default search action
22nd TrustCom 2023: Exeter, UK
- Jia Hu, Geyong Min, Guojun Wang, Nektarios Georgalas:
22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023. IEEE 2023, ISBN 979-8-3503-8199-3 - Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
Representation-enhanced APT Detection Using Contrastive Learning. 1-9 - Jiacheng Li, Tong Li, Runzi Zhang, Di Wu, Hao Yue, Zhen Yang:
APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning. 10-19 - Jian Chen, Jingyao Wu, Hao Yin, Qiang Li, Wensheng Zhang, Chen Wang:
Class-Targeted Poisoning Attacks against DNNs. 20-27 - Xinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo, Luming Yang:
EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPC. 28-37 - Qi Yan, Mohan Li, Yanbin Sun:
Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs. 38-45 - Jinze She, Wenhao Wang, Zihao Wang:
The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel Leakages. 46-53 - Malak Alqulaity, Po Yang:
Advanced Machine-Learning Technologies for Coronary Artery Disease Prediction Using Heterogeneous Data. 54-61 - Tanveer Khan, Antonis Michalas:
Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation. 62-71 - Bo Song, Yunpeng Yi, Ting Zhou, Junfeng Yang, Lei Liu:
Undermining License Plate Recognition: A Data Poisoning Attack. 72-78 - Mehrdad Sheikhjaberi, Dima Alhadidi:
Reducing Model Memorization to Mitigate Membership Inference Attacks. 79-88 - Shuai Li, Yu Wen, Xu Cheng:
Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving. 89-98 - Shuai Li, Yu Wen, Huiying Wang, Xu Cheng:
BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving. 99-108 - Jin Au-Yeung, Shanshan Wang, Yuchen Liu, Zhenxiang Chen:
Safety or Not? A Comparative Study for Deep Learning Apps on Smartphones. 109-116 - Jianlin Zhang, Xiaoding Wang, Hui Lin:
Big Data Assisted Object Detection with Privacy Protection. 117-124 - Linlin Su, Jinyan Wang, Zeming Gan, Xianxian Li:
FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks. 125-132 - Quanbo Pan, Yang Yu, Hanbing Yan, Maoli Wang, Bingzhi Qi:
FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow Sequence. 133-140 - Dandan Li, Yufeng Li, Guiqi Zhang, Ke Sun, Jiangtao Li:
Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage. 141-148 - Lukasz Krzywiecki, Grzegorz Zaborowski, Marcin Zawada:
Too Noisy, or Not Too Noisy? A Private Training in Machine Learning. 149-156 - Qing Yang, Youliang Tian, Jinbo Xiong:
DFedXGB: An XGB Vertical Federated Learning Framework with Data Desensitization. 157-164 - Seyedsina Nabavirazavi, Rahim Taheri, Mohammad Shojafar, Sundaraja Sitharama Iyengar:
Impact of Aggregation Function Randomization against Model Poisoning in Federated Learning. 165-172 - Chamara Sandeepa, Bartlomiej Siniarski, Shen Wang, Madhusanka Liyanage:
FL-TIA: Novel Time Inference Attacks on Federated Learning. 173-180 - Chenzhuo Wang, Yanrong Lu, Athanasios V. Vasilakos:
Scalable Federated Learning for Fingerprint Recognition Algorithm. 181-188 - Gengxiang Chen, Sheng Liu, Xu Yang, Tao Wang, Linlin You, Feng Xia:
FedRSM: Representational-Similarity-Based Secured Model Uploading for Federated Learning. 189-196 - Zhipin Gu, Jiangyong Shi, Yuexiang Yang, Liangzhong He:
Defending against Adversarial Attacks in Federated Learning on Metric Learning Model. 197-206 - Yunpeng Yi, Hongtao Lv, Tie Luo, Junfeng Yang, Lei Liu, Lizhen Cui:
Crowdsourcing-based Model Testing in Federated Learning. 207-213 - Harsh Kasyap, Somanath Tripathy, Mauro Conti:
HDFL: Private and Robust Federated Learning using Hyperdimensional Computing. 214-221 - Hanyu Wang, Liming Wang, Hongjia Li:
Byzantine-Robust Federated Learning through Dynamic Clustering. 222-230 - Changnan Jiang, Chunhe Xia, Chen Chen, Huacheng Li, Tianbo Wang, Xiaojian Li:
FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier. 231-240 - Hengyu Pan, Cheng Qu, Haowen Zhang, Shuo Wang, Jing Li:
HyperChain: A Dynamic State Sharding Protocol Supporting Smart Contracts to Achieve Low Cross-Shard and Scalability. 241-248 - Yuanyuan Li, Wei Chen, Xin Huang, Peng Han, Shenhai Zheng, Zhiqin Zhu:
Efficient Covert Communication Scheme Based on Ethereum. 249-256 - Zhenkun Luo, Shuhong Chen, Guojun Wang, Hanjun Li:
Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features. 257-264 - Yufan Fu, Jiuqi Wei, Ying Li, Botao Peng, Xiaodong Li:
TI-DNS: A Trusted and Incentive DNS Resolution Architecture based on Blockchain. 265-274 - Lianhai Wang, Qihao Huang, Wei Shao, Jinpeng Wang, Xiaoqian Liu, Fansheng Wang:
Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications. 275-283 - Jinyao Zhu, Xiaofei Xing, Guojun Wang, Peiqiang Li:
Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning. 284-291 - Shiyong Huang, Haocong Li, Ruoting Xiong, Wei Ren, Jie He, Yi Ren:
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain. 292-299 - Min Xu, Xiaoding Wang, Hui Lin:
IHFBF: A High-Performance Blockchain Framework for Improving Hyperledger Fabric Permissioned Chain. 300-306 - Jun Zhao, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo:
Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services. 307-317 - Bhaskar Rongali, Satyajit Mohapatra, Sanjeet Kumar Nayak:
A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash Function. 318-325 - Htet Htet Hlaing, Hitoshi Asaeda:
PrivOff: Secure and Privacy-Preserving Data Management for Distributed Off-Chain Networks. 326-333 - Yuwei Xu, Ying Zhang, Haonan Shi, Jie Cao:
ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains. 334-341 - Yiping Teng, Lei Liu, Jiawei Qi, Haochun Pan, Chunlong Fan:
VMR-Tree: Efficient and Verifiable Location-based kNN Queries on Blockchain. 342-351 - Liangen He, Haiqin Wu, Liang Li, Jucai Yang:
UNITE: Privacy-Aware Verifiable Quality Assessment via Federated Learning in Blockchain-Empowered Crowdsourcing. 352-360 - Jiuzheng Wang, Ruilin Zhang, Xinyi Li, Hao Yin:
FedJudge: Blockchain-based full-lifecycle trustworthy federated learning incentive mechanism. 361-368 - Liwen Xu, Xiang Lin, Jianhua Li, Min Bai, Liejun Wang:
HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks. 369-378 - Erol Gelenbe, Mohammed Nasereddin:
Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy. 379-386 - Chenghe Dong, Jianhong Zhang, Zongyi Lv, Ruxuan Zhang:
Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address for IoT. 387-393 - Wenrui Ma, Ying Cong, Haitao Xu, Fan Zhang, Zhao Li, Siqi Ren:
Investigating Fraud and Misconduct in Legitimate Internet Economy based on Customer Complaints. 394-403 - Zimian Liu, Han Qiu, Rui Wang, Junhu Zhu, Qingxian Wang:
Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems. 404-411 - Vinay Sachidananda, Sivaanandh Muneeswaran, Yang Liu, Kwok-Yan Lam:
Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments. 412-421 - Yuanpei Li, Qinglei Zhou, Bin Li, Yan Zhuang:
GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification. 422-433 - Muna Al-Hawawreh, Robin Doss:
Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment. 434-443 - Liang Jiao, Yujia Zhu, Baiyang Li, Qingyun Liu:
Measuring DNS-over-Encryption Performance Over IPv6. 444-451 - Jie Zhang, Hui Wen, Liting Deng, Mingfeng Xin, Zhi Li, Lun Li, Hongsong Zhu, Limin Sun:
HackMentor: Fine-Tuning Large Language Models for Cybersecurity. 452-461 - Xiuwen Sun, Zhihao Wu, Jing Lin, Pengfei Fu, Jie Cui, Hong Zhong:
Extracting Length Field of Unknown Binary Network Protocol from Static Trace. 462-469 - Huanlai Xing, Huaming Ma, Zhiwen Xiao, Xinhan Wang, Bowen Zhao, Shouxi Luo, Li Feng, Lexi Xu:
On ECG Signal Classification: An NAS-empowered Semantic Communication System. 470-476 - Xiuwen Sun, Guangzheng Zhang, Di Wu, Qingying Yu, Jie Cui, Hong Zhong:
Parallel Pattern Matching over Brotli Compressed Network Traffic. 477-484 - Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. 485-494 - Zahra Pooranian, Mohammad Shojafar, Pedram Asef, Matthew Robinson, Harry Lees, Mark Longden:
RCA-IDS: A Novel Real-time Cloud-based Adversarial IDS for Connected Vehicles. 495-503 - Yuwei Xu, Xiaotian Fang, Jie Cao, Rou Yu, Kehui Song, Guang Cheng:
Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning. 504-511 - Zhefeng Nan, Qian Qiang, Tianning Zang, Changbo Tian, Shuyuan Zhao, Shuhe Liu:
Topology construction method of anti-tracking network based on cross-domain decentralized gravity model. 512-521 - Eric Klieme, Ben-Noah Engelhaupt, Vincent Xeno Rahn, Christoph Meinel:
Push It Real Good: Towards Behavioral Access Control using the Door Handle Push-Down-Phase Only. 522-530 - Chunyan Ma, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. 531-538 - Yoshimichi Koga, Kenichi Kourai:
SSdetector: Secure and Manageable Host-based IDS with SGX and SMM. 539-548 - Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. 549-558 - Jawaher Alharbi, Adam P. Chester, Arshad Jhumka:
Towards Understanding Checkpointing in Transiently Powered IoT Networks. 559-568 - Alok Kumar Trivedi, Priyanka Bagade:
PANGA: Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber Attacks. 569-576 - Haoxiang Wang, Yu'Ang Zhang, Yujie Song, Yue Cao, Chee Yen Leow, Shihan Bao:
SRBR: Anti-selfish Routing Based on Social Similarity and Reputation Using Fuzzy Logic. 577-584 - Orvila Sarker, Hong Shen, Muhammad Ali Babar:
Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. 585-594 - Javad Forough, Monowar H. Bhuyan, Erik Elmroth:
Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM Approach. 595-604 - Yumeng Cheng, Wangyang Yu, Xiaojun Zhai, Fei Hao, Yuan Liu:
Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy Modeling and analyzing. 605-611 - Xuming Cen, Nan Hu, Haozhe Wang, Shiyi Liu:
Temporal-Aware Lightweight Visual Tracking Method for Dynamic Traffic Scenes. 612-619 - Hamdi Friji, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Carnelli, Alexis Olivereau, Aftab Khan:
Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study. 620-627 - Tian Tian, Yiru Gong, Bo Jiang, Junrong Liu, Huamin Feng, Zhigang Lu:
Insider Threat Detection Based On Heterogeneous Graph Neural Network. 628-635 - Muwei Jian, Yue Jin, Rui Wang, Xiaoguang Li, Hui Yu:
Inter-slice Correlation Weighted Fusion for Universal Lesion Detection. 636-643 - Liming Wang, Jiaxing Fan, Fengzhe Zhong, Yan Liu, Jinyang Liu:
Anomaly Detection in Dynamic Networks through Edge-Tight Structure Embedding. 644-651 - Hongyu Yang, Tao Zhang, Ze Hu, Liang Zhang, Xiang Cheng:
A DGA Domain Name Detection Method Based on Two-Stage Feature Reinforcement. 652-659 - Lingvue Su, Yongli Wang:
High-knowledge shilling attack detection method based on genetic co-forest. 660-667 - Wanshuang Lin, Chunhe Xia, Tianbo Wang, Chen Chen, Yuan Zhao, Weidong Zhou:
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis. 668-675 - Huiran Yang, Jiaqi Kang, Yueyue Dai, Jiyan Sun, Yan Zhang, Huajun Cui, Can Ma:
LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks. 676-685 - Wen Liu, Degang Sun, Haitian Yang, He Zhu, Yan Wang:
IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks. 686-693 - Jingyu Liu, Chunfang Yang, Ma Zhu, Baojun Qi, Xueyuan Fu, Mengyang Zhou:
MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding. 694-703 - Andrés F. Murillo, Ayoub Messous, Andikan Otung, Motoyoshi Sekiya:
Towards Trust-Centric Networking: A General Model for Trust Evaluation. 704-711 - Hélio Borges, Daniel Andrade, João Nuno Silva, Miguel Correia:
TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart Glasses. 712-721 - Jerzy Konorski:
Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection. 722-729 - Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye:
Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms. 730-739 - Ketong Shang, Fang Lu, Ke Huang, Yu Qin, Wei Li, Wei Feng:
Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential Computing Platform. 740-749 - Michael Eckel, Anirban Basu, Satoshi Kai, Hervais Simo Fhom, Sinisa Dukanovic, Henk Birkholz, Shingo Hane, Matthias Lieske:
SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply Chains. 750-761 - Chenkai Shen, Lei Fan:
Pldb: Protecting LSM-based Key-Value Store using Trusted Execution Environment. 762-771 - Tian Hu, Shangyuan Zhuang, Jiyan Sun, Yinlong Liu, Wei Ma, Hongchao Wang:
A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud Native. 772-779 - Shusuke Wani, Xiaokang Zhou, Shohei Shimizu:
BiLSTM and VAE Enhanced Multi-Task Neural Network for Trust-Aware E-Commerce Product Analysis. 780-787 - Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication. 788-795 - Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma:
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software. 796-803 - Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye:
The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures. 804-813 - Qinghua Hu, Chunxiang Xu, Wanpeng Li:
A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key. 814-822 - Ruizhong Du, Jing Cui, Mingyue Li, Yuqing Zhang:
CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering. 823-832 - Jinzhao Wang, Wenlong Tian, Ruixuan Li, Junwei Tang, Xuming Ye, Yaping Wan, Zhiyong Xu:
Sym-Fed: Unleashing the Power of Symmetric Encryption in Cross-Silo Federated Learning. 833-840 - Ruoyu Huang, Abdullah Aljuffri, Said Hamdioui, Kezheng Ma, Mottaqiallah Taouil:
Securing an Efficient Lightweight AES Accelerator. 841-848 - Fengling Pang, Chingfang Hsu, Man Ho Au, Lein Harn, Ze Zhang, Li Long:
Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments. 849-856 - Dominika Regéciová, Dusan Kolár:
GenRex: Leveraging Regular Expressions for Dynamic Malware Detection. 857-864 - Xuebin Ma, Shengyi Guan, Yanan Lang:
Differential Privacy Frequent Closed Itemset Mining over Data Stream. 865-872 - Weihong Zou, Shigeng Zhang, Weiping Wang, Jian Zhang, Xuan Liu:
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack. 873-880 - Yang Hu, Jia Chen, Xin Luo:
UFADF: A Unified Feature Analysis and Detection Framework for Malicious Office Documents. 881-888 - Hongyu Yang, Youwei Wang, Liang Zhang, Ze Hu, Xiang Cheng, Laiwei Jiang:
EAMDM: An Evolved Android Malware Detection Method Using API Clustering. 889-895 - Zhiwen Ren, Zehua Ma, Weiming Zhang, Nenghai Yu:
SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority Strategy. 896-903 - Wenlin Xu, Tong Li, Jinsong Wang, Haibo Duan, Yahui Tang:
Software Vulnerabilities Detection Based on a Pre-trained Language Model. 904-911 - Yuxi Li, Fucai Zhou, Jingjing Chen, Dong Ji:
Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme. 912-919 - Danping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng:
Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors. 920-928 - Fangwei Wang, Ruixin Song, Zhiyuan Tan, Qingru Li, Changguang Wang, Yong Yang:
Self-attention is What You Need to Fool a Speaker Recognition System. 929-936 - Huasong Zhou, Xiaowei Xu, Xiaodong Wang, Leon Bevan Bullock:
SATBA: An Invisible Backdoor Attack Based on Spatial Attention. 937-945 - Tao Leng, Yuedong Pan, Lixin Zhao, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dang Meng:
MemInspect: Memory Forensics for investigating Fileless Attacks. 946-955 - Zhixuan Wang, Guangping Xu, Hongzhang Yang, Yulei Wu:
Towards Survivable In-Memory Stores with Parity Coded NVRAM. 956-963 - Yiping Teng, Jiawei Qi, Lei Liu, Shiqing Wang, Li Xu, Chunlong Fan:
Secure Synchronized Spatio-Temporal Trajectory Similarity Search. 964-973 - Zeshi Zhang, Guangping Xu, Hongzhang Yang, Yulei Wu:
Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval. 974-981 - Lianpei Zhou, Xi Xiao, Guangwu Hu, Hao Li, Xiangbo Wu, Tao Zhou:
A lightweight and high-precision approach for bulky JavaScript engines fuzzing. 982-989 - Yongjian Guo, Xi Xiao, Yuanyi Lin, Hao Li, Xiangbo Wu, Tao Zhou:
Fuzz Testing for Rust Library Functions. 990-997 - Meiqi Wang, Muqian Chen, Zeyu Li, Xuebin Wang, Jinqiao Shi, Binxing Fang:
Deanonymize Tor Hidden Services Using Remote Website Fingerprinting. 998-1005 - Man Chen, Yuyue Chen, Zoe L. Jiang:
SIMD Bootstrapping in FHEW Scheme. 1006-1013 - Mingdi Xu, Bo Xie, Feng Cui, Chaoyang Jin, Yu Wang:
SQL injection attack sample generation based on IE-GAN. 1014-1021 - Xin Tang, Yiteng Zhou, Yudan Zhu, Mingjun Fu, Luchao Jin:
Random Chunks Generation Attack Resistant Cross-User Deduplication for Cloud Storage. 1022-1030 - Dawei Li, Di Liu, Yangkun Ren, Ziyi Wang, Yu Sun, Zhenyu Guan, Qianhong Wu, Jianwei Liu:
FPHammer: A Device Identification Framework based on DRAM Fingerprinting. 1031-1040 - Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt:
"A method like this would be overkill": Developers' Perceived Issues with Privacy-preserving Computation Methods. 1041-1048 - Benjamin Larsen, Nada El Kassem, Thanassis Giannetsos, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen:
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. 1049-1059 - Tassos Dimitriou, Khazam Alhamdan:
CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. 1060-1067 - Wentao Hu, Hui Fang:
Decentralized Matrix Factorization with Heterogeneous Differential Privacy. 1068-1075 - Everton de Matos, Conor Lennon, Eduardo K. Viegas, Markku Ahvenjärvi, Hannu Lyytinen, Ivan Kuznetsov, Joonas Onatsu, Anh Huy Bui:
Integrating VirtIO and QEMU on seL4 for Enhanced Devices Virtualization Support. 1076-1085 - Jianming Wu, Shuhong Chen, Guojun Wang, Hao Wang, Hanjun Li:
Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text. 1086-1093 - Anis Bkakria, Lydia Brika:
A Framework for Privacy Policy Enforcement for Connected Automotive Systems. 1094-1102 - Shengyang Luo, Yaqi Liu, Xuehu Yan, Chao Huang:
Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery. 1103-1110 - De Li, Tiange Xia, Qiyu Li, Xianxian Li, Jinyan Wang:
Robustness and Privacy for Green Learning under Noisy Labels. 1111-1118 - Yuting Yang, Lin Liu, Shaojing Fu, Jun-Jie Huang, Yuchuan Luo:
SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis. 1119-1126 - Cong Zha, Yulei Wu, Zexun Jiang, Wenqian Zhao, Hao Yin:
BAA: A Novel Decentralized Authorization System for Privacy-Sensitive Medical Data. 1127-1136 - Romain Dagnas, Anis Bkakria, Reda Yaich:
Robustness Assessment of Biometric Authenticators. 1137-1146 - Emmanuel Kwarteng, Mumin Cebe:
MEDICALHARM - A Threat Modeling designed for Modern Medical Devices. 1147-1156 - Yuwei Xu, Zizhi Zhu, Yunpeng Bai, Lilanyi Wu, Kehui Song, Guang Cheng:
SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization. 1157-1164 - Mingjian Tang, Weiqi Wang, Chenhan Zhang, Shui Yu:
RUE: Realising Unlearning from the Perspective of Economics. 1165-1172 - Liuxing Su, Zhenzhen Li, Gaopeng Gou, Zhen Li, Gang Xiong, Chengshang Hou:
MENDER: Multi-level Feature Fusion Discovery Framework for Exposed ICS Remote Management Devices in the Wild. 1173-1180 - Gaowei Zhang, Xu Zhou, Xiaobo Zhang:
Fine-Grained Task Scheduling Combining DDPG and Path Selection in LEO Satellite Networks. 1181-1186 - Wenbing Zou, Xiulei Liu, Shoulu Hou, Ye Zhang, Lin Miao, Yi Gong, Ning Li:
Affinity-Based Resource and Task Allocation in Edge Computing Systems. 1187-1195 - Gergely Tuskó, Weizhi Meng, Brooke Lampe:
Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild. 1196-1205 - Hualong Huang, Zhekai Duan, Wenhan Zhan, Yichen Liu, Zhi Wang, Zitian Zhao:
Distributed Dependent Task Offloading in CPU-GPU Heterogenous MEC: A Federated Reinforcement Learning Approach. 1206-1213 - Degang Sun, Guokun Xu, Weijie Wang, Yan Wang, Qiujian Lv, Xinxing Zhou, Zhiqi Li:
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement. 1214-1221 - Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Membership Inference Attacks against GNN-based Hardware Trojan Detection. 1222-1229 - Anastasia Pustozerova, Jan Baumbach, Rudolf Mayer:
Analysing Utility Loss in Federated Learning with Differential Privacy. 1230-1235 - Sarah Binhulayyil, Shancang Li:
Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model. 1236-1240 - Longfei Li, Xiaokang Yin, Xiao Li, Xiaoya Zhu, Shengli Liu:
ConFunc: Enhanced Binary Function-Level Representation through Contrastive Learning. 1241-1248 - Ximing Li, Linghui Li, Xiaoyong Li, Binsi Cai, Bingyu Li:
TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection. 1249-1257 - Chen Chen, Chunhe Xia, Tianbo Wang, Wanshuang Lin, Yuan Zhao, Yang Li:
EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph. 1258-1265 - Shuyu Chen, Dawei Lin, Zhenping Xie, Hongbo Wang:
Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack Detection. 1266-1271 - Badr Bellaj, Aafaf Ouaddah, Abdellatif Mezrioui, Noël Crespi, Emmanuel Bertin:
GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks. 1272-1278 - Helen Milner, Md. Redowan Mahmud, Mahbuba Afrin, Sashowta G. Siddhartha, Sajib Mistry, Aneesh Krishna:
On-graph Machine Learning-based Fraud Detection in Ethereum Cryptocurrency Transactions. 1279-1285 - Zhongyuan Qin, Jiarong Fan, Zeru Li, Xujian Liu, Xin Sun:
CWGAN-GP: Fuzzing Testcase Generation Method based on Conditional Generative Adversarial Network. 1286-1293 - Kundu Chen, Jie Luo:
Pooling Under the Sun: A Mining Pool Centralized Revisit and Solution. 1294-1299 - Xu Yang, Ao Wang, Qiuhao Wang, Saiyu Qi, Yong Qi:
A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain. 1300-1305 - Jingxian Cheng, Saiyu Qi, Yong Qi, Jianfeng Wang, Qin Jiang, Di Wu:
EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases. 1306-1311 - Karolina Bak, Hannes Salin, Karol Niczyj, Lukasz Krzywiecki:
Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping. 1312-1317 - Hui Zhao, Xiaodong Zhang, Jinshan Shi, Ru Li:
Referable NFT-based Revenue Allocation Mechanism in Data Marketplace. 1318-1323 - Awaneesh Kumar Yadav, Manoj Misra, An Braeken, Madhusanka Liyanage:
A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming. 1324-1331 - Diptendu Chatterjee, Prabal Banerjee, Subhra Mazumdar:
Chrisimos: A useful Proof-of-Work for finding Minimal Dominating Set of a graph. 1332-1339 - Xionghe Yu, Xiaolan Tang, Wenlong Chen:
Blockchain-based and Privacy-Preserving Data Collection for Vehicular Crowdsensing. 1340-1347 - Mina Alishahi, Wouter Leeuw, Nicola Zannone:
BC-FL k-means: A Blockchain-based Framework for Federated Clustering. 1348-1354 - Sandeep Srivastava, Deepshikha Agarwal, Brijesh Kumar Chaurasia:
Secure Decentralized Identity Management using Blockchain. 1355-1360 - Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken, Madhusanka Liyanage:
A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework. 1361-1368 - Pierre-Antoine Rault, Claudia-Lavinia Ignat, Olivier Perrin:
Access Control based on CRDTs for Collaborative Distributed Applications. 1369-1376 - Melker Veltman, Alexandra Parkegren, Victor Morel:
Putting a Padlock on Lambda - Integrating vTPMs into AWS Firecracker. 1377-1384 - Carlos Hernandez Gañán, Siôn Lloyd, Samaneh Tajalizadehkhoob:
Phish and Chips: Language-agnostic classification of unsolicited emails. 1385-1391 - Felix Clemens Gail, Roland Rieke, Florian Fenzl, Christoph Krauß:
Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection in Automotive Ethernet. 1392-1399 - Shahriar Saadat:
The Impact of EMI on Security Access Control in Datacenter Data Halls. 1400-1407 - Tong Gao, Xianhui Lu:
Physical Layer Secure Communication based on MIMO Channel Constellation Flipping. 1408-1415 - Haichuan Peng, Linning Peng, Hua Fu, Lingnan Xie, Junxian Shi, Wentao Jing:
Channel-Robust Radio Frequency Fingerprint Identification for LTE Devices with Hybrid Feature. 1416-1421 - Leonard Bradatsch, Oleksandr Miroshkin, Natasa Trkulja, Frank Kargl:
Zero Trust Score-based Network-level Access Control in Enterprise Networks. 1422-1429 - Abdul-Qadir Khan, Nouredine Tamani, Saad El Jaouhari, Lina Mroueh:
A Contextual Derivation Algorithm for Cybersecurity in IoT Environments. 1430-1435 - Samed Saka, Ali Al-Ataby, Valerio Selis:
Generating Synthetic Tabular Data for DDoS Detection Using Generative Models. 1436-1442 - Xingyu Wang, Wenkun, Yingdan Zhang:
Network Attack Identification and Analysis Based on Graph Convolutional Neural Network. 1443-1448 - Zexiao Zou, Yan Zhang, Jin Chen, Jianyi Zhang, Zhiqiang Wang, Lei Ju, Ri Xu:
Be like a Chameleon: Protect Traffic Privacy with Mimicry. 1449-1454 - Shashwat Adhikari, Hafizul Asad, Kevin D. Jones:
Enhancing IoT Security: Novel Mechanisms for Malware Detection using HPCs and Neural Networks. 1455-1463 - Chundong Wang, Yongxin Zhao:
A Novel Approach for Trajectory Partition Privacy in Location-Based Services. 1464-1469 - Yevheniya Nosyk, Maciej Korczynski, Andrzej Duda:
Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet. 1470-1479 - Yevheniya Nosyk, Maciej Korczynski, Carlos Hernandez Gañán, Michal Król, Qasim Lone, Andrzej Duda:
Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates. 1480-1489 - João Afonso Vilalonga, João S. Resende, Henrique Domingos:
TorKameleon: Improving Tor's Censorship Resistance with K-anonymization and Media-based Covert Channels. 1490-1495 - Paulo Roberto de Oliveira, Altair O. Santin, Pedro Horchulhack, Eduardo K. Viegas, Everton de Matos:
A Dynamic Network-based Intrusion Detection Model for Industrial Control Systems. 1496-1501 - Syafiq Al Atiiq, Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga:
Attacks Against Mobility Prediction in 5G Networks. 1502-1511 - Jingwen Su, Xiangyu Bai, Kexin Zhou:
Analysis and Comparison of Delay Tolerant Network Security Issues and Solutions. 1512-1517 - Adam Spanier, Rui Zhao, Pei-Chi Huang:
Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement. 1518-1523 - Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:
Protocol Aware Unsupervised Network Intrusion Detection System. 1524-1531 - Ayush Kumar, Vrizlynn L. L. Thing:
A Public Key Infrastructure for 5G Service-Based Architecture. 1532-1539 - Nikos Fotiou, Spiros Chadoulos, Iordanis Koutsopoulos, Vasilios A. Siris, George C. Polyzos:
Access control for interoperable energy management systems using Verifiable Credentials. 1540-1545 - Weidong Zhou, Tianbo Wang, Guotao Huang, Xiaopeng Liang, Chunhe Xia, Xiaojian Li:
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data. 1546-1553 - Shaswata Mitra, Stephen A. Torri, Sudip Mittal:
Survey of Malware Analysis through Control Flow Graph using Machine Learning. 1554-1561 - Sunanda Bose, Dusica Marijan:
Secure Traversable Event logging for Responsible Identification of Vertically Partitioned Health Data. 1562-1571 - Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:
MATH - Finding and Fixing Exploits in Algorand. 1572-1579 - Rui Zhao:
CamPass: a Secure Camera-based Password Manager for Kiosk Browsing. 1580-1585 - Kaiqi Lv, Weiguo Lin, Junfeng Xu, Wanshan Xu, Shuren Chen, Shengwei Yi:
Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake. 1586-1591 - Chenyu Dong, Peijia Zheng, Weiqi Luo:
Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition. 1592-1597 - Prasasthy Balasubramanian, Justin Seby, Panos Kostakos:
Semantic-Driven Focused Crawling Using LASER and FAISS: A Novel Approach for Threat Detection and Improved Information Retrieval. 1598-1605 - Daniel Grahn, Lingwei Chen, Junjie Zhang:
Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models. 1606-1613 - Xianxia Zou, Cenyu Zheng, Haodong Lin, Like Du, Weiwu Xu, Chong He:
A Fine-Grained Access Control Mechanism Based on Search Trees. 1614-1620 - Rudra Prasad Baksi, Vishwas Nalka, Shambhu J. Upadhyaya:
Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information. 1621-1630 - Kalam Khadka, Abu Barkat Ullah, Wanli Ma, Elisa Martínez Marroquín, Yibeltal Alem:
A Survey on the Principles of Persuasion as a Social Engineering Strategy in Phishing. 1631-1638 - Junwei Yu, Yepeng Ding, Yuheng Guo, Kentaro Kotani, Hiroyuki Sato:
Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework. 1639-1644 - Roland Kromes, João Rodrigues, Duarte M. Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang:
A New Design for Self-Encryption. 1645-1652 - Mustafa A. Al Sibahee, Chengwen Luo, Jin Zhang, Yijing Huang, Zaid Ameen Abduljabbar:
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity. 1653-1660 - Himanshu Goyal, Krishna Kodali, Sudipta Saha:
LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT. 1661-1666 - David Pineda Reyes, Josiah Hsu, Claire Wagner, Devin J. Pohly:
Dynamic Security Parameters for Multichannel Secret Sharing Protocols. 1667-1672 - Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:
Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware. 1673-1680 - Kailu Guo, Yang Xin, Tianxiang Yu:
Malware Detection Using Contrastive Learning Based on Multi-Feature Fusion. 1681-1686 - Yepeng Ding, Hiroyuki Sato:
Model-Driven Security Analysis of Self-Sovereign Identity Systems. 1687-1694 - Pranitha Sanda, Digambar Pawar, Radha Vedala:
WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach. 1695-1703 - Alexandra Tidrea, Adrian Korodi:
ECC Implementation and Performance Evaluation for Securing OPC UA Communication. 1704-1711 - Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew:
LPA: A Lightweight PUF-based Authentication Protocol for IoT System. 1712-1717 - Sara Ramezanian, Christian Gehrmann:
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key. 1718-1727 - Raghav Bhardwaj, Morteza Noferesti, Madeline Janecek, Naser Ezzati-Jivan:
EMD-SCS: A Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call Sequences. 1728-1737 - Michela Iezzi, Carsten Maple, Danilo A. Giannone:
On the Adoption of Homomorphic Encryption by Financial Institutions*. 1738-1743 - Jayanthi Ramamoorthy, Narasimha K. Shashidhar, Bing Zhou:
Anomaly based malware threat detection on Linux Systems. 1744-1750 - Aidan Spalding, Zhiyuan Tan, Kehinde O. Babaagba:
Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. 1751-1756 - Reham Al Tamime, Ali Farooq, Joni Salminen, Vincent Marmion, Wendy Hall:
Understanding Privacy Concerns in Mobile Health Applications: A Scenario-based Online Survey. 1757-1765 - David Halasz, Suyash Shandilya, Barbora Buhnova:
Trustworthy Execution in Untrustworthy Autonomous Systems. 1766-1773 - Toru Nakamura, Yukiko Sawaya, Takamasa Isohara:
Survey on Recognition of Privacy Risk from Responding on Twitter. 1774-1780 - Ziyu Fei, Ying Li, Jiuqi Wei, Yufan Fu, Botao Peng, Xiaodong Li:
FlexAuth: A Decentralized Authorization System with Flexible Delegation. 1780-1797 - Kewei Guo, Xuefei Li:
A Trustworthiness Evaluation Mechanism Based on Beta Distribution Under Selected Conditions. 1781-1789 - Quan Shi, Kaiyuan Deng:
Privacy-Preserving Detection Method for Transmission Line Based on Edge Collaboration. 1798-1805 - Florian Platzer, York Yannikos:
Trust Assessment of a Darknet Marketplace. 1806-1813 - M. A. Hannan Bin Azhar, Zoltán Mészáros, Tasmina Islam, Soumya Kanti Manna:
An Interactive Web Portal for Customised Telerehabilitation in Neurological Care. 1814-1821 - Brendan Black, Philip Perry, Joseph Rafferty, Claudia Cristina, Tom Bowman, Cathryn Peoples, Andrew Ennis, Andrew Reeves, Nektarios Georgalas, Adrian Moore, Bryan W. Scotney:
Matrix Platform: Empowering Smart Ports with Advanced Video Analytics for Enhanced Security, Safety, and Efficiency. 1822-1826 - Kairen Chen, Shuhong Chen, Guojun Wang, Chenchen Wang:
CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network. 1827-1834 - Bo Yang, Yanchao Zhang, Dong Tong:
DOPS: A Practical Dual Offline Payment Scheme of CBDC for Mobile Devices. 1835-1844 - Yinzhen Wei, Shuo Lu:
Android Malicious Application Detection Based on Improved Mayfly Algorithm. 1845-1852 - Mohd Anuaruddin Bin Ahmadon, Shingo Yamaguchi, Alireza Jolfaei:
Game Theory-Based Trade-Off Analysis for Privacy and Openness in Decision Making by Controlling Quantity of Information. 1853-1858 - Erika A. Leal, Binlin Cheng, TuQuynh Nguyen, Alfredo Gutierrez Garcia, Nathan Cabero, Jiang Ming:
Leveraging Hardware Performance Counters for Efficient Classification of Binary Packers. 1859-1864 - Nektarios Georgalas, Andrew Ennis, Cathryn Peoples, Joseph Rafferty, Philip Perry, Claudia Cristina, Brendan Black, Adrian Moore, Tom Bowman, Bryan W. Scotney, Andrew Reeves:
IoT Device Lifecycle Management. 1865-1870 - Brendan Black, Joseph Rafferty, José A. Santos, Andrew Ennis:
UAV Bluetooth Communication Link Assessment for Emergency Response Applications. 1871-1878 - Sanjiv S. Jha, Simon Mayer, Kimberly García:
Actionable Contextual Explanations for Cyber-Physical Systems. 1879-1886 - Tom Bowman, Nektarios Georgalas, Andrew Reeves, Andrew Ennis, Cathryn Peoples, Brendan Black, Fadi El-Moussa, Adrian Moore:
Proactive Device Management for the Internet of Things. 1887-1892 - Kristaps Jurkans, Charles Fox:
Python Subset to Digital Logic Dataflow Compiler for Robots and IoT. 1893-1899 - Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Daniel Robert Franklin, Massimo Piccardi:
I2Map: IoT Device Attestation Using Integrity Map. 1900-1907 - Can Aknesil, Elena Dubrova, Niklas Lindskog, Håkan Englund:
A Near-Field EM Sensor Implemented in FPGA Configurable Fabric. 1908-1913 - Talal Halabi:
Stealthy Rootkits vs Low-Power IoT Devices: A Process-level Colonel Blotto Game. 1914-1918 - Jiantao Qu, Chunyu Qi, Gaoyun An, He:
Multi-step Prediction of LTE-R Communication Quality based on CA-TCN and Differential Evolution. 1919-1924 - Talaya Farasat, Muhammad Ahmad Rathore, Akmal Khan, Jongwon Kim, Joachim Posegga:
Machine Learning-based BGP Traffic Prediction. 1925-1934 - Martin Macák, Radek Oslejsek, Barbora Buhnova:
Detecting Masquerading Traitors from Process Visualization of Computer Usage. 1935-1940 - Piyush Bajaj, Matthew Edwards:
Automatic Scam-Baiting Using ChatGPT. 1941-1946 - Zeyi Li, Ze Zhang, Mengyi Fu, Pan Wang:
A novel network flow feature scaling method based on cloud-edge collaboration. 1947-1953 - Juliano Pimentel, Alistair A. McEwan, Hong Qing Yu:
A Comprehensive Machine Learning Methodology for Embedded Systems PHM. 1954-1959 - Qaizar Bamboat, Hong Qing Yu:
Literature Study on Bias and Fairness in Machine Learning Systems. 1960-1965 - Haonan Wang, Lixiang Liu, Xin Zhou, Lexi Xu, Guangyang Wu, Shuaijun Liu:
Deep Reinforcement Learning Based Interference Avoidance Beam-Hopping Allocation Algorithm in Multi-beam Satellite Systems. 1966-1973 - Hao Wang, Yun Liu, Zhiqun Song, Bing Hu, Zikai Wang, Ruiliang Song, Pei Xiao:
A Low Complexity And Efficient Algorithm for LEO Satellite Routing. 1974-1979 - Wenli Yan, Shuaijun Liu, Lixiang Liu:
Multiple Chord Distance Regression Algorithm to Judge Constellations Without Prior Information. 1980-1985 - Jifeng Liu, Yao Zhou, Cheng Wang, Yingnan Liu, Fuchang Li:
Simulation of Space-borne Digital Phased Array Anntenna. 1986-1990 - Xiang Gao, Jiangyin Fu, Xiujuan Yao, Yi Yan:
Optimization Method for LEO Constellation Frequency Compatibility Simulation Parameters. 1991-1992 - Yuqian Cai, Cheng Wang, Xiaoqian Wang, Xiaoyan Zhao, Weidong Wang:
Coexistence Analysis Between the Large-scale IMT systems and LEO Satellite communication systems. 1993-1998 - Xiaoqian Wang, Cheng Wang, Yuqian Cai, Xiaoyan Zhao, Weidong Wang:
Coexistence Analysis of 10-10.5 GHz IMT and EESS (passive) Systems. 1999-2004 - Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Kaichu Xing:
Service-Driven Shared QoS Orchestration for Satellite-Ground Integrated Networks. 2005-2011 - Shoufeng Wang, Hua-Min Chen, Ye Ouyang, Fan Li, Xuan Chen, Jianchao Guo, Yun Li, Sen Bian, Xidong Wang, Zhidong Ren:
Constellation Autonomy Modeling for Agile on-Orbit Communication and Computing. 2012-2017 - Mozina Afzal, Kamran Ali, Mumraiz Khan Kasi, Masood Ur Rehman, Mohammad Ali Khoshkholghi, Bushra Haq, Syed Ahmed Shah:
Analyzing Land Cover and Land Use Changes Using Remote Sensing Techniques: A Temporal Analysis of Climate Change Detection with Google Earth Engine. 2018-2023 - Jie Ren, Lin Lin, Miao Xue, Zelin Wang:
Application Scenarios of Confidential Computing in Satellite Internet. 2024-2029 - Zhen Guo, Pengzhou Zhang, Lexi Xu, Peng Liang, Shuwei Yao:
Design and Implementation of Digital Consulting Capability Platform based on Knowledge Sharing. 2030-2035 - Jinhu Shen, Rui Wang, Mingjie Yang, Liang Cui, Ao Shen, Bao Guo, Jiayu Li, Yuan Fang, Pengcheng Liu, Jimin Ling:
RedCap In-depth Research and Market Development Prospect. 2036-2041 - Bin Yang, Jing Liang, Yubin Chen, Ying Xing, Wei Gao, Yue Wang, Lexi Xu, Xinzhou Cheng:
Research on Interpretable Customer Churn Prediction Based on Attention Mechanism. 2042-2047 - Bao Guo, Lufei Zhang, Jinge Guo, Jinhu Shen, Shumin Jiang, Pengcheng Liu:
Method for Dual-path Upgrade in a Leaked Signal Indoor Distribution System in 5G Network. 2048-2051 - Peng Wu, Chengzhuo Han, Tao Yan, Lu Chen, Tianhao Guo, Zhi Li:
SSF-EDZL Scheduling Algorithm on Heterogeneous Multiprocessors. 2052-2057 - Shoufeng Wang, Hua-Min Chen, Ye Ouyang, Fan Li, Xuan Chen, Limeng Ma, Zhanwu Li, Sen Bian, Zhidong Ren:
Evaluation of Distributed Collaborative Learning Approach for 5G Network Data Analytics Function. 2058-2063 - Dongyue Zhang, Sai Han, Zelin Wang, Jingwei Wang, Guangquan Wang, Jieyan Yang:
Research on Cross-Layer Alarm Association in 5G Core Network. 2064-2069 - Ao Li, Sai Han, Zelin Wang, Guangquan Wang, Zhi Qiao, Songtao Ni:
The Research and Implementation of Optical Cable Fault Location Method Based on Navigation. 2070-2075 - Yue Wang, Wei Gao, Xinzhou Cheng, Xin Wang, Lexi Xu, Siwei Wang, Yuanguang Wang, Fanyu Meng, Kunyan Li:
User Relationship Discovery Based on Telecom Data. 2076-2081 - Liu Na, Rui Yang, Zhicheng Zang, Yu Wang, Chao Wu, Xiaofei Li, Zhendong Li, Meng Li:
A Big Data Sharing Architecture Based on Federal Learning in State Grid. 2082-2086 - Pengwei Ma, Chaolun Wang:
Research on the Construction of Information System Stability Guarantee Capability. 2087-2091 - Chaolun Wang, Jiaxing Yang, Xiaolu Han, Jianrui Ma, Siyuan Liu, Pengwei Ma:
Research on Distributed Database Stability Testing Platform based on Chaos Engineering. 2092-2097 - Yue Wang, Wei Gao, Xinzhou Cheng, Xin Wang, Huiying Zhao, Zhipu Xie, Lexi Xu:
Multi-Granularity Cross-Attention Network for Visual Question Answering. 2098-2103 - Jie Gao, Tianyi Wang, Yuhui Han, Lixia Liu, Xingwei Zhang, Lexi Xu, Yang Wu, Zijing Yang, Chen Cheng:
An Analysis Strategy of Abnormal Subscriber Warning Based on Federated Learning Technology. 2104-2109 - Yuwen Hou, Song Wu, Mingde Huo:
Medical Image Recognition Technology Based On Fusion Of Faster-RCNN And SSD. 2110-2114 - Ying Xing, Mengci Zhao, Bin Yang, Yuwei Zhang, Wenjin Li, Jiawei Gu, Jun Yuan, Lexi Xu:
Vulnerability Name Prediction Based on Enhanced Multi-Source Domain Adaptation. 2115-2121 - Zhaoning Wang, Jiajia Zhu, Bo Cheng, Xinzhou Cheng, Feibi Lyu, Guoping Xu, Jinjian Qiao, Lu Zhi, Tian Xiao:
An AI-driven Dockerized Lightweight Framework for Smart Home Service Orchestration. 2122-2127 - Feibi Lyu, Ning Meng, Yuhui Han, Jinjian Qiao, Zhipu Xie, Xinzhou Cheng, Lexi Xu, Zhaoning Wang, Guoping Xu:
Proactive Operation and Maintenance for 5G Networks Based on Complaint Prediction. 2128-2133 - Geng Tian, Amir Rehman, Huanlai Xing, Li Feng, Nighat Gulzar, Abid Hussain:
Automatic Intelligent Chronic Kidney Disease Detection in Healthcare 5.0. 2134-2140 - Yang Cheng, Kai Wei, Yihui Zhang, Chunyu Jiang, Weiwei Pang, Qi Zhang, Bin Liu, Lifeng Zhang, Tingting Liu, Yinqian Wu:
TrustedBench: An Efficient and User-friendly Distributed Performance Testing Tool for Blockchain System. 2141-2146 - Bohuan Ai, Yufei Li, Wenda Ma, Mengyuan Qiu, Miao Liu:
Assessing the Value of Data Assets: An Exploratory Study of Valuation Methods. 2147-2151 - Fanqiang Meng, Jian Wang, Boxiong Li:
A Cooperative Lane Change Method for Connected and Automated Vehicles Based on Reinforcement Learning. 2152-2157 - Heng Zhang, Bing Yan, Yunpeng Li, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu:
Research on Enterprises Growth for Industries in Post-Epidemic Era. 2158-2163 - Yunlu Yang, Miaoqiong Wang, Yuming Ge, Rundong Yu:
Research on Data Security for Vehicle-Infrastructure-Cloud Integration. 2164-2169 - Zheng Yin, Shengwen Zhou, Jingjing Zhou, Minghui Tian, Musen Lin, Sida Liu:
Research on DataOps Capability - Practice and Development. 2170-2174 - Kun Chao, Zhen Xing, Xinzhou Cheng, Jian Guan, Lexi Xu, Xiqing Liu, Yuwei Jia, Lijuan Cao:
Research on Operation Evolution of 5G Non-Public Network. 2175-2180 - Jinjian Qiao, Guoping Xu, Ning Meng, Feibi Lyu, Xinzhou Cheng, Jiajia Zhu, Lexi Xu, Liang Liu:
Research on Diagnosis System of 5G Data Service Latency Problem. 2181-2186 - Weiwei Pang, Kai Wei, Yihui Zhang, Chunyu Jiang, Yang Cheng, Qi Zhang, Bin Liu, Lifeng Zhang, Tingting Liu, Yinqian Wu:
Research on Assessment System for Blockchain. 2187-2192 - Shu Yan, Sirui Zhang, Ailin Lv, Bo Yuan, Kai Wei:
Development Situation and Suggestions of Data Elements in China. 2193-2197 - Yanmei Liu, Pengwei Ma, Jiafeng Tian:
Research on Technology and Industry Situation of Lakehouse. 2198-2203 - Qingyuan Hu, Zheng Yin, Tao Tao, Jibin Wang, Zhuo Chen, Bohuan Ai, Yu Liu, Chongzhou Liu:
Research on Technologies in Data Fabric. 2204-2209 - Jiafeng Tian, Pengwei Ma, Chaolun Wang, Zhuo Wang:
Research on Development of Data Disaster Recovery System. 2210-2215 - Abdullahi Chowdhury, Mohammad Manzurul Islam, Shahriar Kaisar, Mahbub E. Khoda, Ranesh Naha, Mohammad Ali Khoshkholghi, Mahdi Aiash:
Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications. 2216-2221 - Yi Yue, Zhiyan Zhang, Chang Cao, Xiongyan Tang, Wencong Yang, Feile Li:
EasyOrchestrator: A Dynamic QoS-Aware Service Orchestration Platform for 6G Network. 2222-2227 - Chen Cheng, Xinzhou Cheng, Jinyou Dai, Xu Xia, Bin Yang, Feibi Lyu, Jie Gao, Wei Zhang, Tian Xiao, Tianyi Wang:
A Novel Algorithm and System of Customer Value Evaluation based on Telecom Operator Big Data. 2228-2233 - Lexi Xu, Junsheng Zhao, Hong Zhu, Mingde Huo, Xinzhou Cheng, Kun Chao, Jie Li, Jian Guan, Xiqing Liu, Jie Gao:
5G/5G-A Private Network: Construction, Operation and Applications. 2234-2239 - Shoufeng Wang, Hua-Min Chen, Ye Ouyang, Fan Li, Xuan Chen, Jianchao Guo, Yun Li, Sen Bian, Xidong Wang, You Lu:
Elastic Digital Twin Network Modeling toward Restraining Resource Occupation. 2240-2245 - Anyan Xiao, Zhuo Yan, Zheng Li, Huangxin Xu, Huixuan Zheng, Yujie Ai, Xiaocong Zhang, Qixuan Sun, Changyu Zhao:
An Improved Lightweight Linear K-value Transformer. 2246-2250 - Zijing Yang, Lexi Xu, Jie Gao, Jie Li, Yang Wu, Xinzhou Cheng:
FedQuant: Stock Prediction with Muti-Party Technical Indicators using Federated Learning Method in Quantitative Trading. 2251-2256 - Changyu Zhao, Zhuo Yan, Huangxin Xu, Xueliang Chen, Zheng Li, Xinyu Zhong, Cuiwei Liu, Anyan Xiao, Xingyan Lv:
Design and Implementation of Mask Detection System Based on Improved YOLOv5s. 2257-2262 - Tianyi Wang, Yuhui Han, Wei Zhang, Xinzhou Cheng, Jie Gao, Qingqing Zhang, Qijiao Yang, Fengqiang Chen, Chen Cheng:
Address Localization Method Based on Data Fusion of Core Network and Radio Access Network. 2263-2268 - Chao Guo, Buxin Guo, Tingting Zhu, Peihe Liu, Cheng Gong:
FLEvaluate: Robust Federated Learning Based on Trust Evaluate. 2269-2274 - Bao Guo, Jinge Guo, Lufei Zhang, Yuan Fang, Yingtao Meng, Jiayu Li:
A Novel Uplink Coverage and Capacity Enhancement Scheme in NR TDD Network. 2275-2279 - Runsha Dong, Xiaodong Cao, Chao Wang, Zhaoyang Sun, Lexi Xu, Xin He, Yang Wu:
Smart Campus Construction based on Telecom Operators Big Data. 2280-2285 - Minjuan Zhang, Chase Q. Wu, Aiqin Hou:
Ensemble Learning Models for Large-Scale Time Series Forecasting in Supply Chain. 2286-2294 - Nhu Minh Ngoc Pham, Yixi Wu, Carson K. Leung, Mohammadafaz V. Munshi, Vrushil Kiritkumar Patel, Connor C. J. Hryhoruk:
A Big Data Science and Engineering Solution for Transit Performance Analytics. 2295-2302 - Mohammad Shahzad, Lu Liu, Nacer Belkout:
Control Overhead Reduction using Length-based Same Destination Aggregation for Large Scale Software Defined Networks in Next Generation Internet of Things. 2303-2309 - Sheng Yang, Guan-Ju Peng:
Optimizing Quantum Reversible Circuits Using Reinforcement Learning. 2310-2314 - Madathodika Asna, Hussain Shareef, Achikkulath Prasanthi:
Quantum Inspired Binary Atom Search Optimization Algorithm for Charging Station Placement Problem. 2315-2322 - Jinhua Du, Hao Yin:
KrNER: A Novel Named Entity Recognition Method Based on Knowledge Enhancement and Remote Supervision. 2323-2332 - Jinhua Du, Hao Yin:
KLDP: A Data Profiling Technique Based on Knowledge Graph and Large Language Modeling. 2333-2340 - Joseph Attieh, Joe Tekli:
Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation. 2341-2348 - Víctor Pérez-Piqueras, Pablo Bermejo, José A. Gámez:
Hybrid Multi-Objective Relinked GRASP for the constrained Next Release Problem. 2349-2356 - Rafael Cabral de Moura, Lucia Catabriga:
Stabilized Finite Element Approximation for The Transient Darcy-Brinkman-Forchheimer Model. 2357-2364 - Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:
Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection. 2365-2371 - Sankalp Vyas, Amar Nath Patra, Raj Mani Shukla:
Histopathological Image Classification and Vulnerability Analysis using Federated Learning. 2372-2377 - Filip Krakowski, Fabian Ruhland, Michael Schöttner:
High-Performance Object Serialization based on Ahead-of-Time Schema Generation. 2378-2385 - Halvin Yang, Xiao Lin, Kai-Kit Wong, Yizhe Zhao:
Fast Fluid Antenna Multiple Access With Path Loss Consideration and Different Antenna Architecture. 2386-2393 - Adhban Farea, Moaaz Munir, Rahat Ullah, Michal Otreba, Sean Carroll, Joe Harrington:
Comparison of the Barriers to BIM Adoption and Digital Transformation within the Construction Industry of Pakistan and Ireland. 2394-2399 - Alonso Rodríguez-Iglesias, María J. Martín, Juan Touriño:
Clupiter: a Raspberry Pi mini-supercomputer for educational purposes. 2400-2405 - Fabian Ruhland, Filip Krakowski, Michael Schöttner:
Transparent network acceleration for big data computing in Java. 2406-2413 - Jen-Chieh Yang, Hung-I Lin, Lin-Jing Kuo, Sheng-De Wang:
MOFP: Multi-Objective Filter Pruning for Deep Learning Models. 2414-2423 - Chang-Hsuan Hsieh, Jen-Chieh Yang, Hung-Yi Lin, Lin-Jing Kuo, Sheng-De Wang:
A Hybrid Filter Pruning Method Based on Linear Region Analysis. 2424-2431 - Peng-Yu Chen, Jen-Chieh Yang, Sheng-De Wang:
Soft Hybrid Filter Pruning using a Dual Ranking Approach. 2432-2439 - Sheetal Harris, Jinshuo Liu, Hassan Jalil Hadi, Yue Cao:
Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Detection. 2440-2447 - Zhipeng Yuan, Nasamu Musa, Katarzyna Dybal, Matthew Back, Daniel Leybourne, Po Yang:
Quantifying Nematodes through Images: Datasets, Models, and Baselines of Deep Learning. 2448-2455 - Louis Fortune Sahi, Romain Laborde, Mohamed Ali Kandi, Michelle Sibilla, Giorgia Macilotti, Benzekri Abdelmalek, Afonso Ferreira:
Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria. 2456-2464 - Haohan Zhu, Andrea Staino, Biswajit Basu:
Railway Traffic Signal Recognition System based on Spatio-Temporal Features. 2465-2471 - Arghya Kundu, Uyen Trang Nguyen:
A Large-scale Non-standard English Database and Transformer-based Translation System. 2472-2479 - Jonathan Bishop, Ashu M. G. Solo:
Increasing user seduction in e-commerce community interaction using the participation continuum. 2480-2487 - Bozheng Pang, Tim Claeys, Kristof T'Jonck, Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens:
Simulation for Trade-off between Interference and Performance in a Bluetooth Low Energy Network. 2488-2494 - Bozheng Pang, Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens:
Experimental Validation of Common Assumptions in Bluetooth Low Energy Interference Studies. 2495-2502 - Amaury Saint-Jore, Ye-Qiong Song, Laurent Ciarletta:
HMAS: enabling seamless collaboration between drones, quadruped robots, and human operators with efficient spatial awareness. 2503-2510 - Takumi Onozawa, Hiroshi Fujimoto, Takuya Azumi:
Model-based Development for ROS 2-based Autonomous-driving Software. 2511-2519 - Yuta Tajima, Tatsuya Miki, Takuya Azumi:
Performance Evaluation Framework for Arbitrary Nodes of Autonomous-driving Systems. 2520-2529 - Hassan Jalil Hadi, Khurram Shahzad, Naveed Ahmed, Yue Cao, Yasir Javed:
A Scalable Pattern Matching Implementation on Hardware using Data Level Parallelism. 2530-2537 - Naoki Nagamatsu, Yuko Hara-Azumi:
Dynamic Split Computing-Aware Mixed-Precision Quantization for Efficient Deep Edge Intelligence. 2538-2545 - Shashank Hegde, Deepak Munagala, Aditya Singhania, Benjamin Reed:
A Mobile-First Disconnected Data Distribution Network. 2546-2553 - Merlin Kasirajan, M. A. Hannan Bin Azhar, Scott Turner:
Trustworthy Insights: A Novel Multi-Tier Explainable Framework for Ambient Assisted Living. 2554-2561 - Stephen Donchez, Xiaofang Wang:
Dynamic Scheduling of AES Cores for Aperiodic Tasks on Multi-tenant Cloud FPGAs. 2562-2569 - Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:
Network based Intrusion Detection using Time aware LSTM Autoencoder. 2570-2578 - Hocine Boukhedouma, Abdelkrim Meziane, Slimane Hammoudi, Amel Benna, Allel Hadjali:
Towards a Context-based Mobility Prediction in Smart Cities: First Experimentations. 2579-2586 - Zhou Zhou, Yonggui Han, Mohammad Shojafar, Zhongsheng Wang, Jemal H. Abawajy:
A reliable edge server placement strategy based on DDPG in the Internet of Vehicles. 2587-2594 - Malak Alqulaity, Po Yang:
Tabular Generative Adversarial Networks with an Enhanced Sampling Approach for High-Quality Cardiovascular Disease Dataset Generation. 2595-2600 - Muhammad Senoyodha Brennaf, Po Yang, Vitaveska Lanfranchi:
A Comparative Analysis of Federated Learning Techniques on On-Demand Platforms in Supporting Modern Web Browser Applications. 2601-2606 - Shifeng Li, Ruoling Peng, Po Yang, Yun Yang:
A Deep Learning Model for Mobility Change Prediction Based on National Prevention and Control Policy. 2607-2614 - Muyao Peng, Kun Wang, Yueli Wen:
Pollutant Concentration Prediction Based on the Optimization of Long-Short Distance in Space. 2615-2620 - Jinning Wang, Xinyuan Huang, Zichu Yang, Weiran Zhao:
Construction of Artificial Intelligence Generated Content in Digital Film Production. 2621-2628 - Qi Li, Xinqi Shen, Zhongkai Cheng, Yu Liu:
Design and Implementation of Intelligent Pet Feeding System. 2629-2635 - Jorge López, Charalampos Chatzinakis, Marc Cartigny, Claude Poletti:
Software defined networking flow admission and routing under minimal security constraints. 2636-2643 - Qi Wen, Carson K. Leung, Adam G. M. Pazdor:
Personalized Privacy-Preserving Semi-Centralized Recommendation System in a Trust-Based Agent Network. 2644-2651 - Zheng Yang, Degang Sun, Yan Wang, Xinbo Han, Chen Meng, Weiqing Huang:
DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense. 2652-2659 - Abdullah Alhajri, Arshad Jhumka:
Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS. 2660-2667 - Zhenan Xu, Jiuzheng Wang, Cong Zha, Xinyi Li, Hao Yin:
SmartLLM: A New Oracle System for Smart Contracts Calling Large Language Models. 2668-2675 - Md Abrar Hamim, F. M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam, Bijoy Ghosh:
Lung Cancer Detection using Machine Learning Approach. 2676-2682 - Euihyeon Choi, Jooyoung Kim, Wonkyung Lee:
Rethinking Evaluation Metric for Probability Estimation Models Using Esports Data. 2683-2689 - Tingting Wu, Wei Yu, Manxue Guo, Wenjing Nie, Zimeng Jia, Lun Xin:
Communication Efficient Federated Learning Based on Combination of Structural Sparsification and Hybrid Quantization Sensing. 2690-2697 - Lingfeng Zhang, Yuheng Guo, Yepeng Ding, Hiroyuki Sato:
1-D CNN-Based Online Signature Verification with Federated Learning. 2698-2705 - Asmaa Shati, Ghulam Mubashar Hassan, Amitava Datta:
COVID-19 Detection System: A Comparative Analysis of System Performance Based on Acoustic Features of Cough Audio Signals. 2706-2713 - Xiaohui Li, Yunpei Chen, Hong Wang, Shuran Sheng:
R-SACE: RIS-Enabled Sensing-Aided Communication Enhancement in ISAC Systems. 2714-2719 - Nassim Mokhtari, Mohamed Outlouhou, Alexis Nédélec, Pierre De Loor:
Deep learning for graph analysis: application to online human activity recognition. 2720-2726 - Vinicius Camargo Andrade, Sheila S. Reinehr, Cinthia O. A. Freitas, Andreia Malucelli:
Personal Data Privacy in Software Development Processes: A Practitioner's Point of View. 2727-2734 - Yuxiang Zhou, Xin Kang, Fuji Ren, Satoshi Nakagawa, Xiao Shan:
DEU-Net: Dual Encoder U-Net for 3D Medical Image Segmentation. 2735-2741 - Huazheng Pan, Kun Yu, Junyi Le, Wenxin Hu, Taojun Jin:
Unlocking the Potentials of Transcriptomics in Predicting Pan Cancer Immune Therapy Response: A Deep Learning Approach Using PHZNet. 2742-2748 - Luyue Kong, Shu Zhang, Jinbao Li, Song Liu:
An Instruction Inference Graph Optimal Transport Network Model For Biomedical Commonsense Question Answering. 2749-2754 - Bowen Sun, Xin Peng, Saisai Li, Jiaxin Sun, Haochuan Tian:
Ergonomic Design of Precise Percutaneous Robot for Substantial Organs Based on JACK Simulation. 2755-2762 - Yihong Zhu, Xiaoliang Chen, Junsen Fu, Yajun Du:
A novel semantic dependency and aspect interaction graph convolutional network for aspect-level sentiment analysis. 2763-2769 - Xiuyi Luo, Chongrui Lu, Siyi Ouyang, Siyu Xia:
Performance Evaluation of Flight Energy Consumption of UAVs in IRS-assisted UAV Systems. 2770-2775 - Wanying Song, Ying Lu, Jin Liu, Zilu Qin, Xiaodan Wang, Yanfang Fu:
Research on UAV Obstacle Avoidance Method Based on Virtual-real Combination Technology. 2776-2780 - Cheng Tian, Song Liu, Jinbao Li, Guangchen Wang, Luyue Kong:
A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome. 2781-2788 - Qi Guo, Binjiang Hu, Zeqi Hong, Yanjun Zhao, Shuyong Li, Liang Tu:
Designing and Implementing Communication-efficient Model of Distributed System for Real-time Electromagnetic Transient Simulation. 2789-2796 - Luyue Kong, Ling Gong, Guangchen Wang, Song Liu:
DP-ProtoNet: An interpretable dual path prototype network for medical image diagnosis. 2797-2804
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.