable NFT-based Revenue Allocation Mechanism in Data MarketplaceHui Zhao, Xiaodong Zhang 0031, Jinshan Shi, Ru Li 0004. 1318-1323 [doi]
- A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G RoamingAwaneesh Kumar Yadav, Manoj Misra, An Braeken, Madhusanka Liyanage. 1324-1331 [doi]
- Chrisimos: A useful Proof-of-Work for finding Minimal Dominating Set of a graphDiptendu Chatterjee, Prabal Banerjee, Subhra Mazumdar 0001. 1332-1339 [doi]
- Blockchain-based and Privacy-Preserving Data Collection for Vehicular CrowdsensingXionghe Yu, Xiaolan Tang, Wenlong Chen. 1340-1347 [doi]
- BC-FL k-means: A Blockchain-based Framework for Federated ClusteringMina Alishahi, Wouter Leeuw, Nicola Zannone. 1348-1354 [doi]
- Secure Decentralized Identity Management using BlockchainSandeep Srivastava, Deepshikha Agarwal, Brijesh Chaurasia. 1355-1360 [doi]
- A Novel Blockchain-based Decentralized Multi-party Certificate Management FrameworkShalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage. 1361-1368 [doi]
- Access Control based on CRDTs for Collaborative Distributed ApplicationsPierre-Antoine Rault, Claudia-Lavinia Ignat, Olivier Perrin 0001. 1369-1376 [doi]
- Putting a Padlock on Lambda - Integrating vTPMs into AWS FirecrackerMelker Veltman, Alexandra Parkegren, Victor Morel. 1377-1384 [doi]
- Phish and Chips: Language-agnostic classification of unsolicited emailsCarlos Hernandez Gañán, Siôn Lloyd, Samaneh Tajalizadehkhoob. 1385-1391 [doi]
- Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection in Automotive EthernetFelix Clemens Gail, Roland Rieke, Florian Fenzl, Christoph Krauß. 1392-1399 [doi]
- The Impact of EMI on Security Access Control in Datacenter Data HallsShahriar Saadat. 1400-1407 [doi]
- Physical Layer Secure Communication based on MIMO Channel Constellation FlippingTong Gao, Xianhui Lu. 1408-1415 [doi]
- Channel-Robust Radio Frequency Fingerprint Identification for LTE Devices with Hybrid FeatureHaichuan Peng, Linning Peng, Hua Fu, Lingnan Xie, Junxian Shi, Wentao Jing. 1416-1421 [doi]
- Zero Trust Score-based Network-level Access Control in Enterprise NetworksLeonard Bradatsch, Oleksandr Miroshkin, Natasa Trkulja, Frank Kargl. 1422-1429 [doi]
- A Contextual Derivation Algorithm for Cybersecurity in IoT EnvironmentsAbdul Qadir Khan, Nouredine Tamani, Saad El Jaouhari, Lina Mroueh. 1430-1435 [doi]
- Generating Synthetic Tabular Data for DDoS Detection Using Generative ModelsSamed Saka, Ali Al-Ataby, Valerio Selis. 1436-1442 [doi]
- Network Attack Identification and Analysis Based on Graph Convolutional Neural NetworkXingyu Wang, Wenkun, Yingdan Zhang. 1443-1448 [doi]
- Be like a Chameleon: Protect Traffic Privacy with MimicryZexiao Zou, Yan Zhang, Jin Chen, Jianyi Zhang, Zhiqiang Wang, Lei Ju, Ri Xu. 1449-1454 [doi]
- Enhancing IoT Security: Novel Mechanisms for Malware Detection using HPCs and Neural NetworksShashwat Adhikari, Hafizul Asad, Kevin D. Jones. 1455-1463 [doi]
- A Novel Approach for Trajectory Partition Privacy in Location-Based ServicesChundong Wang 0002, Yongxin Zhao. 1464-1469 [doi]
- Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the InternetYevheniya Nosyk, Maciej Korczynski, Andrzej Duda. 1470-1479 [doi]
- Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic UpdatesYevheniya Nosyk, Maciej Korczynski, Carlos Hernandez Gañán, Michal Król, Qasim Lone, Andrzej Duda. 1480-1489 [doi]
- TorKameleon: Improving Tor's Censorship Resistance with K-anonymization and Media-based Covert ChannelsJoão Afonso Vilalonga, João S. Resende, Henrique Domingos. 1490-1495 [doi]
- A Dynamic Network-based Intrusion Detection Model for Industrial Control SystemsPaulo R. de Oliveira, Altair O. Santin, Pedro Horchulhack, Eduardo K. Viegas, Everton de Matos. 1496-1501 [doi]
- Attacks Against Mobility Prediction in 5G NetworksSyafiq Al Atiiq, Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga. 1502-1511 [doi]
- Analysis and Comparison of Delay Tolerant Network Security Issues and SolutionsJingwen Su, Xiangyu Bai, Kexin Zhou. 1512-1517 [doi]
- Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy EnforcementAdam Spanier, Rui Zhao 0005, Pei-Chi Huang. 1518-1523 [doi]
- Protocol Aware Unsupervised Network Intrusion Detection SystemRitesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi. 1524-1531 [doi]
- A Public Key Infrastructure for 5G Service-Based ArchitectureAyush Kumar 0001, Vrizlynn L. L. Thing. 1532-1539 [doi]
- Access control for interoperable energy management systems using Verifiable CredentialsNikos Fotiou, Spiros Chadoulos, Iordanis Koutsopoulos, Vasilios A. Siris, George C. Polyzos. 1540-1545 [doi]
- HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced DataWeidong Zhou, Tianbo Wang, Guotao Huang, Xiaopeng Liang, Chunhe Xia, Xiaojian Li. 1546-1553 [doi]
- Survey of Malware Analysis through Control Flow Graph using Machine LearningShaswata Mitra, Stephen A. Torri, Sudip Mittal. 1554-1561 [doi]
- Secure Traversable Event logging for Responsible Identification of Vertically Partitioned Health DataSunanda Bose, Dusica Marijan. 1562-1571 [doi]
- MATH - Finding and Fixing Exploits in AlgorandPeter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du 0001. 1572-1579 [doi]
- CamPass: a Secure Camera-based Password Manager for Kiosk BrowsingRui Zhao. 1580-1585 [doi]
- Generating Optimized Universal Adversarial Watermark for Preventing Face DeepfakeKaiqi Lv, Weiguo Lin, Junfeng Xu, WanShan Xu, Shuren Chen, Shengwei Yi. 1586-1591 [doi]
- Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution DecompositionChenyu Dong, Peijia Zheng, Weiqi Luo 0001. 1592-1597 [doi]
- Semantic-Driven Focused Crawling Using LASER and FAISS: A Novel Approach for Threat Detection and Improved Information RetrievalPrasasthy Balasubramanian, Justin Seby, Panos Kostakos 0001. 1598-1605 [doi]
- Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection ModelsDaniel Grahn, Lingwei Chen, Junjie Zhang. 1606-1613 [doi]
- A Fine-Grained Access Control Mechanism Based on Search TreesXianxia Zou, Cenyu Zheng, Haodong Lin, Like Du, Weiwu Xu, Chong He. 1614-1620 [doi]
- Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call InformationRudra Prasad Baksi, Vishwas Nalka, Shambhu J. Upadhyaya. 1621-1630 [doi]
- A Survey on the Principles of Persuasion as a Social Engineering Strategy in PhishingKalam Khadka, Abu Barkat Ullah, Wanli Ma, Elisa Martínez Marroquín, Yibeltal Alem. 1631-1638 [doi]
- Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM FrameworkJunwei Yu, Yepeng Ding, Yuheng Guo, Kentaro Kotani, Hiroyuki Sato. 1639-1644 [doi]
- A New Design for Self-EncryptionRoland Kromes, João Rodrigues, Duarte M. Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang. 1645-1652 [doi]
- Dynamic Searchable Scheme with Forward Privacy for Encrypted Document SimilarityMustafa A. Al Sibahee, Chengwen Luo 0001, Jin Zhang, Yijing Huang, Zaid Ameen Abduljabbar. 1653-1660 [doi]
- LiPI: Lightweight Privacy-Preserving Data Aggregation in IoTHimanshu Goyal, Krishna Kodali, Sudipta Saha. 1661-1666 [doi]
- Dynamic Security Parameters for Multichannel Secret Sharing ProtocolsDavid Pineda Reyes, Josiah Hsu, Claire Wagner, Devin J. Pohly. 1667-1672 [doi]
- Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows RansomwareMd. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta. 1673-1680 [doi]
- Malware Detection Using Contrastive Learning Based on Multi-Feature FusionKailu Guo, Yang Xin 0001, Tianxiang Yu. 1681-1686 [doi]
- Model-Driven Security Analysis of Self-Sovereign Identity SystemsYepeng Ding, Hiroyuki Sato. 1687-1694 [doi]
- WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant ApproachPranitha Sanda, Digambar Pawar, Radha Vedala. 1695-1703 [doi]
- ECC Implementation and Performance Evaluation for Securing OPC UA CommunicationAlexandra Tidrea, Adrian Korodi. 1704-1711 [doi]
- LPA: A Lightweight PUF-based Authentication Protocol for IoT SystemVikash Kumar Rai, Somanath Tripathy, Jimson Mathew. 1712-1717 [doi]
- Practical Privacy-Preserving Ride Sharing Protocol with Symmetric KeySara Ramezanian, Christian Gehrmann. 1718-1727 [doi]
- EMD-SCS: A Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call SequencesRaghav Bhardwaj, Morteza Noferesti, Madeline Janecek, Naser Ezzati Jivan. 1728-1737 [doi]
- *Michela Iezzi, Carsten Maple, Danilo A. Giannone. 1738-1743 [doi]
- Anomaly based malware threat detection on Linux SystemsJayanthi Ramamoorthy, Narasimha K. Shashidhar, Bing Zhou 0002. 1744-1750 [doi]
- Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional DevicesAidan Spalding, Zhiyuan Tan 0001, Kehinde O. Babaagba. 1751-1756 [doi]
- Understanding Privacy Concerns in Mobile Health Applications: A Scenario-based Online SurveyReham Al Tamime, Ali Farooq 0005, Joni Salminen, Vincent Marmion, Wendy Hall 0001. 1757-1765 [doi]
- Trustworthy Execution in Untrustworthy Autonomous SystemsDavid Halasz, Suyash Shandilya, Barbora Buhnova. 1766-1773 [doi]
- Survey on Recognition of Privacy Risk from Responding on TwitterToru Nakamura, Yukiko Sawaya, Takamasa Isohara. 1774-1780 [doi]
- FlexAuth: A Decentralized Authorization System with Flexible DelegationZiyu Fei, Ying Li, Jiuqi Wei, Yufan Fu, Botao Peng, Xiaodong Li. 1780-1797 [doi]
- A Trustworthiness Evaluation Mechanism Based on Beta Distribution Under Selected ConditionsKewei Guo, Xuefei Li. 1781-1789 [doi]
- Privacy-Preserving Detection Method for Transmission Line Based on Edge CollaborationQuan Shi, Kaiyuan Deng. 1798-1805 [doi]
- Trust Assessment of a Darknet MarketplaceFlorian Platzer, York Yannikos. 1806-1813 [doi]
- An Interactive Web Portal for Customised Telerehabilitation in Neurological CareM. A. Hannan Bin Azhar, Zoltán Mészáros, Tasmina Islam, Soumya K. Manna. 1814-1821 [doi]
- Matrix Platform: Empowering Smart Ports with Advanced Video Analytics for Enhanced Security, Safety, and EfficiencyBrendan Black, Philip Perry, Joseph Rafferty, Claudia Cristina, Tom Bowman, Cathryn Peoples, Andrew Ennis, Andrew Reeves, Nektarios Georgalas, Adrian Moore 0001, Bryan W. Scotney. 1822-1826 [doi]
- CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution NetworkKairen Chen, Shuhong Chen, Guojun Wang 0001, Chenchen Wang. 1827-1834 [doi]
- DOPS: A Practical Dual Offline Payment Scheme of CBDC for Mobile DevicesBo Yang, Yanchao Zhang, Dong Tong 0003. 1835-1844 [doi]
- Android Malicious Application Detection Based on Improved Mayfly AlgorithmYinZhen Wei, Shuo Lu. 1845-1852 [doi]
- Game Theory-Based Trade-Off Analysis for Privacy and Openness in Decision Making by Controlling Quantity of InformationMohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, Alireza Jolfaei. 1853-1858 [doi]
- Leveraging Hardware Performance Counters for Efficient Classification of Binary PackersErika A. Leal, Binlin Cheng, TuQuynh Nguyen, Alfredo Gutierrez Garcia, Nathan Cabero, Jiang Ming 0002. 1859-1864 [doi]
- IoT Device Lifecycle ManagementNektarios Georgalas, Andrew Ennis, Cathryn Peoples, Joseph Rafferty, Philip Perry, Claudia Cristina, Brendan Black, Adrian Moore 0001, Tom Bowman, Bryan W. Scotney, Andrew Reeves. 1865-1870 [doi]
- UAV Bluetooth Communication Link Assessment for Emergency Response ApplicationsBrendan Black, Joseph Rafferty, José A. Santos, Andrew Ennis. 1871-1878 [doi]
- Actionable Contextual Explanations for Cyber-Physical SystemsSanjiv S. Jha, Simon Mayer, Kimberly García. 1879-1886 [doi]
- Proactive Device Management for the Internet of ThingsTom Bowman, Nektarios Georgalas, Andrew Reeves, Andrew Ennis, Cathryn Peoples, Brendan Black, Fadi El-Moussa 0001, Adrian Moore 0001. 1887-1892 [doi]
- Python Subset to Digital Logic Dataflow Compiler for Robots and IoTKristaps Jurkans, Charles Fox. 1893-1899 [doi]
- I2Map: IoT Device Attestation Using Integrity MapImran Makhdoom, Mehran Abolhasan, Justin Lipman, Daniel Robert Franklin, Massimo Piccardi. 1900-1907 [doi]
- A Near-Field EM Sensor Implemented in FPGA Configurable FabricCan Aknesil, Elena Dubrova, Niklas Lindskog, Håkan Englund. 1908-1913 [doi]
- Stealthy Rootkits vs Low-Power IoT Devices: A Process-level Colonel Blotto GameTalal Halabi. 1914-1918 [doi]
- Multi-step Prediction of LTE-R Communication Quality based on CA-TCN and Differential EvolutionJiantao Qu, Chunyu Qi, GaoYun An, He. 1919-1924 [doi]
- Machine Learning-based BGP Traffic PredictionTalaya Farasat, Muhammad Ahmad Rathore, Akmal Khan, JongWon Kim 0001, Joachim Posegga. 1925-1934 [doi]
- Detecting Masquerading Traitors from Process Visualization of Computer UsageMartin Macák, Radek Oslejsek, Barbora Buhnova. 1935-1940 [doi]
- Automatic Scam-Baiting Using ChatGPTPiyush Bajaj, Matthew Edwards. 1941-1946 [doi]
- A novel network flow feature scaling method based on cloud-edge collaborationZeyi Li, Ze Zhang, Mengyi Fu, Pan Wang. 1947-1953 [doi]
- A Comprehensive Machine Learning Methodology for Embedded Systems PHMJuliano Pimentel, Alistair A. McEwan, Hong Qing Yu. 1954-1959 [doi]
- Literature Study on Bias and Fairness in Machine Learning SystemsQaizar Bamboat, Hong Qing Yu. 1960-1965 [doi]
- Deep Reinforcement Learning Based Interference Avoidance Beam-Hopping Allocation Algorithm in Multi-beam Satellite SystemsHaonan Wang, Lixiang Liu, Xin Zhou, Lexi Xu, Guangyang Wu, Shuaijun Liu. 1966-1973 [doi]
- A Low Complexity And Efficient Algorithm for LEO Satellite RoutingHao Wang, Yun Liu, Zhiqun Song, Bing Hu, Zikai Wang, Ruiliang Song, Pei Xiao. 1974-1979 [doi]
- Multiple Chord Distance Regression Algorithm to Judge Constellations Without Prior InformationWenli Yan, Shuaijun Liu, Lixiang Liu. 1980-1985 [doi]
- Simulation of Space-borne Digital Phased Array AnntennaJifeng Liu, Yao Zhou, Cheng Wang, Yingnan Liu, Fuchang Li. 1986-1990 [doi]
- Optimization Method for LEO Constellation Frequency Compatibility Simulation ParametersXiang Gao, Jiangyin Fu, Xiujuan Yao, Yi Yan. 1991-1992 [doi]
- Coexistence Analysis Between the Large-scale IMT systems and LEO Satellite communication systemsYuqian Cai, Cheng Wang 0008, Xiaoqian Wang 0017, Xiaoyan Zhao 0003, Weidong Wang. 1993-1998 [doi]
- Coexistence Analysis of 10-10.5 GHz IMT and EESS (passive) SystemsXiaoqian Wang 0017, Cheng Wang 0008, Yuqian Cai, Xiaoyan Zhao 0003, Weidong Wang. 1999-2004 [doi]
- Service-Driven Shared QoS Orchestration for Satellite-Ground Integrated NetworksLin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Kaichu Xing. 2005-2011 [doi]
- Constellation Autonomy Modeling for Agile on-Orbit Communication and ComputingShoufeng Wang, Hua-min Chen, Ye Ouyang, Fan Li, Xuan Chen, Jianchao Guo, Yun Li, Sen Bian, Xidong Wang, Zhidong Ren. 2012-2017 [doi]
- Analyzing Land Cover and Land Use Changes Using Remote Sensing Techniques: A Temporal Analysis of Climate Change Detection with Google Earth EngineMozina Afzal, Kamran Ali, Mumraiz Khan Kasi, Masood Ur Rehman 0001, Mohammad Ali Khoshkholghi, Bushra Haq, Syed Ahmed Shah. 2018-2023 [doi]
- Application Scenarios of Confidential Computing in Satellite InternetJie Ren, Lin Lin, Miao Xue, Zelin Wang. 2024-2029 [doi]
- Design and Implementation of Digital Consulting Capability Platform based on Knowledge SharingZhen Guo, Pengzhou Zhang, Lexi Xu, Peng Liang 0014, Shuwei Yao. 2030-2035 [doi]
- RedCap In-depth Research and Market Development ProspectJinhu Shen, Rui Wang, Mingjie Yang, Liang Cui, Ao Shen, Bao Guo, Jiayu Li, Yuan Fang, Pengcheng Liu, Jimin Ling. 2036-2041 [doi]
- Research on Interpretable Customer Churn Prediction Based on Attention MechanismBin Yang, Jing Liang, Yubin Chen, Ying Xing, Wei Gao, Yue Wang, Lexi Xu, Xinzhou Cheng. 2042-2047 [doi]
- Method for Dual-path Upgrade in a Leaked Signal Indoor Distribution System in 5G NetworkBao Guo, Lufei Zhang, Jinge Guo, Jinhu Shen, Shumin Jiang, Pengcheng Liu. 2048-2051 [doi]
- SSF-EDZL Scheduling Algorithm on Heterogeneous MultiprocessorsPeng Wu, Chengzhuo Han, Tao Yan, Lu Chen, Tianhao Guo, Zhi Li. 2052-2057 [doi]
- Evaluation of Distributed Collaborative Learning Approach for 5G Network Data Analytics FunctionShoufeng Wang, Hua-min Chen, Ye Ouyang, Fan Li, Xuan Chen, Limeng Ma, Zhanwu Li, Sen Bian, Zhidong Ren. 2058-2063 [doi]
- Research on Cross-Layer Alarm Association in 5G Core NetworkDongyue Zhang, Sai Han, Zelin Wang, Jingwei Wang, Guangquan Wang, Jieyan Yang. 2064-2069 [doi]
- The Research and Implementation of Optical Cable Fault Location Method Based on NavigationAo Li, Sai Han, Zelin Wang, Guangquan Wang, Zhi Qiao, Songtao Ni. 2070-2075 [doi]
- User Relationship Discovery Based on Telecom DataYue Wang, Wei Gao, Xinzhou Cheng, Xin Wang, Lexi Xu, Siwei Wang, Yuanguang Wang, Fanyu Meng, Kunyan Li. 2076-2081 [doi]
- A Big Data Sharing Architecture Based on Federal Learning in State GridLiu Na, Rui Yang, Zhicheng Zang, Yu Wang, Chao Wu, Xiaofei Li, Zhendong Li, Meng Li. 2082-2086 [doi]
- Research on the Construction of Information System Stability Guarantee CapabilityPengwei Ma, Chaolun Wang. 2087-2091 [doi]
- Research on Distributed Database Stability Testing Platform based on Chaos EngineeringChaolun Wang, Jiaxing Yang, Xiaolu Han, Jianrui Ma, Siyuan Liu, Pengwei Ma. 2092-2097 [doi]
- Multi-Granularity Cross-Attention Network for Visual Question AnsweringYue Wang, Wei Gao, Xinzhou Cheng, Xin Wang, Huiying Zhao, Zhipu Xie, Lexi Xu. 2098-2103 [doi]
- An Analysis Strategy of Abnormal Subscriber Warning Based on Federated Learning TechnologyJie Gao, Tianyi Wang, Yuhui Han, Lixia Liu, Xingwei Zhang, Lexi Xu, Yang Wu, Zijing Yang, Chen Cheng. 2104-2109 [doi]
- Medical Image Recognition Technology Based On Fusion Of Faster-RCNN And SSDYuwen Hou, Song Wu, Mingde Huo. 2110-2114 [doi]
- Vulnerability Name Prediction Based on Enhanced Multi-Source Domain AdaptationYing Xing, Mengci Zhao, Bin Yang, Yuwei Zhang 0003, Wenjin Li, Jiawei Gu, Jun Yuan, Lexi Xu. 2115-2121 [doi]
- An AI-driven Dockerized Lightweight Framework for Smart Home Service OrchestrationZhaoning Wang, Jiajia Zhu, Bo Cheng 0001, Xinzhou Cheng, Feibi Lyu, Guoping Xu, Jinjian Qiao, Lu Zhi, Tian Xiao. 2122-2127 [doi]
- Proactive Operation and Maintenance for 5G Networks Based on Complaint PredictionFeibi Lyu, Ning Meng, Yuhui Han, Jinjian Qiao, Zhipu Xie, Xinzhou Cheng, Lexi Xu, Zhaoning Wang, Guoping Xu. 2128-2133 [doi]
- Automatic Intelligent Chronic Kidney Disease Detection in Healthcare 5.0Geng Tian, Amir Rehman, Huanlai Xing, Li Feng, Nighat Gulzar, Abid Hussain. 2134-2140 [doi]
- TrustedBench: An Efficient and User-friendly Distributed Performance Testing Tool for Blockchain SystemYang Cheng, Kai Wei, Yihui Zhang, Chunyu Jiang, Weiwei Pang, Qi Zhang, Bin Liu, Lifeng Zhang, Tingting Liu, Yinqian Wu. 2141-2146 [doi]
- Assessing the Value of Data Assets: An Exploratory Study of Valuation MethodsBohuan Ai, Yufei Li, Wenda Ma, Mengyuan Qiu, Miao Liu. 2147-2151 [doi]
- A Cooperative Lane Change Method for Connected and Automated Vehicles Based on Reinforcement LearningFanqiang Meng, Jian Wang, Boxiong Li. 2152-2157 [doi]
- Research on Enterprises Growth for Industries in Post-Epidemic EraHeng Zhang, Bing Yan, Yunpeng Li, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu. 2158-2163 [doi]
- Research on Data Security for Vehicle-Infrastructure-Cloud IntegrationYunlu Yang, Miaoqiong Wang, Yuming Ge, Rundong Yu. 2164-2169 [doi]
- Research on DataOps Capability - Practice and DevelopmentZheng Yin, Shengwen Zhou, Jingjing Zhou, Minghui Tian, Musen Lin, Sida Liu. 2170-2174 [doi]
- Research on Operation Evolution of 5G Non-Public NetworkKun Chao, Zhen Xing, Xinzhou Cheng, Jian Guan, Lexi Xu, Xiqing Liu, Yuwei Jia, Lijuan Cao. 2175-2180 [doi]
- Research on Diagnosis System of 5G Data Service Latency ProblemJinjian Qiao, Guoping Xu, Ning Meng, Feibi Lyu, Xinzhou Cheng, Jiajia Zhu, Lexi Xu, Liang Liu. 2181-2186 [doi]
- Research on Assessment System for BlockchainWeiwei Pang, Kai Wei, Yihui Zhang, Chunyu Jiang, Yang Cheng, Qi Zhang, Bin Liu, Lifeng Zhang, Tingting Liu, Yinqian Wu. 2187-2192 [doi]
- Development Situation and Suggestions of Data Elements in ChinaShu Yan, Sirui Zhang, Ailin Lv, Bo Yuan, Kai Wei. 2193-2197 [doi]
- Research on Technology and Industry Situation of LakehouseYanmei Liu, Pengwei Ma, Jiafeng Tian. 2198-2203 [doi]
- Research on Technologies in Data FabricQingyuan Hu, Zheng Yin, Tao Tao, Jibin Wang, Zhuo Chen, Bohuan Ai, Yu Liu, Chongzhou Liu. 2204-2209 [doi]
- Research on Development of Data Disaster Recovery SystemJiafeng Tian, Pengwei Ma, Chaolun Wang, Zhuo Wang. 2210-2215 [doi]
- Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home ApplicationsAbdullahi Chowdhury, Mohammad Manzurul Islam, Shahriar Kaisar, Mahbub E. Khoda, Ranesh Naha, Mohammad Ali Khoshkholghi, Mahdi Aiash. 2216-2221 [doi]
- EasyOrchestrator: A Dynamic QoS-Aware Service Orchestration Platform for 6G NetworkYi Yue, Zhiyan Zhang, Chang Cao, Xiongyan Tang, Wencong Yang, Feile Li. 2222-2227 [doi]
- A Novel Algorithm and System of Customer Value Evaluation based on Telecom Operator Big DataChen Cheng, Xinzhou Cheng, Jinyou Dai, Xu Xia, Bin Yang, Feibi Lyu, Jie Gao, Wei Zhang, Tian Xiao, Tianyi Wang. 2228-2233 [doi]
- 5G/5G-A Private Network: Construction, Operation and ApplicationsLexi Xu, Junsheng Zhao, Hong Zhu, Mingde Huo, Xinzhou Cheng, Kun Chao, Jie Li, Jian Guan, Xiqing Liu, Jie Gao. 2234-2239 [doi]
- Elastic Digital Twin Network Modeling toward Restraining Resource OccupationShoufeng Wang, Hua-min Chen, Ye Ouyang, Fan Li, Xuan Chen, Jianchao Guo, Yun Li, Sen Bian, Xidong Wang, You Lu. 2240-2245 [doi]
- An Improved Lightweight Linear K-value TransformerAnyan Xiao, Zhuo Yan, Zheng Li, Huangxin Xu, Huixuan Zheng, Yujie Ai, Xiaocong Zhang, Qixuan Sun, Changyu Zhao. 2246-2250 [doi]
- FedQuant: Stock Prediction with Muti-Party Technical Indicators using Federated Learning Method in Quantitative TradingZijing Yang, Lexi Xu, Jie Gao, Jie Li, Yang Wu, Xinzhou Cheng. 2251-2256 [doi]
- Design and Implementation of Mask Detection System Based on Improved YOLOv5sChangyu Zhao, Zhuo Yan, Huangxin Xu, Xueliang Chen, Zheng Li, Xinyu Zhong, Cuiwei Liu, Anyan Xiao, Xingyan Lv. 2257-2262 [doi]
- Address Localization Method Based on Data Fusion of Core Network and Radio Access NetworkTianyi Wang, Yuhui Han, Wei Zhang, Xinzhou Cheng, Jie Gao, Qingqing Zhang, Qijiao Yang, Fengqiang Chen, Chen Cheng. 2263-2268 [doi]
- FLEvaluate: Robust Federated Learning Based on Trust EvaluateChao Guo 0002, Buxin Guo, Tingting Zhu, Peihe Liu, Cheng Gong. 2269-2274 [doi]
- A Novel Uplink Coverage and Capacity Enhancement Scheme in NR TDD NetworkBao Guo, Jinge Guo, Lufei Zhang, Yuan Fang, Yingtao Meng, Jiayu Li. 2275-2279 [doi]
- Smart Campus Construction based on Telecom Operators Big DataRunsha Dong, Xiaodong Cao, Chao Wang, Zhaoyang Sun, Lexi Xu, Xin He, Yang Wu. 2280-2285 [doi]
- Ensemble Learning Models for Large-Scale Time Series Forecasting in Supply ChainMinjuan Zhang, Chase Q. Wu, Aiqin Hou. 2286-2294 [doi]
- A Big Data Science and Engineering Solution for Transit Performance AnalyticsNhu Minh Ngoc Pham, Yixi Wu, Carson K. Leung, Mohammadafaz V. Munshi, Vrushil Kiritkumar Patel, Connor C. J. Hryhoruk. 2295-2302 [doi]
- Control Overhead Reduction using Length-based Same Destination Aggregation for Large Scale Software Defined Networks in Next Generation Internet of ThingsMohammad Shahzad, Lu Liu 0001, Nacer Belkout. 2303-2309 [doi]
- Optimizing Quantum Reversible Circuits Using Reinforcement LearningSheng Yang, Guan-Ju Peng. 2310-2314 [doi]
- Quantum Inspired Binary Atom Search Optimization Algorithm for Charging Station Placement ProblemMadathodika Asna, Hussain Shareef, Achikkulath Prasanthi. 2315-2322 [doi]
- KrNER: A Novel Named Entity Recognition Method Based on Knowledge Enhancement and Remote SupervisionJinhua Du, Hao Yin. 2323-2332 [doi]
- KLDP: A Data Profiling Technique Based on Knowledge Graph and Large Language ModelingJinhua Du, Hao Yin. 2333-2340 [doi]
- Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature AugmentationJoseph Attieh, Joe Tekli. 2341-2348 [doi]
- Hybrid Multi-Objective Relinked GRASP for the constrained Next Release ProblemVíctor Pérez-Piqueras, Pablo Bermejo, José A. Gámez 0001. 2349-2356 [doi]
- Stabilized Finite Element Approximation for The Transient Darcy-Brinkman-Forchheimer ModelRafael Cabral de Moura, Lucia Catabriga. 2357-2364 [doi]
- Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion DetectionLochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta. 2365-2371 [doi]
- Histopathological Image Classification and Vulnerability Analysis using Federated LearningSankalp Vyas, Amar Nath Patra, Raj Mani Shukla. 2372-2377 [doi]
- High-Performance Object Serialization based on Ahead-of-Time Schema GenerationFilip Krakowski, Fabian Ruhland, Michael Schöttner. 2378-2385 [doi]
- Fast Fluid Antenna Multiple Access With Path Loss Consideration and Different Antenna ArchitectureHalvin Yang, Xiao Lin, Kai-Kit Wong, Yizhe Zhao. 2386-2393 [doi]
- Comparison of the Barriers to BIM Adoption and Digital Transformation within the Construction Industry of Pakistan and IrelandAdhban Farea, Moaaz Munir, Rahat Ullah, Michal Otreba, Sean Carroll, Joe Harrington. 2394-2399 [doi]
- Clupiter: a Raspberry Pi mini-supercomputer for educational purposesAlonso Rodríguez-Iglesias, María J. Martín, Juan Touriño. 2400-2405 [doi]
- Transparent network acceleration for big data computing in JavaFabian Ruhland, Filip Krakowski, Michael Schöttner. 2406-2413 [doi]
- MOFP: Multi-Objective Filter Pruning for Deep Learning ModelsJen-Chieh Yang, Hung-I Lin, Lin-Jing Kuo, Sheng-De Wang. 2414-2423 [doi]
- A Hybrid Filter Pruning Method Based on Linear Region AnalysisChang-Hsuan Hsieh, Jen-Chieh Yang, Hung-Yi Lin, Lin-Jing Kuo, Sheng-De Wang. 2424-2431 [doi]
- Soft Hybrid Filter Pruning using a Dual Ranking ApproachPeng-Yu Chen, Jen-Chieh Yang, Sheng-De Wang. 2432-2439 [doi]
- Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News DetectionSheetal Harris, Jinshuo Liu, Hassan Jalil Hadi, Yue Cao. 2440-2447 [doi]
- Quantifying Nematodes through Images: Datasets, Models, and Baselines of Deep LearningZhipeng Yuan, Nasamu Musa, Katarzyna Dybal, Matthew Back, Daniel Leybourne, Po Yang 0001. 2448-2455 [doi]
- Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality CriteriaLouis Fortune Sahi, Romain Laborde, Mohamed Ali Kandi, Michelle Sibilla, Giorgia Macilotti, Benzekri Abdelmalek, Afonso Ferreira. 2456-2464 [doi]
- Railway Traffic Signal Recognition System based on Spatio-Temporal FeaturesHaohan Zhu, Andrea Staino, Biswajit Basu. 2465-2471 [doi]
- A Large-scale Non-standard English Database and Transformer-based Translation SystemArghya Kundu, Uyen Trang Nguyen. 2472-2479 [doi]
- Increasing user seduction in e-commerce community interaction using the participation continuumJonathan Bishop, Ashu M. G. Solo. 2480-2487 [doi]
- Simulation for Trade-off between Interference and Performance in a Bluetooth Low Energy NetworkBozheng Pang, Tim Claeys, Kristof T'Jonck, Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens. 2488-2494 [doi]
- Experimental Validation of Common Assumptions in Bluetooth Low Energy Interference StudiesBozheng Pang, Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens. 2495-2502 [doi]
- HMAS: enabling seamless collaboration between drones, quadruped robots, and human operators with efficient spatial awarenessAmaury Saint-Jore, Ye-Qiong Song, Laurent Ciarletta. 2503-2510 [doi]
- Model-based Development for ROS 2-based Autonomous-driving SoftwareTakumi Onozawa, Hiroshi Fujimoto, Takuya Azumi. 2511-2519 [doi]
- Performance Evaluation Framework for Arbitrary Nodes of Autonomous-driving SystemsYuta Tajima, Tatsuya Miki, Takuya Azumi. 2520-2529 [doi]
- A Scalable Pattern Matching Implementation on Hardware using Data Level ParallelismHassan Jalil Hadi, Khurram Shahzad, Naveed Ahmed, Yue Cao, Yasir Javed. 2530-2537 [doi]
- Dynamic Split Computing-Aware Mixed-Precision Quantization for Efficient Deep Edge IntelligenceNaoki Nagamatsu, Yuko Hara-Azumi. 2538-2545 [doi]
- A Mobile-First Disconnected Data Distribution NetworkShashank Hegde, Deepak Munagala, Aditya Singhania, Benjamin Reed. 2546-2553 [doi]
- Trustworthy Insights: A Novel Multi-Tier Explainable Framework for Ambient Assisted LivingMerlin Kasirajan, M. A. Hannan Bin Azhar, Scott Turner. 2554-2561 [doi]
- Dynamic Scheduling of AES Cores for Aperiodic Tasks on Multi-tenant Cloud FPGAsStephen Donchez, Xiaofang Wang. 2562-2569 [doi]
- Network based Intrusion Detection using Time aware LSTM AutoencoderRitesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi. 2570-2578 [doi]
- Towards a Context-based Mobility Prediction in Smart Cities: First ExperimentationsHocine Boukhedouma, Abdelkrim Meziane, Slimane Hammoudi, Amel Benna, Allel HadjAli. 2579-2586 [doi]
- A reliable edge server placement strategy based on DDPG in the Internet of VehiclesZhou Zhou 0001, Yonggui Han, Mohammad Shojafar, Zhongsheng Wang, Jemal H. Abawajy. 2587-2594 [doi]
- Tabular Generative Adversarial Networks with an Enhanced Sampling Approach for High-Quality Cardiovascular Disease Dataset GenerationMalak Alqulaity, Po Yang 0001. 2595-2600 [doi]
- A Comparative Analysis of Federated Learning Techniques on On-Demand Platforms in Supporting Modern Web Browser ApplicationsMuhammad Senoyodha Brennaf, Po Yang 0001, Vitaveska Lanfranchi. 2601-2606 [doi]
- A Deep Learning Model for Mobility Change Prediction Based on National Prevention and Control PolicyShifeng Li, Ruoling Peng, Po Yang 0001, Yun Yang. 2607-2614 [doi]
- Pollutant Concentration Prediction Based on the Optimization of Long-Short Distance in SpaceMuyao Peng, Kun Wang, Yueli Wen. 2615-2620 [doi]
- Construction of Artificial Intelligence Generated Content in Digital Film ProductionJinning Wang, Xinyuan Huang, Zichu Yang, Weiran Zhao. 2621-2628 [doi]
- Design and Implementation of Intelligent Pet Feeding SystemQi Li, Xinqi Shen, Zhongkai Cheng, Yu Liu. 2629-2635 [doi]
- Software defined networking flow admission and routing under minimal security constraintsJorge López, Charalampos Chatzinakis, Marc Cartigny, Claude Poletti. 2636-2643 [doi]
- Personalized Privacy-Preserving Semi-Centralized Recommendation System in a Trust-Based Agent NetworkQi Wen, Carson K. Leung, Adam G. M. Pazdor. 2644-2651 [doi]
- DTrap: A cyberattack-defense confrontation technique based on Moving Target DefenseZheng Yang, Degang Sun, Yan Wang, Xinbo Han, Chen Meng, Weiqing Huang. 2652-2659 [doi]
- Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMSAbdullah Alhajri, Arshad Jhumka. 2660-2667 [doi]
- SmartLLM: A New Oracle System for Smart Contracts Calling Large Language ModelsZhenan Xu, Jiuzheng Wang, Cong Zha, Xinyi Li, Hao Yin. 2668-2675 [doi]
- Lung Cancer Detection using Machine Learning ApproachMd Abrar Hamim, F. M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam, Bijoy Ghosh. 2676-2682 [doi]
- Rethinking Evaluation Metric for Probability Estimation Models Using Esports DataEuihyeon Choi, Jooyoung Kim, Wonkyung Lee. 2683-2689 [doi]
- Communication Efficient Federated Learning Based on Combination of Structural Sparsification and Hybrid Quantization SensingTingting Wu, Wei Yu 0001, Manxue Guo, Wenjing Nie, Zimeng Jia, Lun Xin. 2690-2697 [doi]
- 1-D CNN-Based Online Signature Verification with Federated LearningLingFeng Zhang, Yuheng Guo, Yepeng Ding, Hiroyuki Sato. 2698-2705 [doi]
- COVID-19 Detection System: A Comparative Analysis of System Performance Based on Acoustic Features of Cough Audio SignalsAsmaa Shati, Ghulam Mubashar Hassan, Amitava Datta. 2706-2713 [doi]
- R-SACE: RIS-Enabled Sensing-Aided Communication Enhancement in ISAC SystemsXiaohui Li 0008, Yunpei Chen, Hong Wang 0022, Shuran Sheng. 2714-2719 [doi]
- Deep learning for graph analysis: application to online human activity recognitionNassim Mokhtari, Mohamed Outlouhou, Alexis Nédélec, Pierre De Loor. 2720-2726 [doi]
- Personal Data Privacy in Software Development Processes: A Practitioner's Point of ViewVinicius Camargo Andrade, Sheila S. Reinehr, Cinthia O. A. Freitas, Andreia Malucelli. 2727-2734 [doi]
- DEU-Net: Dual Encoder U-Net for 3D Medical Image SegmentationYuxiang Zhou, Xin Kang, Fuji Ren, Satoshi Nakagawa, Xiao-shan. 2735-2741 [doi]
- Unlocking the Potentials of Transcriptomics in Predicting Pan Cancer Immune Therapy Response: A Deep Learning Approach Using PHZNetHuazheng Pan, Kun Yu, Junyi Le, Wenxin Hu, Taojun Jin. 2742-2748 [doi]
- An Instruction Inference Graph Optimal Transport Network Model For Biomedical Commonsense Question AnsweringLuyue Kong, Shu Zhang, Jinbao Li, Song Liu. 2749-2754 [doi]
- Ergonomic Design of Precise Percutaneous Robot for Substantial Organs Based on JACK SimulationBowen Sun, Xin Peng, Saisai Li, Jiaxin Sun, Haochuan Tian. 2755-2762 [doi]
- A novel semantic dependency and aspect interaction graph convolutional network for aspect-level sentiment analysisYihong Zhu, Xiaoliang Chen, Junsen Fu, Yajun Du. 2763-2769 [doi]
- Performance Evaluation of Flight Energy Consumption of UAVs in IRS-assisted UAV SystemsXiuyi Luo, Chongrui Lu, Siyi Ouyang, Siyu Xia. 2770-2775 [doi]
- Research on UAV Obstacle Avoidance Method Based on Virtual-real Combination TechnologyWanying Song, Ying Lu, Jin Liu, Zilu Qin, Xiaodan Wang, Yanfang Fu. 2776-2780 [doi]
- A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genomeCheng Tian, Song Liu, Jinbao Li, Guangchen Wang, Luyue Kong. 2781-2788 [doi]
- Designing and Implementing Communication-efficient Model of Distributed System for Real-time Electromagnetic Transient SimulationQi Guo, Binjiang Hu, Zeqi Hong, Yanjun Zhao, Shuyong Li, Liang Tu. 2789-2796 [doi]
- DP-ProtoNet: An interpretable dual path prototype network for medical image diagnosisLuyue Kong, Ling Gong, Guangchen Wang, Song Liu. 2797-2804 [doi]