default search action
20th TrustCom 2021: Shenyang, China
- 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021. IEEE 2021, ISBN 978-1-6654-1658-0
- Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni:
A Time-aware Trust Management Heuristic for the Internet of Vehicles. 1-8 - LingHan Zhang, F. Jiang, Xiaohu Tang:
Verifiable Conjunctive Keyword Search with Certificateless Searchable. 9-16 - Sara Alhajaili, Arshad Jhumka:
Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults. 17-25 - Qing Xia, Wensheng Dou, Fengjun Zhang, Geng Liang:
The Performance of Selfish Mining in GHOST. 26-33 - Po-Chu Hsu, Atsuko Miyaji:
Bidder Scalable M+1st-Price Auction with Public Verifiability. 34-42 - Qianyun Gong, Chengjin Zhou, Le Qi, Jianbin Li, Jianzhong Zhang, Jingdong Xu:
VEIN: High Scalability Routing Algorithm for Blockchain-based Payment Channel Networks. 43-50 - Muhammad Shadi Hajar, Harsha K. Kalutarage, M. Omar Al-Kadri:
TrustMod: A Trust Management Module For NS-3 Simulator. 51-60 - Xiaomin Zhu, Bowen Fei, Daqian Liu, Weidong Bao:
Adaptive Clustering Ensemble Method Based on Uncertain Entropy Decision-Making. 61-67 - Jiaqi Yin, Huibiao Zhu, Yuan Fei:
Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed Automata. 68-75 - Wei Zhang, Wenxue Cui, Feng Jiang, Chifu Yang, Ran Li:
Protecting the Ownership of Deep Learning Models with An End-to-End Watermarking Framework. 76-82 - Wei Xia, Wei Wang, Xin He, Gang Xiong, Gaopeng Gou, Zhenzhen Li, Zhen Li:
Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World. 83-90 - Ligeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao:
RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability. 91-98 - Chengshang Hou, Junzheng Shi, Mingxin Cui, Mengyan Liu, Jing Yu:
Universal Website Fingerprinting Defense Based on Adversarial Examples. 99-106 - Ripon Patgiri:
Rando: A General-purpose True Random Number Generator for Conventional Computers. 107-113 - Prashanthi Mallojula, Javaria Ahmad, Fengjun Li, Bo Luo:
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. 114-121 - Wenjuan Li, Weizhi Meng, Laurence T. Yang:
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. 122-129 - Chuanyun Wang, Zhongrui Shi, Keyi Si, Yang Su, Zhaokui Li, Ershen Wang:
Anti-occlusion and Scale Adaptive Target Tracking Algorithm Based on Kernel Correlation Filter. 130-138 - Xuechao Yang, Xun Yi, Andrei Kelarev:
Secure Ranked Choice Online Voting System via Intel SGX and Blockchain. 139-146 - Shuran Wang, Dahan Pan, Runhan Feng, Yuanyuan Zhang:
MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave. 147-154 - Handong Cui, Xianrui Qin, Cailing Cai, Tsz Hon Yuen:
Security on SM2 and GOST Signatures against Related Key Attacks. 155-163 - Gao Wang, Gaoli Wang, Yu He:
Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers. 164-171 - Bartosz Drzazga, Lukasz Krzywiecki, Hannes Salin:
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. 172-179 - Jie Cheng, Kun Zhang, Bibo Tu:
Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center. 180-187 - Runhao Wang, Jiexiang Kang, Wei Yin, Hui Wang, Haiying Sun, Xiaohong Chen, Zhongjie Gao, Shuning Wang, Jing Liu:
DeepTrace: A Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural Networks. 188-195 - Yiping Teng, Zhan Shi, Fanyou Zhao, Guohui Ding, Li Xu, Chunlong Fan:
Signature-Based Secure Trajectory Similarity Search. 196-206 - Guanxiong Ha, Hang Chen, Chunfu Jia, Ruiqi Li, Qiaowen Jia:
A secure deduplication scheme based on data popularity with fully random tags. 207-214 - Bingnan Zhong, Qingkai Zeng:
SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel. 215-223 - Mingyue Cui, Jin Wang, Jingya Zhou, Kejie Lu, Jianping Wang:
The Design of Secure Coded Edge Computing for User-Edge Collaborative Computing. 224-231 - Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Jian Xu, Shi Bai, Yuan He:
A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS. 232-239 - Zheyuan Gu, Gaopeng Gou, Chengshang Hou, Gang Xiong, Zhen Li:
LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset. 240-249 - Cong Cheng, Lingzhi Li, Jin Wang, Fei Gu:
The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge Computing. 250-257 - Biwen Chen, Lei Yang, Tao Xiang, Xiaoguo Li:
Secure Data Transmission with Access Control for Smart Home Devices. 258-265 - Zhiwei Cai, Huicong Zeng, Peijia Zheng, Ziyan Cheng, Weiqi Luo, Hongmei Liu:
Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision. 266-272 - Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:
Techniques for Securing 5G Network Services from attacks. 273-280 - Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:
Techniques for Securing Control Systems from Attacks. 281-288 - Antonino Galletta, Javid Taheri, Maria Fazio, Antonio Celesti, Massimo Villari:
Overcoming security limitations of Secret Share techniques: the Nested Secret Share. 289-296 - Maksym Slavnenko, Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Robin Doss:
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication. 297-308 - Aneta Poniszewska-Maranda, Lukasz Rogozinski, Witold Maranda:
Security Library for Safe Data Storage on Android Platform. 309-316 - Jiaxing Cui, Zhengmin Kong, Jing Song, Weijun Yin, Xianjun Deng:
Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple Eavesdroppers. 317-322 - Licai Zhu, Hao Yang, Shi Chen, Zhipeng Yu:
Effective RFID Localization Based on Fuzzy Logic For Security. 323-330 - Dominik Ziegler, Alexander Marsalek, Gerald Palfinger:
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption. 331-338 - Jiqing Chang, Jin Wang, Fei Gu, Kejie Lu, Lingzhi Li, Jianping Wang:
PCHEC: A Private Coded Computation Scheme For Heterogeneous Edge Computing. 339-346 - Dayin Zhang, Xiaojun Chen, Jinqiao Shi, Dakui Wang, Shuai Zeng:
A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment. 347-354 - Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng:
Sybil Attacks and Defense on Differential Privacy based Federated Learning. 355-362 - Chang Xu, Lvhan Zhang, Liehuang Zhu, Chuan Zhang, Kashif Sharif:
Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing. 363-370 - Yuzhe Li, Yong Liu, Bo Li, Weiping Wang, Nan Liu:
Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for ERM Algorithms. 371-378 - Ruxue Wen, Rui Zhang, Kai Peng, Chen Wang:
Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries. 379-386 - Mengyao Peng, Jia Hu, Hui Lin, Xiaoding Wang, Wenzhong Lin:
A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things. 387-396 - Jiangna Xing, Xuebin Ma:
DP-gSpan: A Pattern Growth-based Differentially Private Frequent Subgraph Mining Algorithm. 397-404 - Xiaohong Liu, Hanbo Cai, De Li, Xianxian Li, Jinyan Wang:
Differential Privacy Preservation in Adaptive K-Nets Clustering. 405-412 - Tao Peng, Wentao Zhong, Kejian Guan, Yipeng Zou, Jiawei Zhu, Guojun Wang:
A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks. 413-419 - Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. 420-427 - Yuhang Hu, De Li, Zhou Tan, Xianxian Li, Jinyan Wang:
Adaptive Clipping Bound of Deep Learning with Differential Privacy. 428-435 - Xuebin Ma, Haijiang Liu, Shengyi Guan:
Improving the Effect of Frequent Itemset Mining with Hadamard Response under Local Differential Privacy. 436-443 - Changli Zhou, Jing Peng, Ying Ma, Qingfeng Jiang:
A Privacy-preserving Location Recommendation Scheme without Trustworthy Entity. 444-451 - Xiaohan Yue, Lixin Yang, Xibo Wang, Shuaishuai Zeng, Jian Xu, Shi Bai, Yuan He:
An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation. 452-459 - Tingting Bao, Yang Liu:
A privacy-preserving framework for smart contracts based on stochastic model checking. 460-467 - Sam Fletcher, Adam Roegiest, Alexander K. Hudek:
Towards Protecting Sensitive Text with Differential Privacy. 468-475 - Yiping Teng, Weiyu Zhao, Chuanyu Zong, Li Xu, Chunlong Fan, Huan Wang:
Answering Why-not Questions on Top k Queries with Privacy Protection. 476-485 - Delin Chen, Peijia Zheng, Ziyang Chen, Ruopan Lai, Weiqi Luo, Hongmei Liu:
Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images. 486-493 - Gaëtan Pradel, Chris J. Mitchell:
Privacy-Preserving Biometric Matching Using Homomorphic Encryption. 494-505 - Andreas Abraham, Karl Koch, Stefan More, Sebastian Ramacher, Miha Stopar:
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation. 506-513 - Junkai Liu, Shihui Zheng, Lize Gu:
Effective Deep Learning-based Side-Channel Analyses Against ASCAD. 514-523 - Jianhua Li, Ximeng Liu, Jiong Jin, Shui Yu:
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge. 524-531 - Gaoyang Liu, Shijie Wang, Borui Wan, Zekun Wang, Chen Wang:
ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box Access. 532-539 - Bolun Wu, Yuanhang Xu, Futai Zou:
Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs. 540-547 - Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:
Automated Detection of Malware Activities Using Nonnegative Matrix Factorization. 548-556 - Yukun Cheng, Mengce Zheng, Fan Huang, Jiajia Zhang, Honggang Hu, Nenghai Yu:
A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack. 557-568 - Yuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang:
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities. 569-576 - Futai Zou, Dechao Meng, Wentao Gao, Linsen Li:
DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic. 577-586 - Andreas Grüner, Alexander Mühle, Christoph Meinel:
Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity. 587-597 - Susheng Wu, Bin Chen, Mingxu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang:
DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities. 598-605 - Genpei Liang, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang:
Malicious Packages Lurking in User-Friendly Python Package Index. 606-613 - Xianwen Deng, Ruijie Zhao, Zhi Xue, Ming Liu, Libo Chen, Yijun Wang:
A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs. 614-619 - Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:
Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. 620-626 - Qian Qiang, Mian Cheng, Yuan Zhou, Yu Ding, Zisen Qi:
MALUP: A Malware Classification Framework using Convolutional Neural Network with Deep Unsupervised Pre-training. 627-634 - Jiachao Zhang, Peiran Yu, Le Qi, Song Liu, Haiyu Zhang, Jianzhong Zhang:
FLDDoS: DDoS Attack Detection Model based on Federated Learning. 635-642 - Lin Wang, Kun Zhang, Chen Li, Bibo Tu:
Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust. 643-650 - Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. 651-658 - Shuaishuai Tan, Zhiyi Tian, Xiaoxiong Zhong, Shui Yu, Weizhe Zhang, Guozhong Dong:
A Novel Android Malware Detection Method Based on Visible User Interface. 659-666 - Chenglin Xie, Yujie Guo, Shaosen Shi, Yu Sheng, Xiarun Chen, Chengyang Li, Weiping Wen:
EnvFaker: A Method to Reinforce Linux Sandbox Based on Tracer, Filter and Emulator against Environmental-Sensitive Malware. 667-677 - Boru Liu, Dan Tang, Yudong Yan, Zhiqing Zheng, Shihan Zhang, Jiangmeng Zhou:
TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM. 678-685 - Chi Li, Min Zhou, Xinrong Han, Ming Gu:
Sensing Error Handling Bugs in SSL Library Usages. 686-692 - Mohammad Mamun, Kevin Shi:
DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning. 693-700 - Carlo Farinella, Ali Ahmed, Craig A. Watterson:
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility. 701-709 - George Grispos, Frank Tursi, Kim-Kwang Raymond Choo, William Mahoney, William Bradley Glisson:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. 710-717 - R. G. Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma:
Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data. 718-725 - Xiaoyu Wang, Xiaorui Gong, Lei Yu, Jian Liu:
MAAC: Novel Alert Correlation Method To Detect Multi-step Attack. 726-733 - Zeyi Li, Yun Wang, Pan Wang, Haorui Su:
PGAN: A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System. 734-741 - Huizi Wu, Shiyi Wang, Hui Fang:
LP-UIT: A Multimodal Framework for Link Prediction in Social Networks. 742-749 - Yuhua Ling, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang:
Cost-sensitive Heterogeneous Integration for Credit Card Fraud Detection. 750-757 - Jinli Li, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang:
Depression Detection Using Asynchronous Federated Optimization. 758-765 - Chengshang Hou, Junzheng Shi, Mingxin Cui, Qingya Yang:
Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack. 766-773 - Xiarun Chen, Qien Li, Zhou Yang, Yongzhi Liu, Shaosen Shi, Chenglin Xie, Weiping Wen:
VulChecker: Achieving More Effective Taint Analysis by Identifying Sanitizers Automatically. 774-782 - Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. 783-790 - Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu:
Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup. 791-801 - Qige Song, Yongzheng Zhang, Junliang Yao:
DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding. 802-809 - Dongrui Zeng, Ben Niu, Gang Tan:
MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies. 810-821 - Ruipeng Zhang, Mengjun Xie, Jiang Bian:
ReLF: Scalable Remote Live Forensics for Android. 822-831 - Chuanyun Wang, Guowei Yang, Dongdong Sun, Jiankai Zuo, Ershen Wang, Linlin Wang:
Frequency Domain Fusion Algorithm of Infrared and Visible Image Based on Compressed Sensing for Video Surveillance Forensics. 832-839 - Mihail Brinza, Miguel Correia, João Pereira:
Virtual Static Security Analyzer for Web Applications. 840-848 - Xulong Zhang, Frank Jiang, Ran Zhang, Shupeng Li, Yang Zhou:
Social Spammer Detection Based on Semi-Supervised Learning. 849-855 - Jingyi Li, Zikai Zhang, Yidong Li, Xinyue Guo, Huifang Li:
FIDS: Detecting DDoS Through Federated Learning Based Method. 856-862 - Chunlong Fan, Jici Zhang, Cailong Li, Zhenxin Zhang, Yiping Teng, Jianzhong Qiao:
Gray Adversarial Attack Algorithm based on Multi-Scale Grid Search. 863-870 - Ke Lv, Yuan Liu, Jienan Chen, Dongxia Wang, Zhihong Tian:
An Interactive System for Unfair Rating Detection Models in a Customized Perspective. 871-878 - Ling Wang, Cheng Zhang, Zejian Luo, Chenguang Liu, Jie Liu, Xi Zheng:
PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things. 879-886 - Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull, Francesco Schiliro, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. 887-894 - Jiwei Guan, Xi Zheng, Chen Wang, Yipeng Zhou, Alireza Jolfaei:
Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles. 895-902 - Changqing Gong, Zhaoyang Dong, Abdullah Gani, Han Qi:
Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted Data. 903-910 - Xiaoqing Wang, Chunping Wang, Kun Zhou, Hongbing Cheng:
ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin System. 911-918 - Wenqing Huang, Fei Hao, Guangyao Pang, Yifei Sun:
Complementary Context-Enhanced Concept Lattice Aware Personalized Recommendation. 919-926 - Salma Abdalla Hamad, Dai Hoang Tran, Quan Z. Sheng, Wei Emma Zhang:
BERTDeep-Ware: A Cross-architecture Malware Detection Solution for IoT Systems. 927-934 - Pengjie Zeng, Xiaoliang Wang, Liangzuo Dong, Xinhui She, Frank Jiang:
A Blockchain Scheme Based on DAG Structure Security Solution for IIoT. 935-943 - Bin Yuan, Shengyao Sun, Xianjun Deng, Deqing Zou, Haoyu Chen, Shenghui Li, Hai Jin:
Automatically derived stateful network functions including non-field attributes. 944-951 - Linshu Ouyang, Yongzheng Zhang:
Phishing Web Page Detection with HTML-Level Graph Neural Network. 952-958 - Changbo Tian, Yongzheng Zhang, Tao Yin:
A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process. 959-966 - Aijun Zhou, Xinghao Jiang, Zhaohong Li, Zhenzhen Zhang:
A HEVC Video Steganography Algorithm Based on DCT/DST Coefficients with Improved VRCNN. 967-975 - Huanyu Wu, Lunjie Li, Hye-Young Paik, Salil S. Kanhere:
MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System. 976-987 - Masaki Aota, Tao Ban, Takeshi Takahashi, Noboru Murata:
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization. 988-996 - Reyhan Duezguen, Peter Mayer, Benjamin Berens, Christopher Beckmann, Lukas Aldag, Mattia Mossano, Melanie Volkamer, Thorsten Strufe:
How to Increase Smart Home Security and Privacy Risk Perception. 997-1004 - Jianfang Wang, Zhiqiang Wu, Guang Chen, Detao Liu, Qiuling Zhang:
An Adaptive Multi-pairwise Ranking with Implicit Feedback for Recommendation. 1005-1012 - Daqian Liu, Weidong Bao, Bowen Fei, Xiaomin Zhu, Zhenliang Xiao, Tong Men:
Multi-UAV Cooperative Obstacle Avoidance and Surveillance in Intelligent Transportation. 1013-1020 - Yucheng Liu, Hao Wu, Xiangxue Li:
Another Look at the Connection between CAN Signal Ringing & In-Vehicle ECU Identification. 1021-1030 - Aiting Yao, Frank Jiang, Xuejun Li, Chengzu Dong, Jia Xu, Yi Xu, Gang Li, Xiao Liu:
A Novel Security Framework for Edge Computing based UAV Delivery System. 1031-1038 - Jianfeng Ma, Xiangxue Li, Haifeng Qian:
LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW. 1039-1048 - Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Reinforcement-Learning-based IDS for 6LoWPAN. 1049-1060 - Xiaojuan Yang, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Shu Fu, Baohua Qiang:
Accepted Influence Maximization under Linear Threshold Model on Large-Scale Social Networks. 1061-1068 - Peipei Fu, Qingya Yang, Yangyang Guan, Bingxu Wang, Gaopeng Gou, Zhen Li, Gang Xiong, Zhenzhen Li:
Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records. 1069-1076 - Jie Ma, Bin Qi, Kewei Lv:
BSA: Enabling Biometric-Based Storage and Authorization on Blockchain. 1077-1084 - Luyue Fang, Xiaoqiang Di, Xu Liu, Yiping Qin, Weiwu Ren, Qiang Ding:
QuickLogS: A Quick Log Parsing Algorithm based on Template Similarity. 1085-1092 - Cesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta, Ladislau Bölöni:
Energy Efficient Merkle Trees for Blockchains. 1093-1099 - Saed Alrabaee, Kim-Kwang Raymond Choo, Mohammad Qbea'h, Mahmoud Khasawneh:
BinDeep: Binary to Source Code Matching Using Deep Learning. 1100-1107 - Jiajia Li, Lingyun Zhang, Cancan Ni, Yunzhe An, Chuanyu Zong, Anzhen Zhang:
Efficient k Nearest Neighbor Query Processing on Public Transportation Network. 1108-1115 - Caciano Machado, Renan R. S. dos Santos, Carla Merkle Westphall:
Hop-by-hop Accounting and Rewards for Packet dIspAtching. 1116-1123 - Wei Yang Bryan Lim, Jer Shyuan Ng, Zehui Xiong, Sahil Garg, Yang Zhang, Dusit Niyato, Chunyan Miao:
Dynamic Edge Association in Hierarchical Federated Learning Networks. 1124-1131 - Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng:
Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. 1132-1140 - Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak:
TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains. 1141-1152 - Akshay M. Fajge, Subhasish Goswami, Arpit Srivastava, Raju Halder:
Wait or Reset Gas Price?: A Machine Learning-based Prediction Model for Ethereum Transactions' Waiting Time. 1153-1160 - Zhihan Fu, Qilin Fan, Xu Zhang, Xiuhua Li, Sen Wang, Yueyang Wang:
Policy Network Assisted Monte Carlo Tree Search for Intelligent Service Function Chain Deployment. 1161-1168 - Alexander Marsalek, Thomas Zefferer:
Compressing the Bitcoin Blockchain using Incremental Snapshots. 1169-1176 - Zhipeng Gao, Zijian Zhuang, Yijing Lin, Lanlan Rui, Yang Yang, Chen Zhao, Zijia Mo:
Select-Storage: A New Oracle Design Pattern on Blockchain. 1177-1184 - Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi:
A Deep Learning Model for Threat Hunting in Ethereum Blockchain. 1185-1190 - Swapnoneel Roy, Sam Matloob, Debajyoti Mukhopadhyay:
On Application of Blockchain to Enhance Single Sign-On (SSO) Systems. 1191-1195 - Cong Feng, Liang Tan, Huan Xiao, Xin Qi, Zheng Wen, Yang Liu:
EDKSAP : Efficient Double-Key Stealth Address Protocol in Blockchain. 1196-1201 - Xiaocong Li, Changshe Ma:
Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification. 1202-1207 - Lichao Zhang, Wangbin Li, Hailiang Ye:
A blind watermarking system based on deep learning model. 1208-1213 - Zhiyi Mo, Yutong Xing, Zizhen Peng:
Application of Bayesian Network Reasoning Algorithm in Emotion Classification. 1214-1219 - Huanlong Liu, Bin Jiang, Zhengjie Wang, Hongyu Peng:
An Measurement Method of Oblique Wedge Rubbing Surface Abrasion Based on Point Cloud. 1220-1226 - Venki Balasubramanian, Rehena Sulthana, Andrew Stranieri, G. Manoharan, Teena Arora, Ram Srinivasan, K. Mahalakshmi, Varun G. Menon:
A Secured Real-Time IoMT Application for Monitoring Isolated COVID-19 Patients using Edge Computing. 1227-1234 - Yang Liu, Ershen Wang, Song Xu, Zhi Wang, Meizhi Liu, Wansen Shu:
Simple Online Unmanned Aerial Vehicle Tracking with Transformer. 1235-1239 - Zhaoyun Ding, Lina Liu, Donghua Yu, Songping Huang, Hang Zhang, Kai Liu:
Detection of Anomaly User Behaviors Based on Deep Neural Networks. 1240-1245 - Yongxin Zhao, Wanqing Wu, Chaofan Di:
Release of Trajectory Data based on Space Segmentation using Differential Privacy. 1246-1253 - Zerui Fang, Shiyao Cui, Qing Su, Suzhen Wang:
An Implementation and Optimization Method of RTLS Based on UWB for Underground Mine. 1254-1258 - Yaling Zhang, Pengfei Feng, Yao Ning:
Random Forest Algorithm Based on Differential Privacy Protection. 1259-1264 - Huanlong Liu, Zhengjie Wang, Yao Chen, Hongyu Peng:
An axis extract method for rotational parts based on point cloud normal lines. 1265-1269 - Yajie Wang, Jinli Ma, Zhao Pei, Jun Li:
Human Trajectory Prediction Using Stacked Temporal Convolutional Network. 1270-1274 - Tianyu Zhao, Tao Zhang:
Revisiting Anonymity and Privacy of Bitcoin. 1275-1280 - Huanlong Liu, Zhengjie Wang, Bin Jiang, Hongyu Peng:
An inertia wheel pendulum control method based on actor-critic learning algorithm. 1281-1285 - M. Ridwanur Rahman, Ahmad Salehi S., Carsten Rudolph:
Decentralized Policy Information Points for Multi-Domain Environments. 1286-1293 - Aneta Poniszewska-Maranda, Lukasz Chomatek, Joanna Ochelska-Mierzejewska:
Secure Development Strategy Model Framework for Security of Mobile Applications. 1294-1299 - Yajie Wang, Zhiyang Wan, Zhao Pei, Chengcai Leng, Yuli Chen:
GEA-net: Global embedded attention neural network for image classification. 1300-1305 - Zhuo Yan, Bin Lan, Shaohao Chen, Senyu Yu, Xingwei Wang, Zhuoqun Fang, Wei Chen, Chuanyun Wang, Xiangbin Shi:
Design of Lightweight Intelligent Vehicle System Based on Hybrid Depth Model. 1306-1311 - Zhuo Yan, Xingwei Wang, Bin Lan, Senyu Yu, Shaohao Chen, Zhuoqun Fang, Chuanyun Wang, Wei Chen, Xiangbin Shi:
Improved NS Cellular Automaton Model for Simulating Traffic Flows of Two-Lane. 1312-1317 - Hao Liu, Zhenyu Guan, Peng Lei:
A Filter Rank Based Pruning Method for Convolutional Neural Networks. 1318-1322 - Qianyun Zhang, Shijie Li, Jiting Shi, Zhenyu Guan:
A TDOA-Assisted Direct Position Determination for Efficient Geolocalization Using LEO Satellites. 1323-1327 - Chaolun Wang, Yuan Liu, Pengwei Ma, Jiafeng Tian, Siyuan Liu, Minjing Zhong, Chunyu Jiang:
Research and implementation of an analytical database testing platform in telecommunication industry. 1328-1333 - Ke Xu, Miaoqiong Wang, Yuming Ge, Rundong Yu, Jian Wang, Jiachen Zhang:
C-V2X Large-scale Test Network Transmission Performance Data Analysis Method. 1334-1339 - Yuhan Liu, Yutao Zhang, Heng Zhang, Yongfeng Wang, Lianbo Song:
Design of Digital Maincenter Platform for Smart Home Based on Big Data. 1340-1344 - Yuanpeng Li, Yile Fan, Shuaijun Liu, LiXiang Liu, Wenge Yang:
Overview of Beam Hopping Algorithms in Large Scale LEO Satellite Constellation. 1345-1351 - Sujie Xu, Xin Hu, Libing Wang, Yin Wang, Weidong Wang:
Joint Power and Bandwidth Allocation for Internet of Vehicles Based on Proximal Policy Optimization Algorithm. 1352-1357 - Wei Wei, Yang Zhang, Zhongsheng Fan, Jinge Guo, Bao Guo, Huangtao Song:
NR Shared Spectrum efficiency and utilization analysis based on big data. 1358-1362 - Mingxin Li, Mingde Huo, Lexi Xu, Xinzhou Cheng, Xin Zhao:
Research and Application of Intelligent Antenna Feeder Optimization System based on Big Data. 1363-1368 - Pengwei Ma, Kai Wei, Chunyu Jiang, Junyi Li, Jiafeng Tian, Siyuan Liu, Minjing Zhong:
Research on Evaluation System of Relational Cloud Database. 1369-1373 - Xu Liu, Ruoyu Li, Penghao Yue:
Design and Implementation of Intelligent Operation and Maintenance System for Big Data Platform. 1374-1379 - Tingting Wang, Yao Zhou, Yushan Pei, Fuchang Li:
Research of Sharing and Compatibility for HIBS and Terrestrial Network in 900MHz. 1380-1385 - Hongyu Peng, Fujian Sun, Kan Wang, Tianlu Hao, Dequan Xiao, Lexi Xu:
A Non-Cooperative Data Center Energy Consumption Optimization Strategy Based on SDN Structure. 1386-1390 - Chen Cheng, Xinzhou Cheng, Yuting Zheng, Lijuan Cao, Yuhui Han, Yuwei Jia, Qingqing Zhang, Yi Zhang, Ya-nan Zhang, Lexi Xu:
A Novel Architecture and Algorithm for Prediction of Students Psychological Health based on Big Data. 1391-1396 - Binqi Cheng, Weijie Feng:
Analysis of the Application of Big Data in Banking Sector. 1397-1401 - Xu Liu, Dongxu Fang, Peng Xu:
Automated Performance Benchmarking Platform of IaaS Cloud. 1402-1405 - Dong Wang, Yue Che, Chao Li, Yahui Chen, Hui Yin, Chunlian Zhang:
Base Station Prediction Analysis Scheme Based on Lasso Regression Machine Learning Algorithm. 1406-1411 - Yinghe Wang, Yu Tang:
BRLR: A Routing Strategy for MANET Based on Reinforcement Learning. 1412-1417 - Chunyu Jiang, Jiafeng Tian, Pengwei Ma:
Databench-T: A Transactional Database Benchmark for Financial Scenarios. 1418-1421 - Heng Zhang, Yuhan Liu, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Wei Xia, Ciguang Yang:
Evaluation and Application of News Transmission Speed in New Media Environment. 1422-1427 - Zhaoning Wang, Bo Cheng, Junliang Chen:
Online Automatic Service Composition for Mobile and Pervasive Computing. 1428-1433 - Chunhui Zhang, Xiaoming Yuan, Qianyun Zhang, Guangxu Zhu, Lei Cheng, Ning Zhang:
Privacy-Preserving Neural Architecture Search Across Federated IoT Devices. 1434-1438 - Jifeng Liu, Yao Zhou, Yiying Niu, Tingting Wang, Tao Zhang, Fuchang Li:
Sharing and Compatibility Studies of EESS(active) and IMT System in 10-10.5 GHz. 1439-1444 - Zhipeng Gao, Chenhao Qiu, Chen Zhao, Yang Yang, Zijia Mo, Yijing Lin:
FedIM: An Anti-attack Federated Learning Based on Agent Importance Aggregation. 1445-1451 - Xingsi Xue, Haolin Wang, Yunmeng Zhao, Yikun Huang, Hai Zhu:
Matching Sensor Ontologies with Neural Network. 1452-1457 - Tao Zhang, Yi Qin, Qiang Li:
Trusted Artificial Intelligence: Technique Requirements and Best Practices. 1458-1462 - Mengjian Cai, Zhanli Sun, Xin Deng:
Multidimensional Observation of Blockchain Security. 1463-1466 - Yuefeng Liu, Wei Guo, Hanyu Zhang, Haodong Bian, Yingjie He, Xiaoyan Zhang, Yanzhang Gong, Jianmin Dong, Zhen Liu:
Construction of Knowledge Graph Based on Discipline Inspection and Supervision. 1467-1472 - Yuefeng Liu, Xiaoyan Zhang, Wei Guo, Haodong Bian, Yingjie He, Zhen Liu:
Prediction of remaining useful life of turbofan engine based on optimized model. 1473-1477 - Wei Shi, Mixue Deng, Dong Wang, Yuyun Yang, Deyin Li, Lirong Wang:
Design and Implementation of Scanning Electron Microscope Image Acquisition Software System. 1478-1482 - Jie Zhang, Jiaqi Yan, Jinxian Wang, Jie Xu, Yilong Zhao, Gangyin Luo:
Research on Droplet Digital PCR Amplification System. 1483-1487 - Lesong Zheng, Miao Zhang, Lishen Qiu, Gang Ma, Wenliang Zhu, Lirong Wang:
A multi-scale convolutional neural network for heartbeat classification. 1488-1492 - Duoduo Wang, Lishen Qiu, Wanyue Li, Wenliang Zhu, Lirong Wang:
An Automatic Algorithm for P/T-Wave Detection based on Auxiliary Waveform. 1493-1497 - Huimin Zhang, Lishen Qiu, Wenliang Zhu, Wenqiang Cai, Lirong Wang:
Automated Classification of Atrial Fibrillation and Atrial Flutter in ECG Signals based on Deep Learning. 1498-1502 - Yuhang Chen, Wenchang Xu, Wenliang Zhu, Gang Ma, Xiaohe Chen, Lirong Wang:
Beat-to-beat Heart Rate Detection Based on Seismocardiogram Using BiLSTM Network. 1503-1507 - Yuhui Han, Chen Cheng, Xinzhou Cheng, Lexi Xu, Yuchao Jin, Yuwei Jia, Jie Gao:
A new algorithm for demographic expansion based on multi-scene differentiated communication data. 1508-1513 - Ming Gao, Xiaokun Yu, Lei Ren, Hongxiang Cai, Zhiyong Wang, Yuyang Zhou:
A Renewable Energy Certificate Trading System Based on Blockchain. 1514-1518 - Yuwei Jia, Kun Chao, Xinzhou Cheng, Jian Guan, Lijuan Cao, Yi Li, Chen Cheng, Yuchao Jin, Lexi Xu:
A Hybrid User Recommendation Scheme Based on Collaborative Filtering and Association Rules. 1519-1524 - Lijuan Cao, Xinzhou Cheng, Lexi Xu, Chen Cheng, Yi Li, Yuwei Jia, Chuntao Song, Heng Zhang:
Preference Recommendation Scheme based on Social Networks of Mobile Users. 1525-1530 - Yuchao Jin, Yi Li, Deyi Li, Xinzhou Cheng, Lexi Xu, Yuhui Han:
Cell Boundary Prediction and Base Station Location Verification based on Machine Learning. 1531-1536 - Jinge Guo, Yang Zhang, Zhongsheng Fan, Wei Wei, Bao Guo, Huangtao Song:
Investigation on Multi-Antenna Technologies Evolution from FDD LTE to NR FDD. 1537-1541 - Mingxin Li, Mingde Huo, Xinzhou Cheng, Lexi Xu, Xiaojing Liu, Rui Yang:
Joint Offloading Decision and Resource Allocation of 5G Edge Intelligent Computing for Complex Industrial Application. 1542-1547 - Yiying Niu, Yao Zhou, Tao Zhang, Fuchang Li:
Study on TDD Unsynchronized Interference from Outdoor to Indoor Scenario in 3.3-3.6 GHz. 1548-1553 - Shiyu Zhou, Jie Miao, Xiqing Liu, Xinzhou Cheng, Zhenqiao Zhao, Xin Zhao:
Fault Diagnosis of 5G Voice Service Based on Multi-sources data. 1554-1558 - Xiqing Liu, Hongshui Jing, Shiyu Zhou, Zhenqiao Zhao, Xinzhou Cheng, Lexi Xu:
Key technologies for 5G co-construction and shared base station data automatic configuration. 1559-1563 - Zhuo Wang, Kai Wei, Chunyu Jiang, Jiafeng Tian, Minjing Zhong, Yuan Liu, Yanmei Liu:
Research on Productization and Development Trend of Data Desensitization Technology. 1564-1569 - Wenliang Zhu, Gang Ma, Yuhang Chen, Lishen Qiu, Lesong Zheng, Lirong Wang:
A Novel Method for Detecting Noise Segments in ECG Signals. 1570-1574 - Jithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph:
Authentication and Access Control in 5G Device-to-Device Communication. 1575-1582 - Weifeng Sun, Yiming Wang, Kangkang Chang, Kelong Meng:
IdiffGrad: A Gradient Descent Algorithm for Intrusion Detection Based on diffGrad. 1583-1590
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.