


default search action
Security and Communication Networks, Volume 2021
Volume 2021, 2021
- Changguang Wang
, Ziqiu Zhao, Fangwei Wang
, Qingru Li
:
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet. 6658842:1-6658842:16 - Zhifei Wang
, Gang Xu
, Na Zhang, Zhihan Qi, Fengqi Wei, Liqiang He:
Ferry Node Identification Model for the Security of Mobile Ad Hoc Network. 6682311:1-6682311:13 - Hui Li, Limin Shen
, Yuying Wang, Jiayin Feng, Honglei Tan, Zhiming Li:
Risk Measurement Method of Collusion Privilege Escalation Attacks for Android Apps Based on Feature Weight and Behavior Determination. 8814844:1-8814844:18 - Xin Li
, Peng Yi
, Wei Wei, Yiming Jiang, Le Tian
:
LNNLS-KH: A Feature Selection Method for Network Intrusion Detection. 8830431:1-8830431:22 - Yawei Yue, Shancang Li
, Phil Legg
, Fuzhong Li
:
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. 8873195:1-8873195:13 - Shichang Ding
, Fan Zhao
, Xiangyang Luo
:
A Street-Level IP Geolocation Method Based on Delay-Distance Correlation and Multilayered Common Routers. 6658642:1-6658642:11 - Tao Feng, Xusheng Wang
, Chunyan Liu, Junli Fang:
Secure Data Collaborative Computing Scheme Based on Blockchain. 6630291:1-6630291:9 - Menghui Lou
, Xiaolei Dong
, Zhenfu Cao
, Jiachen Shen
:
SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. 8884478:1-8884478:18 - Khalid M. Al-Gethami
, Mousa T. Al-Akhras
, Mohammed Alawairdhi
:
Empirical Evaluation of Noise Influence on Supervised Machine Learning Algorithms Using Intrusion Detection Datasets. 8836057:1-8836057:28 - Youxia Dong, Xiaoling Huang
, Qixiang Mei, Yuanju Gan:
Self-Adaptive Image Encryption Algorithm Based on Quantum Logistic Map. 6674948:1-6674948:12 - Yajing Hao, Xinrong Yan, Jianbin Wu
, Huijun Wang, Linfeng Yuan:
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association. 6628034:1-6628034:12 - (Withdrawn) Anticoncept Drift Method for Malware Detector Based on Generative Adversarial Network. 6644107:1-6644107:12
- Juhong Namgung, Siwoon Son
, Yang-Sae Moon
:
Efficient Deep Learning Models for DGA Domain Detection. 8887881:1-8887881:15 - Zhenwei Chen
, Axin Wu
, Yifei Li
, Qixuan Xing
, Shengling Geng
:
Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing. 6619689:1-6619689:11 - Tao Zhang
, Xiongfei Song
, Lele Zheng, Yani Han, Kai Zhang
, Qi Li:
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing. 6679157:1-6679157:14 - Sivleen Kaur, Sheetal Chaturvedi, Aabha Sharma, Jayaprakash Kar
:
A Research Survey on Applications of Consensus Protocols in Blockchain. 6693731:1-6693731:22 - Zhengguo Wu, Kai Zhang, Yannan Ren, Jing Li, Jiande Sun, Wenbo Wan
:
Visual Security Assessment via Saliency-Weighted Structure and Orientation Similarity for Selective Encrypted Images. 6675354:1-6675354:16 - Suleyman Alterkavi
, Hasan Erbay
:
Design and Analysis of a Novel Authorship Verification Framework for Hijacked Social Media Accounts Compromised by a Human. 8869681:1-8869681:12 - Chongzhen Zhang, Yanli Chen, Yang Meng, Fangming Ruan
, Runze Chen, Yidan Li, Yaru Yang:
A Novel Framework Design of Network Intrusion Detection Based on Machine Learning Techniques. 6610675:1-6610675:15 - Jiasheng Qu, Wei Song
, Xiangchun Liu, Lizhi Zhao, Xiaobing Zhao:
A Novel Improved Reversible Visible Image Watermarking Algorithm Based on Grad-CAM and JND. 6652897:1-6652897:17 - Tao Wang
, Hongchang Chen:
A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies. 6688489:1-6688489:23 - Xiaokang Xiong
, Yuhang Dai
, Zhuhua Hu
, Kejia Huo
, Yong Bai
, Hui Li
, Dake Liu
:
Hardware Sharing for Channel Interleavers in 5G NR Standard. 8872140:1-8872140:13 - Diqun Yan
, Mingyu Dong, Jinxing Gao:
Exposing Speech Transsplicing Forgery with Noise Level Inconsistency. 6659371:1-6659371:6 - Shiyue Qin
, Zhenhua Tan
, Fucai Zhou
, Jian Xu
, Zongye Zhang:
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks. 6629726:1-6629726:14 - Lei Du, Songsong Dai
, Haifeng Song
, Yuelong Chuang, Yingying Xu:
Weighted Nuclear Norm Minimization on Multimodality Clustering. 6662989:1-6662989:7 - Zixuan Shen
, Zhihua Xia
, Peipeng Yu
:
PLDP: Personalized Local Differential Privacy for Multidimensional Data Aggregation. 6684179:1-6684179:13 - Shengxu Xie
, Chang-you Xing
, Guomin Zhang
, Jinlong Zhao
:
A Table Overflow LDoS Attack Defending Mechanism in Software-Defined Networks. 6667922:1-6667922:16 - Parimah Ziayi, Seyed Mostafa Farmanbar, Mohsen Rezvani
:
YAICD: Yet Another IMSI Catcher Detector in GSM. 8847803:1-8847803:13 - Chuqiao Xiao
, Xueqing Gong
, Yefeng Xia
, Qian Zhang
:
PB: A Product-Bitmatrix Construction to Reduce the Complexity of XOR Operations of PM-MSR and PM-MBR Codes over GF 2 w. 6642121:1-6642121:18 - Asad Ullah, Jing Wang
, Muhammad Shahid Anwar
, Arshad Ahmad
, Shah Nazir
, Habib Ullah Khan
, Zesong Fei:
Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition. 6673992:1-6673992:12 - Suliman A. Alsuhibany
:
A Camouflage Text-Based Password Approach for Mobile Devices against Shoulder-Surfing Attack. 6653076:1-6653076:11 - Rahul Johari
, Sawan Kalra
, Sonika Dahiya
, Kalpana Gupta
:
S2NOW: Secure Social Network Ontology Using WhatsApp. 7940103:1-7940103:21 - Tsu-Yang Wu
, Tao Wang
, Yu-Qi Lee
, Weimin Zheng
, Saru Kumari
, Sachin Kumar
:
Improved Authenticated Key Agreement Scheme for Fog-Driven IoT Healthcare System. 6658041:1-6658041:16 - Zhe Ren
, Xinghua Li
, Qi Jiang
, Qingfeng Cheng
, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. 6694058:1-6694058:19 - Kaiqing Huang
, Xueli Wang, Zhiqiang Lin:
Practical Multiauthority Attribute-Based Access Control for Edge-Cloud-Aided Internet of Things. 8872699:1-8872699:22 - Fei Zhang
, Aisuo Jin, Yin Hu:
Two-Dimensional DOA Estimation of MIMO Radar Coherent Source Based on Toeplitz Matrix Set Reconstruction. 6631196:1-6631196:9 - Sooyong Jeong
, Cheolhee Park
, Dowon Hong
, Changho Seo
, Nam-Su Jho
:
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. 6680782:1-6680782:12 - Jingwei Wang
, Xinchun Yin
, Jianting Ning:
Fine-Grained Task Access Control System for Mobile Crowdsensing. 6682456:1-6682456:13 - Jie Zeng, Chunhua Wang
:
A Novel Hyperchaotic Image Encryption System Based on Particle Swarm Optimization Algorithm and Cellular Automata. 6675565:1-6675565:15 - Mansoor Fateh
, Mohsen Rezvani
, Yasser Irani
:
A New Method of Coding for Steganography Based on LSB Matching Revisited. 6610678:1-6610678:15 - Zhongguo Yang
, Irshad Ahmed Abbasi
, Elfatih Elmubarak Mustafa
, Sikandar Ali
, Mingzhu Zhang:
An Anomaly Detection Algorithm Selection Service for IoT Stream Data Based on Tsfresh Tool and Genetic Algorithm. 6677027:1-6677027:10 - Juan Tang
, Hualu Xu
, Pengsen Cheng
, Jiayong Liu
, Cheng Huang
, Xun Tang
:
Zombie Follower Recognition Based on Industrial Chain Feature Analysis. 6656470:1-6656470:12 - (Withdrawn) Network Teaching Technology Based on Big Data Mining and Information Fusion. 6629563:1-6629563:9
- Yuqing Zhong
, Zhaohua Li
, Liping Liao
:
A Privacy-Preserving Caching Scheme for Device-to-Device Communications. 6696149:1-6696149:8 - Hongwei Luo
, Yijie Shen
, Feng Lin
, Guoai Xu
:
Spoofing Speaker Verification System by Adversarial Examples Leveraging the Generalized Speaker Difference. 6664578:1-6664578:10 - Jonathan Jen-Rong Chen, Yi-Yuan Chiang, Wang-Hsin Hsu, Wen-Yen Lin
:
Fail-Stop Group Signature Scheme. 6693726:1-6693726:6 - Iram Javed
, Xianlun Tang, Kamran Shaukat
, Muhammad Umer Sarwar, Talha Mahboob Alam
, Ibrahim A. Hameed
, Muhammad Asim Saleem
:
V2X-Based Mobile Localization in 3D Wireless Sensor Network. 6677896:1-6677896:13 - Xinzhi Feng
, Yang Yang
, Xiaozhong Qi, Chunming Xu, Ze Ji
:
Output Feedback NCS of DoS Attacks Triggered by Double-Ended Events. 6643034:1-6643034:14 - Zishuai Cheng
, Baojiang Cui
, Tao Qi
, Wenchuan Yang
, Junsong Fu
:
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure. 6661124:1-6661124:11 - Yi-Fan Tseng, Zi-Yuan Liu
, Jen-Chieh Hsu, Raylin Tso:
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function. 6678194:1-6678194:12 - Zhonghua Wang
, Siwei Duan, Chengli Sun:
Infrared Small Target Detection Method Combined with Bilateral Filter and Local Entropy. 6661852:1-6661852:10 - Jinxiong Zhao
, Xun Zhang, Fuqiang Di, Sensen Guo, Xiaoyu Li, Xiao Jing, Panfei Huang, Dejun Mu:
Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective. 6699108:1-6699108:14 - Zitian Liao
, Shah Nazir
, Habib Ullah Khan
, Muhammad Shafiq
:
Assessing Security of Software Components for Internet of Things: A Systematic Review and Future Directions. 6677867:1-6677867:22 - Xin Tang
, Linna Zhou
, Bingwei Hu
, Haowen Wu
:
Aggregation-Based Tag Deduplication for Cloud Storage with Resistance against Side Channel Attack. 6686281:1-6686281:15 - Daiki Yamakawa
, Takashi Okimoto
, Songpon Teerakanok
, Atsuo Inomata
, Tetsutaro Uehara
:
Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA. 6610863:1-6610863:14 - Shuaijianni Xu
:
An Efficient HPRA-Based Multiclient Verifiable Computation: Transform and Instantiation. 6612614:1-6612614:18 - Aodi Liu
, Xuehui Du
, Na Wang
:
Efficient Access Control Permission Decision Engine Based on Machine Learning. 3970485:1-3970485:11 - Maria Azees
, Pandi Vijayakumar
, Lazarus Jegatha Deborah
, Marimuthu Karuppiah
, Mary Subaja Christo
:
BBAAS: Blockchain-Based Anonymous Authentication Scheme for Providing Secure Communication in VANETs. 6679882:1-6679882:11 - (Withdrawn) Statistical Modeling and Simulation of Online Shopping Customer Loyalty Based on Machine Learning and Big Data Analysis. 5545827:1-5545827:12
- Daoqi Han
, Songqi Wu, Zhuoer Hu, Hui Gao, Enjie Liu, Yueming Lu
:
A Novel Classified Ledger Framework for Data Flow Protection in AIoT Networks. 6671132:1-6671132:11 - Yan Wang, Jixin Li, Wansheng Liu, Aiping Tan
:
Efficient Concurrent Execution of Smart Contracts in Blockchain Sharding. 6688168:1-6688168:15 - (Withdrawn) Research on Digital Economy and Human Resources Based on Fuzzy Clustering and Edge Computing. 5583967:1-5583967:8
- Lejun Gong
, Xingxing Zhang, Tianyin Chen, Li Zhang:
Recognition of Disease Genetic Information from Unstructured Text Data Based on BiLSTM-CRF for Molecular Mechanisms. 6635027:1-6635027:8 - Youxia Dong, Xiaoling Huang
, Guodong Ye
:
Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. 6677325:1-6677325:16 - (Withdrawn) Research on Accounting Intelligence System Modeling of Financial Performance Evaluation. 5550382:1-5550382:9
- Deepak Prashar, Nishant Jha
, Muhammad Shafiq
, Nazir Ahmad, Mamoon Rashid
, Shoeib Amin Banday, Habib Ullah Khan
:
Blockchain-Based Automated System for Identification and Storage of Networks. 6694281:1-6694281:7 - Li-Hua Gong, Jin Du, Jing Wan, Nan-Run Zhou
:
Image Encryption Scheme Based on Block Scrambling, Closed-Loop Diffusion, and DNA Molecular Mutation. 6627005:1-6627005:16 - Bingbing Jiang
:
Two-Party Secure Computation for Any Polynomial Function on Ciphertexts under Different Secret Keys. 6695304:1-6695304:7 - Hongtao Li
, Feng Guo
, Lili Wang, Jie Wang, Bo Wang, Chuankun Wu:
A Blockchain-Based Public Auditing Protocol with Self-Certified Public Keys for Cloud Data. 6623639:1-6623639:10 - Ping Yu
, Wei Ni, Guangsheng Yu, Hua Zhang
, Ren Ping Liu, Qiaoyan Wen
:
Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks. 6638453:1-6638453:14 - Li Miao
, Shuai Li:
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT. 8896715:1-8896715:11 - Fengyin Li
, Pei Ren
, Guoyu Yang
, Yuhong Sun
, Yilei Wang
, Yanli Wang
, Siyuan Li
, Huiyu Zhou
:
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things. 6670847:1-6670847:16 - Lee Mariel Heucheun Yepdia
, Alain Tiedeu
, Guillaume Kom
:
A Robust and Fast Image Encryption Scheme Based on a Mixing Technique. 6615708:1-6615708:17 - Jia Fan, Lanfei Qiao
, Yunfei Cao, Shanglin Liu, Wenke Zhang, Lin Tang:
A New Password- and Position-Based Authenticated Key Exchange. 6613392:1-6613392:9 - Tsu-Yang Wu
, Lei Yang
, Zhiyuan Lee
, Chien-Ming Chen
, Jeng-Shyang Pan
, SK Hafizul Islam
:
Improved ECC-Based Three-Factor Multiserver Authentication Scheme. 6627956:1-6627956:14 - Junyi He, Junnan Zhang
, Cheng Song
, Mengxiang Wu
:
Spectral Efficiency of the Multiway Massive System over Rician Fading Channels. 6618363:1-6618363:8 - Binjie Chen
, Fushan Wei
, Chunxiang Gu
:
Bitcoin Theft Detection Based on Supervised Machine Learning Algorithms. 6643763:1-6643763:10 - Ahmad Alanezi
, Bassem Abd-El-Atty
, Hoshang Kolivand
, Ahmed A. Abd El-Latif
, Basma Abd El-Rahiem, Syam Sankar, Hany S. Khalifa
:
Securing Digital Images through Simple Permutation-Substitution Mechanism in Cloud-Based Smart City Environment. 6615512:1-6615512:17 - Jie Ling
, Junwei Chen
, Jiahui Chen
, Wensheng Gan
:
Multiauthority Attribute-Based Encryption with Traceable and Dynamic Policy Updating. 6661450:1-6661450:13 - Wenyan Pan
, Meimin Wang
, Jiaohua Qin
, Zhili Zhou
:
Improved CNN-Based Hashing for Encrypted Image Retrieval. 5556634:1-5556634:8 - Songjie Wei
, Zedong Zhang, Shasha Li, Pengfei Jiang:
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection. 6695858:1-6695858:10 - Jiawei Zhang
, Jianfeng Ma, Teng Li
, Qi Jiang
:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. 6646445:1-6646445:17 - Mengmeng Cui
, Yiming Fei
, Yin Liu
:
A Survey on Secure Deployment of Mobile Services in Edge Computing. 8846239:1-8846239:8 - Teng Li
, Jiawei Zhang
, Yangxu Lin, Shengkai Zhang, Jianfeng Ma:
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things. 6689448:1-6689448:13 - Yuting Li
, Qingfeng Cheng
, Wenbo Shi:
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. 5573886:1-5573886:6 - Hira Nazir
, Imran Sarwar Bajwa
, Muhammad Samiullah
, Waheed Anwar
, Muhammad Moosa
:
Robust Secure Color Image Watermarking Using 4D Hyperchaotic System, DWT, HbD, and SVD Based on Improved FOA Algorithm. 6617944:1-6617944:17 - (Withdrawn) Analysis of Characteristics of Tennis Singles Matches Based on 5G and Data Mining Technology. 5549309:1-5549309:9
- (Withdrawn) Research on Transmission Line Fault Location Based on the Fusion of Machine Learning and Artificial Intelligence. 6648257:1-6648257:8
- Yidong Yuan, Yao Zhang
, Yiqiang Zhao, Xige Zhang, Ming Tang
:
Process Variation-Resistant Golden-Free Hardware Trojan Detection through a Power Side Channel. 8839222:1-8839222:15 - Jiantao Shi
, Xiangzhan Yu
, Zechao Liu
:
Nowhere to Hide: A Novel Private Protocol Identification Algorithm. 6672911:1-6672911:10 - Wenfa Qi
, Yuxin Liu
, Sirui Guo
, Xiang Wang
, Zongming Guo
:
An Adaptive Visible Watermark Embedding Method based on Region Selection. 6693343:1-6693343:11 - Peijun Zhang
, Lianhai Wang
, Wei Wang
, Kunlun Fu
, Jinpeng Wang
:
A Blockchain System Based on Quantum-Resistant Digital Signature. 6671648:1-6671648:13 - Tongchen Shen
, Fuqun Wang
, Kefei Chen, Zhonghua Shen, Renjun Zhang:
Compressible Multikey and Multi-Identity Fully Homomorphic Encryption. 6619476:1-6619476:14 - Wei Yang
, Anni Jia:
Side-Channel Leakage Detection with One-Way Analysis of Variance. 6614702:1-6614702:13 - (Withdrawn) Research on the Performance of Impressionist Painting Color Visual Communication Based on Wireless Communication and Machine Vision. 5511252:1-5511252:6
- Jianan Zhao
, Ruwei Huang
, Bo Yang
:
Efficient GSW-Style Fully Homomorphic Encryption over the Integers. 8823787:1-8823787:13 - (Withdrawn) An Exploratory Research on Constructing a Model of Innovation and Entrepreneurship Education for College Students Based on Fuzzy Neural Network Algorithm. 5533376:1-5533376:8
- Chirag Sharma
, Bagga Amandeep
, Rajeev Sobti
, Tarun Kumar Lohani
, Mohammad Shabaz
:
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption. 5536170:1-5536170:19 - Pengcheng He
, Kehui Sun
, Congxu Zhu
:
A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture. 6679288:1-6679288:16 - Jie Yang
, Xinsheng Ji, Kaizhi Huang
, Xiaoli Sun, Yi Wang:
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface. 8836757:1-8836757:12 - Yihang Song
, Songfan Li
, Chong Zhang
, Li Lu
:
A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme. 6668498:1-6668498:15 - Yuanju Gan
:
A Fully Adaptively Secure Threshold Signature Scheme Based on Dual-Form Signatures Technology. 6697295:1-6697295:11 - Yang Qiao
, Yunjie Tian
, Yue Liu
, Jianbin Jiao
:
Genetic Feature Fusion for Object Skeleton Detection. 6621760:1-6621760:9 - (Withdrawn) Research on the Credibility of Social Media Information Based on User Perception. 5567610:1-5567610:10
- Yunzhe Tian
, Jiqiang Liu
, Endong Tong
, Wenjia Niu
, Liang Chang
, Qi Alfred Chen
, Gang Li
, Wei Wang
:
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure. 6631247:1-6631247:13 - Zhongguo Yang
, Irshad Ahmed Abbasi
, Fahad Algarni
, Sikandar Ali
, Mingzhu Zhang:
An IoT Time Series Data Security Model for Adversarial Attack Based on Thermometer Encoding. 5537041:1-5537041:11 - Ricardo Ávila
, Raphaël Khoury
, Richard Khoury
, Fábio Petrillo
:
Use of Security Logs for Data Leak Detection: A Systematic Literature Review. 6615899:1-6615899:29 - Zhen Zhang
, Bing Guo, Yan Shen, Chengjie Li
, Xinhua Suo, Hong Su
:
Nakamoto Consensus to Accelerate Supervised Classification Algorithms for Multiparty Computing. 6629433:1-6629433:11 - Muhua Liu
, Lin Wang
, Qingtao Wu
, Jianqiang Song
:
Distributed Functional Signature with Function Privacy and Its Application. 6699974:1-6699974:14 - Wenfeng Xu
, Yongxian Fan
, Changyong Li
:
I2DS: Interpretable Intrusion Detection System Using Autoencoder and Additive Tree. 5564354:1-5564354:9 - Qun Wang, Zhonghao Sun, Zhangquan Wang, Shiping Ye, Ziyi Su, Hao Chen, Chao Hu
:
A Practical Format and Semantic Reverse Analysis Approach for Industrial Control Protocols. 6690988:1-6690988:11 - Elmustafa Sayed Ali
, Mohammad Kamrul Hasan
, Rosilah Hassan
, Rashid A. Saeed
, Mona Bakri Hassan, Shayla Islam, Nazmus Shaker Nafi, Savitri Bevinakoppa:
Machine Learning Technologies for Secure Vehicular Communication in Internet of Vehicles: Recent Advances and Applications. 8868355:1-8868355:23 - Fei Zhao
, Yang Xin
, Kai Zhang, Xinxin Niu:
Representativeness-Based Instance Selection for Intrusion Detection. 6638134:1-6638134:13 - Hui Liu, Hanxing Xue, Hui Lu:
A Sensitive File Abnormal Access Detection Method Based on Application Classification. 6684456:1-6684456:7 - Rahma Gantassi
, Bechir Ben Gouissem, Omar Cheikhrouhou
, Salim El Khediri
, Salem Hasnaoui:
Optimizing Quality of Service of Clustering Protocols in Large-Scale Wireless Sensor Networks with Mobile Data Collector and Machine Learning. 5531185:1-5531185:12 - (Withdrawn) Cryptospace Invertible Steganography with Conditional Generative Adversarial Networks. 5538720:1-5538720:14
- Chengtang Cao, Lin You
, Gengran Hu:
Fuzzy Identity-Based Ring Signature from Lattices. 6692608:1-6692608:9 - Shubao Pan, Binyi Qin
, Lvqing Bi, Jincun Zheng, Ruizhao Yang, Xiaofeng Yang, Yun Li
, Zhi Li:
An Unsupervised Learning Method for the Detection of Genetically Modified Crops Based on Terahertz Spectral Data Analysis. 5516253:1-5516253:7 - Yuting Du
, Tong Qiao
, Ming Xu
, Ning Zheng
:
Towards Face Presentation Attack Detection Based on Residual Color Texture Representation. 6652727:1-6652727:16 - Jiarui Man, Guozi Sun
:
A Residual Learning-Based Network Intrusion Detection System. 5593435:1-5593435:9 - Wenbing Wang
, Yan Li
, Shengli Liu:
A Polar Complex Exponential Transform-Based Zero-Watermarking for Multiple Medical Images with High Discrimination. 6615678:1-6615678:13 - Yan Li
, Yifei Lu
:
ETCC: Encrypted Two-Label Classification Using CNN. 6633250:1-6633250:11 - Hongkun Zhang
, Xinmin Liu:
Reverse Auction-Based Services Optimization in Cloud Computing Environments. 6666628:1-6666628:10 - Huan Zhang
, Jiliu Zhou
, Dongrui Gao
, Xinguo Wang
, Zhefan Chen, Hongyu Wang
:
Hardware Trojan Detection Based on Ordered Mixed Feature GEP. 6682674:1-6682674:9 - Yanfeng Shi
, Shuo Qiu
:
Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT. 5595243:1-5595243:11 - Quanzhong Li
, Sai Zhao
:
Robust Secure Beamforming Design for Cooperative Cognitive Radio Nonorthogonal Multiple Access Networks. 5526485:1-5526485:9 - Amjad Khan, Asfandyar Khan, Javed Iqbal Bangash
, Fazli Subhan
, Abdullah Khan
, Atif Khan
, Muhammad Irfan Uddin
, Marwan Mahmoud
:
Cuckoo Search-based SVM (CS-SVM) Model for Real-Time Indoor Position Estimation in IoT Networks. 6654926:1-6654926:7 - Jin Li, Songqi Wu, Yundan Yang, Fenghui Duan, Hui Lu
, Yueming Lu
:
Controlled Sharing Mechanism of Data Based on the Consortium Blockchain. 5523489:1-5523489:10 - Md Iman Ali
, Sukhkirandeep Kaur
:
Next-Generation Digital Forensic Readiness BYOD Framework. 6664426:1-6664426:19 - Hassan Mahmood, Danish Mahmood
, Qaisar Shaheen
, Rizwan Akhtar, Wang Changda
:
S-DPS: An SDN-Based DDoS Protection System for Smart Grids. 6629098:1-6629098:19 - Runnan Zhang
, Gang Liu
, Shancang Li
, Yongheng Wei
, Quan Wang
:
ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities. 5531369:1-5531369:11 - Zhijun Wu
, Yue Yin
, Guang Li
, Meng Yue
:
Coherent Detection of Synchronous Low-Rate DoS Attacks. 6694264:1-6694264:14 - Ming Zhong
, Yajin Zhou, Gang Chen:
A Security Log Analysis Scheme Using Deep Learning Algorithm for IDSs in Social Network. 5542543:1-5542543:13 - (Withdrawn) Research on Sports Training Decision Support System Based on Improved Association Rules Algorithm. 5561970:1-5561970:6
- Huimin Wang
, Dong Zheng
, Qinglan Zhao
:
Publicly Verifiable Outsourcing Computation for QR Decomposition Based on Blockchain. 6632518:1-6632518:12 - (Withdrawn) Research on English Movie Resource Information Mining Based on Dynamic Data Stream Classification. 5518913:1-5518913:10
- YuFan Cai
, Yanyan Zhang
, Chengsheng Pan
:
Lane Detection Based on Adaptive Network of Receptive Field. 6618459:1-6618459:13 - Ihsan Ullah
, Muhammad Sajjad Khan
, Marc St-Hilaire
, Mohammad Faisal
, Junsu Kim
, Su Min Kim
:
Task Priority-Based Cached-Data Prefetching and Eviction Mechanisms for Performance Optimization of Edge Computing Clusters. 5541974:1-5541974:10 - Qiong Li, Liqiang Zhang, Rui Zhou, Yaowen Xia, Wenfeng Gao
, Yonghang Tai
:
Machine Learning-Based Stealing Attack of the Temperature Monitoring System for the Energy Internet of Things. 6661954:1-6661954:8 - Hao Zou
, Pengpeng Yang
, Rongrong Ni
, Yao Zhao
:
Anti-Forensics of Image Contrast Enhancement Based on Generative Adversarial Network. 6663486:1-6663486:8 - Yu Weng
, Haozhen Chu
, Zhaoyi Shi
:
An Intelligent Offloading System Based on Multiagent Reinforcement Learning. 8830879:1-8830879:13 - Rabiya Ghafoor, Danish Saleem, Sajjad Shaukat Jamal
, Muhammad Ishtiaq
, Sadaf Ejaz, Arif Jamal Malik, Muhammad Fahad Khan
:
Survey on Reversible Watermarking Techniques of Echocardiography. 8820082:1-8820082:19 - Tzung-Her Chen, Ting-Le Zhu, Fuh-Gwo Jeng, Chien-Lung Wang
:
Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains. 6637402:1-6637402:13 - D. J. Guan, X. Y. Qian, S. X. Lu, N. An, Peng Ye
, M. L. Zhang, N. Zhang:
Research on Coordinated Scheduling Strategy of Heat Storage Thermoelectric Units Based on Wind Power Data Acquisition System Using Edge Computing. 8864552:1-8864552:11 - Franklin Leukam Lako
, Paul Lajoie-Mazenc
, Maryline Laurent
:
Privacy-Preserving Publication of Time-Series Data in Smart Grid. 6643566:1-6643566:21 - Shanshan Shi
, Ting Luo
, Jiangtao Huang
, Meng Du
:
A Novel HDR Image Zero-Watermarking Based on Shift-Invariant Shearlet Transform. 6662700:1-6662700:12 - Mingshu He
, Xiaojuan Wang
, Junhua Zhou
, Yuanyuan Xi
, Lei Jin
, Xinlei Wang
:
Deep-Feature-Based Autoencoder Network for Few-Shot Malicious Traffic Detection. 6659022:1-6659022:13 - Qi Tao
, Q. Chen, Hongwei Ding
, Adnan Iftekhar, Xiaofang Huang, Xiaohui Cui
:
Cross-Department Secures Data Sharing in Food Industry via Blockchain-Cloud Fusion Scheme. 6668339:1-6668339:18 - Sandi Rahmadika
, Muhammad Firdaus
, Seolah Jang
, Kyung-Hyune Rhee
:
Blockchain-Enabled 5G Edge Networks and Beyond: An Intelligent Cross-Silo Federated Learning Approach. 5550153:1-5550153:14 - Jun Ma
, Minshen Wang
, Jinbo Xiong
, Yongjin Hu
:
CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. 8855341:1-8855341:14 - Haseeb Tariq, Muhammad Kashif Hanif
, Muhammad Umer Sarwar, Sabeen Bari, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei
:
Employing Deep Learning and Time Series Analysis to Tackle the Accuracy and Robustness of the Forecasting Problem. 5587511:1-5587511:10 - Elmahdi Bentafat
, M. Mazhar Rathore
, Spiridon Bakiras
:
Privacy-Preserving Multipoint Traffic Flow Estimation for Road Networks. 6619770:1-6619770:16 - (Withdrawn) Research on Optimal Design of Short-Life Cycle Product Logistics Supply Chain Based on Multicriteria Decision Model. 5564831:1-5564831:12
- Wenjuan Li
, Shihua Cao
, Keyong Hu
, Jian Cao
, Rajkumar Buyya
:
Blockchain-Enhanced Fair Task Scheduling for Cloud-Fog-Edge Coordination Environments: Model and Algorithm. 5563312:1-5563312:18 - Fuyou Miao, Yue Yu, Keju Meng
, Yan Xiong, Chin-Chen Chang:
Grouped Secret Sharing Schemes Based on Lagrange Interpolation Polynomials and Chinese Remainder Theorem. 6678345:1-6678345:9 - Xiao Jiang
, Peng Li
, Bin Li, Yulong Zou, Ruchuan Wang:
Security-Reliability Tradeoff for Friendly Jammer Aided Multiuser Scheduling in Energy Harvesting Communications. 5599334:1-5599334:16 - (Withdrawn) Neural Reversible Steganography with Long Short-Term Memory. 5580272:1-5580272:14
- Ruijie Pan, Gaocai Wang
, Man Wu:
An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence. 5582921:1-5582921:12 - Weina Niu
, Jiao Xie
, Xiaosong Zhang
, Chong Wang
, Xin-Qiang Li
, Ruidong Chen
, Xiao-Lei Liu
:
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis. 6653386:1-6653386:12 - (Withdrawn) Research on Sports Balanced Development Evaluation System Based on Edge Computing and Balanced Game. 5557138:1-5557138:8
- Yinghua Tian
, Nae Zheng
, Xiang Chen
, Liuyang Gao
:
Wasserstein Metric-Based Location Spoofing Attack Detection in WiFi Positioning Systems. 8817569:1-8817569:12 - Guangxia Xu
, Daiqi Zhou
, Jun Liu
:
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention. 5567991:1-5567991:11 - Dapeng Lang
, Deyun Chen
, Ran Shi
, Yongjun He
:
Attention-Guided Digital Adversarial Patches on Visual Detection. 6637936:1-6637936:11 - (Withdrawn) Theory and Application of Weak Signal Detection Based on Stochastic Resonance Mechanism. 5553490:1-5553490:9
- Yiou Wang, Fuquan Zhang
, Junfeng Wang, Laiyang Liu, Bo Wang:
A Bibliometric Analysis of Edge Computing for Internet of Things. 5563868:1-5563868:10 - Zhuo Liu
, Yong Wang
, Leo Yu Zhang
, Jun Ma
:
A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model. 6625579:1-6625579:21 - (Withdrawn) DDoS Detection Using a Cloud-Edge Collaboration Method Based on Entropy-Measuring SOM and KD-Tree in SDN. 5594468:1-5594468:16
- Jie Wang
, Feng Wang
, Hongtao Li
:
Differential Privacy Location Protection Scheme Based on Hilbert Curve. 5574415:1-5574415:12 - Liyun Dou
, Zichi Wang
, Zhenxing Qian
, Guorui Feng
:
Reversible Privacy Protection with the Capability of Antiforensics. 5558873:1-5558873:12 - Wenhua Gao
, Li Yang
:
Quantum Election Protocol Based on Quantum Public Key Cryptosystem. 5551249:1-5551249:15 - Tidiane Sylla
, Mohamed Aymen Chalouf
, Francine Krief
, Karim Samaké:
SETUCOM: Secure and Trustworthy Context Management for Context-Aware Security and Privacy in the Internet of Things. 6632747:1-6632747:24 - (Withdrawn) An Optimization Model for Logistics Distribution Network of Cross-Border E-Commerce Based on Personalized Recommendation Algorithm. 5510481:1-5510481:11
- Xiushan Liu
, Chun Shan
, Qin Zhang
, Jun Cheng
, Peng Xu
:
Compressed Wavelet Tensor Attention Capsule Network. 9949204:1-9949204:12 - Yao Du, Mengtian Cui
, Xiaochun Cheng
:
A Mobile Malware Detection Method Based on Malicious Subgraphs Mining. 5593178:1-5593178:11 - Yurong Luo
, Hui Li, Ruhui Ma
, Zhenyang Guo
:
A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services. 6697155:1-6697155:18 - Peisong He
, Hongxia Wang, Ruimei Zhang
, Yue Li
:
A Two-Stage Cascaded Detection Scheme for Double HEVC Compression Based on Temporal Inconsistency. 5568351:1-5568351:14 - Ahmed I. Iskanderani, Ibrahim Mustafa Mehedi, Abdulah Jeza Aljohani, Mohammad Shorfuzzaman, Farzana Akther, Thangam Palaniswamy, Shaikh Abdul Latif, Abdul Latif:
Artificial Intelligence-Based Digital Image Steganalysis. 9923389:1-9923389:9 - Mengting Yao
, Xiaoming Wang
, Qingqing Gan
, Yijian Lin
, Chengpeng Huang
:
An Improved and Privacy-Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs. 6698099:1-6698099:12 - Jian Zhou
, Xiaotian Gong, Lijuan Sun
, Yong Xie, Xiaoyong Yan:
Adaptive Routing Strategy Based on Improved Double Q-Learning for Satellite Internet of Things. 5530023:1-5530023:11 - Riguang Lin, Sheng Li
:
An Image Encryption Scheme Based on Lorenz Hyperchaotic System and RSA Algorithm. 5586959:1-5586959:18 - Yun Tan
, Jiaohua Qin
, Xuyu Xiang
, Chunhu Zhang
, Zhangdong Wang
:
Coverless Steganography Based on Motion Analysis of Video. 5554058:1-5554058:16 - Mohammad Sirajuddin, Ch. Rupa
, Celestine Iwendi
, Cresantus Biamba
:
TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network. 5521713:1-5521713:9 - Sa Math
, Prohim Tam
, Seokhoon Kim
:
Intelligent Media Forensics and Traffic Handling Scheme in 5G Edge Networks. 5589352:1-5589352:11 - Qi Han
, Hao Chen, Liyang Yu, Qiong Li:
Robust Frame Duplication Detection for Degraded Videos. 6616239:1-6616239:13 - Xiang Cheng
, Qian Luo, Ye Pan, Zitong Li, Jiale Zhang, Bing Chen
:
Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning. 8814068:1-8814068:14 - Ruhi Tas
, Ömer Özgür Tanriöver
:
A Manipulation Prevention Model for Blockchain-Based E-Voting Systems. 6673691:1-6673691:16 - Dong Zhang
, Zhongyi Guo
:
Mobile Sentry Robot for Laboratory Safety Inspection Based on Machine Vision and Infrared Thermal Imaging Detection. 6612438:1-6612438:16 - Wenju Xu
, Baocang Wang
, Rongxing Lu
, Quanbo Qu
, Yange Chen
, Yupu Hu
:
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials. 5553256:1-5553256:14 - Qingqing Xie
, Fan Dong
, Xia Feng
:
ECLB: Edge-Computing-Based Lightweight Blockchain Framework for Mobile Systems. 5510586:1-5510586:15 - Kun Niu
, Changgen Peng
, Weijie Tan
, Zhou Zhou, Yi Xu:
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing. 6654539:1-6654539:11 - Jianglong Yang
, Wanlin Yang
, Huwei Liu
, Li Zhou
:
Design and Simulation of Lightweight Identity Authentication Mechanism in Body Area Network. 5577514:1-5577514:18 - Zuowen Tan, Haohan Zhang
, Peiyi Hu, Rui Gao:
Distributed Outsourced Privacy-Preserving Gradient Descent Methods among Multiple Parties. 8876893:1-8876893:16 - Gaopeng Xie, Yuling Liu, Guojiang Xin
, Qiuwei Yang:
Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency. 9921209:1-9921209:15 - (Withdrawn) A Segmentation Algorithm of Image Semantic Sequence Data Based on Graph Convolution Network. 5596820:1-5596820:11
- Yanbin Li
, Yue Li, Huanliang Xu, Shougang Ren
:
An Adaptive Communication-Efficient Federated Learning to Resist Gradient-Based Reconstruction Attacks. 9919030:1-9919030:16 - Shunhao Jin, Fenlin Liu, Chunfang Yang
, Yuanyuan Ma, Yuan Liu:
Feature Selection of the Rich Model Based on the Correlation of Feature Components. 6680528:1-6680528:12 - Ruixin Shi
, Yongbin Zhou
, Yong Li, Weili Han:
Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study. 5563884:1-5563884:16 - Huiwen Bai
, Guangjie Liu
, Weiwei Liu, Yingxue Quan, Shuhua Huang:
N-Gram, Semantic-Based Neural Network for Mobile Malware Network Traffic Detection. 5599556:1-5599556:17 - (Withdrawn) Research on Market Stock Index Prediction Based on Network Security and Deep Learning. 5522375:1-5522375:8
- Bashar Ahmad Khalaf, Salama A. Mostafa
, Aida Mustapha
, Mazin Abed Mohammed
, Moamin A. Mahmoud, Bander Ali Saleh Al-Rimy, Shukor Abd Razak
, Mohamed Elhoseny
, Adam Marks:
An Adaptive Protection of Flooding Attacks Model for Complex Network Environments. 5542919:1-5542919:17 - Sensen Guo
, Jinxiong Zhao
, Xiaoyu Li, Junhong Duan, Dejun Mu, Xiao Jing:
A Black-Box Attack Method against Machine-Learning-Based Anomaly Network Flow Detection Models. 5578335:1-5578335:13 - Sachin Lalar
, Shashi Bhushan
, Surender Jangra
, Mehedi Masud
, Jehad F. Al-Amri
:
An Efficient Three-Phase Fuzzy Logic Clone Node Detection Model. 9924478:1-9924478:17 - Fatemeh Aliannejad
, Esmaeel Tahanian
, Mansoor Fateh
, Mohsen Rezvani
:
A Reinforcement Learning-Based Configuring Approach in Next-Generation Wireless Networks Using Software-Defined Metasurface. 5587656:1-5587656:13 - Miqi Wu, Lin You
, Gengran Hu
, Liang Li, Chengtang Cao
:
A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture. 5592119:1-5592119:20 - Tarek Frikha
, Faten Chaabane
, Nadhir Aouinti
, Omar Cheikhrouhou
, Nader Ben Amor
, Abdelfateh Kerrouche:
Implementation of Blockchain Consensus Algorithm on Embedded Architecture. 9918697:1-9918697:11 - Haiyan Kang
, Yanhang Xiao
, Jie Yin:
An Intelligent Detection Method of Personal Privacy Disclosure for Social Networks. 5518220:1-5518220:11 - Bowei Hao
, Guoyong Wang
, Mingchuan Zhang
, Junlong Zhu
, Ling Xing
, Qingtao Wu
:
Stochastic Adaptive Forwarding Strategy Based on Deep Reinforcement Learning for Secure Mobile Video Communications in NDN. 6630717:1-6630717:13 - Donglai Fu
, Yanhua Liu
:
Remote Attestation on Behavioral Traces for Crowd Quality Control Based on Trusted Platform Module. 8859618:1-8859618:12 - (Withdrawn) Interactive Application of Virtual Reality and Intelligent Big Data in Landscape Design. 5572841:1-5572841:9
- Khizar Abbas
, Lo'ai Ali Tawalbeh, Ahsan Rafiq
, Ammar Muthanna
, Ibrahim A. Elgendy
, Ahmed A. Abd El-Latif
:
Convergence of Blockchain and IoT for Secure Transportation Systems in Smart Cities. 5597679:1-5597679:13 - Jeng-Shyang Pan
, Fang Fan
, Shu-Chuan Chu
, Huiqi Zhao
, Gao-Yuan Liu
:
A Lightweight Intelligent Intrusion Detection Model for Wireless Sensor Networks. 5540895:1-5540895:15 - Zhenjun Tang
, Shaopeng Zhang
, Zhenhai Chen
, Xianquan Zhang
:
Robust Video Hashing Based on Multidimensional Scaling and Ordinal Measures. 9930673:1-9930673:11 - Yanan Liu
, Yijun Cui, Lein Harn, Zheng Zhang
, Hao Yan, Yuan Cheng, Shuo Qiu
:
PUF-Based Mutual-Authenticated Key Distribution for Dynamic Sensor Networks. 5532683:1-5532683:13 - Bo Liu
, Jinfu Chen
, Songling Qin, Zufa Zhang, Yisong Liu, Lingling Zhao, Jingyi Chen:
An Approach Based on the Improved SVM Algorithm for Identifying Malware in Network Traffic. 5518909:1-5518909:14 - Xinlei Jin
, Dengpan Ye
, Chuanxi Chen
:
Countering Spoof: Towards Detecting Deepfake with Multidimensional Biological Signals. 6626974:1-6626974:8 - Guangjun Liu
, Wangmei Guo
, Ximeng Liu
, Jinbo Xiong
:
Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage. 6652606:1-6652606:8 - Guanyu Lu
, Xiuxia Tian
:
An Efficient Communication Intrusion Detection Scheme in AMI Combining Feature Dimensionality Reduction and Improved LSTM. 6631075:1-6631075:21 - Jing Zhao
, Shubo Liu
, Xingxing Xiong
, Zhaohui Cai:
Differentially Private Autocorrelation Time-Series Data Publishing Based on Sliding Window. 6665984:1-6665984:10 - Fang Mei
, Tianchang Gao
, Yingda Lyu
:
CF Model: A Coarse-to-Fine Model Based on Two-Level Local Search for Image Copy-Move Forgery Detection. 6688393:1-6688393:13 - Zitong Li, Xiang Cheng, Lixiao Sun, Ji Zhang, Bing Chen
:
A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks. 9961342:1-9961342:14 - Fulong Chen
, Yuqing Tang
, Xu Cheng
, Dong Xie
, Taochun Wang
, Chuanxin Zhao
:
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems. 5580939:1-5580939:13 - Zhishuo Zhang
, Wei Zhang, Zhiguang Qin
:
Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT. 6676862:1-6676862:16 - Eman Yasser Daraghmi
, Mamoun Abu Helou
, Yousef-Awwad Daraghmi
:
A Blockchain-Based Editorial Management System. 9927640:1-9927640:17 - Pan Zhang, Fenggang Lai, Jing Du, Wenda Lu, Xiao Yu
:
A Multimodality Information Synchronization Scheme for a Multisource Information System in the Electric Grid. 5513590:1-5513590:7 - (Withdrawn) Deformation Detection Model of High-Rise Building Foundation Pit Support Structure Based on Neural Network and Wireless Communication. 5525616:1-5525616:10
- (Withdrawn) Distributed Network Image Processing System and Transmission Control Algorithm. 5517843:1-5517843:10
- Lu Yang
, Xingshu Chen
, Yonggang Luo
, Xiao Lan
, Li Chen:
PurExt: Automated Extraction of the Purpose-Aware Rule from the Natural Language Privacy Policy in IoT. 5552501:1-5552501:11 - Mourade Azrour
, Jamal Mabrouki
, Rajasekhar Chaganti
:
New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT. 5546334:1-5546334:12 - Gaopan Hou
, Jianfeng Ma
, Jiayi Li
, Chen Liang
:
Audit Outsourced Data in Internet of Things. 6662135:1-6662135:11 - (Withdrawn) Medical Image Encryption Based on 2D Zigzag Confusion and Dynamic Diffusion. 6624809:1-6624809:23
- Jian Wang
, Shanshan Cui, Guosheng Zhao, Zhong-Nan Zhao:
Diffusion Analysis and Incentive Method for Mobile Crowdsensing User Based on Knowledge Graph Reasoning. 6697862:1-6697862:15 - Chao Li
, Jun Li, Yafei Li, Lingmin He, Xiaokang Fu, Jingjing Chen
:
Fabric Defect Detection in Textile Manufacturing: A Survey of the State of the Art. 9948808:1-9948808:13 - Youngjun Moon
, Intae Ryoo
, Seokhoon Kim
:
Face Antispoofing Method Using Color Texture Segmentation on FPGA. 9939232:1-9939232:11 - Nitheesh Murugan Kaliyamurthy
, Swapnesh Taterh, Suresh Shanmugasundaram, Ankit Saxena
, Omar Cheikhrouhou
, Hadda Ben Elhadj
:
Software-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective. 9971705:1-9971705:7 - (Withdrawn) Improving Convolutional Neural Networks with Competitive Activation Function. 1933490:1-1933490:9
- Zhiqiang Wang, Xiaorui Ren, Shuhao Li, Bingyan Wang, Jianyi Zhang
, Tao Yang:
A Malicious URL Detection Model Based on Convolutional Neural Network. 5518528:1-5518528:12 - Xiang Yu
, Chun Shan
, Jilong Bian
, Xianfei Yang
, Ying Chen
, Haifeng Song
:
AdaGUM: An Adaptive Graph Updating Model-Based Anomaly Detection Method for Edge Computing Environment. 9954951:1-9954951:12 - Darpan Anand
, Vineeta Khemchandani, Munish Sabharwal
, Omar Cheikhrouhou
, Ouissem Ben Fredj
:
Lightweight Technical Implementation of Single Sign-On Authentication and Key Agreement Mechanism for Multiserver Architecture-Based Systems. 9940183:1-9940183:15 - Meng Cai, Ying Cui, Yang Yu, Ying Xue, Han Luo:
Trusted QoS Assurance Approach for Composite Service. 9934138:1-9934138:15 - Lingling Wang
, Zhongda Cao, Peng Zhou, Xueqin Zhao:
Towards a Smart Privacy-Preserving Incentive Mechanism for Vehicular Crowd Sensing. 5580089:1-5580089:16 - Jian Xie
, Wenan Tan, BingWu Fang
, Zhiqiu Huang:
Towards a Statistical Model Checking Method for Safety-Critical Cyber-Physical System Verification. 5536722:1-5536722:12 - Mahboubeh Nazari, Arash Maneshi
:
Chaotic Reversible Watermarking Method Based on IWT with Tamper Detection for Transferring Electronic Health Record. 5514944:1-5514944:15 - Hassan El Gafif
, Ahmed Toumanari
:
Efficient Ciphertext-Policy Attribute-Based Encryption Constructions with Outsourced Encryption and Decryption. 8834616:1-8834616:17 - Honglei Li
, Weilian Xue
:
A Blockchain-Based Sealed-Bid e-Auction Scheme with Smart Contract and Zero-Knowledge Proof. 5523394:1-5523394:10 - Riadh Ayachi
, Ayoub Mhaouch, Abdessalem Ben Abdelali
:
Lightweight Cryptography for Network-on-Chip Data Encryption. 9943713:1-9943713:10 - Shehzad Ashraf Chaudhry
:
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles. 5554318:1-5554318:9 - (Withdrawn) An Online Arrangement Method of Difficult Actions in Competitive Aerobics Based on Multimedia Technology. 9968401:1-9968401:12
- (Withdrawn) Design of Teaching Video Resource Management System in Colleges and Universities based on Microtechnology. 9914048:1-9914048:11
- Khuda Bux Jalbani
, Muhammad Yousaf
, Muhammad Shahzad Sarfraz, Rozita Jamili Oskouei
, Akhtar Hussain
, Zojan Memon
:
Poor Coding Leads to DoS Attack and Security Issues in Web Applications for Sensors. 5523806:1-5523806:11 - Gaoyuan Zhang
, Haiqiong Li
, Congzheng Han
, Congyu Shi
, Hong Wen, Dan Wang:
Multiple-Symbol Detection Scheme for IEEE 802.15.4c MPSK Receivers over Slow Rayleigh Fading Channels. 6641192:1-6641192:19 - (Withdrawn) Real-Time Collection of Training Distance of Long-Distance Runners Based on Wireless Sensor Network. 9992239:1-9992239:11
- Jinchang Hu
, Jinfu Chen
, Sher Ali
, Bo Liu
, Jingyi Chen
, Chi Zhang
, Jian Yang
:
A Detection Approach for Vulnerability Exploiter Based on the Features of the Exploiter. 5581274:1-5581274:14 - Sheng Ren
, Jianqi Li
, Tianyi Tu
, Yibo Peng
, Jian Jiang
:
Towards Efficient Video Detection Object Super-Resolution with Deep Fusion Network for Public Safety. 9999398:1-9999398:14 - Yunhong Zhou
, Jiehui Nan, Licheng Wang
:
Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things. 6649119:1-6649119:14 - Wenmin Li, Sanqi Sun, Shuo Zhang
, Hua Zhang, Yijie Shi:
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data. 6674325:1-6674325:11 - Shyam Deshmukh
, Komati Thirupathi Rao
, Mohammad Shabaz
:
Collaborative Learning Based Straggler Prevention in Large-Scale Distributed Computing Framework. 8340925:1-8340925:9 - Jiangbo Zou, Xiaokang Fu, Lingling Guo, Chunhua Ju, Jingjing Chen
:
Creating Ensemble Classifiers with Information Entropy Diversity Measure. 9953509:1-9953509:11 - Jia Chen
, Quankai Qi
, Yongjie Wang
, Xuehu Yan
, Longlong Li
:
Data Hiding Based on Mini Program Code. 5546344:1-5546344:12 - Shin-Yan Chiou
, Yi-Xuan He
:
Generalized Proxy Oblivious Signature and Its Mobile Application. 5531505:1-5531505:16 - Yongjie Wang
, Jia Chen
, Qinghong Gong
, Xuehu Yan
, Yuyuan Sun
:
Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery. 5597592:1-5597592:11 - Binbin Huang
, Yuanyuan Xiang, Dongjin Yu
, Jiaojiao Wang, Zhongjin Li, Shangguang Wang
:
Reinforcement Learning for Security-Aware Workflow Application Scheduling in Mobile Edge Computing. 5532410:1-5532410:13 - Songpon Teerakanok
, Tetsutaro Uehara
, Atsuo Inomata
:
Migrating to Zero Trust Architecture: Reviews and Challenges. 9947347:1-9947347:10 - Weiyu Jiang
, Bingyang Liu, Chuang Wang, Xue Yang:
Security-Oriented Network Architecture. 6694650:1-6694650:16 - Xingsi Xue
, Xiaojing Wu
, Jie Zhang, Lingyu Zhang
, Hai Zhu
, Guojun Mao:
Aggregating Heterogeneous Sensor Ontologies with Fuzzy Debate Mechanism. 2878684:1-2878684:12 - Zuguo Chen
, Yanglong Liu
, Chaoyang Chen
, Ming Lu
, Xuzhuo Zhang
:
Malicious URL Detection Based on Improved Multilayer Recurrent Convolutional Neural Network Model. 9994127:1-9994127:13 - Ke Yuan
, Yahui Wang
, Yingming Zeng
, Wenlei Ouyang
, Zheng Li
, Chunfu Jia
:
Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model. 5593363:1-5593363:10 - Huixia Zhang
, Guowei Shen
, Chun Guo
, Yunhe Cui, Chaohui Jiang:
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. 5586335:1-5586335:12 - Huige Wang
, Xing Chang, Kefei Chen:
CLE against SOA with Better Data Security Storage to Cloud 5G. 6695964:1-6695964:11 - Yewen Wu
, Shi Zeng
, Bin Wu
, Bin Yang
, Xianyi Chen
:
Quantitative Weighted Visual Cryptographic (k, m, n) Method. 9968652:1-9968652:13 - Hao Yan
, Yanan Liu, Zheng Zhang
, Qian Wang:
Efficient Privacy-Preserving Certificateless Public Auditing of Data in Cloud Storage. 6639634:1-6639634:11 - Yuanlong Cao
, Ruiwen Ji
, Lejun Ji
, Mengshuang Bao
, Lei Tao
, Wei Yang
:
Can Multipath TCP Be Robust to Cyber Attacks? A Measuring Study of MPTCP with Active Queue Management Algorithms. 9963829:1-9963829:11 - Fatima Ezzahra Ziani
, Anas Sadak
, Charifa Hanin
, Bouchra Echandouri
, Fouzia Omary
:
CFA: A New Family of Hybrid CA-Based PRNGs. 6640052:1-6640052:21 - Huiying Hou
, Shidi Hao, Jiaming Yuan
, Shengmin Xu, Yunlei Zhao
:
Fine-Grained and Controllably Redactable Blockchain with Harmful Data Forced Removal. 3680359:1-3680359:20 - Mahammad Shareef Mekala
, Rizwan Patan
, SK Hafizul Islam
, Debabrata Samanta
, Ghulam Ali Mallah
, Shehzad Ashraf Chaudhry
:
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre. 6688162:1-6688162:16 - Jie Min
, Junbin Liang
, Xingpo Ma
, Hongling Chen
:
STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems. 9939796:1-9939796:16 - Tao Li
, Yuling Chen
, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu
, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". 9856969:1-9856969:2 - (Withdrawn) More General Form of Interval-Valued Fuzzy Ideals of BCK/BCI-Algebras. 9930467:1-9930467:10
- Xingxing Xiong
, Shubo Liu
, Dan Li, Zhaohui Cai, Xiaoguang Niu
:
Corrigendum to "A Comprehensive Survey on Local Differential Privacy". 9874067:1-9874067:2 - Xiaodong Zhang
, Ru Li
, Wenhan Hou, Hui Zhao:
V-Lattice: A Lightweight Blockchain Architecture Based on DAG-Lattice Structure for Vehicular Ad Hoc Networks. 9942632:1-9942632:17 - Kai Zhang
, Yanping Li
, Laifeng Lu
:
Privacy-Preserving Attribute-Based Keyword Search with Traceability and Revocation for Cloud-Assisted IoT. 9929663:1-9929663:13 - (Withdrawn) Application of Internet of Things and Edge Computing Technology in Sports Tourism Services. 9980375:1-9980375:10
- Muhammad Altaf Khan
, Moustafa M. Nasralla
, Muhammad Muneer Umar
, Zeeshan Iqbal
, Ghani Ur Rehman
, Muhammad Shahzad Sarfraz, Nikumani Choudhury
:
A Survey on the Noncooperative Environment in Smart Nodes-Based Ad Hoc Networks: Motivations and Solutions. 9921826:1-9921826:17 - Nianwen Si
, Wenlin Zhang
, Dan Qu
, Xiangyang Luo
, Heyu Chang
, Tong Niu
:
Spatial-Channel Attention-Based Class Activation Mapping for Interpreting CNN-Based Image Classification Models. 6682293:1-6682293:13 - Wei Wang
, Yuchen Qiu, Shichang Xuan
, Wu Yang
:
Early Rumor Detection Based on Deep Recurrent Q-Learning. 5569064:1-5569064:13 - Luhui Yang
, Guangjie Liu
, Weiwei Liu, Huiwen Bai
, Jiangtao Zhai
, Yuewei Dai:
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model. 5567635:1-5567635:20 - Yang Li
, Hongtao Song
, Yunlong Zhao
, Nianmin Yao
, Nianbin Wang
:
Anonymous Data Reporting Strategy with Dynamic Incentive Mechanism for Participatory Sensing. 5518168:1-5518168:20 - Xuan Shen, Lei Cheng, Bing Sun, Jun He
:
Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures. 5582711:1-5582711:10 - Weiwei Liu
, Hua Guo
, Yangguang Tian
:
A Secure Distance-Bounding Protocol with Mutual Authentication. 6644326:1-6644326:7 - Yixiao Zhu
, Wenjie Ma
, Jiangtao Cui
, Xiaofang Xia
, Yanguo Peng
, Jianting Ning
:
PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing. 5514137:1-5514137:18 - Hanzhe Yang
, Ruidan Su
, Pei Huang, Yuhan Bai, Kai Fan
, Kan Yang
, Hui Li, Yintang Yang:
PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage. 9993855:1-9993855:11 - Zuowen Tan
:
Privacy-Preserving Two-Factor Key Agreement Protocol Based on Chebyshev Polynomials. 6697898:1-6697898:21 - Jianguo Sun
, Hanqi Yin
, Ye Tian
, Junpeng Wu
, Linshan Shen
, Lei Chen:
Two-Level Multimodal Fusion for Sentiment Analysis in Public Security. 6662337:1-6662337:10 - Sheng Gao
, Qianqian Su
, Rui Zhang
, Jianming Zhu, Zhiyuan Sui, Junsheng Wang:
A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain. 9992353:1-9992353:10 - (Withdrawn) Finite Element Structure Analysis of Automobile Suspension Control Arm Based on Neural Network Control. 9978701:1-9978701:11
- (Withdrawn) An Extraction Method of Volleyball Spiking Trajectory and Teaching Based on Wireless Sensor Network. 9966994:1-9966994:11
- Ding Wang
, Shuhong Hong
, Qingxuan Wang
:
Revisiting a Multifactor Authentication Scheme in Industrial IoT. 9995832:1-9995832:7 - Syed Mahbub
, Eric Pardede
, A. S. M. Kayes
:
Detection of Harassment Type of Cyberbullying: A Dictionary of Approach Words and Its Impact. 5594175:1-5594175:12 - (Withdrawn) Detection of Constellation-Modulated Wireless Covert Channel Based on Adjusted CNN Model. 5569745:1-5569745:14
- (Withdrawn) Research on Basketball Goal Recognition Based on Image Processing and Improved Algorithm. 9996736:1-9996736:10
- (Withdrawn) Tourist Demand Prediction Model Based on Improved Fruit Fly Algorithm. 3411797:1-3411797:11
- Heng Yin
, Hengwei Zhang
, Jindong Wang
, Ruiyu Dou
:
Boosting Adversarial Attacks on Neural Networks with Better Optimizer. 9983309:1-9983309:9 - Baoying Chen
, Shunquan Tan
:
FeatureTransfer: Unsupervised Domain Adaptation for Cross-Domain Deepfake Detection. 9942754:1-9942754:8 - Aya Jaradat
, Eyad Taqieddin
, Moad Mowafi
:
A High-Capacity Image Steganography Method Using Chaotic Particle Swarm Optimization. 6679284:1-6679284:11 - Yining Hu
, Zhe Wang, Yueli Pan, Lizhe Xie
, Zheng Wang:
Craniofacial Reconstruction via Face Elevation Map Estimation Based on the Deep Convolution Neutral Network. 9987792:1-9987792:9 - Da-Zhi Sun
, Ji-Dong Zhong:
Privacy Enhancement on Unilateral Bluetooth Authentication Protocol for Mobile Crowdsensing. 5598574:1-5598574:12 - Mingzhen Li
, Yunfeng Wang, Yang Xin, Hongliang Zhu, Qifeng Tang, Yuling Chen
, Yixian Yang, Guangcan Yang:
Cross-Platform Strong Privacy Protection Mechanism for Review Publication. 5556155:1-5556155:22 - Guoqi Liu
, Ruonan Gu, Jiantao Wang, Weidong Yan
:
Personal Trajectory with Ring Structure Network: Algorithms and Experiments. 9974191:1-9974191:8 - (Withdrawn) Influencing Factors of Cross-Border E-Commerce Consumer Purchase Intention Based on Wireless Network and Machine Learning. 9984213:1-9984213:9
- Wenjing Zeng
, Rui Tang
, Haizhou Wang
, Xingshu Chen
, Wenxian Wang
:
User Identification Based on Integrating Multiple User Information across Online Social Networks. 5533417:1-5533417:14 - Xiujuan Wang
, Yi Sui
, Yuanrui Tao
, Qianqian Zhang
, Jianhua Wei:
Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution. 6653430:1-6653430:14 - (Withdrawn) Static Characteristics of a Linear Bipotentiometer Sensor. 9958652:1-9958652:9
- (Withdrawn) Analysis of Economic Relationship Using the Concept of Complex Pythagorean Fuzzy Information. 4513992:1-4513992:12
- (Withdrawn) Design of Distributed Collection Model of Student Development Information Based on Internet of Things Technology. 6505359:1-6505359:10
- Qiang Zuo
, Songyu Chen
, Zhifang Wang
:
R2AU-Net: Attention Recurrent Residual Convolutional Neural Network for Multimodal Medical Image Segmentation. 6625688:1-6625688:10 - John Prakash Arockiasamy
, Lydia Elizabeth Benjamin
, Vaidheyanathan Rhymend Uthariaraj:
Beyond Statistical Analysis in Chaos-Based CSPRNG Design. 5597720:1-5597720:14 - Chao Su
, Qingkai Zeng
:
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures. 5559552:1-5559552:15 - (Withdrawn) Research on Risk Measurement and Early Warning of Electronic Banking Business Based on GMDH Algorithm. 2678161:1-2678161:9
- Guozhong Dong
, Weizhe Zhang
, Haowen Tan
, Rahul Yadav
, Shuaishuai Tan
:
EOM-NPOSESs: Emergency Ontology Model Based on Network Public Opinion Spread Elements. 9954957:1-9954957:11 - Won-Bin Kim, Daehee Seo, Donghyun Kim, Im-Yeong Lee
:
Data Distribution for Multiple Receivers in a Connected Car Environment Using 5G Communication. 5599996:1-5599996:14 - Long Wei, Gang Chen
, Wenjie Sun, Guoqi Li
:
Recognition of Operating Characteristics of Heavy Trucks Based on the Identification of GPS Trajectory Stay Points. 9998405:1-9998405:12 - Yan Jiang, Guisheng Yin
, Ye Yuan, Qingan Da:
Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification. 6663028:1-6663028:13 - Long Chen, Guojiang Xin
, Yuling Liu, Junwei Huang:
Driver Fatigue Detection Based on Facial Key Points and LSTM. 5383573:1-5383573:9 - Yue Wang
, Yiming Jiang, Julong Lan:
FCNN: An Efficient Intrusion Detection Method Based on Raw Network Traffic. 5533269:1-5533269:13 - Zhiwen Xiao
, Jianbin Jiao
:
Explainable Fraud Detection for Few Labeled Time Series Data. 9941464:1-9941464:9 - Tianpeng Deng, Xuan Li
, Biao Jin, Lei Chen, Jie Lin:
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT. 5519558:1-5519558:13 - Priyanka Dixit
, Rashi Kohli
, Ángel Eduardo Acevedo-Duque, Romel Ramón González-Díaz
, Rutvij H. Jhaveri
:
Comparing and Analyzing Applications of Intelligent Techniques in Cyberattack Detection. 5561816:1-5561816:23 - Hanrui Zhang
, Qianmu Li
, Shunmei Meng, Zhuoran Xu, Chaoxian Lv:
An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things. 5562275:1-5562275:8 - Liang-Jia Tong, Nan-Run Zhou
, Zhi-Jing Huang, Xin-Wen Xie
, Ya-Ru Liang:
Nonlinear Multi-Image Encryption Scheme with the Reality-Preserving Discrete Fractional Angular Transform and DNA Sequences. 6650515:1-6650515:18 - Yi-Fan Tseng
, Chun-I Fan
:
Anonymous Multireceiver Identity-Based Encryption against Chosen-Ciphertext Attacks with Tight Reduction in the Standard Model. 5519721:1-5519721:11 - Qing Yan, Lipeng Song
, Chenlu Zhang, Jing Li, Shanshan Feng:
Modeling and Control of Malware Propagation in Wireless IoT Networks. 4133474:1-4133474:13 - Wenliang Xu
, Futai Zou
:
Obfuscated Tor Traffic Identification Based on Sliding Window. 5587837:1-5587837:11 - Aolin Che, Yalin Liu, Hong Xiao
, Hao Wang
, Ke Zhang, Hong-Ning Dai
:
Augmented Data Selector to Initiate Text-Based CAPTCHA Attack. 9930608:1-9930608:9 - (Withdrawn) How Does the Urgency of Borrowing in Text Messages Affect Loan Defaults? Evidence from P2P Loans in China. 4060676:1-4060676:13
- Renjie Zhou
, Xiao Wang
, Jingjing Yang
, Wei Zhang
, Sanyuan Zhang
:
Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy. 5560185:1-5560185:9 - Dapeng Man
, Yongjia Mu, Jiafei Guo, Wu Yang, Jiguang Lv, Wei Wang
:
Cache Pollution Detection Method Based on GBDT in Information-Centric Network. 6658066:1-6658066:10 - Guihua Tang
, Lei Sun
, Xiuqing Mao
, Song Guo
, Hongmeng Zhang
, Xiaoqin Wang
:
Detection of GAN-Synthesized Image Based on Discrete Wavelet Transform. 5511435:1-5511435:10 - Gaigai Tang, Lin Yang
, Shuangyin Ren
, Lianxiao Meng, Feng Yang, Huiqiang Wang
:
An Automatic Source Code Vulnerability Detection Approach Based on KELM. 5566423:1-5566423:12 - Zilin Qiang, Yingsen Wang, Kai Song, Zijuan Zhao
:
Mine Consortium Blockchain: The Application Research of Coal Mine Safety Production Based on Blockchain. 5553874:1-5553874:10 - Feifei Hu, Situo Zhang, Xubin Lin, Liu Wu, Niandong Liao
:
Classification of Abnormal Traffic in Smart Grids Based on GACNN and Data Statistical Analysis. 9927325:1-9927325:19 - Mengli Wang
, Lipeng Song
:
An Incentive Mechanism for Reporting Phishing E-Mails Based on the Tripartite Evolutionary Game Model. 3394325:1-3394325:8 - Lingzan Yu
, Yanli Ren
, Guorui Feng
, Xinpeng Zhang
:
Efficient Noninteractive Outsourcing of Large-Scale QR and LU Factorizations. 6184920:1-6184920:14 - Yang Bai
, Yu Li, Mingchuang Xie, Mingyu Fan
:
A Defense Framework for Privacy Risks in Remote Machine Learning Service. 9924684:1-9924684:13 - (Withdrawn) CLD-Net: A Network Combining CNN and LSTM for Internet Encrypted Traffic Classification. 5518460:1-5518460:15
- Yi Huang, Shah Nazir
, Xinqiang Ma
, Shiming Kong, Youyuan Liu:
Acquiring Data Traffic for Sustainable IoT and Smart Devices Using Machine Learning Algorithm. 1852466:1-1852466:11 - Yi Peng
, Qi Han
, Fei Su
, Xingwei He
, Xiaohu Feng
:
Meteorological Satellite Operation Prediction Using a BiLSTM Deep Learning Model. 9916461:1-9916461:9 - Ke Shao
, Qiang Xiong, Zhiming Cai
:
FB2Droid: A Novel Malware Family-Based Bagging Algorithm for Android Malware Detection. 6642252:1-6642252:13 - Hao Zhu
, Mulan Wang
, Weiye Xu
:
Research on Calibration Method of Binocular Vision System Based on Neural Network. 5542993:1-5542993:9 - (Withdrawn) A Competition-Based Unequal Clustering Multihop Approach for Wireless Sensor Networks. 9994136:1-9994136:10
- Paul Marillonnet
, Mikaël Ates
, Maryline Laurent
, Nesrine Kaaniche
:
An Efficient User-Centric Consent Management Design for Multiservices Platforms. 5512075:1-5512075:19 - (Withdrawn) Remote Evaluation System of Tennis Batting Action Standard Based on Acceleration Sensor. 9930084:1-9930084:11
- Lingyan Xue, Qinglong Huang
, Shuaiqing Zhang
, Haiping Huang
, Wenming Wang
:
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT. 3300769:1-3300769:15 - Taochun Wang
, Chengmei Lv, Chengtian Wang, Fulong Chen
, Yonglong Luo
:
A Secure Truth Discovery for Data Aggregation in Mobile Crowd Sensing. 2296386:1-2296386:15 - Zhonghua Zhang, Xifei Song
, Lei Liu
, Jie Yin
, Yu Wang
, Dapeng Lan
:
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work. 9991535:1-9991535:15 - Mingyang Song
, Yingpeng Sang
, Yuying Zeng
, Shunchao Luo
:
Blockchain-Based Secure Outsourcing of Polynomial Multiplication and Its Application in Fully Homomorphic Encryption. 9962575:1-9962575:14 - (Withdrawn) A Task Allocation Algorithm for Coal Mine Mobile Crowd Sensing Based on Weighted Undirected Graph. 9999798:1-9999798:14
- Vikram Raju Reddicherla
, Umashankar Rawat
, Y. Jeevan Nagendra Kumar
, Atef Zaguia
:
Secure Vertical Handover to NEMO Using Hybrid Cryptosystem. 6751423:1-6751423:12 - Zhiqiang Wang
, Yuheng Lin
, Zihan Zhuo
, Jieming Gu
, Tao Yang:
GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing. 9946022:1-9946022:14 - Tsu-Yang Wu
, Zhiyuan Lee
, Lei Yang
, Chien-Ming Chen
:
A Provably Secure Authentication and Key Exchange Protocol in Vehicular Ad Hoc Networks. 9944460:1-9944460:17 - (Withdrawn) The Segmentation of Road Scenes Based on Improved ESPNet Model. 1681952:1-1681952:11
- Hung-Yu Chien
:
Self-Healing Group Key Distribution Facilitating Source Authentication Using Block Codes. 2942568:1-2942568:11 - Jabar Mahmood
, Zongtao Duan
, Yun Yang
, Qinglong Wang
, Jamel Nebhen
, Muhammad Nasir Mumtaz Bhutta
:
Security in Vehicular Ad Hoc Networks: Challenges and Countermeasures. 9997771:1-9997771:20 - (Withdrawn) High-Capacity Reversible Data Hiding in Encrypted Images Based on Prediction Error Compression and Block Selection. 9606116:1-9606116:12
- Amir Chaaf, Mohammed Saleh Ali Muthanna
, Ammar Muthanna, Soha Alhelaly, Ibrahim A. Elgendy
, Abdullah M. Iliyasu
, Ahmed A. Abd El-Latif
:
Energy-Efficient Relay-Based Void Hole Prevention and Repair in Clustered Multi-AUV Underwater Wireless Sensor Network. 9969605:1-9969605:20 - Huifang Yu
, Weike Wang
:
Certificateless Network Coding Ring Signature Scheme. 8029644:1-8029644:10 - Shichang Xuan
, Ming Jin
, Xin Li
, Zhaoyuan Yao
, Wu Yang, Dapeng Man
:
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems. 9965157:1-9965157:14 - Fazle Rabby Khan
, Md. Muhabullah
, Roksana Islam
, Mohammad Monirujjaman Khan
, Mehedi Masud
, Sultan Aljahdali
, Avinash Kaur
, Parminder Singh
:
A Cost-Efficient Autonomous Air Defense System for National Security. 9984453:1-9984453:10 - Wei Ma
, Qinglei Zhou
, Mingsheng Hu, Xing Wang:
A Deep Learning-Based Trust Assessment Method for Cloud Users. 9937229:1-9937229:11 - Jiayu Wang
, Xuehu Yan
, Jia Chen
, Yongqiang Yu
:
An Intragroup and Intergroup Multiple Secret Images' Sharing Scheme with Each Participant Holding One Shadow Image. 9960998:1-9960998:14 - Junfeng Tian
, Yue Li
:
Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection. 9717747:1-9717747:14 - Xiaodong Liu
, Tong Li, Runzi Zhang
, Di Wu, Yongheng Liu, Zhen Yang:
A GAN and Feature Selection-Based Oversampling Technique for Intrusion Detection. 9947059:1-9947059:15 - Zakariae El Ouazzani
, An Braeken
, Hanan El Bakkali
:
Proximity Measurement for Hierarchical Categorical Attributes in Big Data. 6612923:1-6612923:17 - Xiaodong Zhang
, Ru Li
, Wenhan Hou
, Jinshan Shi
:
Research on Manhattan Distance Based Trust Management in Vehicular Ad Hoc Network. 9967829:1-9967829:13 - Jianming Zhao
, Peng Zeng
, Yingjun Liu
, Tianyu Wang:
On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication. 4539540:1-4539540:12 - Hao Liu
, Rongbo Zhu
, Jun Wang, Wengang Xu:
Blockchain-Based Key Management and Green Routing Scheme for Vehicular Named Data Networking. 3717702:1-3717702:13 - Jinglan Ou
, Hangchuan Shi
, Liubin Wang, Rui Ma
, Haowei Wu
:
Analysis of SWIPT-Enabled Relay Networks with Full-Duplex Destination-Aided Jamming. 6193012:1-6193012:18 - Jian Jiang
, Fen Zhang
:
Detecting Portable Executable Malware by Binary Code Using an Artificial Evolutionary Fuzzy LSTM Immune System. 3578695:1-3578695:12 - Yongqiang Zhou
, Huan Qian, Qihao Wang, Suoping Li:
Performance Modeling Analysis of D-MSMR-CARQ with Relay Selection in Wireless Sensor Networks. 5533926:1-5533926:11 - Lin Zhang
, Xinyan Wei, Yanwen Huang, Haiping Huang
, Xiong Fu
, Ruchuan Wang:
GT-Bidding: Group Trust Model of P2P Network Based on Bidding. 8842181:1-8842181:13 - Christian Johansen
, Aulon Mujaj, Hamed Arshad
, Josef Noll:
The Snowden Phone: A Comparative Survey of Secure Instant Messaging Mobile Applications. 9965573:1-9965573:30 - Jianbo Du, Yan Sun, Aijing Sun
, Guangyue Lu
, Zhixian Chang, Haotong Cao, Jie Feng:
Cost-Effective Optimization for Blockchain-Enabled NOMA-Based MEC Networks. 8259817:1-8259817:9 - M. Yasir Mehmood, Ammar Oad
, Muhammad Abrar
, Hafiz Mudassir Munir
, Syed Faraz Hasan
, Hafiz Abd Ul Muqeet, Noorbakhsh Amiri Golilarz:
Edge Computing for IoT-Enabled Smart Grid. 5524025:1-5524025:16 - (Withdrawn) Intrusion Detection Method Based on Adaptive Clonal Genetic Algorithm and Backpropagation Neural Network. 9938586:1-9938586:12
- Maohua Guo
, Jinlong Fei
, Yitong Meng
:
Deep Nearest Neighbor Website Fingerprinting Attack Technology. 5399816:1-5399816:14 - Yannick Abanda
, Alain Tiedeu
, Guillaume Kom
:
Image Encryption with Fusion of Two Maps. 6624890:1-6624890:16 - Zelin Zhang
, Jian Xu
, Bin Ma
, Chunpeng Wang
, Jian Li
, Yuli Wang
:
Medical Image Key Area Protection Scheme Based on QR Code and Reversible Data Hiding. 5511806:1-5511806:11 - Lin Ge
, Tao Jiang
:
A Privacy Protection Method of Lightweight Nodes in Blockchain. 2067137:1-2067137:17 - (Withdrawn) Hybrid Structures Applied to Subalgebras of BCH-Algebras. 8960437:1-8960437:8
- Dan Tang
, Hongliang Cai
:
A Novel Decoding Method for the Erasure Codes. 8755697:1-8755697:12 - Jianguo Sun
, Yang Yang
, Zechao Liu
, Yuqing Qiao
:
Multi-Authority Criteria-Based Encryption Scheme for IoT. 9174630:1-9174630:15 - Hongjian Jin
, Xingshu Chen
, Xiao Lan
, Hui Guo, Hongxia Zhang
, Qi Cao
:
Corrigendum to "BNRDT: When Data Transmission Meets Blockchain". 9814372:1-9814372:1 - Reza Soltani
, Uyen Trang Nguyen
, Aijun An
:
A Survey of Self-Sovereign Identity Ecosystem. 8873429:1-8873429:26 - Pengkun Li
, Jinshu Su
, Xiaofeng Wang
, Qianqian Xing
:
DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability. 1974493:1-1974493:17 - (Withdrawn) Semisupervised Learning-Based Sensor Ontology Matching. 2002307:1-2002307:5
- Yan Zhao
, Shuai Liu
:
Robust Image Hashing Based on Cool and Warm Hue and Space Angle. 3803481:1-3803481:13 - Guoai Xu
, Jiangtao Yuan
, Guosheng Xu
, Zhongkai Dang
:
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. 5566179:1-5566179:8 - Junsong Zhang
, Qikun Zhang, Zhigang Li, Xianling Lu
, Yong Gan:
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks. 4939589:1-4939589:11 - Haibin Yang, Zhengge Yi
, Ruifeng Li, Zheng Tu, Xu An Wang
, Yuanyou Cui, Xiaoyuan Yang:
Improved Outsourced Provable Data Possession for Secure Cloud Storage. 1805615:1-1805615:12 - (Withdrawn) Gradient Descent Optimization in Deep Learning Model Training Based on Multistage and Method Combination Strategy. 9956773:1-9956773:15
- Ejin Kim
, Hyoung-Kee Choi
:
Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild. 6245306:1-6245306:13 - Hai Liu
, Changgen Peng
, Youliang Tian, Shigong Long, Zhenqiang Wu:
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective. 5592191:1-5592191:14 - Guiyong Xu, Yang Xu, Sicong Zhang, Xiaoyao Xie:
SFRNet: Feature Extraction-Fusion Steganalysis Network Based on Squeeze-and-Excitation Block and RepVgg Block. 3676720:1-3676720:11 - Yuye Wang
, Jing Yang
, Jianpei Zhan
:
Differentially Private Attributed Network Releasing Based on Early Fusion. 9981752:1-9981752:13 - Sulaiman Khan
, Habib Ullah Khan
, Shah Nazir
:
Offline Pashto Characters Dataset for OCR Systems. 3543816:1-3543816:7 - (Withdrawn) Research on Classification Method of Network Resources Based on Modified SVM Algorithm. 5841829:1-5841829:8
- Haibin Shi, Guang Cheng
, Ying Hu, Fuzhou Wang, Haoxuan Ding:
RT-SAD: Real-Time Sketch-Based Adaptive DDoS Detection for ISP Network. 9409473:1-9409473:10 - Hansong Du
, Jiu-fen Liu
, Yu-guo Tian
, Xiangyang Luo
:
Cryptographic Secrecy Analysis of Adaptive Steganographic Syndrome-Trellis Codes. 5495941:1-5495941:16 - Yubo Song
, Yijin Geng, Junbo Wang, Shang Gao, Wei Shi:
Permission Sensitivity-Based Malicious Application Detection for Android. 6689486:1-6689486:12 - Yuxian Huang
, Geng Yang, Yahong Xu, Hao Zhou:
Differential Privacy Principal Component Analysis for Support Vector Machines. 5542283:1-5542283:12 - Xingzheng Li
, Bingwen Feng
, Guofeng Li
, Tong Li
, Mingjin He
:
A Vulnerability Detection System Based on Fusion of Assembly Code and Source Code. 9997641:1-9997641:11 - Feng Xiao
, Enhong Chen
, Qiang Xu, Xianguo Zhang:
ICSTrace: A Malicious IP Traceback Model for Attacking Data of the Industrial Control System. 7525092:1-7525092:14 - (Withdrawn) Design of Multimedia Vocal Music Education Data Integration System Based on Adaptive Genetic Algorithm. 3897696:1-3897696:9
- Yichuan Wang
, Han Yu
, Xinhong Hei
, Binbin Bai, Wenjiang Ji:
From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT. 9179286:1-9179286:13 - Jiu Lou
, Zhongliang Xu, Decheng Zuo
, Hongwei Liu
:
Feature Extraction Method for Hidden Information in Audio Streams Based on HM-EMD. 5566347:1-5566347:12 - Yu Zhou
, Yongzhuang Wei, Hailong Zhang, Wenzheng Zhang:
On the Modified Transparency Order of n , m -Functions. 6640099:1-6640099:14 - Yifan Luo, Feng Ye, Bin Weng
, Shan Du
, Tianqiang Huang:
A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training. 4280328:1-4280328:10 - (Withdrawn) An Improved Cuckoo Search Algorithm for Multithreshold Image Segmentation. 6036410:1-6036410:10
- Lihua Zhang
, Yu Cao
, Ganzhe Zhang
, Yang Huang
, Chen Zheng
:
A Blockchain-Based Microgrid Data Disaster Backup Scheme in Edge Computing. 9121571:1-9121571:19 - Hao Yang
, Qin He
, Zhenyan Liu
, Qian Zhang
:
Malicious Encryption Traffic Detection Based on NLP. 9960822:1-9960822:10 - (Withdrawn) Research on Evaluation Method of Sports Events Based on Edge Algorithm. 1903699:1-1903699:9
- (Withdrawn) Research on Real-Time Detection of Sprint Error Based on Visual Features and Internet of Things. 2136776:1-2136776:10
- (Withdrawn) Research on the Management Information System of College Education and Teaching Based on Web. 5090813:1-5090813:8
- Hwanjo Heo
, Seungwon Shin
:
Understanding Block and Transaction Logs of Permissionless Blockchain Networks. 9549602:1-9549602:18 - Shuailiang Zhang
, Xiujuan Du
, Xin Liu:
An Efficient and Provable Multifactor Mutual Authentication Protocol for Multigateway Wireless Sensor Networks. 2037188:1-2037188:17 - Xiang Liu
, Yuchun Guo, Xiaoying Tan, Yishuai Chen:
Differentially Private Web Browsing Trajectory over Infinite Streams. 9968905:1-9968905:14 - Junjie Huang, Liang Tan, Sun Mao
, Keping Yu
:
Blockchain Network Propagation Mechanism Based on P4P Architecture. 8363131:1-8363131:12 - Chalee Vorakulpipat
, Ryan K. L. Ko
, Qi Li
, Ahmed Meddahi
:
Security and Privacy in Smart Cities. 9830547:1-9830547:2 - Alireza Chamkoori
, Serajdean Katebi
:
Robustness of the Storage in Cloud Data Centers Based on Simple Swarm Optimization Algorithm. 6667210:1-6667210:17 - Wentao Yu
, Xiaohui Huang, Qingjun Yuan, Mianzhu Yi
, Sen An, Xiang Li:
Information Security Field Event Detection Technology Based on SAtt-LSTM. 5599962:1-5599962:8 - Luo Sheng
:
User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption. 6617669:1-6617669:11 - Yibo Han, Weiwei Zhang, Zheng Zhang
:
Security Analysis of Intelligent System Based on Edge Computing. 1224333:1-1224333:10 - (Withdrawn) Detecting Temporal Attacks: An Intrusion Detection System for Train Communication Ethernet Based on Dynamic Temporal Convolutional Network. 3913515:1-3913515:21
- Xieyang Shen
, Chuanhe Huang
, Xiajiong Shen, Jiaoli Shi
, Danxin Wang:
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction. 7249470:1-7249470:11 - Zelin Deng
, Qiran Zhu
, Pei He
, Dengyong Zhang
, Yuansheng Luo
:
A Saliency Detection and Gram Matrix Transform-Based Convolutional Neural Network for Image Emotion Classification. 6854586:1-6854586:12 - Yunhui Li
, Liang Chang
, Long Li
, Xuguang Bao
, Tianlong Gu
:
TASC-MADM: Task Assignment in Spatial Crowdsourcing Based on Multiattribute Decision-Making. 5448397:1-5448397:14 - Han Zhong
, Ruize Sun
, Fengcheng Mei
, Yong Chen
, Fan Jin
, Lei Ning
:
Deep Grid Scheduler for 5G NB-IoT Uplink Transmission. 5263726:1-5263726:10 - (Withdrawn) Design of Project Cost Risk Management System Based on Improved Fuzzy Rule Weight Algorithm. 4688846:1-4688846:9
- (Withdrawn) Design and Reconstruction of Visual Art Based on Virtual Reality. 1014017:1-1014017:9
- Liyan Zhu
, Jinwei Wang
, Xiangyang Luo
, Yi Zhang
, Chunfang Yang
, Fenlin Liu
:
PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks. 9864833:1-9864833:15 - Jiatong Li, Zhibo Li, Xuanying Li, Cheng Wang
:
Energy-Saving D2D Wireless Networking Based on ACO and AIA Fusion Algorithm. 5781166:1-5781166:9 - (Withdrawn) Research on the Mental Health of College Students Based on Fuzzy Clustering Algorithm. 3960559:1-3960559:8
- Caixue Zhou
:
A Certificate-Based Provable Data Possession Scheme in the Standard Model. 9974485:1-9974485:12 - Yanli Shi
, Pengpeng Sheng
:
J-Net: Asymmetric Encoder-Decoder for Medical Semantic Segmentation. 2139024:1-2139024:8 - (Withdrawn) Analysis and Research of Psychological Education Based on Data Mining Technology. 8979507:1-8979507:8
- (Withdrawn) Research on Balance Control of Freestyle Skiing Aerial Skills Based on Ant Colony Algorithm. 4503358:1-4503358:10
- (Withdrawn) Orthogonal Frequency Division Multiplexing Underwater Acoustic Communication System with Environmental Cognition Ability. 1640072:1-1640072:12
- Peng Li
, Junzuo Lai
, Yongdong Wu:
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting. 6611518:1-6611518:17 - Luke Cranfill
, Jeehyeong Kim
, Hongkyu Lee
, Victor Youdom Kemmoe
, Sunghyun Cho
, Junggab Son
:
Efficient yet Robust Privacy Preservation for MPEG-DASH-Based Video Streaming. 4702469:1-4702469:14 - Ming Li
, Dezhi Han
, Xinming Yin
, Han Liu
, Dun Li
:
Design and Implementation of an Anomaly Network Traffic Detection Model Integrating Temporal and Spatial Features. 7045823:1-7045823:15 - Yan Mi
, Hengwei Zhang
, Hao Hu
, Jinglei Tan
, Jindong Wang
:
Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model. 5594697:1-5594697:16 - Guangquan Xu, Guofeng Feng
, Litao Jiao, Meiqi Feng, Xi Zheng
, Jian Liu
:
FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services. 5395705:1-5395705:10 - Wei Dai
, Wei Wang
, Zhongtian Mao
, Ruwen Jiang
, Fudong Nian
, Teng Li
:
Distributed Policy Evaluation with Fractional Order Dynamics in Multiagent Reinforcement Learning. 1020466:1-1020466:7 - (Withdrawn) Analysis of English Performance Rating Based on Machine Learning and Optimized BP Network Technology. 9294356:1-9294356:12
- Jingjing Zhang
, Xianming Gao
, Lin Yang
, Tao Feng
, Dongyang Li
, Qiang Wang
:
A Systematic Approach to Formal Analysis of QUIC Handshake Protocol Using Symbolic Model Checking. 1630223:1-1630223:12 - Hyun Kwon
:
MedicalGuard: U-Net Model Robust against Adversarially Perturbed Images. 5595026:1-5595026:8 - Huan Dai
, Pengzhan Shi
, He Huang, Ruyu Chen
, Jun Zhao
:
Towards Trustworthy IoT: A Blockchain-Edge Computing Hybrid System with Proof-of-Contribution Mechanism. 3050953:1-3050953:13 - (Withdrawn) Intrusion Detection for Industrial Control Systems Based on Open Set Artificial Neural Network. 4027900:1-4027900:14
- Liquan Chen
, Tianyang Tu, Kunliang Yu
, Mengnan Zhao, Yingchao Wang:
V-LDAA: A New Lattice-Based Direct Anonymous Attestation Scheme for VANETs System. 4660875:1-4660875:13 - Huijie Yang
, Jian Shen
, Junqing Lu
, Tianqi Zhou
, Xueya Xia
, Sai Ji
:
A Privacy-Preserving Data Transmission Scheme Based on Oblivious Transfer and Blockchain Technology in the Smart Healthcare. 5781354:1-5781354:12 - Shuang Yao
, Dawei Zhang
:
Anonymous Certificate-Based Inner Product Broadcast Encryption. 6639835:1-6639835:17 - (Withdrawn) Design of English Interactive Teaching System Based on Association Rules Algorithm. 9275363:1-9275363:10
- Yanli Shao
, Jingru Zhao, Xingqi Wang, Weiwei Wu, Jinglong Fang
:
Research on Cross-Company Defect Prediction Method to Improve Software Security. 5558561:1-5558561:19 - Yujiang Lu
, Yaju Liu
, Jianwei Fei
, Zhihua Xia
:
Channel-Wise Spatiotemporal Aggregation Technology for Face Video Forensics. 5524930:1-5524930:13 - Jinhuan Duan, Xianxian Li
, Shiqi Gao, Zili Zhong, Jinyan Wang
:
SSGD: A Safe and Efficient Method of Gradient Descent. 5404061:1-5404061:11 - Jianhong Zhang
, Menglong Wu
:
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification. 3963037:1-3963037:13 - (Withdrawn) A New Method of Denoising Crop Image Based on Improved SVD in Wavelet Domain. 9995813:1-9995813:11
- Shanjun Zhan
, Lisu Yu
, Zhen Wang
, Yichen Du
, Yan Yu
, Qinghua Cao
, Shuping Dang
, Zahid Khan
:
Cell Traffic Prediction Based on Convolutional Neural Network for Software-Defined Ultra-Dense Visible Light Communication Networks. 9223965:1-9223965:10 - (Withdrawn) Research on Risk Assessment of Science and Technology Data in Network Finance Based on Portfolio Empowerment. 2425383:1-2425383:10
- (Withdrawn) Intelligent Recognition Method of Vehicle Path with Time Window Based on Genetic Algorithm. 3614291:1-3614291:11
- Zhi Yao
, Hailing Sun
, Guofu Zhou:
Real-Time Facial Expression Recognition System for Video Big Sensor Data Security Application. 9539022:1-9539022:10 - Luping Wang
, Kai Zhang, Haifeng Qian, Jie Chen
:
Group Signature with Verifier-Local Revocation Based on Coding Theory. 3259767:1-3259767:12 - (Withdrawn) Braking Control System of Oilfield Minor Repair Machine Based on Wireless Sensor Network. 6966041:1-6966041:14
- Chulwon Lee
, Kyungho Lee:
Factors Affecting Corporate Security Policy Effectiveness in Telecommuting. 2634817:1-2634817:13 - Xiaoyu Xu
, Hao Hu, Yuling Liu, Hongqi Zhang, Dexian Chang:
An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector. 8848473:1-8848473:17 - Sanjeev Kumar Dwivedi
, Priyadarshini Roy, Chinky Karda, Shalini Agrawal, Ruhul Amin
:
Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive Survey. 7142048:1-7142048:21 - (Withdrawn) An IoT-Based Water Level Detection System Enabling Fuzzy Logic Control and Optical Fiber Sensor. 4229013:1-4229013:11
- Azidine Guezzaz, Said Benkirane, Mourade Azrour
, Shahzada Khurram:
A Reliable Network Intrusion Detection Approach Using Decision Tree with Enhanced Data Quality. 1230593:1-1230593:8 - Sirajuddin Qureshi
, Jianqiang Li
, Faheem Akhtar
, Saima Tunio, Zahid Hussain Khand
, Ahsan Wajahat
:
Analysis of Challenges in Modern Network Forensic Framework. 8871230:1-8871230:13 - (Withdrawn) Hierarchical Attention Graph Embedding Networks for Binary Code Similarity against Compilation Diversity. 9954520:1-9954520:19
- Siffat Ullah Khan
, Habib Ullah Khan
, Naeem Ullah, Rafiq Ahmad Khan
:
Challenges and Their Practices in Adoption of Hybrid Cloud Computing: An Analytical Hierarchy Approach. 1024139:1-1024139:20 - Tao Wan
, Shixin Yue
, Weichuan Liao
:
Privacy-Preserving Incentive Mechanism for Mobile Crowdsensing. 4804758:1-4804758:17 - George Iakovakis, Constantinos-Giovanni Xarhoulacos, Konstantinos Giovas, Dimitris Gritzalis
:
Analysis and Classification of Mitigation Tools against Cyberattacks in COVID-19 Era. 3187205:1-3187205:21 - (Withdrawn) HS-MOEA/D: An Oriented Algorithm for Delay and Reliability VNF-SC Deployment. 5538931:1-5538931:9
- Gholamreza Farahani
:
Black Hole Attack Detection Using K-Nearest Neighbor Algorithm and Reputation Calculation in Mobile Ad Hoc Networks. 8814141:1-8814141:15 - Wenle Bai, Zhongjun Yang
, Jianhong Zhang, Rajiv Kumar:
Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing. 4348511:1-4348511:9 - Wenqiu Zhu
, Guang Zou
, Qiang Liu
, Zhigao Zeng
:
An Enhanced Visual Attention Siamese Network That Updates Template Features Online. 9719745:1-9719745:19 - Tianqi Zhou
, Jian Shen
, Yongjun Ren
, Sai Ji
:
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems. 1864514:1-1864514:8 - Qing Ren, Feng Tian
, Xiangyi Lu, Yumeng Shen, Zhenqiang Wu, Xiaolin Gui:
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks. 5317062:1-5317062:12 - Hanqing Ding, Qing Zhang, Yifeng Yin
, Yong Gan, Weihua Liu:
Research on Lightweight Mutual Authentication for the Product Authorization Chain. 8852901:1-8852901:9 - Zhanhui Yuan
, Wenfa Li
, Zhi Yang
, Lei Sun, Xuehui Du, Hongqi Zhang:
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification. 2481818:1-2481818:22 - Shaik Vaseem Akram
, Sultan S. Alshamrani
, Rajesh Singh
, Mamoon Rashid
, Anita Gehlot
, Ahmed Saeed Alghamdi
, Deepak Prashar
:
Blockchain Enabled Automatic Reward System in Solid Waste Management. 6952121:1-6952121:14 - Junjie Mao, Bin Weng, Tianqiang Huang
, Feng Ye, Liqing Huang:
Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks. 3670339:1-3670339:12 - Lin Liu, Wang Ren, Feng Xie, Shengwei Yi, Junkai Yi, Peng Jia
:
Learning-Based Detection for Malicious Android Application Using Code Vectorization. 9964224:1-9964224:11 - Yingjie Xu
, Gengran Hu
, Lin You
, Chengtang Cao
:
A Novel Machine Learning-Based Analysis Model for Smart Contract Vulnerability. 5798033:1-5798033:12 - Chuan Mou, Ye Cheng
:
Research on Information Resource Sharing and Big Data of Sports Industry in the Background of OpenStack Cloud Platform. 2824146:1-2824146:12 - Fei Yan
, Xue Yang
, Nianqiao Li
, Xu Yu
, Hongyu Zhai
:
Emotion Generation and Transition of Companion Robots Based on Plutchik's Model and Quantum Circuit Schemes. 6802521:1-6802521:15 - (Withdrawn) Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery. 5287514:1-5287514:16
- Quan Sun
, Xinyu Miao, Zhihao Guan, Jin Wang, Demin Gao
:
Spoofing Attack Detection Using Machine Learning in Cross-Technology Communication. 3314595:1-3314595:12 - (Withdrawn) Cross-Border E-Commerce Supply Chain Risk Evaluation with FUZZY-ISM Model. 5155524:1-5155524:14
- Shudong Li
, Qianqing Zhang
, Xiaobo Wu
, Weihong Han
, Zhihong Tian
:
Attribution Classification Method of APT Malware in IoT Using Machine Learning Techniques. 9396141:1-9396141:12 - Yan Li
, Zheng Wan
:
Blockchain-Enabled Intelligent Video Caching and Transcoding in Clustered MEC Networks. 7443260:1-7443260:17 - (Withdrawn) A Method of Enterprise Financial Risk Analysis and Early Warning Based on Decision Tree Model. 6950711:1-6950711:9
- Muhammad Javed Iqbal, Muhammad Munwar Iqbal, Iftikhar Ahmad, Madini O. Alassafi
, Ahmed S. Alfakeeh
, Ahmed Alhomoud
:
Real-Time Surveillance Using Deep Learning. 6184756:1-6184756:17 - Tsu-Yang Wu
, Lei Yang
, Jia-Ning Luo
, Jimmy Ming-Tai Wu
:
A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments. 2299632:1-2299632:15 - ChuanPeng Guo
, Wei Yang
, Mengxia Shuai
, Liusheng Huang
:
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network. 1627486:1-1627486:15 - Feng Luo
, Yifan Jiang
, Zhaojing Zhang
, Yi Ren
, Shuo Hou
:
Threat Analysis and Risk Assessment for Connected Vehicles: A Survey. 1263820:1-1263820:19 - (Withdrawn) Economic Decision-Making Algorithm for Cross-Border Industrial E-Commerce Material Purchase Quantity Based on Markov Chain. 1439692:1-1439692:9
- Mourade Azrour
, Jamal Mabrouki
, Azidine Guezzaz
, Ambrina Kanwal:
Internet of Things Security: Challenges and Key Issues. 5533843:1-5533843:11 - Xiaofeng Lu
, Songbing Fu
, Cheng Jiang
, Pietro Lió
:
A Fine-Grained IoT Data Access Control Scheme Combining Attribute-Based Encryption and Blockchain. 5308206:1-5308206:13 - Kottapalli Prasanna
, Kadiyala Ramana
, Gaurav Dhiman
, Sandeep Kautish
, V. Deeban Chakravarthy
:
PoC Design: A Methodology for Proof-of-Concept (PoC) Development on Internet of Things Connected Dynamic Environments. 7185827:1-7185827:12 - Zihao Shao, Huiqiang Wang
, Yifan Zou, Zihan Gao, Hongwu Lv:
From Centralized Protection to Distributed Edge Collaboration: A Location Difference-Based Privacy-Preserving Framework for Mobile Crowdsensing. 5855745:1-5855745:18 - (Withdrawn) Implementation of English "Online and Offline" Hybrid Teaching Recommendation Platform Based on Reinforcement Learning. 4875330:1-4875330:10
- (Withdrawn) Research on Low Frame Rate Video Compression Algorithm in the Context of New Media. 7494750:1-7494750:10
- Wenjing Lv, Rui Wang
, Jun Wu
, Zhijun Fang, Songlin Cheng
:
Joint Design of Beamforming and Edge Caching in Fog Radio Access Networks. 1935453:1-1935453:8 - (Withdrawn) Macroeconomic Short-Term High-Precision Combined Forecasting Algorithm Based on Grey Model. 7026064:1-7026064:9
- Yong Zeng
, Yixin Li
, Zhongyuan Jiang, Jianfeng Ma:
GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum. 8609278:1-8609278:11 - Zhiming Zhang
, Yu Yang, Wei Yang, Fuying Wu, Ping Li, Xiaoyong Xiong:
Detection and Location of Malicious Nodes Based on Homomorphic Fingerprinting in Wireless Sensor Networks. 9082570:1-9082570:12 - (Withdrawn) Research on Intelligent Calibration of English Long Sentence Translation Based on Corpus. 5365915:1-5365915:9
- (Withdrawn) Research on Educational Information Platform Based on Cloud Computing. 3109473:1-3109473:11
- Yong Ding
, Hui Xu, Yujue Wang, Fang Yuan, Hai Liang
:
Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks. 9520941:1-9520941:11 - Siriboon Chaisawat
, Chalee Vorakulpipat
:
Towards Achieving Personal Privacy Protection and Data Security on Integrated E-Voting Model of Blockchain and Message Queue. 8338616:1-8338616:14 - Hang-chao Ding
, Han Jiang
, Qiuliang Xu
:
Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE. 9974604:1-9974604:15 - Rajesh L
, Penke Satyanarayana
:
Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol. 8887666:1-8887666:15 - (Withdrawn) Design of Automatic Course Arrangement System for Electronic Engineering Teaching Based on Monte Carlo Genetic Algorithm. 3564722:1-3564722:11
- (Withdrawn) Design of Remote Real-Time Positioning Method for Long-Distance Running under Wireless Network Technology. 5298736:1-5298736:9
- Maohua Guo
, Jinlong Fei
:
Website Fingerprinting Attacks Based on Homology Analysis. 6070451:1-6070451:14 - (Withdrawn) Prediction of IoT Traffic Using the Gated Recurrent Unit Neural Network- (GRU-NN-) Based Predictive Model. 1425732:1-1425732:7
- Kaijiao Huang
, Liansheng Tan
, Gang Peng:
Stability of SDE-LJN System in the Internet to Mitigate Constant-Rate DDoS Attacks. 4733190:1-4733190:17 - (Withdrawn) Accurate Estimation of English Word Similarity Based on Semantic Network. 8112735:1-8112735:9
- Olutosin Taiwo
, Absalom E. Ezugwu
:
Internet of Things-Based Intelligent Smart Home Control System. 9928254:1-9928254:17 - (Withdrawn) Personalized Online Education Learning Strategies Based on Transfer Learning Emotion Classification Model. 5441631:1-5441631:11
- Jiajie Liu
, Bing Sun, Chao Li:
New Approach towards Generalizing Feistel Networks and Its Provable Security. 2751797:1-2751797:26 - (Withdrawn) Financial Fraud Detection in Healthcare Using Machine Learning and Deep Learning Techniques. 9293877:1-9293877:8
- Dongyang Li
, Lin Yang, Hongguang Zhang, Xiaolei Wang
, Linru Ma, Junchao Xiao:
Image-Based Insider Threat Detection via Geometric Transformation. 1777536:1-1777536:18 - Yongli Tang
, Feifei Xia
, Qing Ye
, Mengyao Wang, Ruijie Mu, Xiaohang Zhang:
Identity-Based Linkable Ring Signature on NTRU Lattice. 9992414:1-9992414:17 - Yu Jiang
, Hua Fu, Aiqun Hu, Wen Sun:
A LoRa-Based Lightweight Secure Access Enhancement System. 3530509:1-3530509:16 - (Withdrawn) IIBE: An Improved Identity-Based Encryption Algorithm for WSN Security. 8527068:1-8527068:8
- Tao Zhou
, Kui Xu
, Chunguo Li
, Zhexian Shen
:
Power Optimization for Aerial Intelligent Reflecting Surface-Aided Cell-Free Massive MIMO-Based Wireless Sensor Network. 9989098:1-9989098:10 - Chunxiao Wang
, Jingjing Zhang
, Wei Jiang, Shuang Wang:
A Deep Multimodal Model for Predicting Affective Responses Evoked by Movies Based on Shot Segmentation. 7650483:1-7650483:12 - (Withdrawn) Automatic Calibration Algorithm for English Text Translation Based on Semantic Features. 3870656:1-3870656:8
- (Withdrawn) An English Mobile Learning Platform Embedded in GSM-R Wireless Network Communication. 8228300:1-8228300:9
- (Withdrawn) Fog-Driven Secure Authentication and Key Exchange Scheme for Wearable Health Monitoring System. 8368646:1-8368646:14
- Jun He
, Xuan Shen
, Guoqiang Liu:
Improved Impossible Differentials and Zero-Correlation Linear Hulls of New Structure III. 6515844:1-6515844:11 - Xianwei Li
, Baoliu Ye
:
Latency-Aware Computation Offloading for 5G Networks in Edge Computing. 8800234:1-8800234:15 - (Withdrawn) A Systematic Analysis of Regression Test Case Selection: A Multi-Criteria-Based Approach. 5834807:1-5834807:11
- Feng Luo
, Bowen Wang
, Zihao Fang
, Zhenyu Yang
, Yifan Jiang
:
Security Analysis of the TSN Backbone Architecture and Anomaly Detection System Design Based on IEEE 802.1Qci. 6902138:1-6902138:17 - (Withdrawn) Evaluation Method of the Influence of Sports Training on Physical Index Based on Deep Learning. 6924262:1-6924262:8
- Nouf S. Aldahwan
, Muhammad Sher Ramzan
:
Factors Affecting the Organizational Adoption of Secure Community Cloud in KSA. 8134739:1-8134739:8 - Zhenyu Gao
, Jian Cao
, Xing-Wei Wang, Huayun Zhang
, Zengrong Xu
:
Online-Semisupervised Neural Anomaly Detector to Identify MQTT-Based Attacks in Real Time. 4587862:1-4587862:11 - Cheng Li, Guoyin Zhang, Yan Mao, Xin Zhao:
A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks. 9975912:1-9975912:9 - Jingyi Li, Yujue Wang, Yong Ding
, Wanqing Wu, Chunhai Li, Huiyong Wang:
A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks. 9463606:1-9463606:10 - (Withdrawn) Parallel Calculation Method of Patch Area Landscape Art Index Based on Surface Coverage Data. 9149734:1-9149734:10
- Yanli Ren
, Xianji Cai, Mingqi Hu:
Privacy-Preserving Redactable Blockchain for Internet of Things. 4485311:1-4485311:12 - Xian-wei Yang, Xueqiu Zhan
, Hongjuan Kang, Ying Luo:
Fast Software Implementation of Serial Test and Approximate Entropy Test of Binary Sequence. 1375954:1-1375954:10 - Xueying Qiu
, Yongzhuang Wei
, Samir Hodzic, Enes Pasalic:
Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo. 5310545:1-5310545:9 - (Withdrawn) Edge Location Method for Multidimensional Image Based on Edge Symmetry Algorithm. 1326357:1-1326357:11
- Rong Ma, Tao Feng
, Junli Fang:
Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT. 7776193:1-7776193:10 - (Withdrawn) An Efficient Resource and Topological Attribute-Based Configuration Algorithm of Virtual Networks. 9952793:1-9952793:13
- Ruonan Wang
, Min Luo
, Yihong Wen, Lianhai Wang, Kim-Kwang Raymond Choo
, Debiao He
:
The Applications of Blockchain in Artificial Intelligence. 6126247:1-6126247:16 - Chien-Ming Chen
, Shuangshuang Liu
:
Improved Secure and Lightweight Authentication Scheme for Next-Generation IoT Infrastructure. 6537678:1-6537678:13 - Muhammad Hameed Siddiqi
, Khurshed Asghar, Umar Draz
, Amjad Ali
, Madallah Alruwaili
, Yousef Alhwaiti
, Saad Awadh Alanazi
, M. M. Kamruzzaman
:
Image Splicing-Based Forgery Detection Using Discrete Wavelet Transform and Edge Weighted Local Binary Patterns. 4270776:1-4270776:10 - Dimitrios Kosmanos
, Dimitrios Karagiannis, Antonios Argyriou
, Spyros Lalis
, Leandros Maglaras
:
RF Jamming Classification Using Relative Speed Estimation in Vehicular Wireless Networks. 9959310:1-9959310:16 - Shichao Gao
, Ming Xia, Gaobo Yang
:
Dual-Tree Complex Wavelet Transform-Based Direction Correlation for Face Forgery Detection. 8661083:1-8661083:10 - Deng Zhao, Weiwei Chen
:
Design and Research of Smart Neck Helmets Based on the KANO-QFD Model and TRIZ Theory. 4693719:1-4693719:13 - (Withdrawn) Deep Reinforcement Learning-Based Algorithm for VNF-SC Deployment. 7398206:1-7398206:11
- Peng Lu
, Teng Hu
, Hao Wang
, Ruobin Zhang
, Guo Wu
:
G-CAS: Greedy Algorithm-Based Security Event Correlation System for Critical Infrastructure Network. 3566360:1-3566360:13 - Mantun Chen
, Yongjun Wang
, Zhiquan Qin
, Xiatian Zhu
:
Few-Shot Website Fingerprinting Attack with Data Augmentation. 2840289:1-2840289:13 - Yong Fang
, Mingyu Xie, Cheng Huang
:
PBDT: Python Backdoor Detection Model Based on Combined Features. 9923234:1-9923234:13 - Ruyan Wang, Shiqi Zhang
, Zhigang Yang, Puning Zhang, Dapeng Wu, Yongling Lu, Alexander A. Fedotov:
Private Data Aggregation Based on Fog-Assisted Authentication for Mobile Crowd Sensing. 7354316:1-7354316:12 - Jiageng Yang, Xinguo Zhang, Hui Lu
, Muhammad Shafiq
, Zhihong Tian
:
StFuzzer: Contribution-Aware Coverage-Guided Fuzzing for Smart Devices. 1987844:1-1987844:15 - Taimur Bakhshi
, Bogdan Ghita
:
Anomaly Detection in Encrypted Internet Traffic Using Hybrid Deep Learning. 5363750:1-5363750:16 - (Withdrawn) An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks. 5451820:1-5451820:14
- Huaifeng Shi
, Chengsheng Pan
, Li Yang
, Xiangxiang Gu
:
AGG: A Novel Intelligent Network Traffic Prediction Method Based on Joint Attention and GCN-GRU. 7751484:1-7751484:11 - (Withdrawn) Distributed Consensus Algorithm for Nonholonomic Wheeled Mobile Robot. 7617819:1-7617819:9
- Javier Junquera-Sánchez
, Carlos Cilleruelo
, Luis de-Marcos
, José Javier Martínez-Herráiz
:
Access Control beyond Authentication. 8146553:1-8146553:11 - Rong Ma
:
Edge Server Placement for Service Offloading in Internet of Things. 5109163:1-5109163:16 - Dapeng Man
, Fanyi Zeng, Wu Yang, Miao Yu
, Jiguang Lv, Yijing Wang:
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things. 9361348:1-9361348:11 - Baozhen Yang
, Xuedong Tian
:
Multimodal Blog Sentiment Classification Based on MD-HFCE. 7457585:1-7457585:13 - Jingjing Guo
, Jiacong Sun
:
Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing. 5686506:1-5686506:17 - Xinghua Liu
, Dandan Bai, Yunling Lv, Rui Jiang
, Shuzhi Sam Ge
:
UKF-Based Vehicle Pose Estimation under Randomly Occurring Deception Attacks. 5572186:1-5572186:12 - Shinya Haga
, Kazumasa Omote
:
IoT-Based Autonomous Pay-As-You-Go Payment System with the Contract Wallet. 8937448:1-8937448:10 - Chao Li
, Fan Li
, Lihua Yin
, Tianjie Luo
, Bin Wang
:
A Blockchain-Based IoT Cross-Domain Delegation Access Control Method. 3091104:1-3091104:11 - Amir Ali
, Zain Ul Abideen
, Kalim Ullah:
SESCon: Secure Ethereum Smart Contracts by Vulnerable Patterns' Detection. 2897565:1-2897565:14 - (Withdrawn) Some Novel Geometric Aggregation Operators of Spherical Cubic Fuzzy Information with Application. 3774353:1-3774353:14
- Chuan-Jun Yi
:
En-Route Message Authentication Scheme for Filtering False Data in WSNs. 4068507:1-4068507:18 - Hasan Alkahtani, Theyazn H. H. Aldhyani
:
Botnet Attack Detection by Using CNN-LSTM Model for Internet of Things Applications. 3806459:1-3806459:23 - Ki Hyeon Hong
, Un Gu Kang
, Byung Mun Lee
:
Enhanced Evaluation Model of Security Strength for Passwords Using Integrated Korean and English Password Dictionaries. 3122627:1-3122627:13 - Yuanyuan Huang
, Jiazhong Lu
, Haozhe Tang
, Xiaolei Liu
:
A Hybrid Association Rule-Based Method to Detect and Classify Botnets. 1028878:1-1028878:9 - Yaoqi Yang
, Xianglin Wei
, Renhui Xu, Laixian Peng
, Yunliang Liao, Lin Ge:
Security-Oriented Indoor Robots Tracking: An Object Recognition Viewpoint. 7456552:1-7456552:9 - Yong Tian
, Sirou Li, Chen Chen, Qiyue Zhang, Chuanzhen Zhuang, Xuejun Ding
:
Small CSI Samples-Based Activity Recognition: A Deep Learning Approach Using Multidimensional Features. 5632298:1-5632298:14 - Hongyun Cai
, Fuzhi Zhang
:
An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features. 2907691:1-2907691:18 - Hua Ren, Shaozhang Niu
, Haiju Fan, Ming Li, Zhen Yue:
Secure Image Authentication Scheme Using Double Random-Phase Encoding and Compressive Sensing. 6978772:1-6978772:20 - Xinliang Bi
, Xiaoyuan Yang
, Chao Wang
, Jia Liu
:
High-Capacity Image Steganography Algorithm Based on Image Style Transfer. 4179340:1-4179340:14 - Qi Xie
, Zixuan Ding
, Bin Hu
:
A Secure and Privacy-Preserving Three-Factor Anonymous Authentication Scheme for Wireless Sensor Networks in Internet of Things. 4799223:1-4799223:12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.