


default search action
NaNA 2024: Yinchuan City, China
- International Conference on Networking and Network Applications, NaNA 2024, Yinchuan City, China, August 9-12, 2024. IEEE 2024, ISBN 979-8-3503-7677-7

- Qiaoyang Li, Yanan Sun, Ning Xi:

LFL-COBC: Lightweight Federated Learning On Blockchain-based Device Contribution Allocation. 1-7 - Zheng Yuan, Youliang Tian, Jinbo Xiong, Linjie Wang:

Enhancing Privacy-Preserving Federated Learning: A Robust and Resilient Approach. 8-14 - Jin Liu, Zan Li, Qiguang Miao, Li Yang, Peihan Qi, Danyang Wang:

Analog Circuit Design of Normalized Bistable Stochastic Resonance Model and Its Application in Weak Signal Processing. 15-20 - Hongbin Zhang, Qingqing Ren, Bin Liu, Dongmei Zhao, Ying Li, Mingyue Qi:

System Security Assessment Method Integrating Risk Relationships of Open Source Software. 21-27 - Jian Mu, Xiaoyu Zhang, Renmin Zhao, Qiong Wang, Pujie Jing, Xia Feng:

CAKA: Certificateless Authenticated Key Agreement Scheme for Satellite-assisted Unmanned-aerial-vehicle Network. 28-34 - Junbo Huang, Youliang Tian, Kedi Yang, Linjie Wang:

A Service-Oriented Anonymous Authentication Scheme with Partial-Disclosure in C-ITS. 35-41 - Meiyun Xie, Xin Liu, Shuangrui Zhao, Yeqiu Xiao, Xiaohong Jiang:

A New Secrecy Metric for Relay-Eavesdropper Channel. 42-47 - Jiaqi Li, Ruoxia Yao, Yiping Tan, Jingwei Xuan, Yan Li:

An HIV/AIDS model with gender differences and awareness differences. 48-53 - Zhiyin Chen, Feng Zhou, Youliang Tian, Shuai Wang

:
A Blockchain-Based Dynamic Incentive Model in Mobile Edge Computing. 54-59 - Yiwen Zhang, Shikai Shen, Bin Yang, Fei Deng, Yumei She, Kaiguo Qian, Riyu Wang, Kai Yang:

Average AoI Minimization in UAV-Enabled Covert Communication Systems. 60-65 - Abdelkader Mekkaoui, Omar Smail, Mohammed Rebbah

:
Energy aware and link-Stability Routing Protocol based on Differential Evolution for MANETs. 66-71 - Xiaoxue Liu, Xinwei Duan, Xinhong Hei, Yichuan Wang, Xin Song:

Compiler Differentiation Detection Method for Binary Similarity. 72-77 - Yueyue Zhu, Huiru Wang, Hanjuan Cai, Xin Zhang, Guozhu Zhao, Ying Sun, Leilei Zhu, Huanhuan Zhao:

A Schizophrenia Screening Method Based on Fine-grained Facial Features and Network Isolation Privacy Protection. 78-83 - Kai Yang, Shikai Shen, Bin Yang, Fei Deng, Yumei She, Kaiguo Qian, Yiwen Zhang, Riyu Wang:

Covert and Secure Communications in UAV-Aided Untrusted Relay Systems. 84-88 - Yuliang Wang, Mingwei Xu, Cuiyun Hua, Jiafu Zhang, Kang Li, Zongpeng Li, Bo Yang:

RPKI Sentinel: An Efficient RPKI-based Routing Emergency Control Platform. 89-95 - Yichuan Wang, Peipei Li, Xin Song, Yeqiu Xiao, Xiaoxue Liu:

Probability analysis of system vulnerability distribution based on the matroid theory. 96-101 - Guiliang Cai, Qiang Wu, Wei Su:

Enabling Service Continuity Support for Low-Latency Services over Mobile Edge with Ubiquitous Mobility. 102-107 - Keshuang Han, Huangwenqing Shi, Runqing Wang, Pinchang Zhang:

Utilizing Space-Time Coding Metasurface for FMCW Radar Spoofing in RIS-Assisted Communication Systems. 108-111 - Changjun Ren, Lin Yan, Shujie Yang, Zan Zhou, Yi Sun:

Unveiling the Power of Collaboration: Detect DDoS Attacks on Proxies through Moving Target Defense with Multi-Proxy Synergy. 112-117 - Fangzhe Zhang, Donglan Liu, Fuhui Zhao, Xin Liu, Yingxian Chang, Rui Wang, Hao Zhang, Lili Sun, Shanjie Xu:

Security Enhancement Method for MQTT Based on TEE. 118-124 - Yanfei Cao, Naijie Gu, Xinyue Shen, Daiyuan Yang, Xingmin Zhang:

Defending Large Language Models Against Jailbreak Attacks Through Chain of Thought Prompting. 125-130 - Shuhui Fang, Xuejun Wan, Jun Wang, Lin Chai, Wenlin Pan, Wu Wang:

HiDS Data clustering algorithm based on differential privacy. 131-136 - Cheng Wu, Hong Zhong, Guilin Chen, Naji Alhusaini, Shenghui Zhao, Yuchen Zhang:

Optimizing Multimodal Federated Learning: Novel Approaches for Efficient Model Aggregation and Client Sampling. 137-146 - Phavithra Manoharan, Jiao Yin, Hua Wang, Yanchun Zhang, Wenjie Ye:

Insider Threat Detection: A Review. 147-153 - Qiaoling Lu, Feng Tian, Jie Ren, Mengdi Li:

Defense Against Membership Inference Attacks on Imbalanced Dataset Using Generated Data. 154-159 - Zijian Chen, Limei Peng, Pin-Han Ho:

A Novel GNN-based Decoding Scheme for Sparse Code Multiple Access (SCMA). 160-165 - Riyu Wang, Shikai Shen, Bin Yang, Kaiguo Qian, Fei Deng, Yumei She, Kai Yang, Yiwen Zhang:

Trajectory Optimization for UAV-Enabled Covert Communications. 166-171 - Yuanyu Zhang, Jia-Ning Wang, Zhumeng Zheng, Yulong Shen, Yunsong Jiang, Mengfei Yang:

Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofing. 172-178 - Kaijun Wu, Bo Tian, Xue Wang:

A Secure Routing Method by Neural Combination Optimization Decision Algorithm Based on Overlay Network. 179-183 - Ziqing Zhang, Jie Ma, Shuoyu Mao, Peng Liang, Qi Liu:

A Low-overhead and Real-time Service Recovery Mechanism for Data Center Networks with SDN. 184-189 - Yeqiu Xiao, Yibin Ma

, Yichuan Wang, Kun Jiang
, Lanlan Cui:
A Novel Auralization Model for Network Security Situation Assessment. 190-195 - Yihua Peng, Wei Su, Jie Ma, Zhuojia Yang, Yuan Yuan, Lisheng Ma, Qi Liu, Peng Liang:

Sudden Traffic Prediction Based on Gated Recurrent Unit in Low Earth Orbit Satellite Networks. 196-201 - Xin Cao, Yu Han, Liumei Zhang, Yuanjiao Hu:

Research on Malicious Attack Detection and Evaluation Methods based on Entropy Increase Analysis. 202-208 - Yijun Zhang, Jun Yan, Yihui Zhou, Wenli Wang:

The Preservation of Weighted Graphs based on Shuffle differential privacy in Social Networks. 209-214 - Qifeng Miao, Yizhi Cao, Ranran Sun, Ji He, Xiaochen Li, Huihui Wu:

On Mobile Covert Communication in Wireless Networks with a Full-Duplex Receiver. 215-221 - Linying Tian, Chan Gao, Dong Zheng, Qiuxia Zhao, Yu Shi:

Covert Communication for UAV-Assisted Wireless Systems with Probabilistic Jamming. 222-228 - Zhuojia Yang, Bin Yang, Wei Su, Yudong Ma, Yihua Peng, Qi Liu, Peng Liang:

Dynamic Resource Allocation for Differentiated Service Adaptation in FANET. 229-235 - Huizhu Yang, Chao Yang, Qihang Wu, Weidong Yang:

Reputation Based Privacy-Preserving in Location-Dependent Crowdsensing for Vehicles. 236-241 - Yizhi Cao, Zewei Guo, Qifeng Miao, Ranran Sun, Ji He, Xiaochen Li:

Minimization of Age of Information for Satellite-Terrestrial Covert Communication with a Full-Duplex Receiver. 242-246 - Huangwenqing Shi, Mu Niu, Yulin Teng, Pinchang Zhang:

Privacy-Preserving Physical Layer Authentication Exploiting Carrier Frequency Offset in UAV-aided Communication Systems. 247-251 - Ruinan Peng, Xinhong Hei, Yichuan Wang, Xiaoxue Liu, Yeqiu Xiao:

Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network Model. 252-257 - Qiutong Zheng, Jie Ma, Qi Liu, Peng Liang:

A Service Customize Routing Method Based on Software Defined Network Using Deep Q-Network. 258-262 - Xiaopu Wang, Jianing Sun, Chao Qi:

CEDA-TQA: Context Enhancement and Domain Adaptation Method for Textbook QA Based on LLM and RAG. 263-268 - Jianing Sun, Zhichao Zhang, Xueli He:

LLM4EduKG: LLM for Automatic Construction of Educational Knowledge Graph. 269-275 - Hui Tian, Haibao Chen, Yuyan Zhao, Pinchang Zhang, Yan Xu, Yangyang Liu:

Source Camera Device Identification Combining Sensor Intrinsic Features and Tag. 276-281 - Ruiqi Zeng, Yuxiang Chen:

A Novel Automatic Horizontal Extension Technology For Multi-instance Microservice System. 282-286 - Zhoukai Wang, Zuoyan Xu, Yaling Zhang, Xin Song, Yichuan Wang:

Research on Code Virtualization Methods for Cloud Applications. 287-292 - Xinhong Hei, Jianfeng Chen, Yichuan Wang, Xin Song, Lei Zhu:

A Novel Multipath Data Transmission Method with Traffic Obfuscation. 293-298 - Zhao Huang, Xin Gao, Xiao Liu, Lu Fan, Junjun Wang, Quan Wang:

A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks. 299-304 - Yunwang Xu, Jiangong Yang, Dingyang Liang, Huan Chen:

MQTT Third-party Library Porting Method and Application Based on the OpenHarmony Standard System. 305-310 - Yuliang Wang, Mingwei Xu, Kang Li, Cuiyun Hua, Jiafu Zhang, Zongpeng Li, Bo Yang:

Route Origin Authorization Emergency Synchronization Based on RPKI Relying Party Cache. 311-316 - Runqing Wang, Huangwenqing Shi, Keshuang Han, Pinchang Zhang:

Physical Layer Authentication with Cascade Channel Characteristics in IRS-Assisted UAV Communication System. 317-320 - Jiarun Ma, Shiling Feng, Jiahao Zeng, Jia Lu, Jie Chen:

Smart Contract Vulnerability Detection Based on Prompt-guided ChatGPT. 321-326 - Xin Song, Haonan Wang, Yichuan Wang, Xinhong Hei, Wenjiang Ji:

Code obfuscation protection strategies for program running states. 327-332 - Jian Li, Wei Tong, Lingxiao Yang, Xiangshang Gao, Zesong Dong, Chen Wang:

Blockchain and Oracle-Driven Web3 Architecture for Data Interaction. 333-338 - Zhijie Hu, Qing Kou, RuiBing Shen, PeiQiao Yang:

Smart Garbage Design Based on Voice Recognition. 339-344 - Chang Wang, Yuan Yuan, Haoru Li, Zijian Wang, Qi Liu:

State Update Control Based on Deep Reinforcement Learning: Balancing AoI-Update Counts. 345-350 - Liming Xu, Zhibo Zhao, Dingyang Liang:

PreKGAT: Using Course Prerequisite Relation and Knowledge Graph Attention Network for Course Recommendation. 351-356 - Yuan Zhou, Yaling Zhang:

Blockchain-based data security sharing and fair payment scheme in smart cities. 357-363 - Lina Zhang, Xueya Zhang, Xinjie Li, Kangrui Ma:

Research on Big Data Analysis of Online Learning Behavior and Predictive of Learning Effectiveness. 364-368 - Zijian Wang, Yuan Yuan, Chang Wang, Qi Liu, Peng Liang:

MEC-assisted Vertical Handover Based on Improved DQN in Heterogeneous Internet of Vehicles. 369-373 - Wanying Suo, Bello Ahmad Muhammad

, Bo Liu:
LightGCN-LSC: Lightweight Graph Convolution Network for Learning Style Classification in Online Education. 374-379 - Congrui Wang, Li Li, Fei Hao:

Deep Attention Fusion Network for Attributed Graph Clustering. 380-385 - Xiaoli Ma, Guangsen Chen, Haoxuan Zhang, Tao Qin:

Towards Hierarchically Extracting Network Topologies. 386-392 - Hong Xia, Jing Xu, Bo Xiao, Hui Jia, Cong Gao, Yanping Chen:

Multi-source KPIs' root cause localization in online service systems. 393-398 - Yanni Liu, Ayong Ye, Yuanhuang Liu, Wenting Lu:

Few-Shot Malware Classification using Malware Variant and Model Augmentation. 399-404 - Tianying Chen, Jianfeng Chen, Xiao Li:

Research on Intelligent Big Data Collaborative Supervision System on Quality and Security Properties. 405-410 - Jiale Quan, Yu Han, Liumei Zhang, Yuanjiao Hu:

ElNnGA: An Artificial Intelligence Empowered Scheme for Unknown Attack Recognition and Defense Strategy Recommendation. 411-417 - Zhen Wan, Sugang Ma, Zixian Zhang, Siwei Sun:

SiamDTA: Dual-Template Siamese Network Visual Object Tracking Algorithm Based on Attention Mechanism. 418-423 - Jia Cao, Jiayue Zhou, Jianan Hong:

UE-detectable Authentication and Key Agreement Method Resisting Serving Network Forging. 424-430 - Yuyan Zhao, Haibao Chen, Boyu Li, Mengyuan Li, Siqing Tao, Hui Tian:

Hierarchical Policy Learning with Noisy Networks based Multi-round Conversational Recommendation. 431-437 - Xianyu Mu, Youliang Tian, Zhou Zhou, Jinbo Xiong:

Lightweight Federated Learning Secure Aggregation Protocols. 438-443 - Huifeng Hao, Shenghui Zhao, Guilin Chen, Shu Zhao, Yong Ge:

Segmentation of multi-residential activities based on spatial correlation and FWC-CPD. 444-452 - Yong Zhao, Liumei Zhang, Ximeng Liu, Yuanjiao Hu:

AAM-Sinc-MV1D: A Model of Short-term Speaker Recognition Based on The Raw Waveform. 453-458 - Wenhao Zhang, Ji He, Xiaohong Jiang:

Transmit Power and Flying Location Optimization for Time-Efficient Covert Multicast in UAV-Enabled Wireless Communication Systems. 459-464 - Yu Chen, Guozhu Zhao, Xu Han, Yichen Li, Chun Fang, Chongjie Wang, Yueyue Zhu:

Two-Factor Authentication for IIoT Systems Utilizing Environmental Background Features. 465-471 - Yang Yang, Bo Tian, Fei Yu, Yuanhang He:

An Anomaly Detection Model Training Method Based on LLM Knowledge Distillation. 472-477 - Yuanjun Liu, Zhihong Liu, Yong Zeng:

Divide-and-Conquer Based Traffic Classification: Towards A Cascaded Classifier. 478-483 - Hong Xia, Jing Xu, Qingyi Dong, Hui Jia, Yanping Chen:

Efficient QoS Data Prediction Based on Tensor Kernel Paradigm-Tensor Decomposition. 484-489 - Han Li, Chuanwei Yang, Baitong Zha, Lifan Liu, Zhiwei Zhang, Shuo Zhong:

A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private Clouds. 490-495 - Yuchen Zhang

, Hong Zhong, Guilin Chen, Naji Alhusaini, Shenghui Zhao, Cheng Wu:
Multimodal Sentiment Analysis Network Based on Distributional Transformation and Gated Cross-Modal Fusion. 496-503 - Changan Wang, Zhihong Liu, Yong Zeng:

Detecting Phishing URLs with GNN-based Network Inference. 504-509 - Na Liu, Guanghui Shao, Yanbo Yang, Jiawei Zhang, Teng Li:

Review on the Research Progress of Machine Learning in Network Coding. 510-515 - Guiyuan Tang, Junqi Zhao, Zhijian Xu, Yuzi Wang, Hanzi Yang, Zhiwei Zhang:

Continuous Smartphone User Authentication Based on Gesture-Sensor Fusion. 516-522 - Huan Chen, Li Li, Yunwang Xu:

Reducing Redundancy of Data Samples Method Based on Data-Importance Analysis. 523-528 - Qiangyi Wu, Yiyu Xiang:

Improving the Accuracy of Anomaly Detection from System Audit Logs via Heterogeneous Provenance Graphs. 529-535 - Jie Wang, Mengru Xu, Hao Chen:

Detecting Source Code Vulnerabilities using High-Precision Code Representation and Bimodal Contrastive Learning. 536-541 - Xiaodong Zhang, Jie Bao, Yulong Shen:

Testing Object Detection Models For Autonomous Vehicles Against Hazards. 542-548

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














