1939-0114
Volume 2021, 2021
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things.

Qi Xie Zixuan Ding Bin Hu

High-Capacity Image Steganography Algorithm Based on Image Style Transfer.

Xinliang Bi Xiaoyuan Yang Chao Wang Jia Liu

Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing.

Hua Ren Shaozhang Niu Haiju Fan Ming Li Zhen Yue

An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features.

Hongyun Cai Fuzhi Zhang

Small CSI Samples-Based Activity Recognition: A Deep Learning Approach Using Multidimensional Features.

Yong Tian Sirou Li Chen Chen Qiyue Zhang Chuanzhen Zhuang Xuejun Ding

Security-Oriented Indoor Robots Tracking: An Object Recognition Viewpoint.

Yaoqi Yang Xianglin Wei Renhui Xu Laixian Peng Yunliang Liao Lin Ge

A Hybrid Association Rule-Based Method to Detect and Classify Botnets.

Yuanyuan Huang Jiazhong Lu Haozhe Tang Xiaolei Liu

Enhanced Evaluation Model of Security Strength for Passwords Using Integrated Korean and English Password Dictionaries.

Ki Hyeon Hong Un Gu Kang Byung Mun Lee

Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications.

Hasan Alkahtani Theyazn H. H. Aldhyani

En-Route Message Authentication Scheme for Filtering False Data in WSNs.

Chuanjun Yi

Some Novel Geometric Aggregation Operators of Spherical Cubic Fuzzy Information with Application.

Zafar Ullah Huma Bashir Rukhshanda Anjum Mabrook Al-Rakhami Suheer Alhadhrami Abdul Ghaffar

SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns' Detection.

Amir Ali Zain Ul Abideen Kalim Ullah

A Blockchain-Based IoT Cross-Domain Delegation Access Control Method.

Chao Li Fan Li Lihua Yin Tianjie Luo Bin Wang

IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet.

Shinya Haga Kazumasa Omote

UKF-Based Vehicle Pose Estimation under Randomly Occurring Deception Attacks.

Xinghua Liu Dandan Bai Yunling Lv Rui Jiang Shuzhi Sam Ge

Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing.

Jingjing Guo Jiacong Sun

Multimodal Blog Sentiment Classification Based on MD-HFCE.

Baozhen Yang Xuedong Tian

Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things.

Dapeng Man Fanyi Zeng Wu Yang Miao Yu Jiguang Lv Yijing Wang

Edge Server Placement for Service Offloading in Internet of Things.

Rong Ma

Access Control beyond Authentication.

Javier Junquera-Sánchez Carlos Cilleruelo Luis de Marcos José Javier Martínez-Herráiz

Distributed Consensus Algorithm for Nonholonomic Wheeled Mobile Robot.

Xianyang Meng Ping He Xingzhong Xiong Haoyang Mi Zuxin Li Zhigang Wu

AGG: A Novel Intelligent Network Traffic Prediction Method Based on Joint Attention and GCN-GRU.

Huaifeng Shi Chengsheng Pan Li Yang Xiangxiang Gu

An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks.

Qizhao Zhou Junqing Yu Dong Li

Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning.

Taimur Bakhshi Bogdan Ghita

StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices.

Jiageng Yang Xinguo Zhang Hui Lu Muhammad Shafiq Zhihong Tian

Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing.

Ruyan Wang Shiqi Zhang Zhigang Yang Puning Zhang Dapeng Wu Yongling Lu Alexander A. Fedotov

PBDT: Python Backdoor Detection Model Based on Combined Features.

Yong Fang Mingyu Xie Cheng Huang

Few-Shot Website Fingerprinting Attack with Data Augmentation.

Mantun Chen Yongjun Wang Zhiquan Qin Xiatian Zhu

G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network.

Peng Lu Teng Hu Hao Wang Ruobin Zhang Guo Wu

Deep Reinforcement Learning-Based Algorithm for VNF-SC Deployment.

Junlei Xuan Huifang Yang Xuelin Zhao Xingpo Ma Xiaokai Yang

Design and Research of Smart Neck Helmets Based on the KANO-QFD Model and TRIZ Theory.

Deng Zhao Weiwei Chen

Dual-Tree Complex Wavelet Transform-Based Direction Correlation for Face Forgery Detection.

Shichao Gao Ming Xia Gaobo Yang

RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks.

Dimitrios Kosmanos Dimitrios Karagiannis Antonios Argyriou Spyros Lalis Leandros A. Maglaras

Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns.

Muhammad Hameed Siddiqi Khurshed Asghar Umar Draz Amjad Ali Madallah Alruwaili Yousef Alhwaiti Saad Awadh Alanazi M. M. Kamruzzaman

Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure.

Chien-Ming Chen Shuangshuang Liu

The Applications of Blockchain in Artificial Intelligence.

Ruonan Wang Min Luo Yihong Wen Lianhai Wang Kim-Kwang Raymond Choo Debiao He

An Efficient Resource and Topological Attribute-Based Configuration Algorithm of Virtual Networks.

Xinyan Wang Shunbin Li Longju Bai

Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT.

Rong Ma Tao Feng Jun-li Fang

Edge Location Method for Multidimensional Image Based on Edge Symmetry Algorithm.

Chen Li

Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo.

Xueying Qiu Yongzhuang Wei Samir Hodzic Enes Pasalic

Fast Software Implementation of Serial Test and Approximate Entropy Test of Binary Sequence.

Xian-wei Yang Xueqiu Zhan Hongjuan Kang Ying Luo

Privacy-Preserving Redactable Blockchain for Internet of Things.

Yanli Ren Xianji Cai Mingqi Hu

Parallel Calculation Method of Patch Area Landscape Art Index Based on Surface Coverage Data.

Zhihua Xu

A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks.

Jingyi Li Yujue Wang Yong Ding Wanqing Wu Chunhai Li Huiyong Wang

A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks.

Cheng Li Guoyin Zhang Yan Mao Xin Zhao

Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time.

Zhenyu Gao Jian Cao Xing-Wei Wang Huayun Zhang Zengrong Xu

Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA.

Nouf S. Aldahwan Muhammed S. Ramzan

Evaluation Method of the Influence of Sports Training on Physical Index Based on Deep Learning.

Zhongxiao Wang

Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci.

Feng Luo Bowen Wang Zihao Fang Zhenyu Yang Yifan Jiang

A Systematic Analysis of Regression Test Case Selection: A Multi-Criteria-Based Approach.

Muhammad Rehan Norhalina Senan Muhammad Aamir Ali Samad Mujtaba Husnain Noraini Ibrahim Sikandar Ali Hizbullah Khattak

Latency-Aware Computation Offloading for 5G Networks in Edge Computing.

Xianwei Li Baoliu Ye

Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III.

Jun He Xuan Shen Guoqiang Liu

Fog-Driven Secure Authentication and Key Exchange Scheme for Wearable Health Monitoring System.

Tsu-Yang Wu Lei Yang Qian Meng Xinglan Guo Chien-Ming Chen

An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication.

Ling Zhen

Automatic Calibration Algorithm for English Text Translation Based on Semantic Features.

Fengzhen Liu

A Deep Multimodal Model for Predicting Affective Responses Evoked by Movies Based on Shot Segmentation.

Chunxiao Wang Jingjing Zhang Wei Jiang Shuang Wang

Power Optimization for Aerial Intelligent Reflecting Surface-Aided Cell-Free Massive MIMO-Based Wireless Sensor Network.

Tao Zhou Kui Xu Chunguo Li Zhexian Shen

IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security.

Chunhua Cao YaNa Tang DeYan Huang WeiMin Gan Chunjiong Zhang

A LoRa-Based Lightweight Secure Access Enhancement System.

Yu Jiang Hua Fu Aiqun Hu Wen Sun

Identity-Based Linkable Ring Signature on NTRU Lattice.

Yongli Tang Feifei Xia Qing Ye Mengyao Wang Ruijie Mu Xiaohang Zhang

Image-Based Insider Threat Detection via Geometric Transformation.

Dongyang Li Lin Yang Hongguang Zhang Xiaolei Wang Linru Ma Junchao Xiao

Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques.

Abolfazl Mehbodniya Izhar Alam Sagar Pande Rahul Neware Kantilal Pitambar Rane Mohammad Shabaz Mangena Venu Madhavan

New Approach towards Generalizing Feistel Networks and Its Provable Security.

Jiajie Liu Bing Sun Chao Li

Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model.

Rongrong Wang Zhengjie Shi

Internet of Things-Based Intelligent Smart Home Control System.

Olutosin Taiwo Absalom E. Ezugwu

Accurate Estimation of English Word Similarity Based on Semantic Network.

Qifeng Gong

Stability of SDE-LJN System in the Internet to Mitigate Constant-Rate DDoS Attacks.

Kaijiao Huang Liansheng Tan Gang Peng

Prediction of IoT Traffic Using the Gated Recurrent Unit Neural Network- (GRU-NN-) Based Predictive Model.

Sonali Appasaheb Patil L. Arun Raj Bhupesh Kumar Singh

Website Fingerprinting Attacks Based on Homology Analysis.

Maohua Guo Jinlong Fei

Design of Remote Real-Time Positioning Method for Long-Distance Running under Wireless Network Technology.

Xu Xia

Design of Automatic Course Arrangement System for Electronic Engineering Teaching Based on Monte Carlo Genetic Algorithm.

Chun-jiang Shuai

Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol.

Rajesh L Penke Satyanarayana

Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE.

Hang-chao Ding Han Jiang Qiuliang Xu

Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue.

Siriboon Chaisawat Chalee Vorakulpipat

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks.

Yong Ding Hui Xu Yujue Wang Fang Yuan Hai Liang

Research on Educational Information Platform Based on Cloud Computing.

Ling Fan Meiyi Xia Ping Huang Jianmin Hu

Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus.

Haimei Qiu

Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks.

Zhiming Zhang Yu Yang Wei Yang Fuying Wu Ping Li Xiaoyong Xiong

GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum.

Yong Zeng Yixin Li Zhongyuan Jiang Jianfeng Ma

Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model.

Cao Li

Joint Design of Beamforming and Edge Caching in Fog Radio Access Networks.

Wenjing Lv Rui Wang Jun Wu Zhijun Fang Songlin Cheng

Research on Low Frame Rate Video Compression Algorithm in the Context of New Media.

Yixin Yang Zhiqang Xiang Jianbo Li

Implementation of English "Online and Offline" Hybrid Teaching Recommendation Platform Based on Reinforcement Learning.

Danling Dong Libo Wu

From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing.

Zihao Shao Huiqiang Wang Yifan Zou Zihan Gao Hongwu Lv

PoC Design: A Methodology for Proof-of-Concept (PoC) Development on Internet of Things Connected Dynamic Environments.

K. Prasanna Kadiyala Ramana Gaurav Dhiman Sandeep Kautish V. Deeban Chakravarthy

A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain.

Xiaofeng Lu Songbing Fu Cheng Jiang Pietro Lió

Internet of Things Security: Challenges and Key Issues.

Mourade Azrour Jamal Mabrouki Azidine Guezzaz Ambrina Kanwal

Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain.

Yue Shen Yixin Ren

Threat Analysis and Risk Assessment for Connected Vehicles: A Survey.

Feng Luo Yifan Jiang Zhaojing Zhang Yi Ren Shuo Hou

F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network.

ChuanPeng Guo Wei Yang Mengxia Shuai Liusheng Huang

A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments.

Tsu-Yang Wu Lei Yang Jia-Ning Luo Jimmy Ming-Tai Wu

Real-Time Surveillance Using Deep Learning.

Muhammad Javed Iqbal Muhammad Munwar Iqbal Iftikhar Ahmad Madini O. Alassafi Ahmed S. Alfakeeh Ahmed Alhomoud

A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model.

Xianfu Wei

Blockchain-Enabled Intelligent Video Caching and Transcoding in Clustered MEC Networks.

Yan Li Zheng Wan

Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques.

Shudong Li Qianqing Zhang Xiaobo Wu Weihong Han Zhihong Tian

Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model.

Zhiqi Fang Qifeng Wang

Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication.

Quan Sun Xinyu Miao Zhihao Guan Jin Wang Demin Gao

Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery.

Meghana P. Lokhande Dipti Durgesh Patil Lalit V. Patil Mohammad Shabaz

Emotion Generation and Transition of Companion Robots Based on Plutchik's Model and Quantum Circuit Schemes.

Fei Yan Xue Yang Nianqiao Li Xu Yu Hongyu Zhai

Research on Information Resource Sharing and Big Data of Sports Industry in the Background of OpenStack Cloud Platform.

Chuan Mou Ye Cheng

A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability.

Yingjie Xu Gengran Hu Lin You Chengtang Cao

Learning-Based Detection for Malicious Android Application Using Code Vectorization.

Lin Liu Wang Ren Feng Xie Shengwei Yi Junkai Yi Peng Jia

Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks.

Junjie Mao Bin Weng Tianqiang Huang Feng Ye Liqing Huang

Blockchain Enabled Automatic Reward System in Solid Waste Management.

Shaik Vaseem Akram Sultan S. Alshamrani Rajesh Singh Mamoon Rashid Anita Gehlot Ahmed Saeed Alghamdi Deepak Prashar

A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification.

Zhanhui Yuan Wenfa Li Zhi Yang Lei Sun Xuehui Du Hongqi Zhang

Research on Lightweight Mutual Authentication for the Product Authorization Chain.

Hanqing Ding Qing Zhang Yifeng Yin Yong Gan Weihua Liu

A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks.

Qing Ren Feng Tian Xiangyi Lu Yumeng Shen Zhenqiang Wu Xiaolin Gui

Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.

Tianqi Zhou Jian Shen Yongjun Ren Sai Ji

An Enhanced Visual Attention Siamese Network That Updates Template Features Online.

Wenqiu Zhu Guang Zou Qiang Liu Zhigao Zeng

Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing.

Wenle Bai Zhongjun Yang Jianhong Zhang Rajiv Kumar

Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks.

Gholamreza Farahani

HS-MOEA/D: An Oriented Algorithm for Delay and Reliability VNF-SC Deployment.

Hejun Xuan Lei You Zhenghui Liu Yanling Li Xiaokai Yang

Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era.

George Iakovakis Constantinos-Giovanni Xarhoulacos Konstantinos Giovas Dimitris Gritzalis

Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing.

Tao Wan Shixin Yue Weichuan Liao

Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach.

Siffat Ullah Khan Habib Ullah Khan Naeem Ullah Rafiq Ahmad Khan

Hierarchical Attention Graph Embedding Networks for Binary Code Similarity against Compilation Diversity.

Yan Wang Peng Jia Cheng Huang Jiayong Liu Peisong He

Analysis of Challenges in Modern Network Forensic Framework.

Sirajuddin Qureshi Jianqiang Li Faheem Akhtar Saima Tunio Zahid Hussain Khand Ahsan Wajahat

A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality.

Azidine Guezzaz Said Benkirane Mourade Azrour Shahzada Khurram

An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor.

Yani Zheng Gaurav Dhiman Ashutosh Sharma Amit Sharma Mohd Asif Shah

Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey.

Sanjeev Kumar Dwivedi Priyadarshini Roy Chinky Karda Shalini Agrawal Ruhul Amin

An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector.

Xiaoyu Xu Hao Hu Yuling Liu Hongqi Zhang Dexian Chang

Factors Affecting Corporate Security Policy Effectiveness in Telecommuting.

Chulwon Lee Kyungho Lee

Braking Control System of Oilfield Minor Repair Machine Based on Wireless Sensor Network.

Li Zhuang Yaoguang Qi Fenna Zhang

Group Signature with Verifier-Local Revocation Based on Coding Theory.

Luping Wang Kai Zhang Haifeng Qian Jie Chen

Real-Time Facial Expression Recognition System for Video Big Sensor Data Security Application.

Zhi Yao Hailing Sun Guofu Zhou

Intelligent Recognition Method of Vehicle Path with Time Window Based on Genetic Algorithm.

Lina Huo

Research on Risk Assessment of Science and Technology Data in Network Finance Based on Portfolio Empowerment.

Qi Zhao

Cell Traffic Prediction Based on Convolutional Neural Network for Software-Defined Ultra-Dense Visible Light Communication Networks.

Shanjun Zhan Lisu Yu Zhen Wang Yichen Du Yan Yu Qinghua Cao Shuping Dang Zahid Khan

A New Method of Denoising Crop Image Based on Improved SVD in Wavelet Domain.

Rui Wang Wanxiong Cai Zaitang Wang

Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification.

Jianhong Zhang Menglong Wu

SSGD: A Safe and Efficient Method of Gradient Descent.

Jinhuan Duan Xianxian Li Shiqi Gao Zili Zhong Jinyan Wang

Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics.

Yujiang Lu Yaju Liu Jianwei Fei Zhihua Xia

Research on Cross-Company Defect Prediction Method to Improve Software Security.

Yanli Shao Jingru Zhao Xingqi Wang Weiwei Wu Jinglong Fang

Design of English Interactive Teaching System Based on Association Rules Algorithm.

Aiming Nie

Anonymous Certificate-Based Inner Product Broadcast Encryption.

Shuang Yao Dawei Zhang

A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare.

Huijie Yang Jian Shen Junqing Lu Tianqi Zhou Xueya Xia Sai Ji

V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System.

Liquan Chen Tianyang Tu Kunliang Yu Mengnan Zhao Yingchao Wang

Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network.

Chao Wang Bailing Wang Yunxiao Sun Yuliang Wei Kai Wang Hui Zhang Hongri Liu

Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism.

Huan Dai Pengzhan Shi He Huang Ruyu Chen Jun Zhao

MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images.

Hyun Kwon

A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking.

Jingjing Zhang Xianming Gao Lin Yang Tao Feng Dongyang Li Qiang Wang

Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology.

Yuan Liu Liangfeng Dong

Distributed Policy Evaluation with Fractional Order Dynamics in Multiagent Reinforcement Learning.

Wei Dai Wei Wang Zhongtian Mao Ruwen Jiang Fudong Nian Teng Li

FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services.

Guangquan Xu Guofeng Feng Litao Jiao Meiqi Feng Xi Zheng Jian Liu

Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model.

Yan Mi Hengwei Zhang Hao Hu Jinglei Tan Jindong Wang

Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features.

Ming Li Dezhi Han Xinming Yin Han Liu Dun Li

Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming.

Luke Cranfill Jeehyeong Kim Hongkyu Lee Victor Youdom Kemmoe Sunghyun Cho Junggab Son

Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting.

Peng Li Junzuo Lai Yongdong Wu

Orthogonal Frequency Division Multiplexing Underwater Acoustic Communication System with Environmental Cognition Ability.

Jinqiu Wu Xiaofei Qi Kang Guo Jiaqiong Zhou Yi Zhang

Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm.

Wang Jun Wenli Song Zhipeng Li

Analysis and Research of Psychological Education Based on Data Mining Technology.

Haiyun Sang

J-Net: Asymmetric Encoder-Decoder for Medical Semantic Segmentation.

Yanli Shi Pengpeng Sheng

A Certificate-Based Provable Data Possession Scheme in the Standard Model.

Caixue Zhou

Research on the Mental Health of College Students Based on Fuzzy Clustering Algorithm.

Qinghua Tang Yixuan Zhao Yujia Wei Lu Jiang

Energy-Saving D2D Wireless Networking Based on ACO and AIA Fusion Algorithm.

Jiatong Li Zhibo Li Xuanying Li Cheng Wang

PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks.

Liyan Zhu Jinwei Wang Xiangyang Luo Yi Zhang Chunfang Yang Fenlin Liu

Design and Reconstruction of Visual Art Based on Virtual Reality.

Bai Yun

Design of Project Cost Risk Management System Based on Improved Fuzzy Rule Weight Algorithm.

Chen Huang Yanfeng Zhu Xiaoming Shao

Deep Grid Scheduler for 5G NB-IoT Uplink Transmission.

Han Zhong Ruize Sun Fengcheng Mei Yong Chen Fan Jin Lei Ning

TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making.

Yunhui Li Liang Chang Long Li Xuguang Bao Tianlong Gu

A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification.

Zelin Deng Qiran Zhu Pei He Dengyong Zhang Yuansheng Luo

A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction.

Xieyang Shen Chuanhe Huang Xiajiong Shen Jiaoli Shi Danxin Wang

Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network.

Chuan Yue Lide Wang Dengrui Wang Ruifeng Duo Haipeng Yan

Security Analysis of Intelligent System Based on Edge Computing.

Yibo Han Weiwei Zhang Zheng Zhang

User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption.

Luo Sheng

Information Security Field Event Detection Technology Based on SAtt-LSTM.

Wentao Yu Xiaohui Huang Qingjun Yuan Mianzhu Yi Sen An Xiang Li

Robustness of the Storage in Cloud Data Centers Based on Simple Swarm Optimization Algorithm.

Alireza Chamkoori Serajdean Katebi

Security and Privacy in Smart Cities.

Chalee Vorakulpipat Ryan K. L. Ko Qi Li Ahmed Meddahi

Blockchain Network Propagation Mechanism Based on P4P Architecture.

Junjie Huang Liang Tan Sun Mao Keping Yu

Differentially Private Web Browsing Trajectory over Infinite Streams.

Xiang Liu Yuchun Guo Xiaoying Tan Yishuai Chen

An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks.

Shuailiang Zhang Xiujuan Du Xin Liu

Understanding Block and Transaction Logs of Permissionless Blockchain Networks.

Hwanjo Heo Seungwon Shin

Research on the Management Information System of College Education and Teaching Based on Web.

Jinhua Liu Caiping Wang Yanhua Wu

Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things.

Hengming Chen Junyong Li

Research on Evaluation Method of Sports Events Based on Edge Algorithm.

FangXiao Deng A. Gudamu

Malicious Encryption Traffic Detection Based on NLP.

Hao Yang Qin He Zhenyan Liu Qian Zhang

A Blockchain-Based Microgrid Data Disaster Backup Scheme in Edge Computing.

Lihua Zhang Yu Cao Ganzhe Zhang Yang Huang Chen Zheng

An Improved Cuckoo Search Algorithm for Multithreshold Image Segmentation.

Wentan Jiao Wenqing Chen Jing Zhang

A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training.

Yifan Luo Feng Ye Bin Weng Shan Du Tianqiang Huang

On the Modified Transparency Order of n , m -Functions.

Yu Zhou Yongzhuang Wei Hailong Zhang Wenzheng Zhang

Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD.

Jiu Lou Zhongliang Xu Decheng Zuo Hongwei Liu

From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT.

Yichuan Wang Han Yu Xinhong Hei Binbin Bai Wenjiang Ji

Design of Multimedia Vocal Music Education Data Integration System Based on Adaptive Genetic Algorithm.

Hao-Lan Zhang Peng-Jiang Yu

ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System.

Feng Xiao Enhong Chen Qiang Xu Xianguo Zhang

A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code.

Xingzheng Li Bingwen Feng Guofeng Li Tong Li Mingjin He

Differential Privacy Principal Component Analysis for Support Vector Machines.

Yuxian Huang Geng Yang Yahong Xu Hao Zhou

Permission Sensitivity-Based Malicious Application Detection for Android.

Yubo Song Yijin Geng Junbo Wang Shang Gao Wei Shi

Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes.

Hansong Du Jiu-fen Liu Yu-guo Tian Xiangyang Luo

RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network.

Haibin Shi Guang Cheng Ying Hu Fuzhou Wang Haoxuan Ding

Research on Classification Method of Network Resources Based on Modified SVM Algorithm.

Hao Zhang Jingchao Hu Yaodong Zhang

Offline Pashto Characters Dataset for OCR Systems.

Sulaiman Khan Habib Ullah Khan Shah Nazir

Differentially Private Attributed Network Releasing Based on Early Fusion.

Yuye Wang Jing Yang Jianpei Zhan

SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block.

Guiyong Xu Yang Xu Sicong Zhang Xiaoyao Xie

Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective.

Hai Liu Changgen Peng Youliang Tian Shigong Long Zhenqiang Wu

Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild.

Ejin Kim Hyoung-Kee Choi

Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy.

Chuanlei Zhang Minda Yao Wei Chen Shanwen Zhang Dufeng Chen Yuliang Wu

Improved Outsourced Provable Data Possession for Secure Cloud Storage.

Haibin Yang Zhengge Yi Ruifeng Li Zheng Tu Xu An Wang Yuanyou Cui Xiaoyuan Yang

A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks.

Junsong Zhang Qikun Zhang Zhigang Li Xianling Lu Yong Gan

An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations.

Guoai Xu Jiangtao Yuan Guosheng Xu Zhongkai Dang

Robust Image Hashing Based on Cool and Warm Hue and Space Angle.

Yan Zhao Shuai Liu

Semisupervised Learning-Based Sensor Ontology Matching.

Hai Zhu Jie Zhang Xingsi Xue

DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability.

Pengkun Li Jinshu Su Xiaofeng Wang Qianqian Xing

A Survey of Self-Sovereign Identity Ecosystem.

Reza Soltani Uyen Trang Nguyen Aijun An

Corrigendum to "BNRDT: When Data Transmission Meets Blockchain".

Hongjian Jin Xingshu Chen Xiao Lan Hui Guo Hongxia Zhang Qi Cao

Multi-Authority Criteria-Based Encryption Scheme for IoT.

Jianguo Sun Yang Yang Zechao Liu Yuqing Qiao

A Novel Decoding Method for the Erasure Codes.

Dan Tang Hongliang Cai

Hybrid Structures Applied to Subalgebras of BCH-Algebras.

G. Muhiuddin Deena Al-Kadi Waseem Ahmad Khan Chiranjibe Jana

A Privacy Protection Method of Lightweight Nodes in Blockchain.

Lin Ge Tao Jiang

Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding.

Zelin Zhang Jian Xu Bin Ma Chunpeng Wang Jian Li Yuli Wang

Image Encryption with Fusion of Two Maps.

Yannick Abanda Alain Tiedeu Guillaume Kom

Deep Nearest Neighbor Website Fingerprinting Attack Technology.

Maohua Guo Jinlong Fei Yitong Meng

Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network.

Yi Lu Menghan Liu Jie Zhou Zhigang Li

Edge Computing for IoT-Enabled Smart Grid.

M. Yasir Mehmood Ammar Oad Muhammad Abrar Hafiz Mudassir Munir Syed Faraz Hasan Hafiz Abd Ul Muqeet Noorbakhsh Amiri Golilarz

Cost-Effective Optimization for Blockchain-Enabled NOMA-Based MEC Networks.

Jianbo Du Yan Sun Aijing Sun Guangyue Lu Zhixian Chang Haotong Cao Jie Feng

The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications.

Christian Johansen Aulon Mujaj Hamed Arshad Josef Noll

GT-Bidding: Group Trust Model of P2P Network Based on Bidding.

Lin Zhang Xinyan Wei Yanwen Huang Haiping Huang Xiong Fu Ruchuan Wang

Performance Modeling Analysis of D-MSMR-CARQ with Relay Selection in Wireless Sensor Networks.

Yongqiang Zhou Huan Qian Qihao Wang Suoping Li

Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System.

Jian Jiang Fen Zhang

Analysis of SWIPT-Enabled Relay Networks with Full-Duplex Destination-Aided Jamming.

Jinglan Ou Hangchuan Shi Liubin Wang Rui Ma Haowei Wu

Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking.

Hao Liu Rongbo Zhu Jun Wang Wengang Xu

On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication.

Jianming Zhao Peng Zeng Yingjun Liu Tianyu Wang

Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network.

Xiaodong Zhang Ru Li Wenhan Hou Jinshan Shi

Proximity Measurement for Hierarchical Categorical Attributes in Big Data.

Zakariae El Ouazzani An Braeken Hanan El Bakkali

A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection.

Xiaodong Liu Tong Li Runzi Zhang Di Wu Yongheng Liu Zhen Yang

Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection.

Junfeng Tian Yue Li

An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image.

Jiayu Wang Xuehu Yan Jia Chen Yongqiang Yu

A Deep Learning-Based Trust Assessment Method for Cloud Users.

Wei Ma Qinglei Zhou Mingsheng Hu Xing Wang

A Cost-Efficient Autonomous Air Defense System for National Security.

Fazle Rabby Khan Md. Muhabullah Roksana Islam Mohammad Monirujjaman Khan Mehedi Masud Sultan Aljahdali Avinash Kaur Parminder Singh

DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems.

Shichang Xuan Ming Jin Xin Li Zhaoyuan Yao Wu Yang Dapeng Man

Certificateless Network Coding Ring Signature Scheme.

Huifang Yu Weike Wang

Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network.

Amir Chaaf Mohammed Saleh Ali Muthanna Ammar Muthanna Soha Alhelaly Ibrahim A. Elgendy Abdullah M. Iliyasu Ahmed A. Abd El-Latif

High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection.

Xu Wang Li-Yao Li Ching-Chun Chang Chih-Cheng Chen

Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures.

Jabar Mahmood Zongtao Duan Yun Yang Qinglong Wang Jamel Nebhen Muhammad Nasir Mumtaz Bhutta

Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes.

Hung-Yu Chien

The Segmentation of Road Scenes Based on Improved ESPNet Model.

Ran Jin Tongrui Yu Xiaozhen Han Yunpeng Liu

A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks.

Tsu-Yang Wu Zhiyuan Lee Lei Yang Chien-Ming Chen

GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing.

Zhiqiang Wang Yuheng Lin Zihan Zhuo Jieming Gu Tao Yang

Secure Vertical Handover to NEMO Using Hybrid Cryptosystem.

Vikram Raju Reddicherla Umashankar Rawat Y. Jeevan Nagendra Kumar Atef Zaguia

A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph.

Zimeng Wang Wei Chen Haifeng Jiang Shuo Xiao Haowen Yang

Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption.

Mingyang Song Yingpeng Sang Yuying Zeng Shunchao Luo

Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work.

Zhonghua Zhang Xifei Song Lei Liu Jie Yin Yu Wang Dapeng Lan

A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing.

Taochun Wang Chengmei Lv Chengtian Wang Fulong Chen Yonglong Luo

A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT.

Lingyan Xue Qinglong Huang Shuaiqing Zhang Haiping Huang Wenming Wang

Remote Evaluation System of Tennis Batting Action Standard Based on Acceleration Sensor.

Yuliang Ji Shunjiang Ma

An Efficient User-Centric Consent Management Design for Multiservices Platforms.

Paul Marillonnet Mikaël Ates Maryline Laurent Nesrine Kaaniche

A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks.

Jing Liu Shoubao Su Yuhua Lu Jun Dong

Research on Calibration Method of Binocular Vision System Based on Neural Network.

Hao Zhu Mulan Wang Weiye Xu

FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection.

Ke Shao Qiang Xiong Zhiming Cai

Meteorological Satellite Operation Prediction Using a BiLSTM Deep Learning Model.

Yi Peng Qi Han Fei Su Xingwei He Xiaohu Feng

Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm.

Yi Huang Shah Nazir Xinqiang Ma Shiming Kong Youyuan Liu

CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification.

Xinyi Hu Chunxiang Gu Fushan Wei

A Defense Framework for Privacy Risks in Remote Machine Learning Service.

Yang Bai Yu Li Mingchuang Xie Mingyu Fan

Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations.

Lingzan Yu Yanli Ren Guorui Feng Xinpeng Zhang

An Incentive Mechanism for Reporting Phishing E-Mails Based on the Tripartite Evolutionary Game Model.

Mengli Wang Lipeng Song

Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis.

F. F. Hu S. T. Zhang X. B. Lin L. Wu N. D. Liao

Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain.

Zilin Qiang Yingsen Wang Kai Song Zijuan Zhao

An Automatic Source Code Vulnerability Detection Approach Based on KELM.

Gaigai Tang Lin Yang Shuangyin Ren Lianxiao Meng Feng Yang Huiqiang Wang

Detection of GAN-Synthesized Image Based on Discrete Wavelet Transform.

Guihua Tang Lei Sun Xiuqing Mao Song Guo Hongmeng Zhang Xiaoqin Wang

Cache Pollution Detection Method Based on GBDT in Information-Centric Network.

Dapeng Man Yongjia Mu Jiafei Guo Wu Yang Jiguang Lv Wei Wang

Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy.

Renjie Zhou Xiao Wang Jingjing Yang Wei Zhang Sanyuan Zhang

How Does the Urgency of Borrowing in Text Messages Affect Loan Defaults? Evidence from P2P Loans in China.

Hong Liu Mingkang Yuan Meiling Zhou

Augmented Data Selector to Initiate Text-Based CAPTCHA Attack.

Aolin Che Yalin Liu Hong Xiao Hao Wang Ke Zhang Hong-Ning Dai

Obfuscated Tor Traffic Identification Based on Sliding Window.

Wenliang Xu Futai Zou

Modeling and Control of Malware Propagation in Wireless IoT Networks.

Qing Yan Lipeng Song Chenlu Zhang Jing Li Shanshan Feng

Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model.

Yi-Fan Tseng Chun-I Fan

Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences.

Liang-Jia Tong Nan-Run Zhou Zhi-Jing Huang Xin-Wen Xie Ya-Ru Liang

An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things.

Hanrui Zhang Qianmu Li Shunmei Meng Zhuoran Xu Chaoxian Lv

Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection.

Priyanka Dixit Rashi Kohli Ángel Eduardo Acevedo-Duque Romel Ramón González-Díaz Rutvij H. Jhaveri

Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT.

Tianpeng Deng Xuan Li Biao Jin Lei Chen Jie Lin

Explainable Fraud Detection for Few Labeled Time Series Data.

Zhiwen Xiao Jianbin Jiao

FCNN: An Efficient Intrusion Detection Method Based on Raw Network Traffic.

Yue Wang Yiming Jiang Julong Lan

Driver Fatigue Detection Based on Facial Key Points and LSTM.

Long Chen Guojiang Xin Yuling Liu Junwei Huang

Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification.

Yan Jiang Guisheng Yin Ye Yuan Qingan Da

Recognition of Operating Characteristics of Heavy Trucks Based on the Identification of GPS Trajectory Stay Points.

Long Wei Gang Chen Wenjie Sun Guoqi Li

Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication.

Won-Bin Kim Daehee Seo Donghyun Kim Im-Yeong Lee

EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements.

Guozhong Dong Weizhe Zhang Haowen Tan Rahul Yadav Shuaishuai Tan

Research on Risk Measurement and Early Warning of Electronic Banking Business Based on GMDH Algorithm.

Hui Zeng

Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures.

Chao Su Qingkai Zeng

Beyond Statistical Analysis in Chaos-Based CSPRNG Design.

John Prakash Arockiasamy Lydia Elizabeth Benjamin Vaidheyanathan Rhymend Uthariaraj

R2AU-Net: Attention Recurrent Residual Convolutional Neural Network for Multimodal Medical Image Segmentation.

Qiang Zuo Songyu Chen Zhifang Wang

Design of Distributed Collection Model of Student Development Information Based on Internet of Things Technology.

Hui Ji

Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information.

Naeem Jan Saif Ur Rehman Abdul Nasir Hassen Aydi Sami Ullah Khan

Static Characteristics of a Linear Bipotentiometer Sensor.

Chang-Zhong Chen Yong Cai Tao Fan Ping He

Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution.

Xiujuan Wang Yi Sui Yuanrui Tao Qianqian Zhang Jianhua Wei

User Identification Based on Integrating Multiple User Information across Online Social Networks.

Wenjing Zeng Rui Tang Haizhou Wang Xingshu Chen Wenxian Wang

Influencing Factors of Cross-Border E-Commerce Consumer Purchase Intention Based on Wireless Network and Machine Learning.

Chunwei Lu Gu-Hong Lin Tzu-Jung Wu I-Hsiang Hu Yuan-Chieh Chang

Personal Trajectory with Ring Structure Network: Algorithms and Experiments.

Guoqi Liu Ruonan Gu Jiantao Wang Weidong Yan

Cross-Platform Strong Privacy Protection Mechanism for Review Publication.

Mingzhen Li Yunfeng Wang Yang Xin Hongliang Zhu Qifeng Tang Yuling Chen Yixian Yang Guangcan Yang

Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing.

Da-Zhi Sun Ji-Dong Zhong

Craniofacial Reconstruction via Face Elevation Map Estimation Based on the Deep Convolution Neutral Network.

Yining Hu Zhe Wang Yueli Pan Lizhe Xie Zheng Wang

A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization.

Aya Jaradat Eyad Taqieddin Moad Mowafi

FeatureTransfer: Unsupervised Domain Adaptation for Cross-Domain Deepfake Detection.

Baoying Chen Shunquan Tan

Boosting Adversarial Attacks on Neural Networks with Better Optimizer.

Heng Yin Hengwei Zhang Jindong Wang Ruiyu Dou

Tourist Demand Prediction Model Based on Improved Fruit Fly Algorithm.

Chuangle Guo Wei Shang

Research on Basketball Goal Recognition Based on Image Processing and Improved Algorithm.

Hangsheng Jiang

Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model.

Shuhua Huang Weiwei Liu Guangjie Liu Yuewei Dai Huiwen Bai

Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact.

Syed Mahbub Eric Pardede A. S. M. Kayes

Revisiting a Multifactor Authentication Scheme in Industrial IoT.

Ding Wang Shuhong Hong Qingxuan Wang

An Extraction Method of Volleyball Spiking Trajectory and Teaching Based on Wireless Sensor Network.

Meifang Wang Zhange Liang

Finite Element Structure Analysis of Automobile Suspension Control Arm Based on Neural Network Control.

Yixuan Li

A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain.

Sheng Gao Qianqian Su Rui Zhang Jianming Zhu Zhiyuan Sui Junsheng Wang

Two-Level Multimodal Fusion for Sentiment Analysis in Public Security.

Jianguo Sun Hanqi Yin Ye Tian Junpeng Wu Linshan Shen Lei Chen

Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials.

Zuowen Tan

PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage.

Hanzhe Yang Ruidan Su Pei Huang Yuhan Bai Kai Fan Kan Yang Hui Li Yintang Yang

PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing.

Yixiao Zhu Wenjie Ma Jiangtao Cui Xiaofang Xia Yanguo Peng Jianting Ning

A Secure Distance-Bounding Protocol with Mutual Authentication.

Weiwei Liu Hua Guo Yangguang Tian

Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures.

Xuan Shen Lei Cheng Bing Sun Jun He

Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing.

Yang Li Hongtao Song Yunlong Zhao Nianmin Yao Nianbin Wang

Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.

Luhui Yang Guangjie Liu Weiwei Liu Huiwen Bai Jiangtao Zhai Yuewei Dai

Early Rumor Detection Based on Deep Recurrent Q-Learning.

Wei Wang Yuchen Qiu Shichang Xuan Wu Yang

Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models.

Nianwen Si Wenlin Zhang Dan Qu Xiangyang Luo Heyu Chang Tong Niu

A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions.

Muhammad Altaf Khan Moustafa M. Nasralla Muhammad Muneer Umar Zeeshan Iqbal Ghani-Ur Rehman Muhammad Shahzad Sarfraz Nikumani Choudhury

Application of Internet of Things and Edge Computing Technology in Sports Tourism Services.

Benxia Zheng Zheng Mei Liangyu Hou Shuoli Qiu

Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT.

Kai Zhang Yanping Li Laifeng Lu

V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks.

Xiaodong Zhang Ru Li Wenhan Hou Hui Zhao

Corrigendum to "A Comprehensive Survey on Local Differential Privacy".

Xingxing Xiong Shubo Liu Dan Li Zhaohui Cai Xiaoguang Niu

More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras.

G. Muhiuddin Deena Al-Kadi Ahsan Mahboob

Corrigendum to "Rational Protocols and Attacks in Blockchain System".

Tao Li Yuling Chen Yanli Wang Yilei Wang Minghao Zhao Haojia Zhu Youliang Tian Xiaomei Yu Yixian Yang

STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems.

Jie Min Junbin Liang Xingpo Ma Hongling Chen

DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.

Mahammad Shareef Mekala Rizwan Patan SK Hafizul Islam Debabrata Samanta Ghulam Ali Mallah Shehzad Ashraf Chaudhry

Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal.

Huiying Hou Shidi Hao Jiaming Yuan Shengmin Xu Yunlei Zhao

CFA: A New Family of Hybrid CA-Based PRNGs.

Fatima Ezzahra Ziani Anas Sadak Charifa Hanin Bouchra Echandouri Fouzia Omary

Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms.

Yuanlong Cao Ruiwen Ji Lejun Ji Mengshuang Bao Lei Tao Wei Yang

Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage.

Hao Yan Yanan Liu Zheng Zhang Qian Wang

Quantitative Weighted Visual Cryptographic (k, m, n) Method.

Yewen Wu Shi Zeng Bin Wu Bin Yang Xianyi Chen

CLE against SOA with Better Data Security Storage to Cloud 5G.

Huige Wang Xing Chang Kefei Chen

EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning.

Huixia Zhang Guowei Shen Chun Guo Yunhe Cui Chaohui Jiang

Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model.

Ke Yuan Yahui Wang Yingming Zeng Wenlei Ouyang Zheng Li Chunfu Jia

Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model.

Zuguo Chen Yanglong Liu Chaoyang Chen Ming Lu Xuzhuo Zhang

Aggregating Heterogeneous Sensor Ontologies with Fuzzy Debate Mechanism.

Xingsi Xue Xiaojing Wu Jie Zhang Lingyu Zhang Hai Zhu Guojun Mao

Security-Oriented Network Architecture.

Weiyu Jiang Bingyang Liu Chuang Wang Xue Yang

Migrating to Zero Trust Architecture: Reviews and Challenges.

Songpon Teerakanok Tetsutaro Uehara Atsuo Inomata

Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing.

Binbin Huang Yuanyuan Xiang Dongjin Yu Jiaojiao Wang Zhongjin Li Shangguang Wang

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery.

Yongjie Wang Jia Chen Qinghong Gong Xuehu Yan Yuyuan Sun

Generalized Proxy Oblivious Signature and Its Mobile Application.

Shin-Yan Chiou Yi-Xuan He

Data Hiding Based on Mini Program Code.

Jia Chen Quankai Qi Yongjie Wang Xuehu Yan Longlong Li

Creating Ensemble Classifiers with Information Entropy Diversity Measure.

Jiangbo Zou Xiaokang Fu Lingling Guo Chunhua Ju Jingjing Chen

Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework.

Shyam Deshmukh Komati Thirupathi Rao Mohammad Shabaz

Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.

Wenmin Li Sanqi Sun Shuo Zhang Hua Zhang Yijie Shi

Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things.

Yunhong Zhou Jiehui Nan Licheng Wang

Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety.

Sheng Ren Jianqi Li Tianyi Tu Yibo Peng Jian Jiang

A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter.

Jinchang Hu Jinfu Chen Sher Ali Bo Liu Jingyi Chen Chi Zhang Jian Yang

Real-Time Collection of Training Distance of Long-Distance Runners Based on Wireless Sensor Network.

Xin Li

Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels.

Gaoyuan Zhang Haiqiong Li Congzheng Han Congyu Shi Hong Wen Dan Wang

Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors.

Khuda Bux Jalbani Muhammad Yousaf Muhammad Shahzad Sarfraz Rozita Jamili Oskouei Akhtar Hussain Zojan Memon

Design of Teaching Video Resource Management System in Colleges and Universities based on Microtechnology.

Qingbo Yan

An Online Arrangement Method of Difficult Actions in Competitive Aerobics Based on Multimedia Technology.

Li Li

Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles.

Shehzad Ashraf Chaudhry

Lightweight Cryptography for Network-on-Chip Data Encryption.

Riadh Ayachi Ayoub Mhaouch Abdessalem Ben Abdelali

A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof.

Honglei Li Weilian Xue

Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption.

Hassan El Gafif Ahmed Toumanari

Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record.

Mahboubeh Nazari Arash Maneshi

Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification.

Jian Xie Wenan Tan BingWu Fang Zhiqiu Huang

Towards a Smart Privacy-Preserving Incentive Mechanism for Vehicular Crowd Sensing.

Lingling Wang Zhongda Cao Peng Zhou Xueqin Zhao

Trusted QoS Assurance Approach for Composite Service.

Meng Cai Ying Cui Yang Yu Ying Xue Han Luo

Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems.

Darpan Anand Vineeta Khemchandani Munish Sabharawal Omar Cheikhrouhou Ouissem Ben Fredj

AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment.

Xiang Yu Chun Shan Jilong Bian Xianfei Yang Ying Chen Haifeng Song

A Malicious URL Detection Model Based on Convolutional Neural Network.

Zhiqiang Wang Xiaorui Ren Shuhao Li Bingyan Wang Jianyi Zhang Tao Yang

Improving Convolutional Neural Networks with Competitive Activation Function.

Yao Ying Nengbo Zhang Ping He Silong Peng

Software-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective.

Nitheesh Murugan Kaliyamurthy Swapnesh Taterh Suresh Shanmugasundaram Ankit Saxena Omar Cheikhrouhou Hadda Ben Elhadj

Face Antispoofing Method Using Color Texture Segmentation on FPGA.

Youngjun Moon Intae Ryoo Seokhoon Kim

Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art.

Chao Li Jun Li Yafei Li Lingmin He Xiaokang Fu Jingjing Chen

Diffusion Analysis and Incentive Method for Mobile Crowdsensing User Based on Knowledge Graph Reasoning.

Jian Wang Shanshan Cui Guosheng Zhao Zhong-Nan Zhao

Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion.

Shanshan Li Li Zhao Na Yang

Audit Outsourced Data in Internet of Things.

Gaopan Hou Jianfeng Ma Jiayi Li Chen Liang

New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT.

Mourade Azrour Jamal Mabrouki Rajasekhar Chaganti

PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT.

Lu Yang Xingshu Chen Yonggang Luo Xiao Lan Li Chen

Distributed Network Image Processing System and Transmission Control Algorithm.

Pu Zaiyi Yang Kun Chaobin Wang

Deformation Detection Model of High-Rise Building Foundation Pit Support Structure Based on Neural Network and Wireless Communication.

Diandian Ding

A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid.

Pan Zhang Fenggang Lai Jing Du Wenda Lu Xiao Yu

A Blockchain-Based Editorial Management System.

Eman Yasser Daraghmi Mamoun Abu Helou Yousef-Awwad Daraghmi

Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT.

Zhishuo Zhang Wei Zhang Zhiguang Qin

Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems.

Fulong Chen Yuqing Tang Xu Cheng Dong Xie Taochun Wang Chuanxin Zhao

A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks.

Zitong Li Xiang Cheng Lixiao Sun Ji Zhang Bing Chen

CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection.

Fang Mei Tianchang Gao Yingda Lyu

Differentially Private Autocorrelation Time-Series Data Publishing Based on Sliding Window.

Jing Zhao Shubo Liu Xingxing Xiong Zhaohui Cai

An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM.

Guanyu Lu Xiuxia Tian

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.

Guangjun Liu Wangmei Guo Ximeng Liu Jinbo Xiong

Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals.

Xinlei Jin Dengpan Ye Chuanxi Chen

An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic.

Bo Liu Jinfu Chen Songling Qin Zufa Zhang Yisong Liu Lingling Zhao Jingyi Chen

PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks.

Yanan Liu Yijun Cui Lein Harn Zheng Zhang Hao Yan Yuan Cheng Shuo Qiu

Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures.

Zhenjun Tang Shaopeng Zhang Zhenhai Chen Xianquan Zhang

A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks.

Jeng-Shyang Pan Fang Fan Shu-Chuan Chu Huiqi Zhao Gao-Yuan Liu

Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities.

Khizar Abbas Lo'ai Ali Tawalbeh Ahsan Rafiq Ammar Muthanna Ibrahim A. Elgendy Ahmed A. Abd El-Latif

Interactive Application of Virtual Reality and Intelligent Big Data in Landscape Design.

Huashan Zhan

Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module.

Donglai Fu Yanhua Liu

Stochastic Adaptive Forwarding Strategy Based on Deep Reinforcement Learning for Secure Mobile Video Communications in NDN.

Bowei Hao Guoyong Wang Mingchuan Zhang Junlong Zhu Ling Xing Qingtao Wu

An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks.

Haiyan Kang Yanhang Xiao Jie Yin

Implementation of Blockchain Consensus Algorithm on Embedded Architecture.

Tarek Frikha Faten Chaabane Nadhir Aouinti Omar Cheikhrouhou Nader Ben Amor Abdelfateh Kerrouche

A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture.

Miqi Wu Lin You Gengran Hu Liang Li Chengtang Cao

A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface.

Fatemeh Aliannejad Esmaeel Tahanian Mansoor Fateh Mohsen Rezvani

An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model.

Sachin Lalar Shashi Bhushan Surender Jangra Mehedi Masud Jehad F. Al-Amri

A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models.

Sensen Guo Jinxiong Zhao Xiaoyu Li Junhong Duan Dejun Mu Xiao Jing

An Adaptive Protection of Flooding Attacks Model for Complex Network Environments.

Bashar Ahmad Khalaf Salama A. Mostafa Aida Mustapha Mazin Abed Mohammed Moamin A. Mahmoud Bander Ali Saleh Al-Rimy Shukor Abd Razak Mohamed Elhoseny Adam Marks

Research on Market Stock Index Prediction Based on Network Security and Deep Learning.

Jiake Li

N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection.

Huiwen Bai Guangjie Liu Weiwei Liu Yingxue Quan Shuhua Huang

Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study.

Ruixin Shi Yongbin Zhou Yong Li Weili Han

Feature Selection of the Rich Model Based on the Correlation of Feature Components.

Shunhao Jin Fenlin Liu Chunfang Yang Yuanyuan Ma Yuan Liu

An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks.

Yanbin Li Yue Li Huanliang Xu Shougang Ren

A Segmentation Algorithm of Image Semantic Sequence Data Based on Graph Convolution Network.

Zheshu Jia Deyun Chen

Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency.

Gaopeng Xie Yuling Liu Guojiang Xin Qiuwei Yang

Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties.

Zuowen Tan Haohan Zhang Peiyi Hu Rui Gao

Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network.

Jianglong Yang Wanlin Yang Huwei Liu Li Zhou

Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing.

Kun Niu Changgen Peng Weijie Tan Zhou Zhou Yi Xu

ECLB: Edge-Computing-Based Lightweight Blockchain Framework for Mobile Systems.

Qingqing Xie Fan Dong Xia Feng

Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.

Wenju Xu Baocang Wang Rongxing Lu Quanbo Qu Yange Chen Yupu Hu

Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection.

Dong Zhang Zhongyi Guo

A Manipulation Prevention Model for Blockchain-Based E-Voting Systems.

Ruhi Tas Ömer Özgür Tanriöver

Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning.

Xiang Cheng Qian Luo Ye Pan Zitong Li Jiale Zhang Bing Chen

Robust Frame Duplication Detection for Degraded Videos.

Qi Han Hao Chen Liyang Yu Qiong Li

Intelligent Media Forensics and Traffic Handling Scheme in 5G Edge Networks.

Sa Math Prohim Tam Seokhoon Kim

TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network.

Mohammad Sirajuddin Ch. Rupa Celestine Iwendi Cresantus Biamba

Coverless Steganography Based on Motion Analysis of Video.

Yun Tan Jiaohua Qin Xuyu Xiang Chunhu Zhang Zhangdong Wang

An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm.

Riguang Lin Sheng Li

Adaptive Routing Strategy Based on Improved Double Q-Learning for Satellite Internet of Things.

Jian Zhou Xiaotian Gong Lijuan Sun Yong Xie Xiaoyong Yan

An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs.

Mengting Yao Xiaoming Wang Qingqing Gan Yijian Lin Chengpeng Huang

Artificial Intelligence-Based Digital Image Steganalysis.

Ahmed I. Iskanderani Ibrahim Mustafa Mehedi Abdulah Jeza Aljohani Mohammad Shorfuzzaman Farzana Akther Thangam Palaniswamy Shaikh Abdul Latif Abdul Latif

A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency.

Peisong He Hongxia Wang Ruimei Zhang Yue Li

A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services.

Yurong Luo Hui Li Ruhui Ma Zhenyang Guo

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining.

Yao Du Mengtian Cui Xiaochun Cheng

Compressed Wavelet Tensor Attention Capsule Network.

Xiushan Liu Chun Shan Qin Zhang Jun Cheng Peng Xu

An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm.

Zhongqiang Zhang

SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things.

Tidiane Sylla Mohamed Aymen Chalouf Francine Krief Karim Samaké

Quantum Election Protocol Based on Quantum Public Key Cryptosystem.

Wenhua Gao Li Yang

Reversible Privacy Protection with the Capability of Antiforensics.

Liyun Dou Zichi Wang Zhenxing Qian Guorui Feng

Differential Privacy Location Protection Scheme Based on Hilbert Curve.

Jie Wang Feng Wang Hongtao Li

DDoS Detection Using a Cloud-Edge Collaboration Method Based on Entropy-Measuring SOM and KD-Tree in SDN.

Yuhua Xu Yunfeng Yu Hanshu Hong Zhixin Sun

A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model.

Zhuo Liu Yong Wang Leo Yu Zhang Jun Ma

A Bibliometric Analysis of Edge Computing for Internet of Things.

Yiou Wang Fuquan Zhang Junfeng Wang Laiyang Liu Bo Wang

Theory and Application of Weak Signal Detection Based on Stochastic Resonance Mechanism.

Lin Cui Jun-an Yang Lunwen Wang Hui Liu

Attention-Guided Digital Adversarial Patches on Visual Detection.

Dapeng Lang Deyun Chen Ran Shi Yongjun He

Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention.

Guangxia Xu Daiqi Zhou Jun Liu

Wasserstein Metric-Based Location Spoofing Attack Detection in WiFi Positioning Systems.

Yinghua Tian Nae Zheng Xiang Chen Liuyang Gao

Research on Sports Balanced Development Evaluation System Based on Edge Computing and Balanced Game.

Zhong Han

HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.

Weina Niu Jiao Xie Xiaosong Zhang Chong Wang Xin-Qiang Li Rui-Dong Chen Xiao-Lei Liu

An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence.

Ruijie Pan Gaocai Wang Man Wu

Neural Reversible Steganography with Long Short-Term Memory.

Ching-Chun Chang

Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications.

Xiao Jiang Peng Li Bin Li Yulong Zou Ruchuan Wang

Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem.

Fuyou Miao Yue Yu Keju Meng Yan Xiong Chin-Chen Chang

Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm.

Wenjuan Li Shihua Cao Keyong Hu Jian Cao Rajkumar Buyya

Research on Optimal Design of Short-Life Cycle Product Logistics Supply Chain Based on Multicriteria Decision Model.

Cui-Min Wang

Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks.

Elmahdi Bentafat M. Mazhar Rathore Spiridon Bakiras

Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem.

Haseeb Tariq Muhammad Kashif Hanif Muhammad Umer Sarwar Sabeen Bari Muhammad Shahzad Sarfraz Rozita Jamili Oskouei

CP-ABE-Based Secure and Verifiable Data Deletion in Cloud.

Jun Ma Minshen Wang Jinbo Xiong Yongjin Hu

Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach.

Sandi Rahmadika Muhammad Firdaus Seolah Jang Kyung-Hyune Rhee

Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme.

Qi Tao Q. Chen Hongwei Ding Adnan Iftekhar Xiaofang Huang Xiaohui Cui

Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection.

Mingshu He Xiaojuan Wang Junhua Zhou Yuanyuan Xi Lei Jin Xinlei Wang

A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform.

Shanshan Shi Ting Luo Jiangtao Huang Meng Du

Privacy-Preserving Publication of Time-Series Data in Smart Grid.

Franklin Leukam Lako Paul Lajoie-Mazenc Maryline Laurent

Research on Coordinated Scheduling Strategy of Heat Storage Thermoelectric Units Based on Wind Power Data Acquisition System Using Edge Computing.

D. J. Guan X. Y. Qian S. X. Lu N. An P. Ye M. L. Zhang N. Zhang

Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains.

Tzung-Her Chen Ting-Le Zhu Fuh-Gwo Jeng Chien-Lung Wang

Survey on Reversible Watermarking Techniques of Echocardiography.

Rabiya Ghafoor Danish Saleem Sajjad Shaukat Jamal Muhammad Ishtiaq Sadaf Ejaz Arif Jamal Malik M. Fahad Khan

An Intelligent Offloading System Based on Multiagent Reinforcement Learning.

Yu Weng Haozhen Chu Zhaoyi Shi

Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network.

Hao Zou Pengpeng Yang Rongrong Ni Yao Zhao

Machine Learning-Based Stealing Attack of the Temperature Monitoring System for the Energy Internet of Things.

Qiong Li Liqiang Zhang Rui Zhou Yaowen Xia Wenfeng Gao Yonghang Tai

Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters.

Ihsan Ullah Muhammad Sajjad Khan Marc St-Hilaire Mohammad Faisal Junsu Kim Su Min Kim

Lane Detection Based on Adaptive Network of Receptive Field.

YuFan Cai Yanyan Zhang Chengsheng Pan

Research on English Movie Resource Information Mining Based on Dynamic Data Stream Classification.

Jinhui Duan Rui Gao

Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain.

Huimin Wang Dong Zheng Qinglan Zhao

Research on Sports Training Decision Support System Based on Improved Association Rules Algorithm.

Linhai Shao

A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network.

Ming Zhong Yajin Zhou Gang Chen

Coherent Detection of Synchronous Low-Rate DoS Attacks.

Zhijun Wu Yue Yin Guang Li Meng Yue

ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities.

Runnan Zhang Gang Liu Shancang Li Yongheng Wei Quan Wang

S-DPS: An SDN-Based DDoS Protection System for Smart Grids.

Hassan Mahmood Danish Mahmood Qaisar Shaheen Rizwan Akhtar Wang Changda

Next-Generation Digital Forensic Readiness BYOD Framework.

Md Iman Ali Sukhkirandeep Kaur

Controlled Sharing Mechanism of Data Based on the Consortium Blockchain.

Jin Li Songqi Wu Yundan Yang Fenghui Duan Hui Lu Yueming Lu

Cuckoo Search-based SVM (CS-SVM) Model for Real-Time Indoor Position Estimation in IoT Networks.

Amjad Khan Asfandyar Khan Javed Iqbal Bangash Fazli Subhan Abdullah Khan Atif Khan Muhammad Irfan Uddin Marwan Mahmoud

Robust Secure Beamforming Design for Cooperative Cognitive Radio Nonorthogonal Multiple Access Networks.

Quanzhong Li Sai Zhao

Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT.

Yanfeng Shi Shuo Qiu

Hardware Trojan Detection Based on Ordered Mixed Feature GEP.

Huan Zhang Jiliu Zhou Dongrui Gao Xinguo Wang Zhefan Chen Hongyu Wang

Reverse Auction-Based Services Optimization in Cloud Computing Environments.

Hongkun Zhang Xinmin Liu

ETCC: Encrypted Two-Label Classification Using CNN.

Yan Li Yifei Lu

A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination.

Wenbing Wang Yan Li Shengli Liu

A Residual Learning-Based Network Intrusion Detection System.

Jiarui Man Guozi Sun

Towards Face Presentation Attack Detection Based on Residual Color Texture Representation.

Yuting Du Tong Qiao Ming Xu Ning Zheng

An Unsupervised Learning Method for the Detection of Genetically Modified Crops Based on Terahertz Spectral Data Analysis.

Shubao Pan Binyi Qin Lvqing Bi Jincun Zheng Ruizhao Yang Xiaofeng Yang Yun Li Zhi Li

Fuzzy Identity-Based Ring Signature from Lattices.

Chengtang Cao Lin You Gengran Hu

Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks.

Ching-Chun Chang

Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning.

Rahma Gantassi Bechir Ben Gouissem Omar Cheikhrouhou Salim El Khediri Salem Hasnaoui

A Sensitive File Abnormal Access Detection Method Based on Application Classification.

Hui Liu Hanxing Xue Hui Lu

Representativeness-Based Instance Selection for Intrusion Detection.

Fei Zhao Yang Xin Kai Zhang Xinxin Niu

Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications.

Elmustafa Sayed Ali Mohammad Kamrul Hasan Rosilah Hassan Rashid A. Saeed Mona Bakri Hassan Shayla Islam Nazmus Shaker Nafi Savitri Bevinakoppa

A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols.

Qun Wang Zhonghao Sun Zhangquan Wang Shiping Ye Ziyi Su Hao Chen Chao Hu

I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree.

Wenfeng Xu Yongxian Fan Changyong Li

Distributed Functional Signature with Function Privacy and Its Application.

Muhua Liu Lin Wang Qingtao Wu Jianqiang Song

Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing.

Zhen Zhang Bing Guo Yan Shen Chengjie Li Xinhua Suo Hong Su

Use of Security Logs for Data Leak Detection: A Systematic Literature Review.

Ricardo Ávila Raphaël Khoury Richard Khoury Fábio Petrillo

An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding.

Zhongguo Yang Irshad Ahmed Abbasi Fahad Algarni Sikandar Ali Mingzhu Zhang

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.

Yunzhe Tian Jiqiang Liu Endong Tong Wenjia Niu Liang Chang Qi Alfred Chen Gang Li Wei Wang

Research on the Credibility of Social Media Information Based on User Perception.

Jiaxi Sun

Genetic Feature Fusion for Object Skeleton Detection.

Yang Qiao Yunjie Tian Yue Liu Jianbin Jiao

A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology.

Yuanju Gan

A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme.

Yihang Song Songfan Li Chong Zhang Li Lu

Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface.

Jie Yang Xinsheng Ji Kaizhi Huang Xiaoli Sun Yi Wang

A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture.

Pengcheng He Kehui Sun Congxu Zhu

A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption.

Chirag Sharma Bagga Amandeep Rajeev Sobti Tarun Kumar Lohani Mohammad Shabaz

An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm.

Chen Hao

Efficient GSW-Style Fully Homomorphic Encryption over the Integers.

Jianan Zhao Ruwei Huang Bo Yang

Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision.

Jun Lin

Side-Channel Leakage Detection with One-Way Analysis of Variance.

Wei Yang Anni Jia

Compressible Multikey and Multi-Identity Fully Homomorphic Encryption.

Tongchen Shen Fuqun Wang Kefei Chen Zhonghua Shen Renjun Zhang

A Blockchain System Based on Quantum-Resistant Digital Signature.

Peijun Zhang Lianhai Wang Wei Wang Kunlun Fu Jinpeng Wang

An Adaptive Visible Watermark Embedding Method based on Region Selection.

Wenfa Qi Yuxin Liu Sirui Guo Xiang Wang Zongming Guo

Nowhere to Hide: A Novel Private Protocol Identification Algorithm.

Jiantao Shi Xiangzhan Yu Zechao Liu

Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel.

Yidong Yuan Yao Zhang Yiqiang Zhao Xige Zhang Ming Tang

Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence.

Xiao-wei Liu

Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology.

Ming Li Qinsheng Li Yuening Li Yunkun Cui Xiufeng Zhao Lei Guo

Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm.

Hira Nazir Imran Sarwar Bajwa Muhammad Samiullah Waheed Anwar Muhammad Moosa

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.

Yuting Li Qingfeng Cheng Wenbo Shi

Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things.

Teng Li Jiawei Zhang Yangxu Lin Shengkai Zhang Jianfeng Ma

A Survey on Secure Deployment of Mobile Services in Edge Computing.

Mengmeng Cui Yiming Fei Yin Liu

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing.

Jiawei Zhang Jianfeng Ma Teng Li Qi Jiang

Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection.

Songjie Wei Zedong Zhang Shasha Li Pengfei Jiang

Improved CNN-Based Hashing for Encrypted Image Retrieval.

Wenyan Pan Meimin Wang Jiaohua Qin Zhili Zhou

Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating.

Jie Ling Junwei Chen Jiahui Chen Wensheng Gan

Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment.

Ahmad Alanezi Bassem Abd-El-Atty Hoshang Kolivand Ahmed A. Abd El-Latif Basma Abd El-Rahiem Syam Sankar Hany S. Khalifa

Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms.

Binjie Chen Fushan Wei Chunxiang Gu

Spectral Efficiency of the Multiway Massive System over Rician Fading Channels.

Junyi He Junnan Zhang Cheng Song Mengxiang Wu

Improved ECC-Based Three-Factor Multiserver Authentication Scheme.

Tsu-Yang Wu Lei Yang Zhiyuan Lee Chien-Ming Chen Jeng-Shyang Pan SK Hafizul Islam

A New Password- and Position-Based Authenticated Key Exchange.

Jia Fan Lanfei Qiao Yunfei Cao Shanglin Liu Wenke Zhang Lin Tang

A Robust and Fast Image Encryption Scheme Based on a Mixing Technique.

Lee Mariel Heucheun Yepdia Alain Tiedeu Guillaume Kom

An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things.

Fengyin Li Pei Ren Guoyu Yang Yuhong Sun Yilei Wang Yanli Wang Siyuan Li Huiyu Zhou

Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT.

Li Miao Shuai Li

Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks.

Ping Yu Wei Ni Guangsheng Yu Hua Zhang Ren Ping Liu Qiaoyan Wen

A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data.

Hongtao Li Feng Guo Lili Wang Jie Wang Bo Wang Chuankun Wu

Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys.

Bingbing Jiang

Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation.

Li-Hua Gong Jin Du Jing Wan Nan-Run Zhou

Blockchain-Based Automated System for Identification and Storage of Networks.

Deepak Prashar Nishant Jha Muhammad Shafiq Nazir Ahmad Mamoon Rashid Shoeib Amin Banday Habib Ullah Khan

Research on Accounting Intelligence System Modeling of Financial Performance Evaluation.

Ziyue Chen

Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition.

Youxia Dong Xiaoling Huang Guodong Ye

Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms.

Lejun Gong Xingxing Zhang Tianyin Chen Li Zhang

Research on Digital Economy and Human Resources Based on Fuzzy Clustering and Edge Computing.

Zhouhuo Wang

Efficient Concurrent Execution of Smart Contracts in Blockchain Sharding.

Yan Wang Jixin Li Wansheng Liu Aiping Tan

A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks.

Daoqi Han Songqi Wu Zhuoer Hu Hui Gao Enjie Liu Yueming Lu

Statistical Modeling and Simulation of Online Shopping Customer Loyalty Based on Machine Learning and Big Data Analysis.

Jui-Chan Huang Po-Chang Ko Cher-Min Fong Sn-Man Lai Hsin-Hung Chen Ching-Tang Hsieh

BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs.

Maria Azees Pandi Vijayakumar Lazarus Jegatha Deborah Marimuthu Karuppiah Mary Subaja Christo

Efficient Access Control Permission Decision Engine Based on Machine Learning.

Aodi Liu Xuehui Du Na Wang

An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation.

Shuaijianni Xu

Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA.

Daiki Yamakawa Takashi Okimoto Songpon Teerakanok Atsuo Inomata Tetsutaro Uehara

Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack.

Xin Tang Linna Zhou Bingwei Hu Haowen Wu

Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions.

Zitian Liao Shah Nazir Habib Ullah Khan Muhammad Shafiq

Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective.

Jinxiong Zhao Xun Zhang Fuqiang Di Sensen Guo Xiaoyu Li Xiao Jing Panfei Huang Dejun Mu

Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy.

Zhonghua Wang Siwei Duan Chengli Sun

Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.

Yi-Fan Tseng Zi-Yuan Liu Jen-Chieh Hsu Raylin Tso

An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure.

Zishuai Cheng Baojiang Cui Tao Qi Wenchuan Yang Junsong Fu

Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events.

Xinzhi Feng Yang Yang Xiaozhong Qi Chunming Xu Ze Ji

V2X-Based Mobile Localization in 3D Wireless Sensor Network.

Iram Javed Xianlun Tang Kamran Shaukat Muhammad Umer Sarwar Talha Mahboob Alam Ibrahim A. Hameed Muhammad Asim Saleem

Fail-Stop Group Signature Scheme.

Jonathan Jen-Rong Chen Yi-Yuan Chiang Wang-Hsin Hsu Wen-Yen Lin

Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference.

Hongwei Luo Yijie Shen Feng Lin Guoai Xu

A Privacy-Preserving Caching Scheme for Device-to-Device Communications.

Yuqing Zhong Zhaohua Li Liping Liao

Network Teaching Technology Based on Big Data Mining and Information Fusion.

Yishan Du Tianzhong Zhao

Zombie Follower Recognition Based on Industrial Chain Feature Analysis.

Juan Tang Hualu Xu Pengsen Cheng Jiayong Liu Cheng Huang Xun Tang

An Anomaly Detection Algorithm Selection Service for IoT Stream Data Based on Tsfresh Tool and Genetic Algorithm.

Zhongguo Yang Irshad Ahmed Abbasi Elfatih Elmubarak Mustafa Sikandar Ali Mingzhu Zhang

A New Method of Coding for Steganography Based on LSB Matching Revisited.

Mansoor Fateh Mohsen Rezvani Yasser Irani

A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata.

Jie Zeng Chunhua Wang

Fine-Grained Task Access Control System for Mobile Crowdsensing.

Jingwei Wang Xinchun Yin Jianting Ning

Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems.

Sooyong Jeong Cheolhee Park Dowon Hong Changho Seo Nam-Su Jho

Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction.

Fei Zhang Aisuo Jin Yin Hu

Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things.

Kaiqing Huang Xueli Wang Zhiqiang Lin

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.

Zhe Ren Xinghua Li Qi Jiang Qingfeng Cheng Jianfeng Ma

Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System.

Tsu-Yang Wu Tao Wang Yu-Qi Lee Weimin Zheng Saru Kumari Sachin Kumar

S2NOW: Secure Social Network Ontology Using WhatsApp.

Rahul Johari Sawan Kalra Sonika Dahiya Kalpana Gupta

A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack.

Suliman A. Alsuhibany

Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition.

Asad Ullah Jing Wang Muhammad Shahid Anwar Arshad Ahmad Shah Nazir Habib Ullah Khan Zesong Fei

PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w.

Chuqiao Xiao Xueqing Gong Yefeng Xia Qian Zhang

YAICD: Yet Another IMSI Catcher Detector in GSM.

Parimah Ziayi Seyed Mostafa Farmanbar Mohsen Rezvani

A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks.

Shengxu Xie Chang-you Xing Guomin Zhang Jinlong Zhao

PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation.

Zixuan Shen Zhihua Xia Peipeng Yu

Weighted Nuclear Norm Minimization on Multimodality Clustering.

Lei Du Songsong Dai Haifeng Song Yuelong Chuang Yingying Xu

A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks.

Shiyue Qin Zhenhua Tan Fucai Zhou Jian Xu Zongye Zhang

Exposing Speech Transsplicing Forgery with Noise Level Inconsistency.

Diqun Yan Mingyu Dong Jinxing Gao

Hardware Sharing for Channel Interleavers in 5G NR Standard.

Xiaokang Xiong Yuhang Dai Zhuhua Hu Kejia Huo Yong Bai Hui Li Dake Liu

A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies.

Tao Wang Hongchang Chen

A Novel Improved Reversible Visible Image Watermarking Algorithm Based on Grad-CAM and JND.

Jiasheng Qu Wei Song Xiangchun Liu Lizhi Zhao Xiaobing Zhao

A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques.

Chongzhen Zhang Yanli Chen Yang Meng Fangming Ruan Runze Chen Yidan Li Yaru Yang

Design and Analysis of a Novel Authorship Verification Framework for Hijacked Social Media Accounts Compromised by a Human.

Suleyman Alterkavi Hasan Erbay

Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images.

Zhengguo Wu Kai Zhang Yannan Ren Jing Li Jiande Sun Wenbo Wan

A Research Survey on Applications of Consensus Protocols in Blockchain.

Sivleen Kaur Sheetal Chaturvedi Aabha Sharma Jayaprakash Kar

Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing.

Tao Zhang Xiongfei Song Lele Zheng Yani Han Kai Zhang Qi Li

Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing.

Zhenwei Chen Axin Wu Yifei Li Qixuan Xing Shengling Geng

Efficient Deep Learning Models for DGA Domain Detection.

Juhong Namgung Siwoon Son Yang-Sae Moon

Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network.

Yusheng Dai Hui Li Yekui Qian Yunling Guo Min Zheng

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association.

Yajing Hao Xinrong Yan Jianbin Wu Huijun Wang Linfeng Yuan

Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map.

Youxia Dong Xiaoling Huang Qixiang Mei Yuanju Gan

Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets.

Khalid M. Al-Gethami Mousa T. Al-Akhras Mohammed Alawairdhi

SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts.

Menghui Lou Xiaolei Dong Zhenfu Cao Jiachen Shen

Secure Data Collaborative Computing Scheme Based on Blockchain.

Tao Feng Xusheng Wang Chunyan Liu Junli Fang

A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers.

Shichang Ding Fan Zhao Xiangyang Luo

Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey.

Yawei Yue Shancang Li Phil Legg Fuzhong Li

LNNLS-KH: A Feature Selection Method for Network Intrusion Detection.

Xin Li Peng Yi Wei Wei Yiming Jiang Le Tian

Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination.

Hui Li Limin Shen Yuying Wang Jiayin Feng Honglei Tan Zhiming Li

Ferry Node Identification Model for the Security of Mobile Ad Hoc Network.

Zhifei Wang Gang Xu Na Zhang Zhihan Qi Fengqi Wei Liqiang He

A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet.

Changguang Wang Ziqiu Zhao Fangwei Wang Qingru Li