


default search action
21st TrustCom 2022: Wuhan, China
- IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022. IEEE 2022, ISBN 978-1-6654-9425-0

- Siyuan Ma, Yuewu Wang, Lingguang Lei, Yingjiao Niu, Haotian Shi, Jie Wang:

Booting IoT Terminal Device Securely with eMMC. 1-8 - Chenghua Tang, Chen Zhou, Min Hu, Mengmeng Yang, Baohua Qiang:

Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN. 9-19 - Chunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang:

Truthfully Negotiating Usage Policy for Data Sovereignty. 20-27 - Yong Kuang, Hongyun Xu, Rui Jiang, Zhikang Liu:

GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology. 28-35 - Yu'ang Zhang

, Yujie Song, Yu Wang, Yue Cao
, Xuefeng Ren, Fei Yan:
TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics. 36-43 - Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li:

Efficiently Constructing Topology of Dynamic Networks. 44-51 - Cailing Cai, Tsz Hon Yuen, Siu-Ming Yiu:

Hash Proof System with Auxiliary Inputs and Its Application. 52-59 - Guozhong Wang, Chunling Peng, Yi Huang:

The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration. 60-65 - Pengfei Liu, Weiping Wang, Hong Song, Shigeng Zhang, Yulu Hong:

HashDroid:Extraction of malicious features of Android applications based on function call graph pruning. 66-73 - Siyu Sun, Xiaoxuan Fan, Yunzhi Xia, Chenlu Zhu, Shenghao Liu, Lingzhi Yi:

Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design. 74-82 - Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao:

A Lightweight Honeynet Design In the Internet of Things. 83-88 - Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti

:
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. 89-96 - Jichao Bi, Shibo He, Fengji Luo, Jiming Chen, Da-Wen Huang, Mingyang Sun:

Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems. 97-104 - Yongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen:

TPIPD: A Robust Model for Online VPN Traffic Classification. 105-110 - Jinghong Lan, Yanan Li, Bo Li, Xudong Liu:

MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection. 111-116 - Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:

A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. 117-122 - Elliott Wen, Jia Wang

, Jens Dietrich
:
SecretHunter: A Large-scale Secret Scanner for Public Git Repositories. 123-130 - Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye, Jianxin Huang, Xiangdong Kong:

SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities. 131-138 - Junyu Shi, Wei Wan

, Shengshan Hu, Jianrong Lu, Leo Yu Zhang:
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning. 139-146 - Myles Foley

, Sergio Maffeis:
Haxss: Hierarchical Reinforcement Learning for XSS Payload Generation. 147-158 - Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song:

From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. 159-166 - Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li

, Xiaosong Zhang:
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM. 167-174 - Zhenquan Ding, Hui Xu, Yonghe Guo, Longchuan Yan, Lei Cui, Zhiyu Hao:

Mal-Bert-GCN: Malware Detection by Combining Bert and GCN. 175-183 - Chuanxi Chen, Dengpan Ye, Hao Wang, Long Tang

, Yue Xu:
Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning. 184-191 - Xiuhua Wen, Chunjie Cao, Yifan Li, Yang Sun:

DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification. 192-200 - Yuan Shen, Wei Song, Changsheng Zhao, Zhiyong Peng:

Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption. 201-208 - Xuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li:

Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation. 209-216 - Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao:

AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. 217-224 - Yun He, Xiaoqi Jia, Shengzhi Zhang

, Lou Chitkushev
:
EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave. 225-232 - Chao Xia, Yaqi Liu, Qingxiao Guan, Sai Ma, Yu Nan, Jiahui Fu:

Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model. 233-238 - Weizhong Qiang, Hao Luo:

AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring. 239-247 - Chaochao Zhang, Rui Hou:

Security Support on Memory Controller for Heap Memory Safety. 248-257 - Qichang Wan, Peisen Wang, Xiaobing Pei:

CGDF-GNN: Cascaded GNN fraud detector with dual features facing imbalanced graphs with camouflaged fraudsters. 258-265 - Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu:

You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. 266-273 - Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu:

CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph. 274-282 - Chunlan Fu, Shirong Han, Gang Shen

:
Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning. 283-290 - Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:

A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. 291-298 - Minqiu Tian, Zifu Li, Fenghua Li, Jin Cao, Chao Guo:

A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. 299-306 - Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu:

DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM. 307-314 - Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig

, Krishna Narasimhan, Mira Mezini:
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. 315-322 - Zhuoqun Xia, Kaixin Zhou, Jingjing Tan, Hongmei Zhou:

Bidirectional LSTM-based attention mechanism for CNN power theft detection. 323-330 - Tongwei Liu, Baokang Zhao, Wei Peng:

An Efficient Certificateless Authentication Scheme for Satellite Internet. 331-338 - Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren:

tTree+: A Threat Tree Model for Representing Complex Semantics. 339-344 - Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou:

Data Poisoning Attack to X-armed Bandits. 345-351 - You Zhai, Jian Yang

, Zixiang Wang, Longtao He, Liqun Yang, Zhoujun Li:
Cdga: A GAN-based Controllable Domain Generation Algorithm. 352-360 - Chengyao Hua, Shigeng Zhang, Weiping Wang, Zhankai Li

, Jian Zhang:
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples. 361-368 - Jinbo Wen, Xiaojun Liu, Zehui Xiong

, Meng Shen, Siming Wang, Yutao Jiao, Jiawen Kang
, He Li:
Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G. 369-374 - José Reverte Cazorla, José María de Fuentes, Lorena González-Manzano:

Eye-based keystroke prediction for natural texts - a feasibility analysis. 375-382 - Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu

, Shujun Li:
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments. 383-390 - Weiqing Huang, Xinbo Han

, Meng Zhang, Min Li, Wen Liu, Zheng Yang, Haitian Yang:
MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection. 391-398 - Minfeng Qi

, Zhiyu Xu
, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan:
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. 399-406 - Cairui She, Liwei Chen, Gang Shi:

TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection. 407-414 - Mengfan Wang, Guifang Huang, Hongmin Gao, Lei Hu:

Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise. 415-421 - Chuang Wang, Yan Ding, Chenlin Huang, Liantao Song:

An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field. 422-428 - Zhuoqun Xia, Hongrui Li, Ke Gu:

CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature. 429-434 - Haili Sun

, Yan Huang, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou:
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. 435-440 - Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:

DRICP: Defect Risk Identification Using Sample Category Perception. 441-448 - Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He

:
Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection. 449-456 - Hongyu Yang, Haiyun Yang, Liang Zhang, Xiang Cheng:

Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph. 457-464 - Aneta Poniszewska-Maranda

, Kacper Pradzynski:
Code-based encryption algorithms for generating and verifying digital signature. 465-472 - Wenxiu Ding

, Wei Sun, Zheng Yan, Robert H. Deng
, Zhiguo Wan:
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. 473-482 - Fuji Han, Dongjun Zhu:

Intelligent Recognition Method of Web Application Categories Based on Multi-layer Simhash Algorithm. 483-489 - Mordechai Guri:

Near Field Air-Gap Covert Channel Attack. 490-497 - Weiqi Dai, Zhenhui Lu, Xia Xie, Duoqiang Wang, Hai Jin:

Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption. 498-505 - Weiqi Dai, Wenhao Zhao, Xia Xie, Song Wu, Hai Jin:

Shared Incentive System for Clinical Pathway Experience. 506-513 - Zhiwen Zhou, Ximeng Liu, Jiayin Li, Junxi Ruan, Mingyuan Fan:

Dynamically Selected Mixup Machine Unlearning. 514-524 - Akito Yamamoto

, Tetsuo Shibuya:
Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform. 525-532 - Yuzhe Li

, Bo Li
, Weiping Wang
, Nan Liu:
An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints. 533-540 - Muhammad Arsalan, Davide Di Matteo, Sana Imtiaz, Zainab Abbas, Vladimir Vlassov, Vadim Issakov:

Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams. 541-546 - Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou:

Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage. 547-555 - Hongjun Li, Fanyu Kong

, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao:
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. 556-564 - Qiaowen Jia, Guanxiong Ha, Hanwei Wang, Haoyu Ma, Hang Chen:

An enhanced MinHash encryption scheme for encrypted deduplication. 565-573 - Stefan More

, Sebastian Ramacher
, Lukas Alber, Marco Herzl:
Extending Expressive Access Policies with Privacy Features. 574-581 - Chao Huang

, Yanqing Yao, Xiaojun Zhang, Da Teng, Yingdong Wang, Lei Zhou:
Robust Secure Aggregation with Lightweight Verification for Federated Learning. 582-589 - Chennan Lin, Baisong Liu

, Xueyuan Zhang, Zhiye Wang, Ce Hu, Linze Luo:
Privacy-Preserving Recommendation with Debiased Obfuscaiton. 590-597 - Fayao Wang, Yuanyuan He, Yunchuan Guo, Peizhi Li, Xinyu Wei:

Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy. 598-605 - De Li

, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang:
A Green Neural Network with Privacy Preservation and Interpretability. 606-614 - Tao Zhang, Bowen Deng, Lele Zheng, Ze Tong, Qi Li:

HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy. 615-622 - Baochen Yan, Rui Zhang, Zheng Yan:

VoiceSketch: a Privacy-Preserving Voiceprint Authentication System. 623-630 - Qian Chen

, Hongbo Wang, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin:
LLDP: A Layer-wise Local Differential Privacy in Federated Learning. 631-637 - Hervais Simo, Michael Kreutzer:

Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media. 638-645 - Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger

:
Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA). 646-655 - Jie Fu, Zhili Chen, Xiao Han:

Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise. 656-663 - Bo Wang, Lingling Wang, Hongliang Guo, Peng Zhou:

Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets. 664-669 - Maxime Thouvenot, Philippe Calvez, Olivier Curé:

Kgastor: a Privacy By Design Knowledge Graph anonymized Store. 670-679 - Shaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu

:
Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. 680-686 - Macarious Abadeer, Wei Shi, Jean-Pierre Corriveau:

FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition. 687-694 - Yuting Xu, Mang Su, Jinpeng Hou, Chong Nie:

Federated Learning Scheme with Dual Security of Identity Authentication and Verification. 695-702 - Ou Ruan, Shanshan Qin:

Secure and efficient publicly verifiable ridge regression outsourcing scheme. 703-709 - Atsuko Miyaji

, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto:
Privacy-Preserving Data Analysis without Trusted Third Party. 710-717 - Yiping Teng, Dongyue Jiang, Mengmeng Sun, Liang Zhao, Li Xu, Chunlong Fan:

Privacy-Preserving Top-k Spatio-Textual Similarity Join. 718-726 - Zhipeng Zhou, Chenyu Dong, Donger Mo, Peijia Zheng:

Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing. 727-732 - Qing Gu, Xiangling Ding

, Dengyong Zhang, Ce Yang:
Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation. 733-738 - Yaqi Liu, Chao Xia, Qiang Cai, Xin Jin:

Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self Deep Matching Network. 739-746 - Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:

Deepro: Provenance-based APT Campaigns Detection via GNN. 747-758 - Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu:

A General Backdoor Attack to Graph Neural Networks Based on Explanation Method. 759-768 - Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei

, Zhihui Han, Yu Zhou:
APT Attribution for Malware Based on Time Series Shapelets. 769-777 - Juan Wang, Chenjun Ma

, Ziang Li
, Huanyu Yuan, Jie Wang:
ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning. 778-785 - Xiao Xiao, Minghua Xu, Han Xu:

A Novel Asynchronous Evolution Opinion Dynamics Model. 786-791 - Piotr Kawa, Marcin Plata, Piotr Syga

:
SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. 792-799 - Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding

, Lijun Gao:
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. 800-809 - Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li:

Robust Document Image Forgery Localization Against Image Blending. 810-817 - Xuejiao Luo, Xiaohui Han, Wenbo Zuo, Zhengyuan Xu, Zhiwen Wang, Xiaoming Wu:

A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection. 818-826 - Jian Chen, Yuan Gao, Yang Liu, Chen Wang

, Kai Peng:
Leveraging Model Poisoning Attacks on License Plate Recognition Systems. 827-834 - Chin-Tser Huang, Laurent Njilla, Tieming Geng:

Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. 835-842 - Shuhe Liu, Xiaolin Xu, Zhefeng Nan:

CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras. 843-850 - Yixuan Qiao, Minghui Zheng, Jingyi Yang:

Implementation of one-time editable blockchain chameleon hash function construction scheme. 851-856 - Kai Zhang, He Xiao, Qiuming Liu:

Data Integrity Verification Scheme Based on Blockchain Smart Contract. 857-863 - Dongdong Liu, Mingsheng Wang, Taotao Li, Ya Han:

A Faster Blockchain Sharding Protocol for Decentralized Ledger. 864-873 - Yuhang Ding, Zihan Yang, Bo Qin, Qin Wang

, Yanran Zhang, Qianhong Wu:
Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment. 874-881 - Jian Wang

, Weiqiong Cao, Hua Chen, Haoyuan Li:
Practical Side-Channel Attack on Message Encoding in Masked Kyber. 882-889 - Mei Yang, Chong Liu, Huiyun Li, Cuiping Shao:

Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles. 890-896 - Zhishen Zhu, Junzheng Shi, Chonghua Wang, Gang Xiong

, Zhiqiang Hao, Gaopeng Gou:
MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System. 897-904 - Lifeng Guo, Huide Lei, Wei-Chuen Yau:

One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control. 905-912 - Jiming Qi, Jiazheng Zhang

, Qingxia Liu, Bang Wang:
A Flow Attack Strategy based on Critical Links for Cyber-attack. 913-920 - Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao:

Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum. 921-926 - Jie Liu, Xingsheng Qin, Frank Jiang:

A quantum inspired differential evolution algorithm with multiple mutation strategies. 927-934 - Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur Rahman Bin Shahid, Omar J. Guerra, Joel Rodriguez:

A Multidimensional Blockchain Framework For Mobile Internet of Things. 935-944 - Xiaofeng Chen

, Ying Gao:
CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing. 945-952 - Xin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song

, Zhongyuan Qin:
VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN. 953-958 - Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman

, Fan Wu, Md. Zakirul Alam Bhuiyan:
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. 959-967 - Baowei Wang, Bin Li, Yi Yuan, Changyu Dai, Yufeng Wu, Weiqian Zheng:

CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashing. 968-975 - Yongkang Chen

, Ming Zhang
, Jin Li, Xiaohui Kuang, Xuhong Zhang, Han Zhang:
Dynamic and Diverse Transformations for Defending Against Adversarial Examples. 976-983 - Rui Gong, Lei Wang, Wei Shi, Wei Liu, Jianfeng Zhang:

A Hardware Security Isolation Architecture for Intelligent Accelerator. 984-991 - Junfeng Jiang, Yujian Zhang, Junhao Li:

A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication. 992-999 - Zhaoxi Zhang

, Leo Yu Zhang, Xufei Zheng, Jinyu Tian
, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. 1000-1007 - Taining Cheng, Wei Zhou, Shaowen Yao, Libo Feng, Jing He

:
Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain. 1008-1019 - Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang

, Zoe Lin Jiang, Siu-Ming Yiu:
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. 1020-1027 - Stewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer:

"The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning. 1028-1035 - Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Jianzhi Wang, Lexi Xu

, Sai Han, Yuwei Jia:
5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing. 1036-1041 - Lijian Liu, Jinguo Li:

A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection. 1042-1047 - Xinwei Li, Qianyun Zhang, Lexi Xu

, Tao Shang:
A Compatible and Identity Privacy-preserving Security Protocol for ACARS. 1048-1053 - Jinfu Chen, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang:

A formalization-based vulnerability detection method for cross-subject network components. 1054-1059 - Yujie Chen, Wenliang Zhu, Jinke Xu, Junwei Zhang, Zhanpeng Zhu, Lirong Wang:

A Heart Sound Classification Method Based on Residual Block and Attention Mechanism. 1060-1065 - Ruixuan Liu, Muyang Lyu, Jiangrong Yang:

A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment. 1066-1071 - Hui Guo, Chunyan Hou, Jinsong Wang, Chen Chen:

A K-Induction Method Extended with Value Analysis for C Program Safety Verification. 1072-1077 - Yuwei Jia, Kun Chao, Xinzhou Cheng, Lin Lin, Lijuan Cao, Yi Li, Yuchao Jin, Zixiang Di, Chen Cheng:

A Novel User Mobility Prediction Scheme based on the Weighted Markov Chain Model. 1078-1083 - Huapeng Li, Baocheng Wang:

A Secure Remote Password Protocol From The Learning With Errors Problem. 1084-1090 - Lei Shi, Peng Yin, Yang Ming, Shengguan Qu, Zhen Liu:

A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation. 1091-1098 - Heng Li, Zeyu Zhu, Peinan He, Yingze Yang, Bin Chen, Jun Peng, Zhiwu Huang:

A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural Networks. 1099-1106 - Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi

, Raja Jurdak
:
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. 1107-1114 - Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou:

Action-Manipulation Attack and Defense to X-Armed Bandits. 1115-1122 - Meimei Li, Yiyan Xu, Nan Li, Zhongfeng Jin:

Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification. 1123-1128 - Tian Xiao, Guoping Xu, Bei Li, Lexi Xu

, Xinzhou Cheng, Feibi Lyu, Guanghai Liu, Yi Zhang, Qingqing Zhang:
AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks. 1129-1135 - Shuguang Yuan

, Chi Chen
, Ke Yang
, Tengfei Yang, Jing Yu
:
An Attribute-attack-proof Watermarking Technique for Relational Database. 1136-1143 - Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao:

An Empirical Study Towards SAR Adversarial Examples. 1144-1148 - Yanfang Dong, Wenqiang Cai, Wenliang Zhu, Lirong Wang:

An End-to-End Multi-label classification model for Arrhythmia based on varied-length ECG signals. 1149-1154 - Huamei Qi, Li Jie, Wangping Xiong:

An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure. 1155-1161 - Ruizhu Chen, Rong Fei, Lili Wu, Lu Yang:

An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles. 1162-1167 - Jinke Xu, Junwei Zhang, Yujie Chen, Gang Ma, Zhanpeng Zhu, Lirong Wang:

Arteriovenous fistula stenosis classification method based on Auxiliary Wave and Transformer. 1168-1172 - Sai Han, Zelin Wang, Guangquan Wang, Qiukeng Fang, Hongbing Ma, Lin Lin, Lexi Xu

, Heng Zhang:
Automatic Association of Cross-Domain Network Topology. 1173-1178 - Heng Li, Zhijun Liu, Yongting Liu, Hui Peng, Rui Zhang, Jun Peng, Zhiwu Huang:

Battery Aging-Robust Driving Range Prediction of Electric Bus. 1179-1186 - Michal Borowski, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier:

Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices. 1187-1192 - Qingqing Zhang, Tao Zhang, Shikun Jiang, Qiang Zhang, Yuhui Han, Xinzhou Cheng, Yunyun Wang, Xin He, Tian Xiao:

Big Data based Potential Fixed-Mobile Convergence User Mining. 1193-1198 - Zhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang:

Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM. 1199-1204 - Haisheng Yu

, Yan Liu, Lihong Duan, Sanwei Liu, Wenyong Wang, Dong Liu, Zirui Peng, Daobiao Gong:
Cache Top-level domain locally: make DNS respond quickly in mobile network. 1205-1210 - Davide Micale, Gianpiero Costantino, Ilaria Matteucci

, Florian Fenzl
, Roland Rieke
, Giuseppe Patanè:
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem. 1211-1218 - Hannu Turtiainen, Andrei Costin, Timo Hämäläinen

, Tuomo Lahtinen
, Lauri Sintonen:
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications. 1219-1226 - Hannu Turtiainen, Andrei Costin, Timo Hämäläinen

, Tuomo Lahtinen
, Lauri Sintonen:
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications. 1227-1234 - Wanjia Zheng, Kazumasa Omote:

Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures. 1235-1242 - Chuntao Song, Jie Gao, Fan Zhang, Tao Zhang, Yi Zhang, Lixia Liu, Bei Li, Yong Wang, Lexi Xu

:
Collaborative Improvement of User Experience and Network Quality Based on Big Data. 1243-1248 - Weilin Yang, Zhonghui Du, Yonghui Wu, Yi Tang:

Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks. 1249-1254 - Feibi Lyu, Xinzhou Cheng, Lexi Xu

, Liang Liu, Jinjian Qiao, Lu Zhi, Zixiang Di, Tian Xiao, Chen Cheng:
Coverage Estimation of Wireless Network Using Attention U-Net. 1255-1260 - Xiaoying Li, Guangxiang Zhang, Yuzhou Wu, Yang Yang, Yuelei Wang, Zhen Liu:

Create Persona of Elderly Users by Clustering Analysis of Needs. 1261-1265 - Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi

, Raghava Rao Mukkamala:
Data Driven based Malicious URL Detection using Explainable AI. 1266-1272 - Junwei Zhang, Rui Bao, Lirong Wang, Jinke Xu, Yujie Chen, Xueqin Chen:

Denoising method of ECG signal based on Channel Attention Mechanism. 1273-1277 - Xinhe Pu, Xiaofang Yuan, Liangsen Li, Weiming Ji:

Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling Robot. 1278-1285 - Gangyang Wang, Chunhua Zhu, Jianhou Wang:

Detection of impurity content in wheat based on cone-beam CT. 1286-1289 - Siqi He, Xiaofei Xing, Guojun Wang:

DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract. 1290-1295 - Xinqing Du, Xin Hu, Yin Wang, Weidong Wang:

Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration. 1296-1301 - Haofeng Liu, Yuefeng Liu, Yue Wang, Bo Liu, Xiang Bao:

EEG classification algorithm of motor imagery based on CNN-Transformer fusion network. 1302-1309 - Hao Xiao, Yuan Qiu, Rong Fei, Xiongbo Chen, Zuo Liu, Zongling Wu:

End-to-End Speech Recognition Technology Based on Multi-Stream CNN. 1310-1315 - Yi Yue

, Wencong Yang, Xiao Liang, Xihuizi Meng, Rong Huang, Xiongyang Tang:
Energy-efficient and Traffic-aware VNF Placement for Vertical Services in 5G Networks. 1316-1322 - Kai Gao, Xiangyu Cheng, Hao Huang, Xunhao Li, Tingyu Yuan, Ronghua Du:

False Data Injection Attack Detection in a Platoon of CACC in RSU. 1324-1329 - Mingyu Yang, Tao Yang, Haiyang Wang, Hao Li, Tianming Li, Biao Hu:

Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environment. 1330-1332 - Yanghui Zhang, Kai Gao, Shuo Huang, Xunhao Li, Ronghua Du:

Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment. 1333-1339 - Boshen Shan, Yuanzhi Yao

, Weihai Li, Xiaodong Zuo, Nenghai Yu:
Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control. 1340-1347 - Zilong Wang, Junhuai Li:

Guide Tracking Method Based On Particle Filter Fusion. 1348-1353 - Giampaolo Bovenzi

, Valerio Persico, Antonio Pescapè, Anna Piscitelli, Vincenzo Spadari
:
Hierarchical Classification of Android Malware Traffic. 1354-1359 - Peilun Wu, Hui Guo:

Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector. 1360-1367 - Bin Ge, Ting Wang, Chenxing Xia, Gaole Dai:

Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix Encoding. 1368-1375 - Shirin Kalantari, Danny Hughes, Bart De Decker:

Listing the ingredients for IFTTT recipes. 1376-1383 - Yuting Zheng, Yi Li, Yuchao Jin, Xiaomeng Zhu, Lexi Xu

, Tian Xiao, Bei Li, Xinzhou Cheng:
Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network. 1384-1389 - Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei

, Zhihui Han, Yu Zhou:
Measurement of Malware Family Classification on a Large-Scale Real-World Dataset. 1390-1397 - Xingfu Wang, Xiangyu Li, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi

:
MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis. 1398-1403 - Zhen Guo, Pengzhou Zhang, Junjie Xia, Zhe Zhou, Juan Cao:

Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration. 1404-1409 - Shuai Zhang, Xingfu Wang, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi

:
Multimodal Graph Reasoning and Fusion for Video Question Answering. 1410-1415 - Hongce Zhao, Shunliang Zhang, Zhuang Qiao, Xianjin Huang, Xiaohui Zhang:

On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic. 1416-1423 - Biao Yang, Shanshan Zhao, Hongfei Du, Minju Yi, Ziwei Liu:

PAPR Suppression in Radar Communication Integration System Based on Subcarrier Reservation. 1424-1428 - Jinzhou Li, Shouye Lv, Liu Yang, Sheng Wu, Yang Liu, Qijun Luan:

Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites. 1429-1434 - Ning Wang, Jia Hu:

Performance Analysis of IEEE 802.11p for the Internet of Vehicles with Bursty Packet Errors. 1435-1440 - Wu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin:

Personalized User Profiles-based Insider Threat Detection for Distributed File System. 1441-1446 - Deqi Cao, Zhaoyun Ding, Fei Wang, Haoyang Ma:

Pre-training Fine-tuning data Enhancement method based on active learning. 1447-1454 - Yong Li, Zhenghao Zhang, Xi Chen, Ruxian Li, Liang Zhang:

Redactable Blockchain with K-Time Controllable Editing. 1455-1461 - Shangyu Tang, Mingde Huo, Yi Du, Yuwen Huo, Yan Zhang, Lexi Xu

, Ying Ji, Guoyu Zhou:
Research and Application of 5G Edge AI in Medical Industry. 1462-1466 - Mingyue Li, Rong Fei:

Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and CNN. 1467-1472 - Xiaomeng Zhu, Yi Li, Yuting Zheng, Rui Xia, Lexi Xu

, Bei Li, Zixiang Di, Lu Zhi, Xinzhou Cheng:
Research on 5G Network Capacity and Expansion. 1473-1478 - Jian Guan, Xinzhou Cheng, Kun Chao, Xin He, Yuwei Jia, Lexi Xu

, Yunyun Wang, Tian Xiao, Bei Li:
Research on Capability Building of Mobile Network Data Analysis and Visualization. 1479-1484 - Heng Zhang, Wenyu Li, Lianbo Song, Lexi Xu

, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu, Sai Han:
Research on Enterprises Loss in Regional Economic Risk Management. 1485-1490 - Tian Xiao, Bei Li, Zixiang Di, Guanghai Liu, Lexi Xu

, Jian Guan, Zhaoning Wang, Chen Cheng, Yi Li:
Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme. 1491-1497 - Bei Li, Tian Xiao, Kai Zhou, Lexi Xu

, Guanghai Liu, Bo Wang, Jie Gao, Jian Guan, Zixiang Di:
Research on OTFS Systems for 6G. 1498-1503 - Jie Gao, Lixia Liu, Tao Zhang, Shenghao Jia, Chuntao Song, Lexi Xu

, Yang Wu, Bei Li, Yunyun Wang, Xinjie Hou:
Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis. 1504-1509 - Zixiang Di, Tian Xiao, Yi Li, Xinzhou Cheng, Bei Li, Lexi Xu

, Xiaomeng Zhu, Lu Zhi, Rui Xia:
Research on Voice Quality Evaluation Method Based on Artificial Neural Network. 1510-1515 - Shivam Garg, Nandish Chattopadhyay, Anupam Chattopadhyay:

Robust Perception for Autonomous Vehicles using Dimensionality Reduction. 1516-1521 - Joseph Gear, Yue Xu, Ernest Foo

, Praveen Gauravaram, Zahra Jadidi
, Leonie Simpson:
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. 1522-1527 - Lukasz Krzywiecki, Hannes Salin:

Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. 1528-1533 - Lei Zhang, Dong Mao, Zuge Chen, Yubo Song

, Liquan Chen, Zhongyuan Qin:
Smart Grid Data Aggregation Scheme Based on Local Differential Privacy. 1534-1539 - Lei Cheng, Shuaijun Liu, Lixaing Liu, Hailong Hu, Jingyi Chen, Xiandong Meng, Pengcheng Ding:

Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks. 1540-1544 - Dejia Lin, Yongdong Wu, Wensheng Gan:

Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect. 1545-1550 - Yuan Liu, Yanmei Liu, Minjing Zhong:

Technical architecture of integrated big data platform. 1551-1556 - Chen Cheng, Xinzhou Cheng, Shikun Jiang, Xin Zhao, Yuhui Han, Tao Zhang, Lijuan Cao, Yuwei Jia, Tian Xiao, Bei Li:

Telecom Big Data assisted Algorithm and System of Campus Safety Management. 1557-1562 - Yi Zhang, Fan Zhang, Chuntao Song, Xinzhou Cheng, Chen Cheng, Lexi Xu

, Tian Xiao, Bei Li:
Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoost. 1563-1568 - Nidhi Rastogi, Sharmishtha Dutta, Alex Gittens, Mohammed J. Zaki

, Charu C. Aggarwal:
TINKER: A framework for Open source Cyberthreat Intelligence. 1569-1574 - Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka:

Towards logical specification of adversarial examples in machine learning. 1575-1580 - Emilia Cioroaica, Barbora Buhnova, Daniel Schneider, Ioannis Sorokos, Thomas Kuhn, Emrah Tomur:

Towards the Concept of Trust Assurance Case. 1581-1586 - Vladimir Ushakov, Sampo Sovio, Qingchao Qi, Vijayanand Nayani, Valentin Manea, Philip Ginzboorg

, Jan-Erik Ekberg:
Trusted Hart for Mobile RISC-V Security. 1587-1596 - Daniel Dalalana Bertoglio, Luis G. B. Schüler, Avelino F. Zorzo

, Roben Castagna Lunardi
:
Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application. 1597-1604 - Xin He, Lijuan Cao, Yuwei Jia, Kun Chao, Miaoqiong Wang, Chao Wang, Yunyun Wang, Runsha Dong, Zhenqiao Zhao:

User Analysis and Traffic Prediction Method based on Behavior Slicing. 1605-1610 - Xiting Peng, Naixian Zhao, Lexi Xu

, Shi Bai:
Vehicle Classification System with Mobile Edge Computing Based on Broad Learning. 1611-1617

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














