SCN - volume 2021 论文列表 |
点击这里查看 Security and Communication Networks 的JCR分区、影响因子等信息 |
Xinliang Bi Xiaoyuan Yang Chao Wang Jia Liu
Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing.Hua Ren Shaozhang Niu Haiju Fan Ming Li Zhen Yue
An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features. Small CSI Samples-Based Activity Recognition: A Deep Learning Approach Using Multidimensional Features.Yong Tian Sirou Li Chen Chen Qiyue Zhang Chuanzhen Zhuang Xuejun Ding
Security-Oriented Indoor Robots Tracking: An Object Recognition Viewpoint.Yaoqi Yang Xianglin Wei Renhui Xu Laixian Peng Yunliang Liao Lin Ge
A Hybrid Association Rule-Based Method to Detect and Classify Botnets.Yuanyuan Huang Jiazhong Lu Haozhe Tang Xiaolei Liu
Enhanced Evaluation Model of Security Strength for Passwords Using Integrated Korean and English Password Dictionaries.Ki Hyeon Hong Un Gu Kang Byung Mun Lee
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications.Hasan Alkahtani Theyazn H. H. Aldhyani
En-Route Message Authentication Scheme for Filtering False Data in WSNs. Some Novel Geometric Aggregation Operators of Spherical Cubic Fuzzy Information with Application.Zafar Ullah Huma Bashir Rukhshanda Anjum Mabrook Al-Rakhami Suheer Alhadhrami Abdul Ghaffar
SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns' Detection.Amir Ali Zain Ul Abideen Kalim Ullah
A Blockchain-Based IoT Cross-Domain Delegation Access Control Method.Chao Li Fan Li Lihua Yin Tianjie Luo Bin Wang
IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet. UKF-Based Vehicle Pose Estimation under Randomly Occurring Deception Attacks.Xinghua Liu Dandan Bai Yunling Lv Rui Jiang Shuzhi Sam Ge
Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing. Multimodal Blog Sentiment Classification Based on MD-HFCE. Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things.Dapeng Man Fanyi Zeng Wu Yang Miao Yu Jiguang Lv Yijing Wang
Edge Server Placement for Service Offloading in Internet of Things. Access Control beyond Authentication.Javier Junquera-Sánchez Carlos Cilleruelo Luis de Marcos José Javier Martínez-Herráiz
Distributed Consensus Algorithm for Nonholonomic Wheeled Mobile Robot.Xianyang Meng Ping He Xingzhong Xiong Haoyang Mi Zuxin Li Zhigang Wu
AGG: A Novel Intelligent Network Traffic Prediction Method Based on Joint Attention and GCN-GRU.Huaifeng Shi Chengsheng Pan Li Yang Xiangxiang Gu
An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks.Qizhao Zhou Junqing Yu Dong Li
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning. StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.Jiageng Yang Xinguo Zhang Hui Lu Muhammad Shafiq Zhihong Tian
Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing.Ruyan Wang Shiqi Zhang Zhigang Yang Puning Zhang Dapeng Wu Yongling Lu Alexander A. Fedotov
PBDT: Python Backdoor Detection Model Based on Combined Features.Yong Fang Mingyu Xie Cheng Huang
Few-Shot Website Fingerprinting Attack with Data Augmentation.Mantun Chen Yongjun Wang Zhiquan Qin Xiatian Zhu
G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network.Peng Lu Teng Hu Hao Wang Ruobin Zhang Guo Wu
Deep Reinforcement Learning-Based Algorithm for VNF-SC Deployment.Junlei Xuan Huifang Yang Xuelin Zhao Xingpo Ma Xiaokai Yang
Design and Research of Smart Neck Helmets Based on the KANO-QFD Model and TRIZ Theory. Dual-Tree Complex Wavelet Transform-Based Direction Correlation for Face Forgery Detection.Shichao Gao Ming Xia Gaobo Yang
RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.Dimitrios Kosmanos Dimitrios Karagiannis Antonios Argyriou Spyros Lalis Leandros A. Maglaras
Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns.Muhammad Hameed Siddiqi Khurshed Asghar Umar Draz Amjad Ali Madallah Alruwaili Yousef Alhwaiti Saad Awadh Alanazi M. M. Kamruzzaman
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure.Chien-Ming Chen Shuangshuang Liu
The Applications of Blockchain in Artificial Intelligence.Ruonan Wang Min Luo Yihong Wen Lianhai Wang Kim-Kwang Raymond Choo Debiao He
An Efficient Resource and Topological Attribute-Based Configuration Algorithm of Virtual Networks.Xinyan Wang Shunbin Li Longju Bai
Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT. Edge Location Method for Multidimensional Image Based on Edge Symmetry Algorithm. Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo.Xueying Qiu Yongzhuang Wei Samir Hodzic Enes Pasalic
Fast Software Implementation of Serial Test and Approximate Entropy Test of Binary Sequence.Xian-wei Yang Xueqiu Zhan Hongjuan Kang Ying Luo
Privacy-Preserving Redactable Blockchain for Internet of Things.Yanli Ren Xianji Cai Mingqi Hu
Parallel Calculation Method of Patch Area Landscape Art Index Based on Surface Coverage Data. A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks.Jingyi Li Yujue Wang Yong Ding Wanqing Wu Chunhai Li Huiyong Wang
A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks.Cheng Li Guoyin Zhang Yan Mao Xin Zhao
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time.Zhenyu Gao Jian Cao Xing-Wei Wang Huayun Zhang Zengrong Xu
Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA.Nouf S. Aldahwan Muhammed S. Ramzan
Evaluation Method of the Influence of Sports Training on Physical Index Based on Deep Learning. Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci.Feng Luo Bowen Wang Zihao Fang Zhenyu Yang Yifan Jiang
A Systematic Analysis of Regression Test Case Selection: A Multi-Criteria-Based Approach.Muhammad Rehan Norhalina Senan Muhammad Aamir Ali Samad Mujtaba Husnain Noraini Ibrahim Sikandar Ali Hizbullah Khattak
Latency-Aware Computation Offloading for 5G Networks in Edge Computing. Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III. Fog-Driven Secure Authentication and Key Exchange Scheme for Wearable Health Monitoring System.Tsu-Yang Wu Lei Yang Qian Meng Xinglan Guo Chien-Ming Chen
An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication. Automatic Calibration Algorithm for English Text Translation Based on Semantic Features. A Deep Multimodal Model for Predicting Affective Responses Evoked by Movies Based on Shot Segmentation.Chunxiao Wang Jingjing Zhang Wei Jiang Shuang Wang
Power Optimization for Aerial Intelligent Reflecting Surface-Aided Cell-Free Massive MIMO-Based Wireless Sensor Network.Tao Zhou Kui Xu Chunguo Li Zhexian Shen
IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security.Chunhua Cao YaNa Tang DeYan Huang WeiMin Gan Chunjiong Zhang
A LoRa-Based Lightweight Secure Access Enhancement System.Yu Jiang Hua Fu Aiqun Hu Wen Sun
Identity-Based Linkable Ring Signature on NTRU Lattice.Yongli Tang Feifei Xia Qing Ye Mengyao Wang Ruijie Mu Xiaohang Zhang
Image-Based Insider Threat Detection via Geometric Transformation.Dongyang Li Lin Yang Hongguang Zhang Xiaolei Wang Linru Ma Junchao Xiao
Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques.Abolfazl Mehbodniya Izhar Alam Sagar Pande Rahul Neware Kantilal Pitambar Rane Mohammad Shabaz Mangena Venu Madhavan
New Approach towards Generalizing Feistel Networks and Its Provable Security. Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model. Internet of Things-Based Intelligent Smart Home Control System.Olutosin Taiwo Absalom E. Ezugwu
Accurate Estimation of English Word Similarity Based on Semantic Network. Stability of SDE-LJN System in the Internet to Mitigate Constant-Rate DDoS Attacks.Kaijiao Huang Liansheng Tan Gang Peng
Prediction of IoT Traffic Using the Gated Recurrent Unit Neural Network- (GRU-NN-) Based Predictive Model.Sonali Appasaheb Patil L. Arun Raj Bhupesh Kumar Singh
Website Fingerprinting Attacks Based on Homology Analysis. Design of Remote Real-Time Positioning Method for Long-Distance Running under Wireless Network Technology. Design of Automatic Course Arrangement System for Electronic Engineering Teaching Based on Monte Carlo Genetic Algorithm. Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol. Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE.Hang-chao Ding Han Jiang Qiuliang Xu
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue.Siriboon Chaisawat Chalee Vorakulpipat
Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks.Yong Ding Hui Xu Yujue Wang Fang Yuan Hai Liang
Research on Educational Information Platform Based on Cloud Computing.Ling Fan Meiyi Xia Ping Huang Jianmin Hu
Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus. Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks.Zhiming Zhang Yu Yang Wei Yang Fuying Wu Ping Li Xiaoyong Xiong
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum.Yong Zeng Yixin Li Zhongyuan Jiang Jianfeng Ma
Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model. Joint Design of Beamforming and Edge Caching in Fog Radio Access Networks.Wenjing Lv Rui Wang Jun Wu Zhijun Fang Songlin Cheng
Research on Low Frame Rate Video Compression Algorithm in the Context of New Media.Yixin Yang Zhiqang Xiang Jianbo Li
Implementation of English "Online and Offline" Hybrid Teaching Recommendation Platform Based on Reinforcement Learning. From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing.Zihao Shao Huiqiang Wang Yifan Zou Zihan Gao Hongwu Lv
PoC Design: A Methodology for Proof-of-Concept (PoC) Development on Internet of Things Connected Dynamic Environments.K. Prasanna Kadiyala Ramana Gaurav Dhiman Sandeep Kautish V. Deeban Chakravarthy
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain.Xiaofeng Lu Songbing Fu Cheng Jiang Pietro Lió
Internet of Things Security: Challenges and Key Issues.Mourade Azrour Jamal Mabrouki Azidine Guezzaz Ambrina Kanwal
Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain. Threat Analysis and Risk Assessment for Connected Vehicles: A Survey.Feng Luo Yifan Jiang Zhaojing Zhang Yi Ren Shuo Hou
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network.ChuanPeng Guo Wei Yang Mengxia Shuai Liusheng Huang
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments.Tsu-Yang Wu Lei Yang Jia-Ning Luo Jimmy Ming-Tai Wu
Real-Time Surveillance Using Deep Learning.Muhammad Javed Iqbal Muhammad Munwar Iqbal Iftikhar Ahmad Madini O. Alassafi Ahmed S. Alfakeeh Ahmed Alhomoud
A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model. Blockchain-Enabled Intelligent Video Caching and Transcoding in Clustered MEC Networks. Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.Shudong Li Qianqing Zhang Xiaobo Wu Weihong Han Zhihong Tian
Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model. Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication.Quan Sun Xinyu Miao Zhihao Guan Jin Wang Demin Gao
Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery.Meghana P. Lokhande Dipti Durgesh Patil Lalit V. Patil Mohammad Shabaz
Emotion Generation and Transition of Companion Robots Based on Plutchik's Model and Quantum Circuit Schemes.Fei Yan Xue Yang Nianqiao Li Xu Yu Hongyu Zhai
Research on Information Resource Sharing and Big Data of Sports Industry in the Background of OpenStack Cloud Platform. A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability.Yingjie Xu Gengran Hu Lin You Chengtang Cao
Learning-Based Detection for Malicious Android Application Using Code Vectorization.Lin Liu Wang Ren Feng Xie Shengwei Yi Junkai Yi Peng Jia
Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks.Junjie Mao Bin Weng Tianqiang Huang Feng Ye Liqing Huang
Blockchain Enabled Automatic Reward System in Solid Waste Management.Shaik Vaseem Akram Sultan S. Alshamrani Rajesh Singh Mamoon Rashid Anita Gehlot Ahmed Saeed Alghamdi Deepak Prashar
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification.Zhanhui Yuan Wenfa Li Zhi Yang Lei Sun Xuehui Du Hongqi Zhang
Research on Lightweight Mutual Authentication for the Product Authorization Chain.Hanqing Ding Qing Zhang Yifeng Yin Yong Gan Weihua Liu
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks.Qing Ren Feng Tian Xiangyi Lu Yumeng Shen Zhenqiang Wu Xiaolin Gui
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.Tianqi Zhou Jian Shen Yongjun Ren Sai Ji
An Enhanced Visual Attention Siamese Network That Updates Template Features Online.Wenqiu Zhu Guang Zou Qiang Liu Zhigao Zeng
Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing.Wenle Bai Zhongjun Yang Jianhong Zhang Rajiv Kumar
Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks. HS-MOEA/D: An Oriented Algorithm for Delay and Reliability VNF-SC Deployment.Hejun Xuan Lei You Zhenghui Liu Yanling Li Xiaokai Yang
Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era.George Iakovakis Constantinos-Giovanni Xarhoulacos Konstantinos Giovas Dimitris Gritzalis
Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing.Tao Wan Shixin Yue Weichuan Liao
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach.Siffat Ullah Khan Habib Ullah Khan Naeem Ullah Rafiq Ahmad Khan
Hierarchical Attention Graph Embedding Networks for Binary Code Similarity against Compilation Diversity.Yan Wang Peng Jia Cheng Huang Jiayong Liu Peisong He
Analysis of Challenges in Modern Network Forensic Framework.Sirajuddin Qureshi Jianqiang Li Faheem Akhtar Saima Tunio Zahid Hussain Khand Ahsan Wajahat
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality.Azidine Guezzaz Said Benkirane Mourade Azrour Shahzada Khurram
An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor.Yani Zheng Gaurav Dhiman Ashutosh Sharma Amit Sharma Mohd Asif Shah
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey.Sanjeev Kumar Dwivedi Priyadarshini Roy Chinky Karda Shalini Agrawal Ruhul Amin
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector.Xiaoyu Xu Hao Hu Yuling Liu Hongqi Zhang Dexian Chang
Factors Affecting Corporate Security Policy Effectiveness in Telecommuting. Braking Control System of Oilfield Minor Repair Machine Based on Wireless Sensor Network.Li Zhuang Yaoguang Qi Fenna Zhang
Group Signature with Verifier-Local Revocation Based on Coding Theory.Luping Wang Kai Zhang Haifeng Qian Jie Chen
Real-Time Facial Expression Recognition System for Video Big Sensor Data Security Application.Zhi Yao Hailing Sun Guofu Zhou
Intelligent Recognition Method of Vehicle Path with Time Window Based on Genetic Algorithm. Research on Risk Assessment of Science and Technology Data in Network Finance Based on Portfolio Empowerment. Cell Traffic Prediction Based on Convolutional Neural Network for Software-Defined Ultra-Dense Visible Light Communication Networks.Shanjun Zhan Lisu Yu Zhen Wang Yichen Du Yan Yu Qinghua Cao Shuping Dang Zahid Khan
A New Method of Denoising Crop Image Based on Improved SVD in Wavelet Domain.Rui Wang Wanxiong Cai Zaitang Wang
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification. SSGD: A Safe and Efficient Method of Gradient Descent.Jinhuan Duan Xianxian Li Shiqi Gao Zili Zhong Jinyan Wang
Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics.Yujiang Lu Yaju Liu Jianwei Fei Zhihua Xia
Research on Cross-Company Defect Prediction Method to Improve Software Security.Yanli Shao Jingru Zhao Xingqi Wang Weiwei Wu Jinglong Fang
Design of English Interactive Teaching System Based on Association Rules Algorithm. Anonymous Certificate-Based Inner Product Broadcast Encryption. A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare.Huijie Yang Jian Shen Junqing Lu Tianqi Zhou Xueya Xia Sai Ji
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System.Liquan Chen Tianyang Tu Kunliang Yu Mengnan Zhao Yingchao Wang
Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network.Chao Wang Bailing Wang Yunxiao Sun Yuliang Wei Kai Wang Hui Zhang Hongri Liu
Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism.Huan Dai Pengzhan Shi He Huang Ruyu Chen Jun Zhao
MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images. A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.Jingjing Zhang Xianming Gao Lin Yang Tao Feng Dongyang Li Qiang Wang
Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology. Distributed Policy Evaluation with Fractional Order Dynamics in Multiagent Reinforcement Learning.Wei Dai Wei Wang Zhongtian Mao Ruwen Jiang Fudong Nian Teng Li
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services.Guangquan Xu Guofeng Feng Litao Jiao Meiqi Feng Xi Zheng Jian Liu
Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model.Yan Mi Hengwei Zhang Hao Hu Jinglei Tan Jindong Wang
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features.Ming Li Dezhi Han Xinming Yin Han Liu Dun Li
Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming.Luke Cranfill Jeehyeong Kim Hongkyu Lee Victor Youdom Kemmoe Sunghyun Cho Junggab Son
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting.Peng Li Junzuo Lai Yongdong Wu
Orthogonal Frequency Division Multiplexing Underwater Acoustic Communication System with Environmental Cognition Ability.Jinqiu Wu Xiaofei Qi Kang Guo Jiaqiong Zhou Yi Zhang
Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm.Wang Jun Wenli Song Zhipeng Li
Analysis and Research of Psychological Education Based on Data Mining Technology. J-Net: Asymmetric Encoder-Decoder for Medical Semantic Segmentation. A Certificate-Based Provable Data Possession Scheme in the Standard Model. Research on the Mental Health of College Students Based on Fuzzy Clustering Algorithm.Qinghua Tang Yixuan Zhao Yujia Wei Lu Jiang
Energy-Saving D2D Wireless Networking Based on ACO and AIA Fusion Algorithm.Jiatong Li Zhibo Li Xuanying Li Cheng Wang
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.Liyan Zhu Jinwei Wang Xiangyang Luo Yi Zhang Chunfang Yang Fenlin Liu
Design and Reconstruction of Visual Art Based on Virtual Reality. Design of Project Cost Risk Management System Based on Improved Fuzzy Rule Weight Algorithm.Chen Huang Yanfeng Zhu Xiaoming Shao
Deep Grid Scheduler for 5G NB-IoT Uplink Transmission.Han Zhong Ruize Sun Fengcheng Mei Yong Chen Fan Jin Lei Ning
TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making.Yunhui Li Liang Chang Long Li Xuguang Bao Tianlong Gu
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification.Zelin Deng Qiran Zhu Pei He Dengyong Zhang Yuansheng Luo
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction.Xieyang Shen Chuanhe Huang Xiajiong Shen Jiaoli Shi Danxin Wang
Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network.Chuan Yue Lide Wang Dengrui Wang Ruifeng Duo Haipeng Yan
Security Analysis of Intelligent System Based on Edge Computing.Yibo Han Weiwei Zhang Zheng Zhang
User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption. Information Security Field Event Detection Technology Based on SAtt-LSTM.Wentao Yu Xiaohui Huang Qingjun Yuan Mianzhu Yi Sen An Xiang Li
Robustness of the Storage in Cloud Data Centers Based on Simple Swarm Optimization Algorithm.Alireza Chamkoori Serajdean Katebi
Security and Privacy in Smart Cities.Chalee Vorakulpipat Ryan K. L. Ko Qi Li Ahmed Meddahi
Blockchain Network Propagation Mechanism Based on P4P Architecture.Junjie Huang Liang Tan Sun Mao Keping Yu
Differentially Private Web Browsing Trajectory over Infinite Streams.Xiang Liu Yuchun Guo Xiaoying Tan Yishuai Chen
An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks.Shuailiang Zhang Xiujuan Du Xin Liu
Understanding Block and Transaction Logs of Permissionless Blockchain Networks. Research on the Management Information System of College Education and Teaching Based on Web.Jinhua Liu Caiping Wang Yanhua Wu
Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things. Research on Evaluation Method of Sports Events Based on Edge Algorithm. Malicious Encryption Traffic Detection Based on NLP.Hao Yang Qin He Zhenyan Liu Qian Zhang
A Blockchain-Based Microgrid Data Disaster Backup Scheme in Edge Computing.Lihua Zhang Yu Cao Ganzhe Zhang Yang Huang Chen Zheng
An Improved Cuckoo Search Algorithm for Multithreshold Image Segmentation.Wentan Jiao Wenqing Chen Jing Zhang
A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training.Yifan Luo Feng Ye Bin Weng Shan Du Tianqiang Huang
On the Modified Transparency Order of n , m -Functions.Yu Zhou Yongzhuang Wei Hailong Zhang Wenzheng Zhang
Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD.Jiu Lou Zhongliang Xu Decheng Zuo Hongwei Liu
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT.Yichuan Wang Han Yu Xinhong Hei Binbin Bai Wenjiang Ji
Design of Multimedia Vocal Music Education Data Integration System Based on Adaptive Genetic Algorithm. ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System.Feng Xiao Enhong Chen Qiang Xu Xianguo Zhang
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code.Xingzheng Li Bingwen Feng Guofeng Li Tong Li Mingjin He
Differential Privacy Principal Component Analysis for Support Vector Machines.Yuxian Huang Geng Yang Yahong Xu Hao Zhou
Permission Sensitivity-Based Malicious Application Detection for Android.Yubo Song Yijin Geng Junbo Wang Shang Gao Wei Shi
Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes.Hansong Du Jiu-fen Liu Yu-guo Tian Xiangyang Luo
RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network.Haibin Shi Guang Cheng Ying Hu Fuzhou Wang Haoxuan Ding
Research on Classification Method of Network Resources Based on Modified SVM Algorithm.Hao Zhang Jingchao Hu Yaodong Zhang
Offline Pashto Characters Dataset for OCR Systems.Sulaiman Khan Habib Ullah Khan Shah Nazir
Differentially Private Attributed Network Releasing Based on Early Fusion.Yuye Wang Jing Yang Jianpei Zhan
SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block.Guiyong Xu Yang Xu Sicong Zhang Xiaoyao Xie
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.Hai Liu Changgen Peng Youliang Tian Shigong Long Zhenqiang Wu
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild. Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy.Chuanlei Zhang Minda Yao Wei Chen Shanwen Zhang Dufeng Chen Yuliang Wu
Improved Outsourced Provable Data Possession for Secure Cloud Storage.Haibin Yang Zhengge Yi Ruifeng Li Zheng Tu Xu An Wang Yuanyou Cui Xiaoyuan Yang
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks.Junsong Zhang Qikun Zhang Zhigang Li Xianling Lu Yong Gan
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.Guoai Xu Jiangtao Yuan Guosheng Xu Zhongkai Dang
Robust Image Hashing Based on Cool and Warm Hue and Space Angle. Semisupervised Learning-Based Sensor Ontology Matching. DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability.Pengkun Li Jinshu Su Xiaofeng Wang Qianqian Xing
A Survey of Self-Sovereign Identity Ecosystem.Reza Soltani Uyen Trang Nguyen Aijun An
Corrigendum to "BNRDT: When Data Transmission Meets Blockchain".Hongjian Jin Xingshu Chen Xiao Lan Hui Guo Hongxia Zhang Qi Cao
Multi-Authority Criteria-Based Encryption Scheme for IoT.Jianguo Sun Yang Yang Zechao Liu Yuqing Qiao
A Novel Decoding Method for the Erasure Codes. Hybrid Structures Applied to Subalgebras of BCH-Algebras.G. Muhiuddin Deena Al-Kadi Waseem Ahmad Khan Chiranjibe Jana
A Privacy Protection Method of Lightweight Nodes in Blockchain. Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding.Zelin Zhang Jian Xu Bin Ma Chunpeng Wang Jian Li Yuli Wang
Image Encryption with Fusion of Two Maps.Yannick Abanda Alain Tiedeu Guillaume Kom
Deep Nearest Neighbor Website Fingerprinting Attack Technology.Maohua Guo Jinlong Fei Yitong Meng
Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network.Yi Lu Menghan Liu Jie Zhou Zhigang Li
Edge Computing for IoT-Enabled Smart Grid.M. Yasir Mehmood Ammar Oad Muhammad Abrar Hafiz Mudassir Munir Syed Faraz Hasan Hafiz Abd Ul Muqeet Noorbakhsh Amiri Golilarz
Cost-Effective Optimization for Blockchain-Enabled NOMA-Based MEC Networks.Jianbo Du Yan Sun Aijing Sun Guangyue Lu Zhixian Chang Haotong Cao Jie Feng
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications.Christian Johansen Aulon Mujaj Hamed Arshad Josef Noll
GT-Bidding: Group Trust Model of P2P Network Based on Bidding.Lin Zhang Xinyan Wei Yanwen Huang Haiping Huang Xiong Fu Ruchuan Wang
Performance Modeling Analysis of D-MSMR-CARQ with Relay Selection in Wireless Sensor Networks.Yongqiang Zhou Huan Qian Qihao Wang Suoping Li
Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System. Analysis of SWIPT-Enabled Relay Networks with Full-Duplex Destination-Aided Jamming.Jinglan Ou Hangchuan Shi Liubin Wang Rui Ma Haowei Wu
Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking.Hao Liu Rongbo Zhu Jun Wang Wengang Xu
On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication.Jianming Zhao Peng Zeng Yingjun Liu Tianyu Wang
Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network.Xiaodong Zhang Ru Li Wenhan Hou Jinshan Shi
Proximity Measurement for Hierarchical Categorical Attributes in Big Data.Zakariae El Ouazzani An Braeken Hanan El Bakkali
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection.Xiaodong Liu Tong Li Runzi Zhang Di Wu Yongheng Liu Zhen Yang
Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection. An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image.Jiayu Wang Xuehu Yan Jia Chen Yongqiang Yu
A Deep Learning-Based Trust Assessment Method for Cloud Users.Wei Ma Qinglei Zhou Mingsheng Hu Xing Wang
A Cost-Efficient Autonomous Air Defense System for National Security.Fazle Rabby Khan Md. Muhabullah Roksana Islam Mohammad Monirujjaman Khan Mehedi Masud Sultan Aljahdali Avinash Kaur Parminder Singh
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems.Shichang Xuan Ming Jin Xin Li Zhaoyuan Yao Wu Yang Dapeng Man
Certificateless Network Coding Ring Signature Scheme. Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network.Amir Chaaf Mohammed Saleh Ali Muthanna Ammar Muthanna Soha Alhelaly Ibrahim A. Elgendy Abdullah M. Iliyasu Ahmed A. Abd El-Latif
High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection.Xu Wang Li-Yao Li Ching-Chun Chang Chih-Cheng Chen
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures.Jabar Mahmood Zongtao Duan Yun Yang Qinglong Wang Jamel Nebhen Muhammad Nasir Mumtaz Bhutta
Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes. The Segmentation of Road Scenes Based on Improved ESPNet Model.Ran Jin Tongrui Yu Xiaozhen Han Yunpeng Liu
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks.Tsu-Yang Wu Zhiyuan Lee Lei Yang Chien-Ming Chen
GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing.Zhiqiang Wang Yuheng Lin Zihan Zhuo Jieming Gu Tao Yang
Secure Vertical Handover to NEMO Using Hybrid Cryptosystem.Vikram Raju Reddicherla Umashankar Rawat Y. Jeevan Nagendra Kumar Atef Zaguia
A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph.Zimeng Wang Wei Chen Haifeng Jiang Shuo Xiao Haowen Yang
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption.Mingyang Song Yingpeng Sang Yuying Zeng Shunchao Luo
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work.Zhonghua Zhang Xifei Song Lei Liu Jie Yin Yu Wang Dapeng Lan
A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing.Taochun Wang Chengmei Lv Chengtian Wang Fulong Chen Yonglong Luo
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT.Lingyan Xue Qinglong Huang Shuaiqing Zhang Haiping Huang Wenming Wang
Remote Evaluation System of Tennis Batting Action Standard Based on Acceleration Sensor. An Efficient User-Centric Consent Management Design for Multiservices Platforms.Paul Marillonnet Mikaël Ates Maryline Laurent Nesrine Kaaniche
A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks.Jing Liu Shoubao Su Yuhua Lu Jun Dong
Research on Calibration Method of Binocular Vision System Based on Neural Network. FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection.Ke Shao Qiang Xiong Zhiming Cai
Meteorological Satellite Operation Prediction Using a BiLSTM Deep Learning Model.Yi Peng Qi Han Fei Su Xingwei He Xiaohu Feng
Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm.Yi Huang Shah Nazir Xinqiang Ma Shiming Kong Youyuan Liu
CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification.Xinyi Hu Chunxiang Gu Fushan Wei
A Defense Framework for Privacy Risks in Remote Machine Learning Service.Yang Bai Yu Li Mingchuang Xie Mingyu Fan
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations.Lingzan Yu Yanli Ren Guorui Feng Xinpeng Zhang
An Incentive Mechanism for Reporting Phishing E-Mails Based on the Tripartite Evolutionary Game Model. Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis.F. F. Hu S. T. Zhang X. B. Lin L. Wu N. D. Liao
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain.Zilin Qiang Yingsen Wang Kai Song Zijuan Zhao
An Automatic Source Code Vulnerability Detection Approach Based on KELM.Gaigai Tang Lin Yang Shuangyin Ren Lianxiao Meng Feng Yang Huiqiang Wang
Detection of GAN-Synthesized Image Based on Discrete Wavelet Transform.Guihua Tang Lei Sun Xiuqing Mao Song Guo Hongmeng Zhang Xiaoqin Wang
Cache Pollution Detection Method Based on GBDT in Information-Centric Network.Dapeng Man Yongjia Mu Jiafei Guo Wu Yang Jiguang Lv Wei Wang
Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy.Renjie Zhou Xiao Wang Jingjing Yang Wei Zhang Sanyuan Zhang
How Does the Urgency of Borrowing in Text Messages Affect Loan Defaults? Evidence from P2P Loans in China.Hong Liu Mingkang Yuan Meiling Zhou
Augmented Data Selector to Initiate Text-Based CAPTCHA Attack.Aolin Che Yalin Liu Hong Xiao Hao Wang Ke Zhang Hong-Ning Dai
Obfuscated Tor Traffic Identification Based on Sliding Window. Modeling and Control of Malware Propagation in Wireless IoT Networks.Qing Yan Lipeng Song Chenlu Zhang Jing Li Shanshan Feng
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model. Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences.Liang-Jia Tong Nan-Run Zhou Zhi-Jing Huang Xin-Wen Xie Ya-Ru Liang
An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things.Hanrui Zhang Qianmu Li Shunmei Meng Zhuoran Xu Chaoxian Lv
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection.Priyanka Dixit Rashi Kohli Ángel Eduardo Acevedo-Duque Romel Ramón González-Díaz Rutvij H. Jhaveri
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT.Tianpeng Deng Xuan Li Biao Jin Lei Chen Jie Lin
Explainable Fraud Detection for Few Labeled Time Series Data. FCNN: An Efficient Intrusion Detection Method Based on Raw Network Traffic.Yue Wang Yiming Jiang Julong Lan
Driver Fatigue Detection Based on Facial Key Points and LSTM.Long Chen Guojiang Xin Yuling Liu Junwei Huang
Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification.Yan Jiang Guisheng Yin Ye Yuan Qingan Da
Recognition of Operating Characteristics of Heavy Trucks Based on the Identification of GPS Trajectory Stay Points.Long Wei Gang Chen Wenjie Sun Guoqi Li
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.Won-Bin Kim Daehee Seo Donghyun Kim Im-Yeong Lee
EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements.Guozhong Dong Weizhe Zhang Haowen Tan Rahul Yadav Shuaishuai Tan
Research on Risk Measurement and Early Warning of Electronic Banking Business Based on GMDH Algorithm. Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures. Beyond Statistical Analysis in Chaos-Based CSPRNG Design.John Prakash Arockiasamy Lydia Elizabeth Benjamin Vaidheyanathan Rhymend Uthariaraj
R2AU-Net: Attention Recurrent Residual Convolutional Neural Network for Multimodal Medical Image Segmentation.Qiang Zuo Songyu Chen Zhifang Wang
Design of Distributed Collection Model of Student Development Information Based on Internet of Things Technology. Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information.Naeem Jan Saif Ur Rehman Abdul Nasir Hassen Aydi Sami Ullah Khan
Static Characteristics of a Linear Bipotentiometer Sensor.Chang-Zhong Chen Yong Cai Tao Fan Ping He
Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution.Xiujuan Wang Yi Sui Yuanrui Tao Qianqian Zhang Jianhua Wei
User Identification Based on Integrating Multiple User Information across Online Social Networks.Wenjing Zeng Rui Tang Haizhou Wang Xingshu Chen Wenxian Wang
Influencing Factors of Cross-Border E-Commerce Consumer Purchase Intention Based on Wireless Network and Machine Learning.Chunwei Lu Gu-Hong Lin Tzu-Jung Wu I-Hsiang Hu Yuan-Chieh Chang
Personal Trajectory with Ring Structure Network: Algorithms and Experiments.Guoqi Liu Ruonan Gu Jiantao Wang Weidong Yan
Cross-Platform Strong Privacy Protection Mechanism for Review Publication.Mingzhen Li Yunfeng Wang Yang Xin Hongliang Zhu Qifeng Tang Yuling Chen Yixian Yang Guangcan Yang
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing. Craniofacial Reconstruction via Face Elevation Map Estimation Based on the Deep Convolution Neutral Network.Yining Hu Zhe Wang Yueli Pan Lizhe Xie Zheng Wang
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization.Aya Jaradat Eyad Taqieddin Moad Mowafi
FeatureTransfer: Unsupervised Domain Adaptation for Cross-Domain Deepfake Detection. Boosting Adversarial Attacks on Neural Networks with Better Optimizer.Heng Yin Hengwei Zhang Jindong Wang Ruiyu Dou
Tourist Demand Prediction Model Based on Improved Fruit Fly Algorithm. Research on Basketball Goal Recognition Based on Image Processing and Improved Algorithm. Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model.Shuhua Huang Weiwei Liu Guangjie Liu Yuewei Dai Huiwen Bai
Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact.Syed Mahbub Eric Pardede A. S. M. Kayes
Revisiting a Multifactor Authentication Scheme in Industrial IoT.Ding Wang Shuhong Hong Qingxuan Wang
An Extraction Method of Volleyball Spiking Trajectory and Teaching Based on Wireless Sensor Network. Finite Element Structure Analysis of Automobile Suspension Control Arm Based on Neural Network Control. A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain.Sheng Gao Qianqian Su Rui Zhang Jianming Zhu Zhiyuan Sui Junsheng Wang
Two-Level Multimodal Fusion for Sentiment Analysis in Public Security.Jianguo Sun Hanqi Yin Ye Tian Junpeng Wu Linshan Shen Lei Chen
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials. PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage.Hanzhe Yang Ruidan Su Pei Huang Yuhan Bai Kai Fan Kan Yang Hui Li Yintang Yang
PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing.Yixiao Zhu Wenjie Ma Jiangtao Cui Xiaofang Xia Yanguo Peng Jianting Ning
A Secure Distance-Bounding Protocol with Mutual Authentication.Weiwei Liu Hua Guo Yangguang Tian
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures.Xuan Shen Lei Cheng Bing Sun Jun He
Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing.Yang Li Hongtao Song Yunlong Zhao Nianmin Yao Nianbin Wang
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.Luhui Yang Guangjie Liu Weiwei Liu Huiwen Bai Jiangtao Zhai Yuewei Dai
Early Rumor Detection Based on Deep Recurrent Q-Learning.Wei Wang Yuchen Qiu Shichang Xuan Wu Yang
Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models.Nianwen Si Wenlin Zhang Dan Qu Xiangyang Luo Heyu Chang Tong Niu
A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions.Muhammad Altaf Khan Moustafa M. Nasralla Muhammad Muneer Umar Zeeshan Iqbal Ghani-Ur Rehman Muhammad Shahzad Sarfraz Nikumani Choudhury
Application of Internet of Things and Edge Computing Technology in Sports Tourism Services.Benxia Zheng Zheng Mei Liangyu Hou Shuoli Qiu
Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT.Kai Zhang Yanping Li Laifeng Lu
V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks.Xiaodong Zhang Ru Li Wenhan Hou Hui Zhao
Corrigendum to "A Comprehensive Survey on Local Differential Privacy".Xingxing Xiong Shubo Liu Dan Li Zhaohui Cai Xiaoguang Niu
More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras.G. Muhiuddin Deena Al-Kadi Ahsan Mahboob
Corrigendum to "Rational Protocols and Attacks in Blockchain System".Tao Li Yuling Chen Yanli Wang Yilei Wang Minghao Zhao Haojia Zhu Youliang Tian Xiaomei Yu Yixian Yang
STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems.Jie Min Junbin Liang Xingpo Ma Hongling Chen
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.Mahammad Shareef Mekala Rizwan Patan SK Hafizul Islam Debabrata Samanta Ghulam Ali Mallah Shehzad Ashraf Chaudhry
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal.Huiying Hou Shidi Hao Jiaming Yuan Shengmin Xu Yunlei Zhao
CFA: A New Family of Hybrid CA-Based PRNGs.Fatima Ezzahra Ziani Anas Sadak Charifa Hanin Bouchra Echandouri Fouzia Omary
Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms.Yuanlong Cao Ruiwen Ji Lejun Ji Mengshuang Bao Lei Tao Wei Yang
Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage.Hao Yan Yanan Liu Zheng Zhang Qian Wang
Quantitative Weighted Visual Cryptographic (k, m, n) Method.Yewen Wu Shi Zeng Bin Wu Bin Yang Xianyi Chen
CLE against SOA with Better Data Security Storage to Cloud 5G.Huige Wang Xing Chang Kefei Chen
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.Huixia Zhang Guowei Shen Chun Guo Yunhe Cui Chaohui Jiang
Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model.Ke Yuan Yahui Wang Yingming Zeng Wenlei Ouyang Zheng Li Chunfu Jia
Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model.Zuguo Chen Yanglong Liu Chaoyang Chen Ming Lu Xuzhuo Zhang
Aggregating Heterogeneous Sensor Ontologies with Fuzzy Debate Mechanism.Xingsi Xue Xiaojing Wu Jie Zhang Lingyu Zhang Hai Zhu Guojun Mao
Security-Oriented Network Architecture.Weiyu Jiang Bingyang Liu Chuang Wang Xue Yang
Migrating to Zero Trust Architecture: Reviews and Challenges.Songpon Teerakanok Tetsutaro Uehara Atsuo Inomata
Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing.Binbin Huang Yuanyuan Xiang Dongjin Yu Jiaojiao Wang Zhongjin Li Shangguang Wang
Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery.Yongjie Wang Jia Chen Qinghong Gong Xuehu Yan Yuyuan Sun
Generalized Proxy Oblivious Signature and Its Mobile Application. Data Hiding Based on Mini Program Code.Jia Chen Quankai Qi Yongjie Wang Xuehu Yan Longlong Li
Creating Ensemble Classifiers with Information Entropy Diversity Measure.Jiangbo Zou Xiaokang Fu Lingling Guo Chunhua Ju Jingjing Chen
Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework.Shyam Deshmukh Komati Thirupathi Rao Mohammad Shabaz
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.Wenmin Li Sanqi Sun Shuo Zhang Hua Zhang Yijie Shi
Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things.Yunhong Zhou Jiehui Nan Licheng Wang
Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety.Sheng Ren Jianqi Li Tianyi Tu Yibo Peng Jian Jiang
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter.Jinchang Hu Jinfu Chen Sher Ali Bo Liu Jingyi Chen Chi Zhang Jian Yang
Real-Time Collection of Training Distance of Long-Distance Runners Based on Wireless Sensor Network. Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels.Gaoyuan Zhang Haiqiong Li Congzheng Han Congyu Shi Hong Wen Dan Wang
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors.Khuda Bux Jalbani Muhammad Yousaf Muhammad Shahzad Sarfraz Rozita Jamili Oskouei Akhtar Hussain Zojan Memon
Design of Teaching Video Resource Management System in Colleges and Universities based on Microtechnology. An Online Arrangement Method of Difficult Actions in Competitive Aerobics Based on Multimedia Technology. Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles. Lightweight Cryptography for Network-on-Chip Data Encryption.Riadh Ayachi Ayoub Mhaouch Abdessalem Ben Abdelali
A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof. Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption.Hassan El Gafif Ahmed Toumanari
Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record.Mahboubeh Nazari Arash Maneshi
Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification.Jian Xie Wenan Tan BingWu Fang Zhiqiu Huang
Towards a Smart Privacy-Preserving Incentive Mechanism for Vehicular Crowd Sensing.Lingling Wang Zhongda Cao Peng Zhou Xueqin Zhao
Trusted QoS Assurance Approach for Composite Service.Meng Cai Ying Cui Yang Yu Ying Xue Han Luo
Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems.Darpan Anand Vineeta Khemchandani Munish Sabharawal Omar Cheikhrouhou Ouissem Ben Fredj
AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment.Xiang Yu Chun Shan Jilong Bian Xianfei Yang Ying Chen Haifeng Song
A Malicious URL Detection Model Based on Convolutional Neural Network.Zhiqiang Wang Xiaorui Ren Shuhao Li Bingyan Wang Jianyi Zhang Tao Yang
Improving Convolutional Neural Networks with Competitive Activation Function.Yao Ying Nengbo Zhang Ping He Silong Peng
Software-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective.Nitheesh Murugan Kaliyamurthy Swapnesh Taterh Suresh Shanmugasundaram Ankit Saxena Omar Cheikhrouhou Hadda Ben Elhadj
Face Antispoofing Method Using Color Texture Segmentation on FPGA.Youngjun Moon Intae Ryoo Seokhoon Kim
Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art.Chao Li Jun Li Yafei Li Lingmin He Xiaokang Fu Jingjing Chen
Diffusion Analysis and Incentive Method for Mobile Crowdsensing User Based on Knowledge Graph Reasoning.Jian Wang Shanshan Cui Guosheng Zhao Zhong-Nan Zhao
Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion. Audit Outsourced Data in Internet of Things.Gaopan Hou Jianfeng Ma Jiayi Li Chen Liang
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT.Mourade Azrour Jamal Mabrouki Rajasekhar Chaganti
PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT.Lu Yang Xingshu Chen Yonggang Luo Xiao Lan Li Chen
Distributed Network Image Processing System and Transmission Control Algorithm.Pu Zaiyi Yang Kun Chaobin Wang
Deformation Detection Model of High-Rise Building Foundation Pit Support Structure Based on Neural Network and Wireless Communication. A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid.Pan Zhang Fenggang Lai Jing Du Wenda Lu Xiao Yu
A Blockchain-Based Editorial Management System.Eman Yasser Daraghmi Mamoun Abu Helou Yousef-Awwad Daraghmi
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT.Zhishuo Zhang Wei Zhang Zhiguang Qin
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems.Fulong Chen Yuqing Tang Xu Cheng Dong Xie Taochun Wang Chuanxin Zhao
A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks.Zitong Li Xiang Cheng Lixiao Sun Ji Zhang Bing Chen
CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection.Fang Mei Tianchang Gao Yingda Lyu
Differentially Private Autocorrelation Time-Series Data Publishing Based on Sliding Window.Jing Zhao Shubo Liu Xingxing Xiong Zhaohui Cai
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM. Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.Guangjun Liu Wangmei Guo Ximeng Liu Jinbo Xiong
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals.Xinlei Jin Dengpan Ye Chuanxi Chen
An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic.Bo Liu Jinfu Chen Songling Qin Zufa Zhang Yisong Liu Lingling Zhao Jingyi Chen
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks.Yanan Liu Yijun Cui Lein Harn Zheng Zhang Hao Yan Yuan Cheng Shuo Qiu
Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures.Zhenjun Tang Shaopeng Zhang Zhenhai Chen Xianquan Zhang
A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks.Jeng-Shyang Pan Fang Fan Shu-Chuan Chu Huiqi Zhao Gao-Yuan Liu
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities.Khizar Abbas Lo'ai Ali Tawalbeh Ahsan Rafiq Ammar Muthanna Ibrahim A. Elgendy Ahmed A. Abd El-Latif
Interactive Application of Virtual Reality and Intelligent Big Data in Landscape Design. Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module. Stochastic Adaptive Forwarding Strategy Based on Deep Reinforcement Learning for Secure Mobile Video Communications in NDN.Bowei Hao Guoyong Wang Mingchuan Zhang Junlong Zhu Ling Xing Qingtao Wu
An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks.Haiyan Kang Yanhang Xiao Jie Yin
Implementation of Blockchain Consensus Algorithm on Embedded Architecture.Tarek Frikha Faten Chaabane Nadhir Aouinti Omar Cheikhrouhou Nader Ben Amor Abdelfateh Kerrouche
A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture.Miqi Wu Lin You Gengran Hu Liang Li Chengtang Cao
A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface.Fatemeh Aliannejad Esmaeel Tahanian Mansoor Fateh Mohsen Rezvani
An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model.Sachin Lalar Shashi Bhushan Surender Jangra Mehedi Masud Jehad F. Al-Amri
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models.Sensen Guo Jinxiong Zhao Xiaoyu Li Junhong Duan Dejun Mu Xiao Jing
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments.Bashar Ahmad Khalaf Salama A. Mostafa Aida Mustapha Mazin Abed Mohammed Moamin A. Mahmoud Bander Ali Saleh Al-Rimy Shukor Abd Razak Mohamed Elhoseny Adam Marks
Research on Market Stock Index Prediction Based on Network Security and Deep Learning. N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection.Huiwen Bai Guangjie Liu Weiwei Liu Yingxue Quan Shuhua Huang
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study.Ruixin Shi Yongbin Zhou Yong Li Weili Han
Feature Selection of the Rich Model Based on the Correlation of Feature Components.Shunhao Jin Fenlin Liu Chunfang Yang Yuanyuan Ma Yuan Liu
An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks.Yanbin Li Yue Li Huanliang Xu Shougang Ren
A Segmentation Algorithm of Image Semantic Sequence Data Based on Graph Convolution Network. Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency.Gaopeng Xie Yuling Liu Guojiang Xin Qiuwei Yang
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties.Zuowen Tan Haohan Zhang Peiyi Hu Rui Gao
Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network.Jianglong Yang Wanlin Yang Huwei Liu Li Zhou
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing.Kun Niu Changgen Peng Weijie Tan Zhou Zhou Yi Xu
ECLB: Edge-Computing-Based Lightweight Blockchain Framework for Mobile Systems.Qingqing Xie Fan Dong Xia Feng
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.Wenju Xu Baocang Wang Rongxing Lu Quanbo Qu Yange Chen Yupu Hu
Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection. A Manipulation Prevention Model for Blockchain-Based E-Voting Systems. Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning.Xiang Cheng Qian Luo Ye Pan Zitong Li Jiale Zhang Bing Chen
Robust Frame Duplication Detection for Degraded Videos.Qi Han Hao Chen Liyang Yu Qiong Li
Intelligent Media Forensics and Traffic Handling Scheme in 5G Edge Networks.Sa Math Prohim Tam Seokhoon Kim
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network.Mohammad Sirajuddin Ch. Rupa Celestine Iwendi Cresantus Biamba
Coverless Steganography Based on Motion Analysis of Video.Yun Tan Jiaohua Qin Xuyu Xiang Chunhu Zhang Zhangdong Wang
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm. Adaptive Routing Strategy Based on Improved Double Q-Learning for Satellite Internet of Things.Jian Zhou Xiaotian Gong Lijuan Sun Yong Xie Xiaoyong Yan
An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs.Mengting Yao Xiaoming Wang Qingqing Gan Yijian Lin Chengpeng Huang
Artificial Intelligence-Based Digital Image Steganalysis.Ahmed I. Iskanderani Ibrahim Mustafa Mehedi Abdulah Jeza Aljohani Mohammad Shorfuzzaman Farzana Akther Thangam Palaniswamy Shaikh Abdul Latif Abdul Latif
A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency.Peisong He Hongxia Wang Ruimei Zhang Yue Li
A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services.Yurong Luo Hui Li Ruhui Ma Zhenyang Guo
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining.Yao Du Mengtian Cui Xiaochun Cheng
Compressed Wavelet Tensor Attention Capsule Network.Xiushan Liu Chun Shan Qin Zhang Jun Cheng Peng Xu
An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm. SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things.Tidiane Sylla Mohamed Aymen Chalouf Francine Krief Karim Samaké
Quantum Election Protocol Based on Quantum Public Key Cryptosystem. Reversible Privacy Protection with the Capability of Antiforensics.Liyun Dou Zichi Wang Zhenxing Qian Guorui Feng
Differential Privacy Location Protection Scheme Based on Hilbert Curve. DDoS Detection Using a Cloud-Edge Collaboration Method Based on Entropy-Measuring SOM and KD-Tree in SDN.Yuhua Xu Yunfeng Yu Hanshu Hong Zhixin Sun
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model.Zhuo Liu Yong Wang Leo Yu Zhang Jun Ma
A Bibliometric Analysis of Edge Computing for Internet of Things.Yiou Wang Fuquan Zhang Junfeng Wang Laiyang Liu Bo Wang
Theory and Application of Weak Signal Detection Based on Stochastic Resonance Mechanism.Lin Cui Jun-an Yang Lunwen Wang Hui Liu
Attention-Guided Digital Adversarial Patches on Visual Detection.Dapeng Lang Deyun Chen Ran Shi Yongjun He
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention.Guangxia Xu Daiqi Zhou Jun Liu
Wasserstein Metric-Based Location Spoofing Attack Detection in WiFi Positioning Systems.Yinghua Tian Nae Zheng Xiang Chen Liuyang Gao
Research on Sports Balanced Development Evaluation System Based on Edge Computing and Balanced Game. HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.Weina Niu Jiao Xie Xiaosong Zhang Chong Wang Xin-Qiang Li Rui-Dong Chen Xiao-Lei Liu
An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence. Neural Reversible Steganography with Long Short-Term Memory. Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications.Xiao Jiang Peng Li Bin Li Yulong Zou Ruchuan Wang
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.Fuyou Miao Yue Yu Keju Meng Yan Xiong Chin-Chen Chang
Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm.Wenjuan Li Shihua Cao Keyong Hu Jian Cao Rajkumar Buyya
Research on Optimal Design of Short-Life Cycle Product Logistics Supply Chain Based on Multicriteria Decision Model. Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks.Elmahdi Bentafat M. Mazhar Rathore Spiridon Bakiras
Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem.Haseeb Tariq Muhammad Kashif Hanif Muhammad Umer Sarwar Sabeen Bari Muhammad Shahzad Sarfraz Rozita Jamili Oskouei
CP-ABE-Based Secure and Verifiable Data Deletion in Cloud.Jun Ma Minshen Wang Jinbo Xiong Yongjin Hu
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach.Sandi Rahmadika Muhammad Firdaus Seolah Jang Kyung-Hyune Rhee
Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme.Qi Tao Q. Chen Hongwei Ding Adnan Iftekhar Xiaofang Huang Xiaohui Cui
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection.Mingshu He Xiaojuan Wang Junhua Zhou Yuanyuan Xi Lei Jin Xinlei Wang
A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform.Shanshan Shi Ting Luo Jiangtao Huang Meng Du
Privacy-Preserving Publication of Time-Series Data in Smart Grid.Franklin Leukam Lako Paul Lajoie-Mazenc Maryline Laurent
Research on Coordinated Scheduling Strategy of Heat Storage Thermoelectric Units Based on Wind Power Data Acquisition System Using Edge Computing.D. J. Guan X. Y. Qian S. X. Lu N. An P. Ye M. L. Zhang N. Zhang
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains.Tzung-Her Chen Ting-Le Zhu Fuh-Gwo Jeng Chien-Lung Wang
Survey on Reversible Watermarking Techniques of Echocardiography.Rabiya Ghafoor Danish Saleem Sajjad Shaukat Jamal Muhammad Ishtiaq Sadaf Ejaz Arif Jamal Malik M. Fahad Khan
An Intelligent Offloading System Based on Multiagent Reinforcement Learning.Yu Weng Haozhen Chu Zhaoyi Shi
Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network.Hao Zou Pengpeng Yang Rongrong Ni Yao Zhao
Machine Learning-Based Stealing Attack of the Temperature Monitoring System for the Energy Internet of Things.Qiong Li Liqiang Zhang Rui Zhou Yaowen Xia Wenfeng Gao Yonghang Tai
Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters.Ihsan Ullah Muhammad Sajjad Khan Marc St-Hilaire Mohammad Faisal Junsu Kim Su Min Kim
Lane Detection Based on Adaptive Network of Receptive Field.YuFan Cai Yanyan Zhang Chengsheng Pan
Research on English Movie Resource Information Mining Based on Dynamic Data Stream Classification. Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain.Huimin Wang Dong Zheng Qinglan Zhao
Research on Sports Training Decision Support System Based on Improved Association Rules Algorithm. A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network.Ming Zhong Yajin Zhou Gang Chen
Coherent Detection of Synchronous Low-Rate DoS Attacks.Zhijun Wu Yue Yin Guang Li Meng Yue
ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities.Runnan Zhang Gang Liu Shancang Li Yongheng Wei Quan Wang
S-DPS: An SDN-Based DDoS Protection System for Smart Grids.Hassan Mahmood Danish Mahmood Qaisar Shaheen Rizwan Akhtar Wang Changda
Next-Generation Digital Forensic Readiness BYOD Framework.Md Iman Ali Sukhkirandeep Kaur
Controlled Sharing Mechanism of Data Based on the Consortium Blockchain.Jin Li Songqi Wu Yundan Yang Fenghui Duan Hui Lu Yueming Lu
Cuckoo Search-based SVM (CS-SVM) Model for Real-Time Indoor Position Estimation in IoT Networks.Amjad Khan Asfandyar Khan Javed Iqbal Bangash Fazli Subhan Abdullah Khan Atif Khan Muhammad Irfan Uddin Marwan Mahmoud
Robust Secure Beamforming Design for Cooperative Cognitive Radio Nonorthogonal Multiple Access Networks. Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT. Hardware Trojan Detection Based on Ordered Mixed Feature GEP.Huan Zhang Jiliu Zhou Dongrui Gao Xinguo Wang Zhefan Chen Hongyu Wang
Reverse Auction-Based Services Optimization in Cloud Computing Environments. ETCC: Encrypted Two-Label Classification Using CNN. A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination.Wenbing Wang Yan Li Shengli Liu
A Residual Learning-Based Network Intrusion Detection System. Towards Face Presentation Attack Detection Based on Residual Color Texture Representation.Yuting Du Tong Qiao Ming Xu Ning Zheng
An Unsupervised Learning Method for the Detection of Genetically Modified Crops Based on Terahertz Spectral Data Analysis.Shubao Pan Binyi Qin Lvqing Bi Jincun Zheng Ruizhao Yang Xiaofeng Yang Yun Li Zhi Li
Fuzzy Identity-Based Ring Signature from Lattices.Chengtang Cao Lin You Gengran Hu
Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks. Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning.Rahma Gantassi Bechir Ben Gouissem Omar Cheikhrouhou Salim El Khediri Salem Hasnaoui
A Sensitive File Abnormal Access Detection Method Based on Application Classification. Representativeness-Based Instance Selection for Intrusion Detection.Fei Zhao Yang Xin Kai Zhang Xinxin Niu
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications.Elmustafa Sayed Ali Mohammad Kamrul Hasan Rosilah Hassan Rashid A. Saeed Mona Bakri Hassan Shayla Islam Nazmus Shaker Nafi Savitri Bevinakoppa
A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols.Qun Wang Zhonghao Sun Zhangquan Wang Shiping Ye Ziyi Su Hao Chen Chao Hu
I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree.Wenfeng Xu Yongxian Fan Changyong Li
Distributed Functional Signature with Function Privacy and Its Application.Muhua Liu Lin Wang Qingtao Wu Jianqiang Song
Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing.Zhen Zhang Bing Guo Yan Shen Chengjie Li Xinhua Suo Hong Su
Use of Security Logs for Data Leak Detection: A Systematic Literature Review.Ricardo Ávila Raphaël Khoury Richard Khoury Fábio Petrillo
An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding.Zhongguo Yang Irshad Ahmed Abbasi Fahad Algarni Sikandar Ali Mingzhu Zhang
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.Yunzhe Tian Jiqiang Liu Endong Tong Wenjia Niu Liang Chang Qi Alfred Chen Gang Li Wei Wang
Research on the Credibility of Social Media Information Based on User Perception. Genetic Feature Fusion for Object Skeleton Detection.Yang Qiao Yunjie Tian Yue Liu Jianbin Jiao
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology. A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme.Yihang Song Songfan Li Chong Zhang Li Lu
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface.Jie Yang Xinsheng Ji Kaizhi Huang Xiaoli Sun Yi Wang
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture.Pengcheng He Kehui Sun Congxu Zhu
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption.Chirag Sharma Bagga Amandeep Rajeev Sobti Tarun Kumar Lohani Mohammad Shabaz
An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm. Efficient GSW-Style Fully Homomorphic Encryption over the Integers.Jianan Zhao Ruwei Huang Bo Yang
Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision. Side-Channel Leakage Detection with One-Way Analysis of Variance. Compressible Multikey and Multi-Identity Fully Homomorphic Encryption.Tongchen Shen Fuqun Wang Kefei Chen Zhonghua Shen Renjun Zhang
A Blockchain System Based on Quantum-Resistant Digital Signature.Peijun Zhang Lianhai Wang Wei Wang Kunlun Fu Jinpeng Wang
An Adaptive Visible Watermark Embedding Method based on Region Selection.Wenfa Qi Yuxin Liu Sirui Guo Xiang Wang Zongming Guo
Nowhere to Hide: A Novel Private Protocol Identification Algorithm.Jiantao Shi Xiangzhan Yu Zechao Liu
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel.Yidong Yuan Yao Zhang Yiqiang Zhao Xige Zhang Ming Tang
Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence. Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology.Ming Li Qinsheng Li Yuening Li Yunkun Cui Xiufeng Zhao Lei Guo
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm.Hira Nazir Imran Sarwar Bajwa Muhammad Samiullah Waheed Anwar Muhammad Moosa
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.Yuting Li Qingfeng Cheng Wenbo Shi
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things.Teng Li Jiawei Zhang Yangxu Lin Shengkai Zhang Jianfeng Ma
A Survey on Secure Deployment of Mobile Services in Edge Computing.Mengmeng Cui Yiming Fei Yin Liu
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing.Jiawei Zhang Jianfeng Ma Teng Li Qi Jiang
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection.Songjie Wei Zedong Zhang Shasha Li Pengfei Jiang
Improved CNN-Based Hashing for Encrypted Image Retrieval.Wenyan Pan Meimin Wang Jiaohua Qin Zhili Zhou
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating.Jie Ling Junwei Chen Jiahui Chen Wensheng Gan
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment.Ahmad Alanezi Bassem Abd-El-Atty Hoshang Kolivand Ahmed A. Abd El-Latif Basma Abd El-Rahiem Syam Sankar Hany S. Khalifa
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms.Binjie Chen Fushan Wei Chunxiang Gu
Spectral Efficiency of the Multiway Massive System over Rician Fading Channels.Junyi He Junnan Zhang Cheng Song Mengxiang Wu
Improved ECC-Based Three-Factor Multiserver Authentication Scheme.Tsu-Yang Wu Lei Yang Zhiyuan Lee Chien-Ming Chen Jeng-Shyang Pan SK Hafizul Islam
A New Password- and Position-Based Authenticated Key Exchange.Jia Fan Lanfei Qiao Yunfei Cao Shanglin Liu Wenke Zhang Lin Tang
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique.Lee Mariel Heucheun Yepdia Alain Tiedeu Guillaume Kom
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things.Fengyin Li Pei Ren Guoyu Yang Yuhong Sun Yilei Wang Yanli Wang Siyuan Li Huiyu Zhou
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT. Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks.Ping Yu Wei Ni Guangsheng Yu Hua Zhang Ren Ping Liu Qiaoyan Wen
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data.Hongtao Li Feng Guo Lili Wang Jie Wang Bo Wang Chuankun Wu
Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys. Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation.Li-Hua Gong Jin Du Jing Wan Nan-Run Zhou
Blockchain-Based Automated System for Identification and Storage of Networks.Deepak Prashar Nishant Jha Muhammad Shafiq Nazir Ahmad Mamoon Rashid Shoeib Amin Banday Habib Ullah Khan
Research on Accounting Intelligence System Modeling of Financial Performance Evaluation. Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition.Youxia Dong Xiaoling Huang Guodong Ye
Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms.Lejun Gong Xingxing Zhang Tianyin Chen Li Zhang
Research on Digital Economy and Human Resources Based on Fuzzy Clustering and Edge Computing. Efficient Concurrent Execution of Smart Contracts in Blockchain Sharding.Yan Wang Jixin Li Wansheng Liu Aiping Tan
A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks.Daoqi Han Songqi Wu Zhuoer Hu Hui Gao Enjie Liu Yueming Lu
Statistical Modeling and Simulation of Online Shopping Customer Loyalty Based on Machine Learning and Big Data Analysis.Jui-Chan Huang Po-Chang Ko Cher-Min Fong Sn-Man Lai Hsin-Hung Chen Ching-Tang Hsieh
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.Maria Azees Pandi Vijayakumar Lazarus Jegatha Deborah Marimuthu Karuppiah Mary Subaja Christo
Efficient Access Control Permission Decision Engine Based on Machine Learning. An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation. Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA.Daiki Yamakawa Takashi Okimoto Songpon Teerakanok Atsuo Inomata Tetsutaro Uehara
Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack.Xin Tang Linna Zhou Bingwei Hu Haowen Wu
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions.Zitian Liao Shah Nazir Habib Ullah Khan Muhammad Shafiq
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective.Jinxiong Zhao Xun Zhang Fuqiang Di Sensen Guo Xiaoyu Li Xiao Jing Panfei Huang Dejun Mu
Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy.Zhonghua Wang Siwei Duan Chengli Sun
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.Yi-Fan Tseng Zi-Yuan Liu Jen-Chieh Hsu Raylin Tso
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure.Zishuai Cheng Baojiang Cui Tao Qi Wenchuan Yang Junsong Fu
Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events.Xinzhi Feng Yang Yang Xiaozhong Qi Chunming Xu Ze Ji
V2X-Based Mobile Localization in 3D Wireless Sensor Network.Iram Javed Xianlun Tang Kamran Shaukat Muhammad Umer Sarwar Talha Mahboob Alam Ibrahim A. Hameed Muhammad Asim Saleem
Fail-Stop Group Signature Scheme.Jonathan Jen-Rong Chen Yi-Yuan Chiang Wang-Hsin Hsu Wen-Yen Lin
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference.Hongwei Luo Yijie Shen Feng Lin Guoai Xu
A Privacy-Preserving Caching Scheme for Device-to-Device Communications.Yuqing Zhong Zhaohua Li Liping Liao
Network Teaching Technology Based on Big Data Mining and Information Fusion. Zombie Follower Recognition Based on Industrial Chain Feature Analysis.Juan Tang Hualu Xu Pengsen Cheng Jiayong Liu Cheng Huang Xun Tang
An Anomaly Detection Algorithm Selection Service for IoT Stream Data Based on Tsfresh Tool and Genetic Algorithm.Zhongguo Yang Irshad Ahmed Abbasi Elfatih Elmubarak Mustafa Sikandar Ali Mingzhu Zhang
A New Method of Coding for Steganography Based on LSB Matching Revisited.Mansoor Fateh Mohsen Rezvani Yasser Irani
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata. Fine-Grained Task Access Control System for Mobile Crowdsensing.Jingwei Wang Xinchun Yin Jianting Ning
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems.Sooyong Jeong Cheolhee Park Dowon Hong Changho Seo Nam-Su Jho
Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction. Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things.Kaiqing Huang Xueli Wang Zhiqiang Lin
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.Zhe Ren Xinghua Li Qi Jiang Qingfeng Cheng Jianfeng Ma
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System.Tsu-Yang Wu Tao Wang Yu-Qi Lee Weimin Zheng Saru Kumari Sachin Kumar
S2NOW: Secure Social Network Ontology Using WhatsApp.Rahul Johari Sawan Kalra Sonika Dahiya Kalpana Gupta
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack. Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition.Asad Ullah Jing Wang Muhammad Shahid Anwar Arshad Ahmad Shah Nazir Habib Ullah Khan Zesong Fei
PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w.Chuqiao Xiao Xueqing Gong Yefeng Xia Qian Zhang
YAICD: Yet Another IMSI Catcher Detector in GSM.Parimah Ziayi Seyed Mostafa Farmanbar Mohsen Rezvani
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks.Shengxu Xie Chang-you Xing Guomin Zhang Jinlong Zhao
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation.Zixuan Shen Zhihua Xia Peipeng Yu
Weighted Nuclear Norm Minimization on Multimodality Clustering.Lei Du Songsong Dai Haifeng Song Yuelong Chuang Yingying Xu
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks.Shiyue Qin Zhenhua Tan Fucai Zhou Jian Xu Zongye Zhang
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency.Diqun Yan Mingyu Dong Jinxing Gao
Hardware Sharing for Channel Interleavers in 5G NR Standard.Xiaokang Xiong Yuhang Dai Zhuhua Hu Kejia Huo Yong Bai Hui Li Dake Liu
A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies. A Novel Improved Reversible Visible Image Watermarking Algorithm Based on Grad-CAM and JND.Jiasheng Qu Wei Song Xiangchun Liu Lizhi Zhao Xiaobing Zhao
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques.Chongzhen Zhang Yanli Chen Yang Meng Fangming Ruan Runze Chen Yidan Li Yaru Yang
Design and Analysis of a Novel Authorship Verification Framework for Hijacked Social Media Accounts Compromised by a Human.Suleyman Alterkavi Hasan Erbay
Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images.Zhengguo Wu Kai Zhang Yannan Ren Jing Li Jiande Sun Wenbo Wan
A Research Survey on Applications of Consensus Protocols in Blockchain.Sivleen Kaur Sheetal Chaturvedi Aabha Sharma Jayaprakash Kar
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing.Tao Zhang Xiongfei Song Lele Zheng Yani Han Kai Zhang Qi Li
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing.Zhenwei Chen Axin Wu Yifei Li Qixuan Xing Shengling Geng
Efficient Deep Learning Models for DGA Domain Detection.Juhong Namgung Siwoon Son Yang-Sae Moon
Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network.Yusheng Dai Hui Li Yekui Qian Yunling Guo Min Zheng
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association.Yajing Hao Xinrong Yan Jianbin Wu Huijun Wang Linfeng Yuan
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map.Youxia Dong Xiaoling Huang Qixiang Mei Yuanju Gan
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets.Khalid M. Al-Gethami Mousa T. Al-Akhras Mohammed Alawairdhi
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts.Menghui Lou Xiaolei Dong Zhenfu Cao Jiachen Shen
Secure Data Collaborative Computing Scheme Based on Blockchain.Tao Feng Xusheng Wang Chunyan Liu Junli Fang
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers.Shichang Ding Fan Zhao Xiangyang Luo
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey.Yawei Yue Shancang Li Phil Legg Fuzhong Li
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection.Xin Li Peng Yi Wei Wei Yiming Jiang Le Tian
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination.Hui Li Limin Shen Yuying Wang Jiayin Feng Honglei Tan Zhiming Li
Ferry Node Identification Model for the Security of Mobile Ad Hoc Network.Zhifei Wang Gang Xu Na Zhang Zhihan Qi Fengqi Wei Liqiang He
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet.