Abstract is missing.
- A Backdoor Embedding Method for Backdoor Detection in Deep Neural NetworksMeirong Liu, Hong Zheng, Qin Liu, Xiaofei Xing, Yinglong Dai. 1-12 [doi]
- Security and Privacy for Sharing Electronic Medical Records Based on Blockchain and Federated LearningWei Liu, Wenlong Feng, Benguo Yu, Tao Peng. 13-24 [doi]
- A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and AttributesShaobo Zhang, Shuo Yang, Gengming Zhu, Entao Luo, Jiyong Zhang, Desheng Xiang. 25-37 [doi]
- Active Malicious Accounts Detection with Multimodal Fusion Machine Learning AlgorithmYuting Tang, Dafang Zhang, Wei Liang, Kuan-Ching Li, Nitin Sukhija. 38-52 [doi]
- Evaluation of an Anomaly Detector for Routers Using Parameterizable Malware in an IoT EcosystemJohn Carter, Spiros Mancoridis. 53-65 [doi]
- PUFloc: PUF and Location Based Hierarchical Mutual Authentication Protocol for Surveillance Drone NetworksAiswarya S. Nair, Sabu M. Thampi. 66-89 [doi]
- Smart Search over Encrypted Educational Resources in Cloud StorageQiang Zhang 0017, Guihua Duan, Shukun Liu. 90-101 [doi]
- SDGen: A Scalable, Reproducible and Flexible Approach to Generate Real World Cyber Security DatasetsAbigail M. Y. Koay, Miao Xie, Ryan K. L. Ko, Charles Sterner, Taejun Choi, Naipeng Dong. 102-115 [doi]
- Towards a Location-Aware Blockchain-Based Solution to Distinguish Fake News in Social MediaWahid Sadique Koly, Abu Kaisar Jamil, Mohammad Shahriar Rahman, Hanif Bhuiyan, Md. Zakirul Alam Bhuiyan, Abdullah Al Omar. 116-130 [doi]
- Using Streaming Data Algorithm for Intrusion Detection on the Vehicular Controller Area NetworkShaila Sharmin, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah Abdul Aziz. 131-144 [doi]
- Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart GridsYuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang. 145-158 [doi]
- Privacy-Preserving Cluster ValidityPeng Yang, Shaohong Zhang, Liu Yang 0002. 159-170 [doi]
- A Large-Scale Study on the Security Vulnerabilities of Cloud DeploymentsIosif Andrei-Cristian, Tiago Espinha Gasiba, Tiange Zhao, Ulrike Lechner, Maria Pinto-Albuquerque. 171-188 [doi]
- Design and Architecture of Progger 3: A Low-Overhead, Tamper-Proof Provenance SystemTristan Corrick, Vimal Kumar. 189-202 [doi]
- Skill Reward for Safe Deep Reinforcement LearningJiangchang Cheng, Fumin Yu, Hongliang Zhang, Yinglong Dai. 203-213 [doi]
- Generalizing Supervised Learning for Intrusion Detection in IoT Mesh NetworksHossein Keipour, Saptarshi Hazra, Niclas Finne, Thiemo Voigt. 214-228 [doi]
- Reliable and Controllable Data Sharing Based on BlockchainYipeng Zou, Tao Peng 0011, Wentao Zhong, Kejian Guan, Guojun Wang 0001. 229-240 [doi]
- A Network Forensics Investigating Method Based on Weak Consistency for Distributed SDNXuehua Liu, Liping Ding, Tao Zheng, Fang Yu, Zhen Jia, Wang Xiao. 241-254 [doi]
- Intrusion Detection System Based on Deep Neural Network and Incremental Learning for In-Vehicle CAN NetworksJiaying Lin, Yehua Wei, Wenjia Li, Jing Long. 255-267 [doi]
- Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS)Shakil, Muhammad Arif, Shahab Saquib Sohail, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang. 268-278 [doi]
- A Supervised Rare Anomaly Detection Technique via Cooperative Co-evolution-Based Feature Selection Using Benchmark UNSW_NB15 DatasetA. N. M. Bazlur Rashid, Mohiuddin Ahmed, Sheikh Rabiul Islam. 279-291 [doi]
- Towards Evaluating the Effectiveness of Botnet Detection TechniquesAshley Woodiss-Field, Michael N. Johnstone, Paul S. Haskell-Dowland. 292-308 [doi]
- A Robust Malware Detection Approach for Android System Based on Ensemble LearningWenjia Li, Juecong Cai, Zi Wang, Sihua Cheng. 309-321 [doi]
- A Reverse Auction Based Efficient D2D Transmission Mechanism for Ubiquitous Power TerminalsXingshen Wei, Yongjian Cao, Peng Gao, Junxian Xu. 322-335 [doi]
- A Fine-Tuning Strategy Based on Real Scenes in Gait IdentificationXianggang Zhang, Jing Zeng, Guoyu Wang. 336-350 [doi]
- An Online Automated Anti-anti-virus MethodLi Ma, Huihong Yang, Yiming Chai, Jiawen Fan, Wenyin Yang. 351-362 [doi]
- Research on Bandwidth Reservation Algorithm of Teaching Resources in Cloud Computing EnvironmentHongling Chen, Zhiwen Liao, Qin Liu. 363-370 [doi]
- An Edge-Cloud Collaborative Object Detection SystemLei Xu, Dingkun Yang. 371-378 [doi]