


default search action
ICCSIE 2023: Putrajaya, Malaysia
- Proceedings of the 8th International Conference on Cyber Security and Information Engineering, ICCSIE 2023, Putrajaya, Malaysia, September 22-24, 2023. ACM 2023

- Lan Zheng

, Lei Liu
:
Chaotic Digital Image Encryption Based on Fourier Transform. 1-7 - Wei Yang

, Chenming Chang
:
SmartGate: Accelerate Cloud Gateway with SmartNIC. 8-14 - Junkai Wang

, Deng Zhang
, Hanjun Gao
:
Structure and key technologies of nuclear power plant network security situational awareness platform. 15-22 - Chao Lv

, Kaisheng Zhang
:
A Research of Improved Facial Expression Recognition Method Based on CBAM and Joint-normalization Techniques. 23-30 - Yun Zhu

, Wenxiang Xu
:
Research on Multi-level Trust Mechanism of Internet of Things. 31-36 - Xiaojie Xie, Gang Yang, Lei An, Yun Ren, Xiao Wu, Xin Tong, Yanhua He, Xiaojie Chen:

Research on Substation Quantum Secure Communication System Based on 5G Private Network Technology. 37-44 - Xiaomei Liu

, Yujing Cao
:
Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural Network. 45-51 - Yi Cai

, Mingsheng Feng
:
A Time-bound Data Access Control Scheme based on Attribute-based Encryption. 52-56 - Lixuan Zhu

, Bin Xu
:
Robust watermarking based on dual-random phase encryption against collusion attacks. 57-64 - Ru Han

, Jin Xu
:
Research Progress of Location Privacy Protection Technology in the Internet Era. 65-72 - Zhen Wang

:
The Application and Practice of Computer Network Security Technology in Electronic Information Engineering. 73-77 - Lili Wang

, Wei Chen
, Haoliang Wang
:
Data Visualization Analysis for Job Recruitment Based on Big Data. 78-83 - Yuanshi Deng

, Zhengwei Chang
, Jun Zhao
, Wei Pu
, Xuanwen Ding
, Ran Zhang
, Hongyan Wang
, Xiaopei Guo
, Hongqiang Gong
:
Tag Anti-collision Algorithm for RFID in Underdetermined States Based on Local Sparse Constraints. 84-90 - Zhijiang Zhang

, Yanyong Zhang
, Zhibing Wang
:
Bixi: A EB-level Object Storage System Based on CEPH. 91-96 - Fuzhong Hao

, Lei Liang
, Nuannuan Li
, Linhai Mu
, Haiyan Zhi
:
Bluetooth AOA Localization Technology Based on LS and MUSIC Algorithms. 97-102 - Hongwei Niu

, Lixuan Zhu
:
Adaptive Motion Compensation and Quantized Embedded Watermarking Against Collusion Attacks. 103-110 - Xiangming Ni

, Yuhong Zhao
, Yue Yao
:
Dynamic Heterogeneous Link Prediction Based on Hierarchical Attention Model. 111-115 - Yingying Zhang

, Yue Shi
:
Constructing Dynamic Honeypot Using Machine Learning. 116-120 - Jingli Han

, Qing Xia
, Zhaoli Wang
:
Access Control Management of Information System based on Homomorphism and Blockchain Technology. 121-125 - Huizhong Liu

, Suli Ge
, Gaifang Tan
, Song Tang
:
Research on Application of Identity Authentication Encryption Technology in Blockchain Scene. 126-129 - Jixin Wei

, Yanzhen Huang
:
A K-means Algorithm for Blockchain the Construction of Data Privacy Security Monitoring System. 130-134 - Chenyu Yang

, Rong Fei
, Junxuan Shi
:
Improved Indoor Location Algorithm of Multilayer Perceptron based on RSSI. 135-141 - Siyao Wen

, Dandan Li
, Junlong Yuan
, Jingbin Huang
, Long Zhou
:
Design and Implementation of a Game Session Plugin based on Unreal Engine. 142-149 - Liansuo Wei, Shenhao Huan

, Longyu Ma
:
A Topology Control Algorithm based on Theil's Entropy lmproved Potential Game for Wireless Sensor Networks. 150-158 - Yaowen Sun

:
FL Intelligent Wireless Network Optimization System. 159-165 - Xibin Sun

, Wenting Li
, Jiwei Qiu
, Di Han
:
A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection. 166-170 - Feng Li

, Guangyue Jia
, Chengbo Liu
:
Design of RFID Data Acquisition System for Manufacturing Execution Systems. 171-176 - Yingzhuo Zhang

, Minghua Wang
, Haochen Shi
, Jingheng Zhang
:
Data Cooperative Transmission and Resource Allocation Algorithm in Aviation Communication. 177-182 - Qing Xia

, Jingli Han
, Zhaoli Wang
:
An Extensible and Traceable Data Operation Recording System Architecture and Method. 183-187 - Xin Ye

, Shimin Wang
, Han Wang
, Qinwei Wei
, Ting Yang
, Yu Tao
:
Application of Knowledge Graph in Financial Information Security Strategy. 188-192 - Baizheng Wang

, Qiang Zhang
, Wen Shao
, Kexun He
, Xiyu Fang
, Xuebin Shao
:
A Network Security Test Evaluation Model of Automobile Digital Key. 193-199 - Yang Yang

, Juxing Di
, Wencheng Zhang
, Fumei Yu
:
Anomalous Traffic Detection in Campus Networks based on NetFlow and CNN. 200-203 - Wenjing Chen

, Jingyi Liu
:
Research and Implementationof National Commercial Cryptographic Algorithms. 204-210 - Canyu Huang

, Dongwei Zhang
, Yingzhuo Zhang
:
NEMO Routing Optimization for Aviation Communication Based on Simulated Annealing Algorithm. 211-216 - Yuchuan Yang

, Fan Xu
, Bin Yin
, Wanyu Li
, Xiaochen Fan
, Yiwen Hu
:
Application of Network Data Transmission Module Based on Advance Planning in Aerospace Measurement and Control Simulation Field. 217-221 - Zhaoyang Liu

, Ru Xue
:
The EEG Signal Encryption Scheme Based on Hyperchaotic System and Identity Authentication. 222-229 - Jian Kang

, Xiaodi Suo
, Lu Liu
, Xunshi Wang
, Zhengjun He
, Jinjun Chen
:
Research on All-Digital Simulation Method for OTN Optical Signal Fault. 230-235 - Zhengwei Chang

, Yuanshi Deng
, Xuanwen Ding
, Wei Pu
, Fuxiang Li
, Lin Yang
, Jun Zhao
, Hongyan Wang
:
Safety Equipment Management of cabinet Based on Intelligent Information Processing Technology. 236-246 - Jianping Zhao, Huan Wang, Yichuan Wang, Hua Li, Yan Wang:

Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning. 247-254 - Yiting Yin

, Jingxu Zhang
, Liping Zhu
, Guodong Li
:
Research on Sensitive Frame Recognition Algorithm for Home Monitoring Video Based on Mixture of Gaussians Background Modeling. 255-261 - Jipeng Zhou

:
Frequency-domain Generative Adversarial Image Super-Resolution Algorithm Based on Phase Attention Loss. 262-268 - Xiuxia Zhang

, Dongyuan Xing
, Shuyi Wei
:
Simulation of Light Source Layout Characteristics for Tunnel Visible Light Communication. 269-273 - Xiaolong Li

, Zhenhua Yan
, Shuang Zhang
, Xinghua Li
, Feng Wang
:
Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion. 274-281 - Hao Zhou

, Zhiwei Sheng
:
A Federated Learning based Botnet Detection Method for Industrial Internet of Things. 282-288 - Boyi Zheng

, Tao Li
, Wenxia Xu
, Liping Zhu
:
Design and Application of Chaos Algorithm based on the Sprott-B System. 289-294 - Fengli Sun

, Yan Wang
:
Multi-image Multiplexing Pixel Synchronization Encryption based on Optical Scanning Holography. 295-301 - Hao Xu

, Haoning Chen
, Ying Nie
, Yilin Li
:
Research on Power Intrusion Protection System Architecture Based on Edge Computing Nodes. 302-306 - Qi Liu

, Sunqing Xu
:
Weak signal detection technology based on improved background noise subtraction. 307-313 - Mengting Liu

:
Application of Image Sharing and Encryption Based on Visual Cryptography in Networking Systems of AI. 314-318 - Jun Zhao

, Qi Liu
:
Research on noise source localization technology based on improved DCS-SOMP algorithm. 319-327 - Wen Li

:
Trustless Layer for Secure Fog Computing. 328-334 - Dongya Xiao

, Mingda Li
, Zheng Xu
:
Performance Analysis of Different Intensity Modulation Techniques over Weak Turbulence Channel. 335-340 - Qi Wu

, Shuo Wen
, Boliang Liu
:
A Method for Identifying Encrypted Webshell Traffic. 341-349 - Wei Sun

, Yu Wang
, Junjie Ma
, Xin Wang
, Weihao Shi
, Fei Jiao
, Ningbo Liu
:
Data Privacy Protection and Sharing in Smart Grid Based on Blockchain Technology. 350-355 - Xing Zhao

, Jie Heng
, Qian Sun
:
Research on Network Intrusion Simulation and Adversarial Strategies Based on Generate Adversarial Networks. 356-360

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














