default search action
NaNA 2023: Qingdao, China
- International Conference on Networking and Network Applications, NaNA 2023, Qingdao, China, August 18-21, 2023. IEEE 2023, ISBN 979-8-3503-2738-0
- Haitao Du, Shen He, Li Su, Jie Bai, Ru Yan:
Requirements and Potential Key Technologies of Security for 6G Mobile Network. 1-6 - Yuyang Huang, Jian Mu, Yuzhen Wang, Renmin Zhao:
A Review of Authentication Methods in Internet of Drones. 7-12 - Kaijun Wu, Bo Tian, Xue Wang:
Data Security Storage Scheme For UAV Cluster Based On Distributed Storage. 13-17 - Yulin Teng, Pinchang Zhang, Yangyang Liu, Xin Liu:
PHY-Layer Authentication with Hardware Impairments in UAV-Aided Communication Systems. 18-22 - Jun Liu, Tianyu Zhang, Hewu Li, Qian Wu, Shaowen Zheng, Lu Lu:
A Risk Path Detection Based Trusted Delivery Mechanism in Integrated Satellite and Terrestrial Internet. 23-27 - Yi Yin, Dongmei Zhao, Xufei Li, Shuiguang Zeng:
Learning Based Preamble Collision Detection of Cellular Random Access by Physical Layer Features. 28-33 - Lei Chen, Fei Yu, Siyuan Ni, Yuyao Wang, Yuanhang He:
A Survey of Trust Assessment Technology Research for Edge Computing. 34-39 - Boyou Yi, Baoquan Ren, Jie Zhan:
Hybrid Resource Sharing Solution in Virtual Wireless Networks. 40-45 - Han Li, Zhiwei Zhang, Hao Duan, Yi He, Ning Xi:
A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data. 46-51 - Siyuan Li, Liumei Zhang, Yu Han:
LMIPv6ATK:A Labeled Dataset Containing Multiple ICMPV6-DDOS Attacks. 52-57 - Sibo Wang, Bin Yang, Wu Wang, Shikai Shen, Xiaohong Jiang:
On UAV-IRS-Aided Covert Communication of D2D-Enabled Cellular Networks. 58-63 - Jin Liu, Zan Li, Qiguang Miao, Li Yang:
A Novel Detector Based on Adaptive Bistable Stochastic Resonance for Spectrum Sensing at Low Signal-to-Noise Ratio. 64-71 - Tong Zhang, Wei Wei, Yichuan Wang, Xi Deng, Lei Zhu, Wenjiang Ji:
Formal Modeling and Defense Methods for 5G Network Endpoint Access Denial of Service Attacks. 72-77 - Xiao Liu, Zhao Huang, Quan Wang:
Evolutionary Equilibrium of Mining Pools Under DDoS Attack in Blockchain System. 78-83 - Yiteng Wang, Zhe Ren, Wei Wang:
A Robust and Scalable One-PUF-to-Many Authentication and Key Agreement Scheme for Mobile Communication Network. 84-91 - Yuan Yuan, Wei Su:
A Game Theory-Based Strategy for Allocating and Offloading Computing Resources in 5G Networks. 92-97 - Yuyao Wang, Lei Chen, Siyuan Ni, Fei Yu, Yuanhang He, Qiang Fang, Yuzheng Zhou:
Research on Privacy Preserving Computing Technology in Edge Computing. 98-103 - Lei Huang, Huiling Shi, Wei Zhang, Kun Yu:
Block Transmission Scheduling Strategy Based on Deadline Priority. 104-109 - Jinyu Fan, Jiayi Li, Chunjiao Li, Yuheng Du, Yahan Lyu:
Research on Safe-Content Distribution Technology in VANETs. 110-115 - Siyuan Ni, Yuanhang He, Lei Chen, Yuyao Wang, Fei Yu:
A Survey of Edge Computing Resource Allocation Strategies Based on Federated Learning. 116-121 - He Zhu, Huihui Wu, Xiaohong Jiang:
Jamming with Zero-Forcing Beamforming for Covert Communication in MIMO Systems. 122-126 - Xinzhe Pi, Bin Yang, Xiaohong Jiang:
Covert Terahertz Communication for UAV-Aided Wireless Relay Systems. 127-132 - Jiang Mo, Ke Zhao, Limei Peng:
Joint Deployment of LAU and HAU for Hierarchical Space-Air-Ground Communications. 133-137 - Yihuai Yang, Shikai Shen, Yumei She, Wu Wang, Bin Yang, Yangshui Gao:
Joint Covert and Secure Communications for Intelligent Reflecting Surface (IRS)-Aided Wireless Networks. 138-142 - Weigang Ma, Yichuan Wang, Dengfang Hu, Zhoukai Wang:
E-PBFT: An Improved Consensus Mechanism Based on PBFT. 143-149 - Teng Liu, Menghan Shang, Haoshuo Li, Tao Zhang:
Enhancing Robustness Against Heterogeneity via Class-Difficulty Based Weights. 150-155 - Guoyi Cao, Wanghao Mo, Zhaozhen Wu, Yaqi Shen:
Research on Lightweight Human Pose Estimation Model Based on Knowledge Distillation. 156-162 - Yifan Deng, Liangmin Wang, Liang Wang, Jiayi Li, Quan Yong:
A Survey on Automatic Discover Approach by Using Static Analysis for Smart Contract Vulnerability. 163-168 - Yaling Zhang, Jingjing Chen, Yichuan Wang, Yeqiu Xiao, Xiaoxue Liu:
A Novel On-Demand Service Architecture for Efficient Cloud-Edge Collaboration. 169-174 - Yulu Yang, Jingce Yang, Han Xu, Jing Hu, Tiecheng Song:
Trajectory and Offloading Policy Optimization in Age-of-Information-Aware UAV-Assisted MEC Systems. 175-180 - Hongbin Zhang, Yikang Bai, Dongmei Zhao, Bin Liu, Ying Xu:
A Study on a Reduced Indicator System for the Network Security Situational Assessment Model. 181-186 - Yichuan Wang, Jianhuan Tie, Xinhong Hei, Li Zhao, Xiaohui Zhang:
A Trusted Privacy-Preserving Model for Cross-Chain Transactions Based on zk_SNARKs. 187-192 - Yubao Zhang, Lin Tang, Lixuan Che, Chaozhang Liu, Entang Li, Hongwei Xing, Jianhui Zhang, Guandong Di:
Privacy-Preserving Multi-User Joint Data Logistic Regression Inference Scheme. 193-201 - Lu Lin, Jiayi Li, Yuzhen Wang, Qiong Wang:
A Survey on Cross-Chain Asset Transfer Schemes: Classification, Challenges, and Prospects. 202-208 - Jianping Wang, Zhiyu Li, Guohong Gao, Yingying Lv, Yuxin Ma, Guanglan Chen:
ST-MobileNetV3: A Lightweight Network Model for Strawberry Disease Identification. 209-214 - Yanhua Niu, Shuai Gao, Hongke Zhang, Yuanjia Gong:
A Decentralized Quality Management Scheme for Content Moderation. 215-220 - Xin Guo, Jiandong Wang, Zhiwei Zhang, Lisheng Ma:
Failure-Aware Service Request Protection in LEO Satellite Constellation Networks. 221-225 - Kun Yu, Su-Ruo Li:
SRv6-based In-band Network Telemetry: Architecture and Strategy. 226-230 - Weicong Huang, Jieying Zhou, Minghui Jin, Zheng Han, Sijia Wei:
Research on Secure Data Circulation and Sharing Protection Technology Framework for Power Monitoring System. 231-238 - Dong Yang, Kai Gong, Weiting Zhang, Kuo Guo, Jia Chen:
enDRTS: Deep Reinforcement Learning Based Deterministic Scheduling for Chain Flows in TSN. 239-244 - Lingui Ma, Fan Yang, Tingting Chen:
A Rapid Configuration Mechanism Based on Load Measurement for NETCONF in SDN Networks. 245-250 - Changduo Wu, Fan Yang, Ting Zheng:
A Time Slot Averaging Algorithm for Delay Sensitive Service of Small Particle Time in Slicing Packet Networks. 251-255 - Jiahong Lai, Fan Yang, Chaoran Ying, Wenchao Song:
Spatial-Temporal Correlation-Based Prediction Model for Node and Link Residual Resources in NFV Networks. 256-261 - Lei Zhang, Huiling Shi, Kuichao Zhang, Hongyang Sun, Wei Zhang:
GraphMal: A Network Malicious Traffic Identification Method Based on Graph Neural Network. 262-267 - Rui Wang, Donglan Liu, Xin Liu, Lei Ma, Hao Zhang, Yong Wang, Zhenghao Li, Fangzhe Zhang, Lili Sun:
An ASN.1 UPER Encoding Based Fuzzing Method for Radio Resource Control Protocol. 268-273 - Xiaojian Tian, Zuqing Zhu:
On the Topology Scaling of Interplanetary Networks. 274-280 - Zhao Ming, Qize Guo, Hao Yu, Tarik Taleb:
Deep Reinforcement Learning-Based Task Offloading Over In-Network Computing and Multi-Access Edge Computing. 281-286 - Weigang Ma, Yaping Yu, Yichuan Wang, Xiaoxue Liu, Zhoukai Wang:
A Pseudonym Exchange-Based Traceable Location Privacy Protection Scheme for IoV. 287-292 - Jipeng Cui, Zhongyuan Jiang:
EDF: Enhanced Deep Fingerprinting attacks on Websites. 293-299 - Zhiheng Zhang, Zeyu Liu, Li Yang, Tingbo Zhe, Jian Wu:
Security Risk Assessment of Image Classification Model Based on ANP-TOPSIS. 300-306 - Xin Zhang, Yanbo Yang, Baoshan Li, Minchao Li, Teng Li, Jiawei Zhang:
Research on Activation Functions in Machine Learning Based Network Coding. 307-312 - Zheng Dang, Hao Chen, Xinhong Hei, Yilong Liu:
A Digital Twin Framework for Logical Range. 313-317 - Yutong Wang, Yu'e Jiang, Yu Feng:
Covert Communication-Assisted Computation Offloading Schemes in Blockchain-Enabled IoT. 318-323 - Chunhui Hu, Jianfeng Chen:
A Dimensional Perspective Analysis on the Cybersecurity Risks and Opportunities of ChatGPT-Like Information Systems. 324-331 - Yang Li, Qingyang Zhang, Jun Cheng, Yiyuan Zhou, Jie Cui, Hong Zhong:
Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT. 332-338 - Wei Wei, Feng Zang, Liben Huang, Mingxiao Bai:
Product Retrieval Based on Subtractive Angular Margin Loss. 339-343 - Lifeng Guo, Mengfei Jia, Zhuoheng Xu, Xialei Zhang:
Efficient Fine-Grained Forward Secure Encryption Scheme Based on Attributes in Mobile Healthcare. 344-349 - Chaozhang Liu, Lin Tang, Lixuan Che, Yubao Zhang, Hongwei Xing, Jianhui Zhang, Entang Li, Xiangyang Li:
Research on Cross-Chain Consensus Models in Complex Trust Environments. 350-358 - Lifeng Guo, Lingxia Wang, Xueke Ma, Xialei Zhang:
New Traceable and Revocable Attribute Based Encryption on Lattices. 359-364 - Xinlu Zhuang, Zeyu Xiao, Haoping Qin, Yunjie Ge:
An Efficient and Scalable Consensus for Main Blockchain in the Multi-Chain Network. 365-371 - Feng Zang, Liben Huang, Wei Wei, Weiqi Shen:
UAV Camera Re-localization Based on Image Retrieval. 372-377 - Lulu Gao, Xiaonan Li, Zhicheng Wei:
Taxi Station Location Model Based on Spatio-Temporal Demand Cube. 378-383 - Qiong Di, Chaoran Ying, Fan Yang, Qing Yu, Yaxin Ren:
A Delay Guarantee Mechanism Based on Active and Passive Measurement in SDN Networks. 384-389 - Jun Yan, Yi Tian, Wenli Wang, Yijun Zhang, Yihui Zhou, Laifeng Lu:
A Local Differential Privacy Based Method to Preserve Link Privacy in Mobile Social Network. 390-396 - Zhenyu Guan, Yang Zhang, Shizhong Li, Ruonan Chen, Dawei Li:
Scaling Blockchain via a Lightweight Tree-based Sharding System. 397-403 - Xiaolong Chen, Yue Zhao, Qi Zhao:
Distributed Storage Method for Data Security Sharing and Exchange. 404-409 - Pengliang Shi, Dongning Hao:
Cloud Data Deduplication Scheme Based on Blockchain. 410-415 - Fangwei Wang, Man Yan, Qingru Li, Changguang Wang:
A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual Features. 416-421 - Wenli Wang, Yijun Zhang, Jun Yan, Yihui Zhou, Laifeng Lu:
Joint Distribution Analysis of Multi-Dimensional Randomized Response. 422-427 - Huayuan Jiang, Xin Xie, Jianan Fan, Shicong Hou, Huan Chen:
Online Tobacco Width Detection Based on Skeleton Detection Algorithm. 428-433 - Taoyi Zhang, Yubo Wang, Zhicheng Wei:
STGAT: A Spatio-Temporal Graph Attention Network for Travel Demand Prediction. 434-439 - Yu Wang, Naijie Gu:
Classification of Hash Functions Based on Anti-Attack Ability. 440-446 - Kaixin Li, Limei Peng, Pin-Han Ho:
GNN-Based Data Rate Maximization in Double Intelligent Reflecting Surface (IRS)-Aided Communication System. 447-452 - Ruiyan Liu, Tengchao Ma, Yiting Huang, Qingzhao An, Lin Yan, Jiangyuan Li:
Cost-Sensitive Cold Start Latency Optimization Mechanism in Function-as-a-Service. 453-458 - Wenjiang Ji, Yixin Yang, Yaling Zhang, Yichuan Wang, Mengjie Tian, Yuan Qiu:
DDoS Attack Detection Based on Information Entropy Feature Extraction in Software Defined Networks. 459-464 - Ji He, Xiaodan Zhang, Baoquan Ren, Hongjun Li, Tianzhu Hu, Xiangwu Gong, Xudong Zhong:
ML-Based Detection Approaches for Covert Communication with Multi-D Signal Features. 465-470 - Cong Shen, Wei Zhang:
Privacy Enhanced Federated Learning via Privacy Masks and Additive Homomorphic Encryption. 471-478 - Suwan Tang, Wu Wang:
The Differential Privacy Framework for Convolutional Neural Network using PATE, ADLM and SGD models. 479-483 - Lei Zhu, Miaoqing Wen, Tong Zhang, Yichuan Wang, Jing Wang, Mingsong Yang, Bing Ma:
A Text Classification Method of Network Public Opinion Based on Information Fusion. 484-489 - Mengfan Xu, Jin Li, Yingying Liu:
PPKD: Privacy-preserving Knowledge Distillation for Large Model. 490-496 - Jie Gao, Zhihong Liu, Yong Zeng:
Topological Loss on Graph Auto-Encoders. 497-501 - Hong Xia, Bo Wang, Yongkang Zhang, Yanping Chen:
Hierarchical Clustering Combination Method Using Intuitionistic Fuzzy Similarity in Software Module Clustering. 502-507 - Qiuling Chen, Ayong Ye, Fengyu Wu, Huang Zhang:
Leverage Generative Adversarial Network for Enhancing Fairness and Utility. 508-513 - Ziwen Wang, Baihe Ma, Zhihong Liu, Yong Zeng, Zhe Wang, Kaichao Shi:
DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-Vehicles. 514-519 - Chengxuan Li, Zhou Yang, Yang Xiao, Haozhao Liu, Yuning Zhang, Qingqi Pei:
Defense Against Adversarial Attacks via Adversarial Noise Denoising Networks in Image Recognition. 520-526 - Shuang Yang, Li Li:
Improving Bipartite Networks Embedding with Partially Available Vertex Content. 527-531 - Guohong Gao, Chengchao Wang, Jianping Wang, Yingying Lv:
UD-YOLOv5s: Recognition of Cattle Regurgitation Behavior Based on Upper and Lower Jaw Skeleton Feature Extraction. 532-538 - Wei Wei, Feng Zang, Liben Huang, Wei Xue:
A Comparison of Finetune and Meta Learning Methods for Few-Shot Object Detection in Sonar Images. 539-544 - Jini Li, Man Zhang, Yu Lai:
A Light-Weighted Machine Learning Based ECU Identification for Automotive CAN Security. 545-550 - Yinglin Wang, Chunjie Cao, Yifan Li, Qianlin Dong, Haoran Li, Jingzhang Sun:
Radiofrequency Fingerprint Feature Extraction and Recognition Using a Coordinate Attention-Guided Deep Residual Shrinkage Network. 551-557 - Hikofumi Suzuki, Akiyoshi Iwasa, Takumi Uchiyama, Katsumi Wasaki:
Man-machine Cooperative Monitoring System to Support Detection of DoS/DDoS Attacks Through Continuous SOM Diagram Generation. 558-567 - Yumeng Shen, Feng Tian, Qiaoling Lu, Kemeng Cui:
A Deep Model Intellectual Property Protection Method Supporting Public Verification. 568-573 - Xihua Ma, Youliang Tian, Zehua Ding:
Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets. 574-579 - Meng Huang, Shenghui Zhao, Kaichuan Sun, Yuyan Zhao:
A Detection Method for Alzheimer's Disease Based on Long-Term Visual Features. 580-587 - Xianyu Mu, Youliang Tian, Jinbo Xiong, Shuai Wang, Boxiang Gong:
FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing. 588-594 - Qi Zheng, Haizheng Yu:
B-Pet: The PET Model with Parameter-Efficient Learning. 595-600 - Jianping Wang, Xueyan Zhang, Guohong Gao, Yingying Lv:
OP Mask R-CNN: An Advanced Mask R-CNN Network for Cattle Individual Recognition on Large Farms. 601-606 - Wei Dong, Zan Zhou, Shujie Yang, Yibo Lian, Hongjing Li, Changqiao Xu:
Least Co-Residence: A Novel Virtual Migration Algorithm for Mitigating Side-Channel Attacks. 607-612 - Yu Feng, Yu'e Jiang, Yutong Wang:
GAN-Based Covert Communications Against an Adversary with Uncertain Detection Threshold in Federated Learning Networks. 613-618 - Peng Xu, Ziyi Zhao, Sugang Ma:
Real-Time Semantic Segmentation Algorithm Based on Tversky Loss Function and Mixed Pooling. 619-624 - Menghan Shang, Ze Tong, Teng Liu, Tao Zhang:
Privacy-preserving Federated Learning Against Byzantine Attack via Top-k Indexes. 625-630 - Jinyuan Zhao, Di Jia, Qian Wang:
Correction Algorithm of Multi-Person Pose Estimation Based on Improved YOLOv5. 631-636 - Yuhua Wang, Jianming Zhu:
Locally Differential Private Federated Learning with Controllable Perturbation Domains. 637-644 - Fei Deng, Kaiguo Qian, Shikai Shen, Sunyan Hong, Bin Yang, Xuanxuan Li, Jun He:
Joint Location and Power Optimization for Secure Communications in Multi-UAVs Enabled Cellular Networks. 645-648 - Changbing Bi, Youliang Tian, Ta Li, Shihong Wu, Hua Zhou:
An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs. 649-654 - Yubo Wang, Taoyi Zhang, Zhicheng Wei:
A Deep Reinforcement Learning Approach for Online Taxi Dispatching. 655-660 - Jingsen Jiao, Huihui Wu, Ranran Sun, Qifeng Miao, Yizhi Cao:
Covert Communication in the D2D-Enabled Cellular Network with Multiple Non-Colluding Wardens. 661-666 - Lin Tang, Yubao Zhang, Lixuan Che, Chaozhang Liu, Hongwei Xing, Jianhui Zhang, Entang Li, ChongHao Xu:
Research on NAS-Oriented Blockchain Aggregation Consensus Algorithm. 667-673 - Ruiqi Zeng, Yiru Niu, Lanfei Qiao:
A Novel Construction Technology of Microservice Multi-Instance System Automatic Deployment and Upgrade. 674-679 - Lu Fan, Zhao Huang, Junjun Wang, Lirong Zhou, Yi'an Zhu, Quan Wang:
A Novel Configurable RO-Obfuscated PUF Design with Machine Learning Immunity. 680-685 - Guoqing Pan, Yuan Chang, Haoquan Qi, Qiang Hu:
Web Service Category Recommendation with Feature Word Semantic Enhancement and tag Co-occurrence. 686-689 - Qimiao Zeng, Yirong Zhuang, Jinxia Hai, Qing Pan, Zhifan Yin, Qi Chen, Jie Liang:
Challenges of Livecast Computing Network: A Contemporary Survey. 690-697 - Qi Zhao, Bo Tian, Yiming Liu:
The Design Method of Micro-Unit Cryptographic Service Framework. 698-704 - Yujuan Cao, Zhao Liu, Wuhe Axi, Dawei Wei, Ning Xi:
Physical-Sensing Inconsistency Vulnerability Mitigation for Multi-UAV Crowdsensing. 705-710 - Zijian Chen, Limei Peng:
Performance Evaluation for Grant-Free NOMA System Using Hybrid SCMA-OFDM. 711-715
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.