default search action
21st TrustCom 2022: Wuhan, China
- IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022. IEEE 2022, ISBN 978-1-6654-9425-0
- Siyuan Ma, Yuewu Wang, Lingguang Lei, Yingjiao Niu, Haotian Shi, Jie Wang:
Booting IoT Terminal Device Securely with eMMC. 1-8 - Chenghua Tang, Chen Zhou, Min Hu, Mengmeng Yang, Baohua Qiang:
Malicious Family Identify Combining Multi-channel Mapping Feature Image and Fine-Tuned CNN. 9-19 - Chunlei Yang, Yunchuan Guo, Mingjie Yu, Lingcui Zhang:
Truthfully Negotiating Usage Policy for Data Sovereignty. 20-27 - Yong Kuang, Hongyun Xu, Rui Jiang, Zhikang Liu:
GTMS: A Gated Linear Unit Based Trust Management System for Internet of Vehicles Using Blockchain Technology. 28-35 - Yu'Ang Zhang, Yujie Song, Yu Wang, Yue Cao, Xuefeng Ren, Fei Yan:
TECS: A Trust Model for VANETs Using Eigenvector Centrality and Social Metrics. 36-43 - Fenghua Li, Cao Chen, Yunchuan Guo, Liang Fang, Chao Guo, Zifu Li:
Efficiently Constructing Topology of Dynamic Networks. 44-51 - Cailing Cai, Tsz Hon Yuen, Siu-Ming Yiu:
Hash Proof System with Auxiliary Inputs and Its Application. 52-59 - Guozhong Wang, Chunling Peng, Yi Huang:
The Power Allocation for SWIPT-based Cognitive Two-Way Relay Networks with Rate Fairness Consideration. 60-65 - Pengfei Liu, Weiping Wang, Hong Song, Shigeng Zhang, Yulu Hong:
HashDroid:Extraction of malicious features of Android applications based on function call graph pruning. 66-73 - Siyu Sun, Xiaoxuan Fan, Yunzhi Xia, Chenlu Zhu, Shenghao Liu, Lingzhi Yi:
Coverage Reliability of IoT Intrusion Detection System based on Attack-Defense Game Design. 74-82 - Xiaoyu Du, Guanying Zhou, Yujing Wang, Song Tao:
A Lightweight Honeynet Design In the Internet of Things. 83-88 - Meng Li, Jianbo Gao, Zijian Zhang, Chaoping Fu, Chhagan Lal, Mauro Conti:
Graph Encryption for Shortest Path Queries with k Unsorted Nodes. 89-96 - Jichao Bi, Shibo He, Fengji Luo, Jiming Chen, Da-Wen Huang, Mingyang Sun:
Differential Game Approach for Modelling and Defense of False Data Injection Attacks Targeting Energy Metering Systems. 97-104 - Yongwei Meng, Tao Qin, Haonian Wang, Zhouguo Chen:
TPIPD: A Robust Model for Online VPN Traffic Classification. 105-110 - Jinghong Lan, Yanan Li, Bo Li, Xudong Liu:
MATTER: A Multi-Level Attention-Enhanced Representation Learning Model for Network Intrusion Detection. 111-116 - Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Xiaolin Xu:
A longitudinal Measurement and Analysis Study of Mozi, an Evolving P2P IoT Botnet. 117-122 - Elliott Wen, Jia Wang, Jens Dietrich:
SecretHunter: A Large-scale Secret Scanner for Public Git Repositories. 123-130 - Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye, Jianxin Huang, Xiangdong Kong:
SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities. 131-138 - Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang:
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning. 139-146 - Myles Foley, Sergio Maffeis:
Haxss: Hierarchical Reinforcement Learning for XSS Payload Generation. 147-158 - Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song:
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. 159-166 - Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li, Xiaosong Zhang:
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM. 167-174 - Zhenquan Ding, Hui Xu, Yonghe Guo, Longchuan Yan, Lei Cui, Zhiyu Hao:
Mal-Bert-GCN: Malware Detection by Combining Bert and GCN. 175-183 - Chuanxi Chen, Dengpan Ye, Hao Wang, Long Tang, Yue Xu:
Towards Adversarial Robustness with Multidimensional Perturbations via Contrastive Learning. 184-191 - Xiuhua Wen, Chunjie Cao, Yifan Li, Yang Sun:
DRSN with Simple Parameter-Free Attention Module for Specific Emitter Identification. 192-200 - Yuan Shen, Wei Song, Changsheng Zhao, Zhiyong Peng:
Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption. 201-208 - Xuyang Jing, Xiaojun Cheng, Zheng Yan, Xian Li:
Deceiving Learning-based Sketches to Cause Inaccurate Frequency Estimation. 209-216 - Ligeng Chen, Zhongling He, Hao Wu, Yuhang Gong, Bing Mao:
AVMiner: Expansible and Semantic-Preserving Anti-Virus Labels Mining Method. 217-224 - Yun He, Xiaoqi Jia, Shengzhi Zhang, Lou Chitkushev:
EnShare: Sharing Files Securely and Efficiently in the Cloud using Enclave. 225-232 - Chao Xia, Yaqi Liu, Qingxiao Guan, Sai Ma, Yu Nan, Jiahui Fu:
Steganalysis for Small-Scale Training Image Pairs with Cover-Stego Feature Difference Model. 233-238 - Weizhong Qiang, Hao Luo:
AutoSlicer: Automatic Program Partitioning for Securing Sensitive Data Based-on Data Dependency Analysis and Code Refactoring. 239-247 - Chaochao Zhang, Rui Hou:
Security Support on Memory Controller for Heap Memory Safety. 248-257 - Qichang Wan, Peisen Wang, Xiaobing Pei:
CGDF-GNN: Cascaded GNN fraud detector with dual features facing imbalanced graphs with camouflaged fraudsters. 258-265 - Li Song, Qiongxiao Wang, Shijie Jia, Jingqiang Lin, Linli Lu, Yanduo Fu:
You Cannot Fully Trust Your Device: An Empirical Study of Client-Side Certificate Validation in WPA2-Enterprise Networks. 266-273 - Jingqiang Liu, Xiaoxi Zhu, Chaoge Liu, Xiang Cui, Qixu Liu:
CPGBERT: An Effective Model for Defect Detection by Learning Program Semantics via Code Property Graph. 274-282 - Chunlan Fu, Shirong Han, Gang Shen:
Detecting Unknown Network Attacks with Attention Encoding and Deep Metric Learning. 283-290 - Xiaoqing Ma, Chao Zheng, Zhao Li, Jiangyi Yin, Qingyun Liu, Xunxun Chen:
A Lightweight Graph-based Method to Detect Pornographic and Gambling Websites with Imperfect Datasets. 291-298 - Minqiu Tian, Zifu Li, Fenghua Li, Jin Cao, Chao Guo:
A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. 299-306 - Dongxu Han, Pu Dong, Ning Li, Xiang Cui, Jiawen Diao, Qing Wang, Dan Du, Yuling Liu:
DCC-Find: DNS Covert Channel Detection by Features Concatenation-Based LSTM. 307-314 - Anna-Katharina Wickert, Lars Baumgärtner, Michael Schlichtig, Krishna Narasimhan, Mira Mezini:
To Fix or Not to Fix: A Critical Study of Crypto-misuses in the Wild. 315-322 - Zhuoqun Xia, Kaixin Zhou, Jingjing Tan, Hongmei Zhou:
Bidirectional LSTM-based attention mechanism for CNN power theft detection. 323-330 - Tongwei Liu, Baokang Zhao, Wei Peng:
An Efficient Certificateless Authentication Scheme for Satellite Internet. 331-338 - Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren:
tTree+: A Threat Tree Model for Representing Complex Semantics. 339-344 - Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou:
Data Poisoning Attack to X-armed Bandits. 345-351 - You Zhai, Jian Yang, Zixiang Wang, Longtao He, Liqun Yang, Zhoujun Li:
Cdga: A GAN-based Controllable Domain Generation Algorithm. 352-360 - Chengyao Hua, Shigeng Zhang, Weiping Wang, Zhankai Li, Jian Zhang:
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples. 361-368 - Jinbo Wen, Xiaojun Liu, Zehui Xiong, Meng Shen, Siming Wang, Yutao Jiao, Jiawen Kang, He Li:
Optimal Block Propagation and Incentive Mechanism for Blockchain Networks in 6G. 369-374 - José Reverte Cazorla, José María de Fuentes, Lorena González-Manzano:
Eye-based keystroke prediction for natural texts - a feasibility analysis. 375-382 - Yang Xu, Jie Guo, Weidong Qiu, Zheng Huang, Enes Altuncu, Shujun Li:
"Comments Matter and The More The Better!": Improving Rumor Detection with User Comments. 383-390 - Weiqing Huang, Xinbo Han, Meng Zhang, Min Li, Wen Liu, Zheng Yang, Haitian Yang:
MFFAN: Multiple Features Fusion with Attention Networks for Malicious Traffic Detection. 391-398 - Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan:
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. 399-406 - Cairui She, Liwei Chen, Gang Shi:
TFCFI:Transparent Forward Fine-grained Control-Flow Integrity Protection. 407-414 - Mengfan Wang, Guifang Huang, Hongmin Gao, Lei Hu:
Improved Zero-Knowledge Proofs for Commitments from Learning Parity with Noise. 415-421 - Chuang Wang, Yan Ding, Chenlin Huang, Liantao Song:
An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field. 422-428 - Zhuoqun Xia, Hongrui Li, Ke Gu:
CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature. 429-434 - Haili Sun, Yan Huang, Lansheng Han, Xiang Long, Hongle Liu, Chunjie Zhou:
Neural-FacTOR: Neural Representation Learning for Website Fingerprinting Attack over TOR Anonymity. 435-440 - Lixia Xie, Siyu Liu, Hongyu Yang, Liang Zhang:
DRICP: Defect Risk Identification Using Sample Category Perception. 441-448 - Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He:
Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection. 449-456 - Hongyu Yang, Haiyun Yang, Liang Zhang, Xiang Cheng:
Source Code Vulnerability Detection Using Vulnerability Dependency Representation Graph. 457-464 - Aneta Poniszewska-Maranda, Kacper Pradzynski:
Code-based encryption algorithms for generating and verifying digital signature. 465-472 - Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan:
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. 473-482 - Fuji Han, Dongjun Zhu:
Intelligent Recognition Method of Web Application Categories Based on Multi-layer Simhash Algorithm. 483-489 - Mordechai Guri:
Near Field Air-Gap Covert Channel Attack. 490-497 - Weiqi Dai, Zhenhui Lu, Xia Xie, Duoqiang Wang, Hai Jin:
Diabetes Mellitus Type 2 Data Sharing System Based on Blockchain and Attribute-Encryption. 498-505 - Weiqi Dai, Wenhao Zhao, Xia Xie, Song Wu, Hai Jin:
Shared Incentive System for Clinical Pathway Experience. 506-513 - Zhiwen Zhou, Ximeng Liu, Jiayin Li, Junxi Ruan, Mingyuan Fan:
Dynamically Selected Mixup Machine Unlearning. 514-524 - Akito Yamamoto, Tetsuo Shibuya:
Efficient and Highly Accurate Differentially Private Statistical Genomic Analysis using Discrete Fourier Transform. 525-532 - Yuzhe Li, Bo Li, Weiping Wang, Nan Liu:
An Efficient Epsilon Selection Method for DP-ERM with Expected Accuracy Constraints. 533-540 - Muhammad Arsalan, Davide Di Matteo, Sana Imtiaz, Zainab Abbas, Vladimir Vlassov, Vadim Issakov:
Energy-Efficient Privacy-Preserving Time-Series Forecasting on User Health Data Streams. 541-546 - Xin Tang, Xiong Chen, Ran Zhou, Linchi Sui, Tian'e Zhou:
Marking based Obfuscation Strategy to resist Side Channel Attack in Cross-User Deduplication for Cloud Storage. 547-555 - Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao:
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. 556-564 - Qiaowen Jia, Guanxiong Ha, Hanwei Wang, Haoyu Ma, Hang Chen:
An enhanced MinHash encryption scheme for encrypted deduplication. 565-573 - Stefan More, Sebastian Ramacher, Lukas Alber, Marco Herzl:
Extending Expressive Access Policies with Privacy Features. 574-581 - Chao Huang, Yanqing Yao, Xiaojun Zhang, Da Teng, Yingdong Wang, Lei Zhou:
Robust Secure Aggregation with Lightweight Verification for Federated Learning. 582-589 - Chennan Lin, Baisong Liu, Xueyuan Zhang, Zhiye Wang, Ce Hu, Linze Luo:
Privacy-Preserving Recommendation with Debiased Obfuscaiton. 590-597 - Fayao Wang, Yuanyuan He, Yunchuan Guo, Peizhi Li, Xinyu Wei:
Privacy-Preserving Robust Federated Learning with Distributed Differential Privacy. 598-605 - De Li, Hongyan Zheng, Zeming Gan, Xianxian Li, Jinyan Wang:
A Green Neural Network with Privacy Preservation and Interpretability. 606-614 - Tao Zhang, Bowen Deng, Lele Zheng, Ze Tong, Qi Li:
HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy. 615-622 - Baochen Yan, Rui Zhang, Zheng Yan:
VoiceSketch: a Privacy-Preserving Voiceprint Authentication System. 623-630 - Qian Chen, Hongbo Wang, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin:
LLDP: A Layer-wise Local Differential Privacy in Federated Learning. 631-637 - Hervais Simo, Michael Kreutzer:
Towards Automated Detection and Prevention of Regrettable (Self-) Disclosures on Social Media. 638-645 - Raphael Schermann, Rainer Urian, Ronald Toegl, Holger Bock, Christian Steger:
Enabling Anonymous Authenticated Encryption with a Novel Anonymous Authenticated Credential Key Agreement (AACKA). 646-655 - Jie Fu, Zhili Chen, Xiao Han:
Adap DP-FL: Differentially Private Federated Learning with Adaptive Noise. 656-663 - Bo Wang, Lingling Wang, Hongliang Guo, Peng Zhou:
Privacy-Preserving Smart Lock System for IoT-enabled Rental House Markets. 664-669 - Maxime Thouvenot, Philippe Calvez, Olivier Curé:
Kgastor: a Privacy By Design Knowledge Graph anonymized Store. 670-679 - Shaolong Guo, Zhou Su, Zhiyi Tian, Shui Yu:
Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck. 680-686 - Macarious Abadeer, Wei Shi, Jean-Pierre Corriveau:
FLightNER: A Federated Learning Approach to Lightweight Named-Entity Recognition. 687-694 - Yuting Xu, Mang Su, Jinpeng Hou, Chong Nie:
Federated Learning Scheme with Dual Security of Identity Authentication and Verification. 695-702 - Ou Ruan, Shanshan Qin:
Secure and efficient publicly verifiable ridge regression outsourcing scheme. 703-709 - Atsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto:
Privacy-Preserving Data Analysis without Trusted Third Party. 710-717 - Yiping Teng, Dongyue Jiang, Mengmeng Sun, Liang Zhao, Li Xu, Chunlong Fan:
Privacy-Preserving Top-k Spatio-Textual Similarity Join. 718-726 - Zhipeng Zhou, Chenyu Dong, Donger Mo, Peijia Zheng:
Privacy-preserving Decision Making Based on Q-Learning in Cloud Computing. 727-732 - Qing Gu, Xiangling Ding, Dengyong Zhang, Ce Yang:
Forgery Detection Scheme of Deep Video Frame-rate Up-conversion Based on Dual-stream Multi-scale Spatial-temporal Representation. 733-738 - Yaqi Liu, Chao Xia, Qiang Cai, Xin Jin:
Pyramid Copy-move Forgery Detection Using Adversarial Optimized Self Deep Matching Network. 739-746 - Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. 747-758 - Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu:
A General Backdoor Attack to Graph Neural Networks Based on Explanation Method. 759-768 - Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou:
APT Attribution for Malware Based on Time Series Shapelets. 769-777 - Juan Wang, Chenjun Ma, Ziang Li, Huanyu Yuan, Jie Wang:
ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning. 778-785 - Xiao Xiao, Minghua Xu, Han Xu:
A Novel Asynchronous Evolution Opinion Dynamics Model. 786-791 - Piotr Kawa, Marcin Plata, Piotr Syga:
SpecRNet: Towards Faster and More Accessible Audio DeepFake Detection. 792-799 - Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding, Lijun Gao:
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. 800-809 - Weipeng Liang, Li Dong, Rangding Wang, Diqun Yan, Yuanman Li:
Robust Document Image Forgery Localization Against Image Blending. 810-817 - Xuejiao Luo, Xiaohui Han, Wenbo Zuo, Zhengyuan Xu, Zhiwen Wang, Xiaoming Wu:
A Dynamic Transaction Pattern Aggregation Neural Network for Money Laundering Detection. 818-826 - Jian Chen, Yuan Gao, Yang Liu, Chen Wang, Kai Peng:
Leveraging Model Poisoning Attacks on License Plate Recognition Systems. 827-834 - Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. 835-842 - Shuhe Liu, Xiaolin Xu, Zhefeng Nan:
CNN-Based Autonomous Traffic Detection on Unknown Home Security Cameras. 843-850 - Yixuan Qiao, Minghui Zheng, Jingyi Yang:
Implementation of one-time editable blockchain chameleon hash function construction scheme. 851-856 - Kai Zhang, He Xiao, Qiuming Liu:
Data Integrity Verification Scheme Based on Blockchain Smart Contract. 857-863 - Dongdong Liu, Mingsheng Wang, Taotao Li, Ya Han:
A Faster Blockchain Sharding Protocol for Decentralized Ledger. 864-873 - Yuhang Ding, Zihan Yang, Bo Qin, Qin Wang, Yanran Zhang, Qianhong Wu:
Squeezing Network Performance for Secure and Efficient PoW with Better Difficulty Adjustment. 874-881 - Jian Wang, Weiqiong Cao, Hua Chen, Haoyuan Li:
Practical Side-Channel Attack on Message Encoding in Masked Kyber. 882-889 - Mei Yang, Chong Liu, Huiyun Li, Cuiping Shao:
Efficient SM2 Hardware Design for Digital Signature of Internet of Vehicles. 890-896 - Zhishen Zhu, Junzheng Shi, Chonghua Wang, Gang Xiong, Zhiqiang Hao, Gaopeng Gou:
MCFM: Discover Sensitive Behavior from Encrypted Traffic in Industrial Control System. 897-904 - Lifeng Guo, Huide Lei, Wei-Chuen Yau:
One-Time Rewritable Blockchain with Traitor Tracing and Bilateral Access Control. 905-912 - Jiming Qi, Jiazheng Zhang, Qingxia Liu, Bang Wang:
A Flow Attack Strategy based on Critical Links for Cyber-attack. 913-920 - Jingyan Yang, Shang Gao, Guyue Li, Rui Song, Bin Xiao:
Reducing Gas Consumption of Tornado Cash and Other Smart Contracts in Ethereum. 921-926 - Jie Liu, Xingsheng Qin, Frank Jiang:
A quantum inspired differential evolution algorithm with multiple mutation strategies. 927-934 - Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur R. Shahid, Omar J. Guerra, Joel Rodriguez:
A Multidimensional Blockchain Framework For Mobile Internet of Things. 935-944 - Xiaofeng Chen, Ying Gao:
CDEdit: Redactable Blockchain with Cross-audit and Diversity Editing. 945-952 - Xin Sun, Wen Wang, Xujian Liu, Jiarong Fan, Zeru Li, Yubo Song, Zhongyuan Qin:
VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN. 953-958 - Md. Jobair Hossain Faruk, Bilash Saha, Mazharul Islam, Fazlul Alam, Hossain Shahriar, Maria Valero, Akond Rahman, Fan Wu, Md. Zakirul Alam Bhuiyan:
Development of Blockchain-based e-Voting System: Requirements, Design and Security Perspective. 959-967 - Baowei Wang, Bin Li, Yi Yuan, Changyu Dai, Yufeng Wu, Weiqian Zheng:
CPDT: A copyright-preserving data trading scheme based on smart contracts and perceptual hashing. 968-975 - Yongkang Chen, Ming Zhang, Jin Li, Xiaohui Kuang, Xuhong Zhang, Han Zhang:
Dynamic and Diverse Transformations for Defending Against Adversarial Examples. 976-983 - Rui Gong, Lei Wang, Wei Shi, Wei Liu, Jianfeng Zhang:
A Hardware Security Isolation Architecture for Intelligent Accelerator. 984-991 - Junfeng Jiang, Yujian Zhang, Junhao Li:
A Blockchain-based Privacy-Preserving Scheme for Cross-domain Authentication. 992-999 - Zhaoxi Zhang, Leo Yu Zhang, Xufei Zheng, Jinyu Tian, Jiantao Zhou:
Self-Supervised Adversarial Example Detection by Disentangled Representation. 1000-1007 - Taining Cheng, Wei Zhou, Shaowen Yao, Libo Feng, Jing He:
Multi-pipeline HotStuff: A High Performance Consensus for Permissioned Blockchain. 1008-1019 - Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu:
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. 1020-1027 - Stewart Sentanoe, Christofer Fellicious, Hans P. Reiser, Michael Granitzer:
"The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning. 1028-1035 - Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Jianzhi Wang, Lexi Xu, Sai Han, Yuwei Jia:
5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing. 1036-1041 - Lijian Liu, Jinguo Li:
A Blockchain-assisted Collaborative Ensemble Learning for Network Intrusion Detection. 1042-1047 - Xinwei Li, Qianyun Zhang, Lexi Xu, Tao Shang:
A Compatible and Identity Privacy-preserving Security Protocol for ACARS. 1048-1053 - Jinfu Chen, Haodi Xie, Saihua Cai, Ye Geng, Yemin Yin, Zikang Zhang:
A formalization-based vulnerability detection method for cross-subject network components. 1054-1059 - Yujie Chen, Wenliang Zhu, Jinke Xu, Junwei Zhang, Zhanpeng Zhu, Lirong Wang:
A Heart Sound Classification Method Based on Residual Block and Attention Mechanism. 1060-1065 - Ruixuan Liu, Muyang Lyu, Jiangrong Yang:
A hybrid BCI system combining motor imagery and conceptual imagery in a smart home environment. 1066-1071 - Hui Guo, Chunyan Hou, Jinsong Wang, Chen Chen:
A K-Induction Method Extended with Value Analysis for C Program Safety Verification. 1072-1077 - Yuwei Jia, Kun Chao, Xinzhou Cheng, Lin Lin, Lijuan Cao, Yi Li, Yuchao Jin, Zixiang Di, Chen Cheng:
A Novel User Mobility Prediction Scheme based on the Weighted Markov Chain Model. 1078-1083 - Huapeng Li, Baocheng Wang:
A Secure Remote Password Protocol From The Learning With Errors Problem. 1084-1090 - Lei Shi, Peng Yin, Yang Ming, Shengguan Qu, Zhen Liu:
A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation. 1091-1098 - Heng Li, Zeyu Zhu, Peinan He, Yingze Yang, Bin Chen, Jun Peng, Zhiwu Huang:
A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural Networks. 1099-1106 - Kealan Dunnett, Shantanu Pal, Guntur Dharma Putra, Zahra Jadidi, Raja Jurdak:
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain. 1107-1114 - Zhi Luo, Youqi Li, Lixing Chen, Zichuan Xu, Pan Zhou:
Action-Manipulation Attack and Defense to X-Armed Bandits. 1115-1122 - Meimei Li, Yiyan Xu, Nan Li, Zhongfeng Jin:
Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification. 1123-1128 - Tian Xiao, Guoping Xu, Bei Li, Lexi Xu, Xinzhou Cheng, Feibi Lyu, Guanghai Liu, Yi Zhang, Qingqing Zhang:
AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks. 1129-1135 - Shuguang Yuan, Chi Chen, Ke Yang, Tengfei Yang, Jing Yu:
An Attribute-attack-proof Watermarking Technique for Relational Database. 1136-1143 - Zhiwei Zhang, Xunzhang Gao, Shuowei Liu, Yujia Diao:
An Empirical Study Towards SAR Adversarial Examples. 1144-1148 - Yanfang Dong, Wenqiang Cai, Wenliang Zhu, Lirong Wang:
An End-to-End Multi-label classification model for Arrhythmia based on varied-length ECG signals. 1149-1154 - Huamei Qi, Li Jie, Wangping Xiong:
An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure. 1155-1161 - Ruizhu Chen, Rong Fei, Lili Wu, Lu Yang:
An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles. 1162-1167 - Jinke Xu, Junwei Zhang, Yujie Chen, Gang Ma, Zhanpeng Zhu, Lirong Wang:
Arteriovenous fistula stenosis classification method based on Auxiliary Wave and Transformer. 1168-1172 - Sai Han, Zelin Wang, Guangquan Wang, Qiukeng Fang, Hongbing Ma, Lin Lin, Lexi Xu, Heng Zhang:
Automatic Association of Cross-Domain Network Topology. 1173-1178 - Heng Li, Zhijun Liu, Yongting Liu, Hui Peng, Rui Zhang, Jun Peng, Zhiwu Huang:
Battery Aging-Robust Driving Range Prediction of Electric Bus. 1179-1186 - Michal Borowski, Sangeet Saha, Xiaojun Zhai, Klaus D. McDonald-Maier:
Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices. 1187-1192 - Qingqing Zhang, Tao Zhang, Shikun Jiang, Qiang Zhang, Yuhui Han, Xinzhou Cheng, Yunyun Wang, Xin He, Tian Xiao:
Big Data based Potential Fixed-Mobile Convergence User Mining. 1193-1198 - Zhe Zhou, Xiaoyu Cheng, Yang Sun, Fang Jiang, Fei Tong, Yuxing Mao, Ruilin Wang:
Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM. 1199-1204 - Haisheng Yu, Yan Liu, Lihong Duan, Sanwei Liu, Wenyong Wang, Dong Liu, Zirui Peng, Daobiao Gong:
Cache Top-level domain locally: make DNS respond quickly in mobile network. 1205-1210 - Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Florian Fenzl, Roland Rieke, Giuseppe Patanè:
CAHOOT: a Context-Aware veHicular intrusiOn detectiOn sysTem. 1211-1218 - Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen:
CCTVCV: Computer Vision model/dataset supporting CCTV forensics and privacy applications. 1219-1226 - Hannu Turtiainen, Andrei Costin, Timo Hämäläinen, Tuomo Lahtinen, Lauri Sintonen:
CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications. 1227-1234 - Wanjia Zheng, Kazumasa Omote:
Clean-label Backdoor Attack on Machine Learning-based Malware Detection Models and Countermeasures. 1235-1242 - Chuntao Song, Jie Gao, Fan Zhang, Tao Zhang, Yi Zhang, Lixia Liu, Bei Li, Yong Wang, Lexi Xu:
Collaborative Improvement of User Experience and Network Quality Based on Big Data. 1243-1248 - Weilin Yang, Zhonghui Du, Yonghui Wu, Yi Tang:
Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks. 1249-1254 - Feibi Lyu, Xinzhou Cheng, Lexi Xu, Liang Liu, Jinjian Qiao, Lu Zhi, Zixiang Di, Tian Xiao, Chen Cheng:
Coverage Estimation of Wireless Network Using Attention U-Net. 1255-1260 - Xiaoying Li, Guangxiang Zhang, Yuzhou Wu, Yang Yang, Yuelei Wang, Zhen Liu:
Create Persona of Elderly Users by Clustering Analysis of Needs. 1261-1265 - Saranda Poddar, Deepraj Chowdhury, Ashutosh Dhar Dwivedi, Raghava Rao Mukkamala:
Data Driven based Malicious URL Detection using Explainable AI. 1266-1272 - Junwei Zhang, Rui Bao, Lirong Wang, Jinke Xu, Yujie Chen, Xueqin Chen:
Denoising method of ECG signal based on Channel Attention Mechanism. 1273-1277 - Xinhe Pu, Xiaofang Yuan, Liangsen Li, Weiming Ji:
Design and Development of Operation Status Monitoring System for Large Glass Substrate Handling Robot. 1278-1285 - Gangyang Wang, Chunhua Zhu, Jianhou Wang:
Detection of impurity content in wheat based on cone-beam CT. 1286-1289 - Siqi He, Xiaofei Xing, Guojun Wang:
DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract. 1290-1295 - Xinqing Du, Xin Hu, Yin Wang, Weidong Wang:
Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration. 1296-1301 - Haofeng Liu, Yuefeng Liu, Yue Wang, Bo Liu, Xiang Bao:
EEG classification algorithm of motor imagery based on CNN-Transformer fusion network. 1302-1309 - Hao Xiao, Yuan Qiu, Rong Fei, Xiongbo Chen, Zuo Liu, Zongling Wu:
End-to-End Speech Recognition Technology Based on Multi-Stream CNN. 1310-1315 - Yi Yue, Wencong Yang, Xiao Liang, Xihuizi Meng, Rong Huang, Xiongyang Tang:
Energy-efficient and Traffic-aware VNF Placement for Vertical Services in 5G Networks. 1316-1322 - Kai Gao, Xiangyu Cheng, Hao Huang, Xunhao Li, Tingyu Yuan, Ronghua Du:
False Data Injection Attack Detection in a Platoon of CACC in RSU. 1324-1329 - Mingyu Yang, Tao Yang, Haiyang Wang, Hao Li, Tianming Li, Biao Hu:
Ferrite microstrip limiter based on the equivalent nonlinear loss simulation model for the narrow microwave pulse environment. 1330-1332 - Yanghui Zhang, Kai Gao, Shuo Huang, Xunhao Li, Ronghua Du:
Forgery Trajectory Injection Attack Detection for Traffic Lights under Connected Vehicle Environment. 1333-1339 - Boshen Shan, Yuanzhi Yao, Weihai Li, Xiaodong Zuo, Nenghai Yu:
Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control. 1340-1347 - Zilong Wang, Junhuai Li:
Guide Tracking Method Based On Particle Filter Fusion. 1348-1353 - Giampaolo Bovenzi, Valerio Persico, Antonio Pescapè, Anna Piscitelli, Vincenzo Spadari:
Hierarchical Classification of Android Malware Traffic. 1354-1359 - Peilun Wu, Hui Guo:
Holmes: An Efficient and Lightweight Semantic Based Anomalous Email Detector. 1360-1367 - Bin Ge, Ting Wang, Chenxing Xia, Gaole Dai:
Image Encryption Algorithm based on Convolutional Neural Network and Four Square Matrix Encoding. 1368-1375 - Shirin Kalantari, Danny Hughes, Bart De Decker:
Listing the ingredients for IFTTT recipes. 1376-1383 - Yuting Zheng, Yi Li, Yuchao Jin, Xiaomeng Zhu, Lexi Xu, Tian Xiao, Bei Li, Xinzhou Cheng:
Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network. 1384-1389 - Qinqin Wang, Hanbing Yan, Chang Zhao, Rui Mei, Zhihui Han, Yu Zhou:
Measurement of Malware Family Classification on a Large-Scale Real-World Dataset. 1390-1397 - Xingfu Wang, Xiangyu Li, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi:
MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis. 1398-1403 - Zhen Guo, Pengzhou Zhang, Junjie Xia, Zhe Zhou, Juan Cao:
Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration. 1404-1409 - Shuai Zhang, Xingfu Wang, Ammar Hawbani, Liang Zhao, Saeed Hamood Alsamhi:
Multimodal Graph Reasoning and Fusion for Video Question Answering. 1410-1415 - Hongce Zhao, Shunliang Zhang, Zhuang Qiao, Xianjin Huang, Xiaohui Zhang:
On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic. 1416-1423 - Biao Yang, Shanshan Zhao, Hongfei Du, Minju Yi, Ziwei Liu:
PAPR Suppression in Radar Communication Integration System Based on Subcarrier Reservation. 1424-1428 - Jinzhou Li, Shouye Lv, Liu Yang, Sheng Wu, Yang Liu, Qijun Luan:
Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites. 1429-1434 - Ning Wang, Jia Hu:
Performance Analysis of IEEE 802.11p for the Internet of Vehicles with Bursty Packet Errors. 1435-1440 - Wu Xin, Qingni Shen, Ke Feng, Yutang Xia, Zhonghai Wu, Zhenghao Lin:
Personalized User Profiles-based Insider Threat Detection for Distributed File System. 1441-1446 - Deqi Cao, Zhaoyun Ding, Fei Wang, Haoyang Ma:
Pre-training Fine-tuning data Enhancement method based on active learning. 1447-1454 - Yong Li, Zhenghao Zhang, Xi Chen, Ruxian Li, Liang Zhang:
Redactable Blockchain with K-Time Controllable Editing. 1455-1461 - Shangyu Tang, Mingde Huo, Yi Du, Yuwen Huo, Yan Zhang, Lexi Xu, Ying Ji, Guoyu Zhou:
Research and Application of 5G Edge AI in Medical Industry. 1462-1466 - Mingyue Li, Rong Fei:
Research and Implementation of Fault Diagnosis of Switch Machine Based on Data Enhancement and CNN. 1467-1472 - Xiaomeng Zhu, Yi Li, Yuting Zheng, Rui Xia, Lexi Xu, Bei Li, Zixiang Di, Lu Zhi, Xinzhou Cheng:
Research on 5G Network Capacity and Expansion. 1473-1478 - Jian Guan, Xinzhou Cheng, Kun Chao, Xin He, Yuwei Jia, Lexi Xu, Yunyun Wang, Tian Xiao, Bei Li:
Research on Capability Building of Mobile Network Data Analysis and Visualization. 1479-1484 - Heng Zhang, Wenyu Li, Lianbo Song, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu, Sai Han:
Research on Enterprises Loss in Regional Economic Risk Management. 1485-1490 - Tian Xiao, Bei Li, Zixiang Di, Guanghai Liu, Lexi Xu, Jian Guan, Zhaoning Wang, Chen Cheng, Yi Li:
Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme. 1491-1497 - Bei Li, Tian Xiao, Kai Zhou, Lexi Xu, Guanghai Liu, Bo Wang, Jie Gao, Jian Guan, Zixiang Di:
Research on OTFS Systems for 6G. 1498-1503 - Jie Gao, Lixia Liu, Tao Zhang, Shenghao Jia, Chuntao Song, Lexi Xu, Yang Wu, Bei Li, Yunyun Wang, Xinjie Hou:
Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis. 1504-1509 - Zixiang Di, Tian Xiao, Yi Li, Xinzhou Cheng, Bei Li, Lexi Xu, Xiaomeng Zhu, Lu Zhi, Rui Xia:
Research on Voice Quality Evaluation Method Based on Artificial Neural Network. 1510-1515 - Shivam Garg, Nandish Chattopadhyay, Anupam Chattopadhyay:
Robust Perception for Autonomous Vehicles using Dimensionality Reduction. 1516-1521 - Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaram, Zahra Jadidi, Leonie Simpson:
SCEVD: Semantic-enhanced Code Embedding for Vulnerability Discovery. 1522-1527 - Lukasz Krzywiecki, Hannes Salin:
Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. 1528-1533 - Lei Zhang, Dong Mao, Zuge Chen, Yubo Song, Liquan Chen, Zhongyuan Qin:
Smart Grid Data Aggregation Scheme Based on Local Differential Privacy. 1534-1539 - Lei Cheng, Shuaijun Liu, Lixaing Liu, Hailong Hu, Jingyi Chen, Xiandong Meng, Pengcheng Ding:
Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks. 1540-1544 - Dejia Lin, Yongdong Wu, Wensheng Gan:
Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect. 1545-1550 - Yuan Liu, Yanmei Liu, Minjing Zhong:
Technical architecture of integrated big data platform. 1551-1556 - Chen Cheng, Xinzhou Cheng, Shikun Jiang, Xin Zhao, Yuhui Han, Tao Zhang, Lijuan Cao, Yuwei Jia, Tian Xiao, Bei Li:
Telecom Big Data assisted Algorithm and System of Campus Safety Management. 1557-1562 - Yi Zhang, Fan Zhang, Chuntao Song, Xinzhou Cheng, Chen Cheng, Lexi Xu, Tian Xiao, Bei Li:
Telecom Customer Chum Prediction based on Half Termination Dynamic Label and XGBoost. 1563-1568 - Nidhi Rastogi, Sharmishtha Dutta, Alex Gittens, Mohammed J. Zaki, Charu C. Aggarwal:
TINKER: A framework for Open source Cyberthreat Intelligence. 1569-1574 - Marwa Zeroual, Brahim Hamid, Morayo Adedjouma, Jason Jaskolka:
Towards logical specification of adversarial examples in machine learning. 1575-1580 - Emilia Cioroaica, Barbora Buhnova, Daniel Schneider, Ioannis Sorokos, Thomas Kuhn, Emrah Tomur:
Towards the Concept of Trust Assurance Case. 1581-1586 - Vladimir Ushakov, Sampo Sovio, Qingchao Qi, Vijayanand Nayani, Valentin Manea, Philip Ginzboorg, Jan-Erik Ekberg:
Trusted Hart for Mobile RISC-V Security. 1587-1596 - Daniel Dalalana Bertoglio, Luis G. B. Schüler, Avelino F. Zorzo, Roben Castagna Lunardi:
Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application. 1597-1604 - Xin He, Lijuan Cao, Yuwei Jia, Kun Chao, Miaoqiong Wang, Chao Wang, Yunyun Wang, Runsha Dong, Zhenqiao Zhao:
User Analysis and Traffic Prediction Method based on Behavior Slicing. 1605-1610 - Xiting Peng, Naixian Zhao, Lexi Xu, Shi Bai:
Vehicle Classification System with Mobile Edge Computing Based on Broad Learning. 1611-1617
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.