


default search action
ICCSIE 2023: Putrajaya, Malaysia
- Proceedings of the 8th International Conference on Cyber Security and Information Engineering, ICCSIE 2023, Putrajaya, Malaysia, September 22-24, 2023. ACM 2023
- Lan Zheng
, Lei Liu
:
Chaotic Digital Image Encryption Based on Fourier Transform. 1-7 - Wei Yang
, Chenming Chang
:
SmartGate: Accelerate Cloud Gateway with SmartNIC. 8-14 - Junkai Wang
, Deng Zhang
, Hanjun Gao
:
Structure and key technologies of nuclear power plant network security situational awareness platform. 15-22 - Chao Lv
, Kaisheng Zhang
:
A Research of Improved Facial Expression Recognition Method Based on CBAM and Joint-normalization Techniques. 23-30 - Yun Zhu
, Wenxiang Xu
:
Research on Multi-level Trust Mechanism of Internet of Things. 31-36 - Xiaojie Xie, Gang Yang, Lei An, Yun Ren, Xiao Wu, Xin Tong, Yanhua He, Xiaojie Chen:
Research on Substation Quantum Secure Communication System Based on 5G Private Network Technology. 37-44 - Xiaomei Liu
, Yujing Cao
:
Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural Network. 45-51 - Yi Cai
, Mingsheng Feng
:
A Time-bound Data Access Control Scheme based on Attribute-based Encryption. 52-56 - Lixuan Zhu
, Bin Xu
:
Robust watermarking based on dual-random phase encryption against collusion attacks. 57-64 - Ru Han
, Jin Xu
:
Research Progress of Location Privacy Protection Technology in the Internet Era. 65-72 - Zhen Wang
:
The Application and Practice of Computer Network Security Technology in Electronic Information Engineering. 73-77 - Lili Wang
, Wei Chen
, Haoliang Wang
:
Data Visualization Analysis for Job Recruitment Based on Big Data. 78-83 - Yuanshi Deng
, Zhengwei Chang
, Jun Zhao
, Wei Pu
, Xuanwen Ding
, Ran Zhang
, Hongyan Wang
, Xiaopei Guo
, Hongqiang Gong
:
Tag Anti-collision Algorithm for RFID in Underdetermined States Based on Local Sparse Constraints. 84-90 - Zhijiang Zhang
, Yanyong Zhang
, Zhibing Wang
:
Bixi: A EB-level Object Storage System Based on CEPH. 91-96 - Fuzhong Hao
, Lei Liang
, Nuannuan Li
, Linhai Mu
, Haiyan Zhi
:
Bluetooth AOA Localization Technology Based on LS and MUSIC Algorithms. 97-102 - Hongwei Niu
, Lixuan Zhu
:
Adaptive Motion Compensation and Quantized Embedded Watermarking Against Collusion Attacks. 103-110 - Xiangming Ni
, Yuhong Zhao
, Yue Yao
:
Dynamic Heterogeneous Link Prediction Based on Hierarchical Attention Model. 111-115 - Yingying Zhang
, Yue Shi
:
Constructing Dynamic Honeypot Using Machine Learning. 116-120 - Jingli Han
, Qing Xia
, Zhaoli Wang
:
Access Control Management of Information System based on Homomorphism and Blockchain Technology. 121-125 - Huizhong Liu
, Suli Ge
, Gaifang Tan
, Song Tang
:
Research on Application of Identity Authentication Encryption Technology in Blockchain Scene. 126-129 - Jixin Wei
, Yanzhen Huang
:
A K-means Algorithm for Blockchain the Construction of Data Privacy Security Monitoring System. 130-134 - Chenyu Yang
, Rong Fei
, Junxuan Shi
:
Improved Indoor Location Algorithm of Multilayer Perceptron based on RSSI. 135-141 - Siyao Wen
, Dandan Li
, Junlong Yuan
, Jingbin Huang
, Long Zhou
:
Design and Implementation of a Game Session Plugin based on Unreal Engine. 142-149 - Liansuo Wei, Shenhao Huan
, Longyu Ma
:
A Topology Control Algorithm based on Theil's Entropy lmproved Potential Game for Wireless Sensor Networks. 150-158 - Yaowen Sun
:
FL Intelligent Wireless Network Optimization System. 159-165 - Xibin Sun
, Wenting Li
, Jiwei Qiu
, Di Han
:
A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection. 166-170 - Feng Li
, Guangyue Jia
, Chengbo Liu
:
Design of RFID Data Acquisition System for Manufacturing Execution Systems. 171-176 - Yingzhuo Zhang
, Minghua Wang
, Haochen Shi
, Jingheng Zhang
:
Data Cooperative Transmission and Resource Allocation Algorithm in Aviation Communication. 177-182 - Qing Xia
, Jingli Han
, Zhaoli Wang
:
An Extensible and Traceable Data Operation Recording System Architecture and Method. 183-187 - Xin Ye
, Shimin Wang
, Han Wang
, Qinwei Wei
, Ting Yang
, Yu Tao
:
Application of Knowledge Graph in Financial Information Security Strategy. 188-192 - Baizheng Wang
, Qiang Zhang
, Wen Shao
, Kexun He
, Xiyu Fang
, Xuebin Shao
:
A Network Security Test Evaluation Model of Automobile Digital Key. 193-199 - Yang Yang
, Juxing Di
, Wencheng Zhang
, Fumei Yu
:
Anomalous Traffic Detection in Campus Networks based on NetFlow and CNN. 200-203 - Wenjing Chen
, Jingyi Liu
:
Research and Implementationof National Commercial Cryptographic Algorithms. 204-210 - Canyu Huang
, Dongwei Zhang
, Yingzhuo Zhang
:
NEMO Routing Optimization for Aviation Communication Based on Simulated Annealing Algorithm. 211-216 - Yuchuan Yang
, Fan Xu
, Bin Yin
, Wanyu Li
, Xiaochen Fan
, Yiwen Hu
:
Application of Network Data Transmission Module Based on Advance Planning in Aerospace Measurement and Control Simulation Field. 217-221 - Zhaoyang Liu
, Ru Xue
:
The EEG Signal Encryption Scheme Based on Hyperchaotic System and Identity Authentication. 222-229 - Jian Kang
, Xiaodi Suo
, Lu Liu
, Xunshi Wang
, Zhengjun He
, Jinjun Chen
:
Research on All-Digital Simulation Method for OTN Optical Signal Fault. 230-235 - Zhengwei Chang
, Yuanshi Deng
, Xuanwen Ding
, Wei Pu
, Fuxiang Li
, Lin Yang
, Jun Zhao
, Hongyan Wang
:
Safety Equipment Management of cabinet Based on Intelligent Information Processing Technology. 236-246 - Jianping Zhao, Huan Wang, Yichuan Wang, Hua Li, Yan Wang:
Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning. 247-254 - Yiting Yin
, Jingxu Zhang
, Liping Zhu
, Guodong Li
:
Research on Sensitive Frame Recognition Algorithm for Home Monitoring Video Based on Mixture of Gaussians Background Modeling. 255-261 - Jipeng Zhou
:
Frequency-domain Generative Adversarial Image Super-Resolution Algorithm Based on Phase Attention Loss. 262-268 - Xiuxia Zhang
, Dongyuan Xing
, Shuyi Wei
:
Simulation of Light Source Layout Characteristics for Tunnel Visible Light Communication. 269-273 - Xiaolong Li
, Zhenhua Yan
, Shuang Zhang
, Xinghua Li
, Feng Wang
:
Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion. 274-281 - Hao Zhou
, Zhiwei Sheng
:
A Federated Learning based Botnet Detection Method for Industrial Internet of Things. 282-288 - Boyi Zheng
, Tao Li
, Wenxia Xu
, Liping Zhu
:
Design and Application of Chaos Algorithm based on the Sprott-B System. 289-294 - Fengli Sun
, Yan Wang
:
Multi-image Multiplexing Pixel Synchronization Encryption based on Optical Scanning Holography. 295-301 - Hao Xu
, Haoning Chen
, Ying Nie
, Yilin Li
:
Research on Power Intrusion Protection System Architecture Based on Edge Computing Nodes. 302-306 - Qi Liu
, Sunqing Xu
:
Weak signal detection technology based on improved background noise subtraction. 307-313 - Mengting Liu
:
Application of Image Sharing and Encryption Based on Visual Cryptography in Networking Systems of AI. 314-318 - Jun Zhao
, Qi Liu
:
Research on noise source localization technology based on improved DCS-SOMP algorithm. 319-327 - Wen Li
:
Trustless Layer for Secure Fog Computing. 328-334 - Dongya Xiao
, Mingda Li
, Zheng Xu
:
Performance Analysis of Different Intensity Modulation Techniques over Weak Turbulence Channel. 335-340 - Qi Wu
, Shuo Wen
, Boliang Liu
:
A Method for Identifying Encrypted Webshell Traffic. 341-349 - Wei Sun
, Yu Wang
, Junjie Ma
, Xin Wang
, Weihao Shi
, Fei Jiao
, Ningbo Liu
:
Data Privacy Protection and Sharing in Smart Grid Based on Blockchain Technology. 350-355 - Xing Zhao
, Jie Heng
, Qian Sun
:
Research on Network Intrusion Simulation and Adversarial Strategies Based on Generate Adversarial Networks. 356-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.