Abstract is missing.
- An Efficient Privacy-Preserving Scheme for Traffic Monitoring Services in Vehicular NetworksChen Gu, Xuande Cui, Donghui Hu. 3-14 [doi]
- Skin Lesion Segmentation via Intensive Atrous Spatial TransformerXiuli Liu, Wanshu Fan, Dongsheng Zhou. 15-26 [doi]
- Graph Convolutional Networks (GCN)-Based Lightweight Detection Model for Dangerous Driving BehaviorXing Wei, Shang Yao, Chong Zhao, Di Hu, Hui Luo, Yang Lu 0015. 27-39 [doi]
- Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of ThingsJunhua Wu, Huiru Zhang, Guangshun Li, Kan Yu. 40-51 [doi]
- A Smart Contract-Based Intelligent Traffic Adaptive Signal Control SchemeWenyue Wang, Xiang Tian, Xiaolu Cheng, Yuan Yuan, Biwei Yan, Jiguo Yu. 52-63 [doi]
- Inferring Device Interactions for Attack Path Discovery in Smart Home IoTMengjie Sun, Ke Li, Yaowen Zheng, Weidong Zhang, Hong Li 0004, Limin Sun. 64-75 [doi]
- A Local Rotation Transformation Model for Vehicle Re-IdentificationYanbing Chen, Wei Ke, Hao Sheng 0001, Zhang Xiong 0001. 76-87 [doi]
- A Prototype System for Blockchain Performance EvaluationKaixiang Hou, Tianyi Xu, Chao Xu, Xiaobo Zhou 0003, Tie Qiu 0001, Fengbiao Zan. 88-100 [doi]
- A Spatial-Temporal Convolutional Model with Improved Graph RepresentationYang Lv, Zesheng Cheng, Zhiqiang Lv, Jianbo Li. 101-112 [doi]
- A Proof-of-Weighted-Planned-Behavior Consensus for Efficient and Reliable Cyber-Physical SystemsFang Ouyang, Zheng Bao, Lixiao Zhou, Feilong Lin, Zhaolong Hu, Changbing Tang, Minglu Li 0001. 113-125 [doi]
- 2M: Evolving Mobility Modeling in Metropolitan-Scale Electric Taxi SystemsYizong Wang, Haoyu Wang, Dong Zhao 0001, Fuyu Yang, Huadong Ma. 126-138 [doi]
- Multi-task Class Feature Space Fusion Domain Adaptation Network for Thyroid Ultrasound Images: Research on Generalization of Smart Healthcare SystemsXiang Ying, Zhen Liu, Jie Gao 0008, Ruixuan Zhang, Han Jiang, Xi Wei. 139-152 [doi]
- A Caching Strategy Based on Spreading Influence in Information-Centric Satellite NetworksHaowei Wang, Rui Xu, Xiaoqiang Di, Jing Chen, Dejun Zhu, Juping Sun, Yuchen Zhu. 153-164 [doi]
- Posture and Appearance Fusion Network for Driver Distraction RecognitionHao Yu, Chong Zhao, Xing Wei, Yan Zhai, Zhen Chen, Guangling Sun, Yang Lu 0015. 165-174 [doi]
- A Behavior Decision Method for Autonomous Vehicles in an Urban SceneJiujun Cheng, Yonghong Xiong, Shuai Feng, Guiyuan Yuan, Qichao Mao, Bo Lu. 175-184 [doi]
- TimeBird: Context-Aware Graph Convolution Network for Traffic Incident Duration PredictionFuyong Sun, Ruipeng Gao, Weiwei Xing, Yaoxue Zhang, Wei Lu 0010, Jun Fang, Shui Liu, Nan Ma, Hua Chai. 185-195 [doi]
- The Link Awareness Driven Resource Allocation Algorithm Based on Scenario Marking and Vehicle Clustering in VANETsBixun Zhang, Xu Ding, Hang Zheng, Xiang Zheng, Pengfei Xu. 196-205 [doi]
- Socially Acceptable Trajectory Prediction for Scene Pedestrian Gathering AreaRongkun Ye, Zhiqiang Lv, Aite Zhao, Jianbo Li. 206-215 [doi]
- Wi-KF: A Rehabilitation Motion Recognition in Commercial Wireless DevicesXiaochao Dang 0001, Yanhong Bai, Daiyang Zhang, Gaoyuan Liu, Zhanjun Hao 0001. 216-228 [doi]
- An Effective Insider Threat Detection Apporoach Based on BPNNXiaoling Tao, Runrong Liu, Lianyou Fu, Qiqi Qiu, Yuelin Yu, Haijing Zhang. 231-243 [doi]
- VMT: Secure VANETs Message Transmission Scheme with Encryption and BlockchainShiyuan Xu, Xue Chen, Yunhua He, Yibo Cao, Shang Gao. 244-257 [doi]
- Robust Truth Discovery Against Multi-round Data Poisoning AttacksHongniu Zhang, Mohan Li, Yanbin Sun, Guanqun Qu. 258-270 [doi]
- BERT-Based Vulnerability Type Identification with Effective Program RepresentationChenguang Zhu, Gewangzi Du, Tongshuai Wu, Ningning Cui, Liwei Chen, Gang Shi. 271-282 [doi]
- Privacy-Preserving and Truthful Auction for Task Assignment in Outsourced Cloud EnvironmentsXufeng Jiang, Lu Li. 283-295 [doi]
- An SM2-based Traceable Ring Signature Scheme for Smart Grid Privacy ProtectionDa Teng, Yanqing Yao, Yingdong Wang, Lei Zhou, Chao Huang. 296-313 [doi]
- Collusion-Tolerant Data Aggregation Method for Smart GridLiyuan Cao, Yingwen Chen, Kaiyu Cai, Dongsheng Wang, Yuchuan Luo, Guangtao Xue. 314-325 [doi]
- Network Defense Resource Allocation Scheme with Multi-armed BanditsNing Huang, Xue-cai Feng, Rui Zhang 0050, Xiugui Yang, Hui Xia. 326-337 [doi]
- FLFHNN: An Efficient and Flexible Vertical Federated Learning Framework for Heterogeneous Neural NetworkHan Sun, Yan Zhang, Mingxuan Li, Zhen Xu. 338-350 [doi]
- Phishing Frauds Detection Based on Graph Neural Network on EthereumXincheng Duan, Biwei Yan, Anming Dong, Li Zhang, Jiguo Yu. 351-363 [doi]
- Blockchain-Aided Hierarchical Attribute-Based Encryption for Data SharingJiaxu Ding, Biwei Yan, Guijuan Wang, Li Zhang, YuBing Han, Jiguo Yu, Yan Yao. 364-376 [doi]
- Efficient Certificateless Ring Signcryption Scheme with Constant Ciphertext Length on BlockchainYan Jin, Chunxiao Ye, Mengqing Yang, Chunming Ye. 377-388 [doi]
- An Efficient Soft Analytical Side-Channel Attack on AsconSinian Luo, Weibin Wu, Yanbin Li, Ruyun Zhang, Zhe Liu. 389-400 [doi]
- Privacy-preserving WiFi Fingerprint Localization Based on Spatial Linear CorrelationXu Yang, Yuchuan Luo, Ming Xu 0001, Shaojing Fu, Yingwen Chen. 401-412 [doi]
- Secure RFID Handwriting Recognition-Attacker Can Hear but Cannot UnderstandQihang Zhang, Jiuwu Zhang, Xiulong Liu, Xinyu Tong, Keqiu Li. 413-426 [doi]
- Privacy Preserving Federated Learning Using CKKS Homomorphic EncryptionFengyuan Qiu, Hao Yang, Lu Zhou, Chuan Ma, Liming Fang 0001. 427-440 [doi]
- Reinforcement Learning Based Vulnerability Analysis for Smart Grids Against False Data Injection AttacksShiyu Xu, Shi Yu, Liang Xiao 0003, Zefang Lv. 441-452 [doi]
- Blockchain-Based Secure and Efficient Federated Learning with Three-phase Consensus and Unknown Device SelectionJianrong Wang, Haoran Sun, Tianyi Xu. 453-465 [doi]
- TraceDroid: Detecting Android Malware by Trace of Privacy LeakageYueqing Wu, Hao Fu, Guoming Zhang, Bin Zhao, Minghui Xu 0001, Yifei Zou, Xiaotao Feng, Pengfei Hu. 466-478 [doi]
- CA-Free Real-Time Fuzzy Digital Signature SchemeYijie Yan, Shiyuan Xu. 479-490 [doi]
- Efficient Post Quantum Random Oblivious Transfer Based on LatticeLidong Xu, Mingqiang Wang. 491-499 [doi]
- A Secure Aggregation Scheme for Model Update in Federated LearningBaolin Wang, Chunqiang Hu, Zewei Liu. 500-512 [doi]
- A Novel Self-supervised Few-shot Network Intrusion Detection MethodJing Zhang, Zhixin Shi, Hao Wu, Mengyan Xing. 513-525 [doi]
- A Trust Secure Data Aggregation Model with Multiple Attributes for WSNsZhaowei Li, Na Dang, Wenshuo Ma, Xiaowu Liu. 526-534 [doi]
- Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption VerifiabilityXiaolei Wang, Yang Wang, Mingqiang Wang. 535-544 [doi]
- Malicious Domain Detection with Heterogeneous Graph Propagation NetworkCheng Hu, Fangfang Yuan, Yanbing Liu, Cong Cao, Chunyan Zhang, Jianlong Tan. 545-556 [doi]
- Interference Mitigation via Collaborative Beamforming in UAV-Enabled Data Collections: A Multi-objective Optimization MethodHongjuan Li, Da Wei, Geng Sun 0001, Jian Wang 0003, Jiahui Li 0002, Hui Kang. 557-566 [doi]
- Authentication Mechanism Based on Physical Layer Security in Industrial Wireless Sensor NetworksRuizhong Du, Lin Zhen, Yan Liu 0051. 567-578 [doi]
- A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable FunctionsPingchuan Wang, Lupeng Zhang, Jinhao Pan, Fengqi Li. 579-590 [doi]
- On Eliminating Blocking Interference of RFID Unauthorized Reader DetectionDegang Sun, Yue Cui, Siye Wang, Yanfang Zhang. 591-602 [doi]
- Gradient-Based Adversarial Attacks Against Malware Detection by Instruction ReplacementJiapeng Zhao, Zhongjin Liu, Xiaoling Zhang, Jintao Huang, Zhiqiang Shi, Shichao Lv, Hong Li 0004, Limin Sun. 603-612 [doi]
- Opportunistic Network Routing Algorithm Based on Ferry Node Cluster Active Motion and Collaborative ComputingGang Xu, Qi Tang, Zhifei Wang, Baoqi Huang. 615-626 [doi]
- Optimal Deployment and Scheduling of a Mobile Charging Station in the Internet of Electric VehiclesZhenxian Ma, Ran Wang 0004, Changyan Yi, Kun Zhu 0001. 627-639 [doi]
- Energy Efficiency Optimization for RIS Assisted RSMA System over Estimated ChannelCaina Gao, Jia Zhang, Linlin Guo, Lili Meng, Hui Ji, Jiande Sun. 643-654 [doi]