


default search action
20th TrustCom 2021: Shenyang, China
- 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China, October 20-22, 2021. IEEE 2021, ISBN 978-1-6654-1658-0

- Sarah Ali Siddiqui, Adnan Mahmood

, Quan Z. Sheng
, Hajime Suzuki, Wei Ni:
A Time-aware Trust Management Heuristic for the Internet of Vehicles. 1-8 - LingHan Zhang, F. Jiang, Xiaohu Tang:

Verifiable Conjunctive Keyword Search with Certificateless Searchable. 9-16 - Sara Alhajaili, Arshad Jhumka:

Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults. 17-25 - Qing Xia

, Wensheng Dou, Fengjun Zhang, Geng Liang:
The Performance of Selfish Mining in GHOST. 26-33 - Po-Chu Hsu

, Atsuko Miyaji
:
Bidder Scalable M+1st-Price Auction with Public Verifiability. 34-42 - Qianyun Gong

, Chengjin Zhou, Le Qi, Jianbin Li, Jianzhong Zhang, Jingdong Xu:
VEIN: High Scalability Routing Algorithm for Blockchain-based Payment Channel Networks. 43-50 - Muhammad Shadi Hajar, Harsha K. Kalutarage

, M. Omar Al-Kadri
:
TrustMod: A Trust Management Module For NS-3 Simulator. 51-60 - Xiaomin Zhu, Bowen Fei, Daqian Liu, Weidong Bao:

Adaptive Clustering Ensemble Method Based on Uncertain Entropy Decision-Making. 61-67 - Jiaqi Yin, Huibiao Zhu, Yuan Fei:

Formal Verification of HPS-based Master-Slave Scheme in MEC with Timed Automata. 68-75 - Wei Zhang, Wenxue Cui, Feng Jiang, Chifu Yang, Ran Li:

Protecting the Ownership of Deep Learning Models with An End-to-End Watermarking Framework. 76-82 - Wei Xia, Wei Wang, Xin He, Gang Xiong, Gaopeng Gou, Zhenzhen Li, Zhen Li:

Old Habits Die Hard: A Sober Look at TLS Client Certificates in the Real World. 83-90 - Ligeng Chen, Jian Guo, Zhongling He, Dongliang Mu, Bing Mao:

RoBin: Facilitating the Reproduction of Configuration-Related Vulnerability. 91-98 - Chengshang Hou, Junzheng Shi, Mingxin Cui, Mengyan Liu, Jing Yu:

Universal Website Fingerprinting Defense Based on Adversarial Examples. 99-106 - Ripon Patgiri

:
Rando: A General-purpose True Random Number Generator for Conventional Computers. 107-113 - Prashanthi Mallojula, Javaria Ahmad, Fengjun Li

, Bo Luo
:
You Are (not) Who Your Peers Are: Identification of Potentially Excessive Permission Requests in Android Apps. 114-121 - Wenjuan Li, Weizhi Meng

, Laurence T. Yang:
Enhancing Trust-based Medical Smartphone Networks via Blockchain-based Traffic Sampling. 122-129 - Chuanyun Wang, Zhongrui Shi, Keyi Si, Yang Su, Zhaokui Li, Ershen Wang:

Anti-occlusion and Scale Adaptive Target Tracking Algorithm Based on Kernel Correlation Filter. 130-138 - Xuechao Yang

, Xun Yi, Andrei Kelarev:
Secure Ranked Choice Online Voting System via Intel SGX and Blockchain. 139-146 - Shuran Wang, Dahan Pan

, Runhan Feng, Yuanyuan Zhang
:
MagikCube: Securing Cross-Domain Publish/Subscribe Systems with Enclave. 147-154 - Handong Cui

, Xianrui Qin, Cailing Cai, Tsz Hon Yuen
:
Security on SM2 and GOST Signatures against Related Key Attacks. 155-163 - Gao Wang, Gaoli Wang, Yu He:

Improved Machine Learning Assisted (Related-key) Differential Distinguishers For Lightweight Ciphers. 164-171 - Bartosz Drzazga

, Lukasz Krzywiecki
, Hannes Salin
:
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. 172-179 - Jie Cheng, Kun Zhang, Bibo Tu:

Remote Attestation of Large-scale Virtual Machines in the Cloud Data Center. 180-187 - Runhao Wang, Jiexiang Kang, Wei Yin, Hui Wang, Haiying Sun, Xiaohong Chen, Zhongjie Gao, Shuning Wang, Jing Liu:

DeepTrace: A Secure Fingerprinting Framework for Intellectual Property Protection of Deep Neural Networks. 188-195 - Yiping Teng, Zhan Shi, Fanyou Zhao, Guohui Ding, Li Xu, Chunlong Fan:

Signature-Based Secure Trajectory Similarity Search. 196-206 - Guanxiong Ha, Hang Chen, Chunfu Jia, Ruiqi Li

, Qiaowen Jia:
A secure deduplication scheme based on data popularity with fully random tags. 207-214 - Bingnan Zhong, Qingkai Zeng:

SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel. 215-223 - Mingyue Cui, Jin Wang, Jingya Zhou, Kejie Lu, Jianping Wang:

The Design of Secure Coded Edge Computing for User-Edge Collaborative Computing. 224-231 - Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Jian Xu

, Shi Bai, Yuan He
:
A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS. 232-239 - Zheyuan Gu

, Gaopeng Gou, Chengshang Hou, Gang Xiong
, Zhen Li:
LFETT2021: A Large-scale Fine-grained Encrypted Tunnel Traffic Dataset. 240-249 - Cong Cheng, Lingzhi Li, Jin Wang, Fei Gu:

The Design and Implementation of Secure Distributed Image Classification Reasoning System for Heterogeneous Edge Computing. 250-257 - Biwen Chen

, Lei Yang, Tao Xiang
, Xiaoguo Li:
Secure Data Transmission with Access Control for Smart Home Devices. 258-265 - Zhiwei Cai, Huicong Zeng, Peijia Zheng, Ziyan Cheng, Weiqi Luo

, Hongmei Liu:
Secure Homomorphic Evaluation of Discrete Cosine Transform with High Precision. 266-272 - Vijay Varadharajan, Uday Kiran Tupakula, Kallol Krishna Karmakar:

Techniques for Securing 5G Network Services from attacks. 273-280 - Uday Kiran Tupakula, Vijay Varadharajan, Kallol Krishna Karmakar:

Techniques for Securing Control Systems from Attacks. 281-288 - Antonino Galletta, Javid Taheri, Maria Fazio, Antonio Celesti, Massimo Villari:

Overcoming security limitations of Secret Share techniques: the Nested Secret Share. 289-296 - Maksym Slavnenko, Yevhen Zolotavkin, Jongkil Jay Jeong

, Veronika Kuchta, Robin Doss:
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication. 297-308 - Aneta Poniszewska-Maranda

, Lukasz Rogozinski, Witold Maranda
:
Security Library for Safe Data Storage on Android Platform. 309-316 - Jiaxing Cui, Zhengmin Kong, Jing Song, Weijun Yin, Xianjun Deng:

Robust AN-aided Secure Beamforming for Full-Duplex Relay System with Multiple Eavesdroppers. 317-322 - Licai Zhu, Hao Yang, Shi Chen, Zhipeng Yu:

Effective RFID Localization Based on Fuzzy Logic For Security. 323-330 - Dominik Ziegler, Alexander Marsalek, Gerald Palfinger

:
White-Box Traceable Attribute-Based Encryption with Hidden Policies and Outsourced Decryption. 331-338 - Jiqing Chang, Jin Wang, Fei Gu, Kejie Lu, Lingzhi Li, Jianping Wang:

PCHEC: A Private Coded Computation Scheme For Heterogeneous Edge Computing. 339-346 - Dayin Zhang, Xiaojun Chen, Jinqiao Shi, Dakui Wang, Shuai Zeng:

A Differential Privacy Collaborative Deep Learning Algorithm in Pervasive Edge Computing Environment. 347-354 - Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng:

Sybil Attacks and Defense on Differential Privacy based Federated Learning. 355-362 - Chang Xu

, Lvhan Zhang, Liehuang Zhu, Chuan Zhang, Kashif Sharif
:
Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing. 363-370 - Yuzhe Li

, Yong Liu, Bo Li
, Weiping Wang
, Nan Liu:
Just Keep Your Concerns Private: Guaranteeing Heterogeneous Privacy and Achieving High Availability for ERM Algorithms. 371-378 - Ruxue Wen, Rui Zhang, Kai Peng, Chen Wang

:
Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries. 379-386 - Mengyao Peng, Jia Hu, Hui Lin, Xiaoding Wang

, Wenzhong Lin:
A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things. 387-396 - Jiangna Xing, Xuebin Ma:

DP-gSpan: A Pattern Growth-based Differentially Private Frequent Subgraph Mining Algorithm. 397-404 - Xiaohong Liu, Hanbo Cai

, De Li
, Xianxian Li, Jinyan Wang:
Differential Privacy Preservation in Adaptive K-Nets Clustering. 405-412 - Tao Peng, Wentao Zhong, Kejian Guan, Yipeng Zou, Jiawei Zhu, Guojun Wang:

A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks. 413-419 - Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. 420-427 - Yuhang Hu, De Li

, Zhou Tan, Xianxian Li, Jinyan Wang:
Adaptive Clipping Bound of Deep Learning with Differential Privacy. 428-435 - Xuebin Ma, Haijiang Liu, Shengyi Guan:

Improving the Effect of Frequent Itemset Mining with Hadamard Response under Local Differential Privacy. 436-443 - Changli Zhou, Jing Peng, Ying Ma, Qingfeng Jiang:

A Privacy-preserving Location Recommendation Scheme without Trustworthy Entity. 444-451 - Xiaohan Yue, Lixin Yang, Xibo Wang, Shuaishuai Zeng, Jian Xu

, Shi Bai, Yuan He
:
An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation. 452-459 - Tingting Bao, Yang Liu:

A privacy-preserving framework for smart contracts based on stochastic model checking. 460-467 - Sam Fletcher, Adam Roegiest, Alexander K. Hudek:

Towards Protecting Sensitive Text with Differential Privacy. 468-475 - Yiping Teng, Weiyu Zhao, Chuanyu Zong, Li Xu, Chunlong Fan, Huan Wang:

Answering Why-not Questions on Top k Queries with Privacy Protection. 476-485 - Delin Chen, Peijia Zheng, Ziyang Chen, Ruopan Lai, Weiqi Luo

, Hongmei Liu:
Privacy-Preserving Hough Transform and Line Detection on Encrypted Cloud Images. 486-493 - Gaëtan Pradel, Chris J. Mitchell:

Privacy-Preserving Biometric Matching Using Homomorphic Encryption. 494-505 - Andreas Abraham, Karl W. Koch

, Stefan More
, Sebastian Ramacher
, Miha Stopar:
Privacy-Preserving eID Derivation to Self-Sovereign Identity Systems with Offline Revocation. 506-513 - Junkai Liu, Shihui Zheng, Lize Gu:

Effective Deep Learning-based Side-Channel Analyses Against ASCAD. 514-523 - Jianhua Li

, Ximeng Liu, Jiong Jin
, Shui Yu
:
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge. 524-531 - Gaoyang Liu, Shijie Wang

, Borui Wan, Zekun Wang, Chen Wang
:
ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box Access. 532-539 - Bolun Wu

, Yuanhang Xu, Futai Zou:
Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs. 540-547 - Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue:

Automated Detection of Malware Activities Using Nonnegative Matrix Factorization. 548-556 - Yukun Cheng

, Mengce Zheng, Fan Huang, Jiajia Zhang, Honggang Hu, Nenghai Yu:
A Fast-Detection and Fault-Correction Algorithm against Persistent Fault Attack. 557-568 - Yuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang:

Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities. 569-576 - Futai Zou, Dechao Meng, Wentao Gao, Linsen Li:

DePL: Detecting Privacy Leakage in DNS-over-HTTPS Traffic. 577-586 - Andreas Grüner, Alexander Mühle, Christoph Meinel:

Analyzing Interoperability and Portability Concepts for Self-Sovereign Identity. 587-597 - Susheng Wu, Bin Chen, Mingxu Sun, Renyu Duan, Qixiang Zhang, Cheng Huang:

DeepVuler: A Vulnerability Intelligence Mining System for Open-Source Communities. 598-605 - Genpei Liang

, Xiangyu Zhou, Qingyu Wang, Yutong Du, Cheng Huang:
Malicious Packages Lurking in User-Friendly Python Package Index. 606-613 - Xianwen Deng, Ruijie Zhao, Zhi Xue, Ming Liu, Libo Chen, Yijun Wang:

A Semi-supervised Deep Learning-Based Solver for Breaking Text-Based CAPTCHAs. 614-619 - Mingfu Xue, Can He, Shichang Sun, Jian Wang, Weiqiang Liu:

Robust Backdoor Attacks against Deep Neural Networks in Real Physical World. 620-626 - Qian Qiang, Mian Cheng, Yuan Zhou, Yu Ding, Zisen Qi:

MALUP: A Malware Classification Framework using Convolutional Neural Network with Deep Unsupervised Pre-training. 627-634 - Jiachao Zhang, Peiran Yu, Le Qi, Song Liu, Haiyu Zhang, Jianzhong Zhang:

FLDDoS: DDoS Attack Detection Model based on Federated Learning. 635-642 - Lin Wang

, Kun Zhang, Chen Li, Bibo Tu:
Log-based Anomaly Detection from Multi-view by Associating Anomaly Scores with User Trust. 643-650 - Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu

, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. 651-658 - Shuaishuai Tan, Zhiyi Tian, Xiaoxiong Zhong, Shui Yu

, Weizhe Zhang, Guozhong Dong:
A Novel Android Malware Detection Method Based on Visible User Interface. 659-666 - Chenglin Xie, Yujie Guo, Shaosen Shi, Yu Sheng, Xiarun Chen, Chengyang Li, Weiping Wen:

EnvFaker: A Method to Reinforce Linux Sandbox Based on Tracer, Filter and Emulator against Environmental-Sensitive Malware. 667-677 - Boru Liu, Dan Tang, Yudong Yan, Zhiqing Zheng, Shihan Zhang, Jiangmeng Zhou:

TS-SVM: Detect LDoS Attack in SDN Based on Two-step Self-adjusting SVM. 678-685 - Chi Li, Min Zhou, Xinrong Han, Ming Gu:

Sensing Error Handling Bugs in SSL Library Usages. 686-692 - Mohammad Mamun, Kevin Shi:

DeepTaskAPT: Insider APT detection using Task-tree based Deep Learning. 693-700 - Carlo Farinella, Ali Ahmed, Craig A. Watterson

:
Git Leaks: Boosting Detection Effectiveness Through Endpoint Visibility. 701-709 - George Grispos, Frank Tursi

, Kim-Kwang Raymond Choo, William Mahoney
, William Bradley Glisson
:
A Digital Forensics Investigation of a Smart Scale IoT Ecosystem. 710-717 - R. G. Gayathri, Atul Sajjanhar, Yong Xiang, Xingjun Ma:

Anomaly Detection for Scenario-based Insider Activities using CGAN Augmented Data. 718-725 - Xiaoyu Wang, Xiaorui Gong, Lei Yu, Jian Liu:

MAAC: Novel Alert Correlation Method To Detect Multi-step Attack. 726-733 - Zeyi Li, Yun Wang, Pan Wang

, Haorui Su:
PGAN: A Generative Adversarial Network based Anomaly Detection Method for Network Intrusion Detection System. 734-741 - Huizi Wu, Shiyi Wang, Hui Fang:

LP-UIT: A Multimodal Framework for Link Prediction in Social Networks. 742-749 - Yuhua Ling, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang:

Cost-sensitive Heterogeneous Integration for Credit Card Fraud Detection. 750-757 - Jinli Li, Ran Zhang, Mingcan Cen, Xunao Wang, M. Jiang:

Depression Detection Using Asynchronous Federated Optimization. 758-765 - Chengshang Hou, Junzheng Shi, Mingxin Cui, Qingya Yang:

Attack versus Attack: Toward Adversarial Example Defend Website Fingerprinting Attack. 766-773 - Xiarun Chen, Qien Li, Zhou Yang, Yongzhi Liu, Shaosen Shi, Chenglin Xie, Weiping Wen:

VulChecker: Achieving More Effective Taint Analysis by Identifying Sanitizers Automatically. 774-782 - Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:

Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. 783-790 - Zhimin Luo, Mengce Zheng, Ping Wang, Minhui Jin, Jiajia Zhang, Honggang Hu:

Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup. 791-801 - Qige Song, Yongzheng Zhang, Junliang Yao:

DroidRadar: Android Malware Detection Based on Global Sensitive Graph Embedding. 802-809 - Dongrui Zeng, Ben Niu, Gang Tan:

MazeRunner: Evaluating the Attack Surface of Control-Flow Integrity Policies. 810-821 - Ruipeng Zhang

, Mengjun Xie, Jiang Bian:
ReLF: Scalable Remote Live Forensics for Android. 822-831 - Chuanyun Wang, Guowei Yang

, Dongdong Sun, Jiankai Zuo
, Ershen Wang, Linlin Wang:
Frequency Domain Fusion Algorithm of Infrared and Visible Image Based on Compressed Sensing for Video Surveillance Forensics. 832-839 - Mihail Brinza, Miguel Correia, João Pereira:

Virtual Static Security Analyzer for Web Applications. 840-848 - Xulong Zhang, Frank Jiang, Ran Zhang, Shupeng Li, Yang Zhou:

Social Spammer Detection Based on Semi-Supervised Learning. 849-855 - Jingyi Li

, Zikai Zhang
, Yidong Li, Xinyue Guo, Huifang Li:
FIDS: Detecting DDoS Through Federated Learning Based Method. 856-862 - Chunlong Fan, Jici Zhang, Cailong Li, Zhenxin Zhang, Yiping Teng, Jianzhong Qiao:

Gray Adversarial Attack Algorithm based on Multi-Scale Grid Search. 863-870 - Ke Lv, Yuan Liu, Jienan Chen, Dongxia Wang, Zhihong Tian:

An Interactive System for Unfair Rating Detection Models in a Customized Perspective. 871-878 - Ling Wang, Cheng Zhang, Zejian Luo, Chenguang Liu

, Jie Liu, Xi Zheng
:
PDAAA: Progressive Defense Against Adversarial Attacks for Deep Learning-as-a-Service in Internet of Things. 879-886 - Nickolaos Koroniotis, Nour Moustafa, Benjamin P. Turnbull

, Francesco Schiliro
, Praveen Gauravaram, Helge Janicke:
A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments. 887-894 - Jiwei Guan, Xi Zheng

, Chen Wang, Yipeng Zhou
, Alireza Jolfaei
:
Robust Sensor Fusion Algorithms Against Voice Command Attacks in Autonomous Vehicles. 895-902 - Changqing Gong, Zhaoyang Dong

, Abdullah Gani, Han Qi:
Quantum Ciphertext Dimension Reduction Scheme for Homomorphic Encrypted Data. 903-910 - Xiaoqing Wang, Chunping Wang, Kun Zhou, Hongbing Cheng:

ESS: An Efficient Storage Scheme for Improving the Scalability of Bitcoin System. 911-918 - Wenqing Huang, Fei Hao, Guangyao Pang, Yifei Sun:

Complementary Context-Enhanced Concept Lattice Aware Personalized Recommendation. 919-926 - Salma Abdalla Hamad, Dai Hoang Tran

, Quan Z. Sheng
, Wei Emma Zhang
:
BERTDeep-Ware: A Cross-architecture Malware Detection Solution for IoT Systems. 927-934 - Pengjie Zeng, Xiaoliang Wang, Liangzuo Dong, Xinhui She, Frank Jiang:

A Blockchain Scheme Based on DAG Structure Security Solution for IIoT. 935-943 - Bin Yuan, Shengyao Sun, Xianjun Deng, Deqing Zou, Haoyu Chen, Shenghui Li, Hai Jin:

Automatically derived stateful network functions including non-field attributes. 944-951 - Linshu Ouyang, Yongzheng Zhang:

Phishing Web Page Detection with HTML-Level Graph Neural Network. 952-958 - Changbo Tian, Yongzheng Zhang, Tao Yin:

A Feature-Flux Traffic Camouflage Method based on Twin Gaussian Process. 959-966 - Aijun Zhou, Xinghao Jiang, Zhaohong Li, Zhenzhen Zhang:

A HEVC Video Steganography Algorithm Based on DCT/DST Coefficients with Improved VRCNN. 967-975 - Huanyu Wu, Lunjie Li, Hye-Young Paik, Salil S. Kanhere

:
MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System. 976-987 - Masaki Aota, Tao Ban, Takeshi Takahashi, Noboru Murata

:
Multi-label Positive and Unlabeled Learning and its Application to Common Vulnerabilities and Exposure Categorization. 988-996 - Reyhan Duezguen, Peter Mayer

, Benjamin Berens
, Christopher Beckmann, Lukas Aldag, Mattia Mossano
, Melanie Volkamer, Thorsten Strufe:
How to Increase Smart Home Security and Privacy Risk Perception. 997-1004 - Jianfang Wang, Zhiqiang Wu, Guang Chen, Detao Liu, Qiuling Zhang:

An Adaptive Multi-pairwise Ranking with Implicit Feedback for Recommendation. 1005-1012 - Daqian Liu, Weidong Bao, Bowen Fei, Xiaomin Zhu, Zhenliang Xiao, Tong Men:

Multi-UAV Cooperative Obstacle Avoidance and Surveillance in Intelligent Transportation. 1013-1020 - Yucheng Liu, Hao Wu, Xiangxue Li:

Another Look at the Connection between CAN Signal Ringing & In-Vehicle ECU Identification. 1021-1030 - Aiting Yao, Frank Jiang, Xuejun Li, Chengzu Dong, Jia Xu

, Yi Xu, Gang Li, Xiao Liu:
A Novel Security Framework for Edge Computing based UAV Delivery System. 1031-1038 - Jianfeng Ma, Xiangxue Li, Haifeng Qian:

LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW. 1039-1048 - Aryan Mohammadi Pasikhani

, John A. Clark, Prosanta Gope:
Reinforcement-Learning-based IDS for 6LoWPAN. 1049-1060 - Xiaojuan Yang, Jiaxing Shang, Linjiang Zheng, Dajiang Liu, Shu Fu, Baohua Qiang:

Accepted Influence Maximization under Linear Threshold Model on Large-Scale Social Networks. 1061-1068 - Peipei Fu, Qingya Yang, Yangyang Guan, Bingxu Wang, Gaopeng Gou, Zhen Li, Gang Xiong, Zhenzhen Li:

Towards Multi-source Extension: A Multi-classification Method Based on Sampled NetFlow Records. 1069-1076 - Jie Ma

, Bin Qi, Kewei Lv:
BSA: Enabling Biometric-Based Storage and Authorization on Blockchain. 1077-1084 - Luyue Fang, Xiaoqiang Di, Xu Liu, Yiping Qin, Weiwu Ren, Qiang Ding:

QuickLogS: A Quick Log Parsing Algorithm based on Template Similarity. 1085-1092 - Cesar Castellon, Swapnoneel Roy, O. Patrick Kreidl, Ayan Dutta, Ladislau Bölöni:

Energy Efficient Merkle Trees for Blockchains. 1093-1099 - Saed Alrabaee, Kim-Kwang Raymond Choo, Mohammad Qbea'h

, Mahmoud Khasawneh:
BinDeep: Binary to Source Code Matching Using Deep Learning. 1100-1107 - Jiajia Li

, Lingyun Zhang, Cancan Ni, Yunzhe An, Chuanyu Zong, Anzhen Zhang:
Efficient k Nearest Neighbor Query Processing on Public Transportation Network. 1108-1115 - Caciano Machado

, Renan R. S. dos Santos, Carla Merkle Westphall:
Hop-by-hop Accounting and Rewards for Packet dIspAtching. 1116-1123 - Wei Yang Bryan Lim

, Jer Shyuan Ng
, Zehui Xiong
, Sahil Garg, Yang Zhang, Dusit Niyato, Chunyan Miao:
Dynamic Edge Association in Hierarchical Federated Learning Networks. 1124-1131 - Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng:

Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks. 1132-1140 - Sidra Malik, Naman Gupta, Volkan Dedeoglu, Salil S. Kanhere

, Raja Jurdak
:
TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains. 1141-1152 - Akshay M. Fajge, Subhasish Goswami, Arpit Srivastava, Raju Halder

:
Wait or Reset Gas Price?: A Machine Learning-based Prediction Model for Ethereum Transactions' Waiting Time. 1153-1160 - Zhihan Fu, Qilin Fan, Xu Zhang, Xiuhua Li, Sen Wang, Yueyang Wang:

Policy Network Assisted Monte Carlo Tree Search for Intelligent Service Function Chain Deployment. 1161-1168 - Alexander Marsalek, Thomas Zefferer:

Compressing the Bitcoin Blockchain using Incremental Snapshots. 1169-1176 - Zhipeng Gao, Zijian Zhuang, Yijing Lin, Lanlan Rui, Yang Yang, Chen Zhao, Zijia Mo:

Select-Storage: A New Oracle Design Pattern on Blockchain. 1177-1184 - Elnaz Rabieinejad, Abbas Yazdinejad, Reza M. Parizi:

A Deep Learning Model for Threat Hunting in Ethereum Blockchain. 1185-1190 - Swapnoneel Roy, Sam Matloob, Debajyoti Mukhopadhyay:

On Application of Blockchain to Enhance Single Sign-On (SSO) Systems. 1191-1195 - Cong Feng, Liang Tan, Huan Xiao, Xin Qi, Zheng Wen, Yang Liu:

EDKSAP : Efficient Double-Key Stealth Address Protocol in Blockchain. 1196-1201 - Xiaocong Li, Changshe Ma:

Redactable Blockchain based on Unforgeable Signatures for Supporting Fast Verification. 1202-1207 - Lichao Zhang, Wangbin Li, Hailiang Ye:

A blind watermarking system based on deep learning model. 1208-1213 - Zhiyi Mo, Yutong Xing, Zizhen Peng:

Application of Bayesian Network Reasoning Algorithm in Emotion Classification. 1214-1219 - Huanlong Liu, Bin Jiang, Zhengjie Wang, Hongyu Peng:

An Measurement Method of Oblique Wedge Rubbing Surface Abrasion Based on Point Cloud. 1220-1226 - Venki Balasubramanian

, Rehena Sulthana, Andrew Stranieri
, G. Manoharan, Teena Arora, Ram Srinivasan, K. Mahalakshmi, Varun G. Menon
:
A Secured Real-Time IoMT Application for Monitoring Isolated COVID-19 Patients using Edge Computing. 1227-1234 - Yang Liu, Ershen Wang, Song Xu, Zhi Wang, Meizhi Liu, Wansen Shu:

Simple Online Unmanned Aerial Vehicle Tracking with Transformer. 1235-1239 - Zhaoyun Ding, Lina Liu, Donghua Yu, Songping Huang, Hang Zhang, Kai Liu:

Detection of Anomaly User Behaviors Based on Deep Neural Networks. 1240-1245 - Yongxin Zhao, Wanqing Wu, Chaofan Di:

Release of Trajectory Data based on Space Segmentation using Differential Privacy. 1246-1253 - Zerui Fang, Shiyao Cui, Qing Su, Suzhen Wang:

An Implementation and Optimization Method of RTLS Based on UWB for Underground Mine. 1254-1258 - Yaling Zhang, Pengfei Feng, Yao Ning:

Random Forest Algorithm Based on Differential Privacy Protection. 1259-1264 - Huanlong Liu, Zhengjie Wang, Yao Chen, Hongyu Peng:

An axis extract method for rotational parts based on point cloud normal lines. 1265-1269 - Yajie Wang, Jinli Ma

, Zhao Pei, Jun Li:
Human Trajectory Prediction Using Stacked Temporal Convolutional Network. 1270-1274 - Tianyu Zhao, Tao Zhang:

Revisiting Anonymity and Privacy of Bitcoin. 1275-1280 - Huanlong Liu, Zhengjie Wang, Bin Jiang, Hongyu Peng:

An inertia wheel pendulum control method based on actor-critic learning algorithm. 1281-1285 - M. Ridwanur Rahman, Ahmad Salehi S., Carsten Rudolph:

Decentralized Policy Information Points for Multi-Domain Environments. 1286-1293 - Aneta Poniszewska-Maranda

, Lukasz Chomatek
, Joanna Ochelska-Mierzejewska
:
Secure Development Strategy Model Framework for Security of Mobile Applications. 1294-1299 - Yajie Wang, Zhiyang Wan, Zhao Pei, Chengcai Leng, Yuli Chen:

GEA-net: Global embedded attention neural network for image classification. 1300-1305 - Zhuo Yan, Bin Lan, Shaohao Chen, Senyu Yu, Xingwei Wang, Zhuoqun Fang, Wei Chen, Chuanyun Wang, Xiangbin Shi:

Design of Lightweight Intelligent Vehicle System Based on Hybrid Depth Model. 1306-1311 - Zhuo Yan, Xingwei Wang, Bin Lan, Senyu Yu, Shaohao Chen, Zhuoqun Fang, Chuanyun Wang, Wei Chen, Xiangbin Shi:

Improved NS Cellular Automaton Model for Simulating Traffic Flows of Two-Lane. 1312-1317 - Hao Liu

, Zhenyu Guan, Peng Lei:
A Filter Rank Based Pruning Method for Convolutional Neural Networks. 1318-1322 - Qianyun Zhang, Shijie Li

, Jiting Shi
, Zhenyu Guan:
A TDOA-Assisted Direct Position Determination for Efficient Geolocalization Using LEO Satellites. 1323-1327 - Chaolun Wang, Yuan Liu, Pengwei Ma, Jiafeng Tian, Siyuan Liu, Minjing Zhong, Chunyu Jiang:

Research and implementation of an analytical database testing platform in telecommunication industry. 1328-1333 - Ke Xu, Miaoqiong Wang, Yuming Ge, Rundong Yu, Jian Wang, Jiachen Zhang:

C-V2X Large-scale Test Network Transmission Performance Data Analysis Method. 1334-1339 - Yuhan Liu, Yutao Zhang, Heng Zhang, Yongfeng Wang, Lianbo Song:

Design of Digital Maincenter Platform for Smart Home Based on Big Data. 1340-1344 - Yuanpeng Li, Yile Fan, Shuaijun Liu, LiXiang Liu, Wenge Yang:

Overview of Beam Hopping Algorithms in Large Scale LEO Satellite Constellation. 1345-1351 - Sujie Xu, Xin Hu, Libing Wang, Yin Wang, Weidong Wang:

Joint Power and Bandwidth Allocation for Internet of Vehicles Based on Proximal Policy Optimization Algorithm. 1352-1357 - Wei Wei, Yang Zhang, Zhongsheng Fan, Jinge Guo, Bao Guo, Huangtao Song:

NR Shared Spectrum efficiency and utilization analysis based on big data. 1358-1362 - Mingxin Li, Mingde Huo, Lexi Xu

, Xinzhou Cheng, Xin Zhao:
Research and Application of Intelligent Antenna Feeder Optimization System based on Big Data. 1363-1368 - Pengwei Ma, Kai Wei, Chunyu Jiang, Junyi Li, Jiafeng Tian, Siyuan Liu, Minjing Zhong:

Research on Evaluation System of Relational Cloud Database. 1369-1373 - Xu Liu, Ruoyu Li, Penghao Yue:

Design and Implementation of Intelligent Operation and Maintenance System for Big Data Platform. 1374-1379 - Tingting Wang, Yao Zhou, Yushan Pei, Fuchang Li:

Research of Sharing and Compatibility for HIBS and Terrestrial Network in 900MHz. 1380-1385 - Hongyu Peng, Fujian Sun, Kan Wang, Tianlu Hao, Dequan Xiao, Lexi Xu:

A Non-Cooperative Data Center Energy Consumption Optimization Strategy Based on SDN Structure. 1386-1390 - Chen Cheng, Xinzhou Cheng, Yuting Zheng, Lijuan Cao, Yuhui Han, Yuwei Jia, Qingqing Zhang, Yi Zhang, Ya-nan Zhang, Lexi Xu

:
A Novel Architecture and Algorithm for Prediction of Students Psychological Health based on Big Data. 1391-1396 - Binqi Cheng, Weijie Feng:

Analysis of the Application of Big Data in Banking Sector. 1397-1401 - Xu Liu, Dongxu Fang, Peng Xu:

Automated Performance Benchmarking Platform of IaaS Cloud. 1402-1405 - Dong Wang, Yue Che, Chao Li, Yahui Chen, Hui Yin, Chunlian Zhang:

Base Station Prediction Analysis Scheme Based on Lasso Regression Machine Learning Algorithm. 1406-1411 - Yinghe Wang, Yu Tang:

BRLR: A Routing Strategy for MANET Based on Reinforcement Learning. 1412-1417 - Chunyu Jiang, Jiafeng Tian, Pengwei Ma:

Databench-T: A Transactional Database Benchmark for Financial Scenarios. 1418-1421 - Heng Zhang, Yuhan Liu, Lexi Xu

, Xinzhou Cheng, Lijuan Cao, Wei Xia, Ciguang Yang:
Evaluation and Application of News Transmission Speed in New Media Environment. 1422-1427 - Zhaoning Wang, Bo Cheng, Junliang Chen:

Online Automatic Service Composition for Mobile and Pervasive Computing. 1428-1433 - Chunhui Zhang, Xiaoming Yuan, Qianyun Zhang, Guangxu Zhu, Lei Cheng, Ning Zhang:

Privacy-Preserving Neural Architecture Search Across Federated IoT Devices. 1434-1438 - Jifeng Liu, Yao Zhou, Yiying Niu, Tingting Wang, Tao Zhang, Fuchang Li:

Sharing and Compatibility Studies of EESS(active) and IMT System in 10-10.5 GHz. 1439-1444 - Zhipeng Gao, Chenhao Qiu, Chen Zhao, Yang Yang, Zijia Mo, Yijing Lin:

FedIM: An Anti-attack Federated Learning Based on Agent Importance Aggregation. 1445-1451 - Xingsi Xue, Haolin Wang, Yunmeng Zhao, Yikun Huang, Hai Zhu:

Matching Sensor Ontologies with Neural Network. 1452-1457 - Tao Zhang, Yi Qin, Qiang Li:

Trusted Artificial Intelligence: Technique Requirements and Best Practices. 1458-1462 - Mengjian Cai, Zhanli Sun, Xin Deng:

Multidimensional Observation of Blockchain Security. 1463-1466 - Yuefeng Liu, Wei Guo, Hanyu Zhang, Haodong Bian, Yingjie He, Xiaoyan Zhang, Yanzhang Gong, Jianmin Dong, Zhen Liu:

Construction of Knowledge Graph Based on Discipline Inspection and Supervision. 1467-1472 - Yuefeng Liu, Xiaoyan Zhang, Wei Guo, Haodong Bian, Yingjie He, Zhen Liu:

Prediction of remaining useful life of turbofan engine based on optimized model. 1473-1477 - Wei Shi, Mixue Deng, Dong Wang, Yuyun Yang, Deyin Li, Lirong Wang:

Design and Implementation of Scanning Electron Microscope Image Acquisition Software System. 1478-1482 - Jie Zhang, Jiaqi Yan, Jinxian Wang

, Jie Xu, Yilong Zhao, Gangyin Luo:
Research on Droplet Digital PCR Amplification System. 1483-1487 - Lesong Zheng, Miao Zhang, Lishen Qiu, Gang Ma, Wenliang Zhu, Lirong Wang:

A multi-scale convolutional neural network for heartbeat classification. 1488-1492 - Duoduo Wang, Lishen Qiu, Wanyue Li, Wenliang Zhu, Lirong Wang:

An Automatic Algorithm for P/T-Wave Detection based on Auxiliary Waveform. 1493-1497 - Huimin Zhang, Lishen Qiu, Wenliang Zhu, Wenqiang Cai, Lirong Wang:

Automated Classification of Atrial Fibrillation and Atrial Flutter in ECG Signals based on Deep Learning. 1498-1502 - Yuhang Chen, Wenchang Xu, Wenliang Zhu, Gang Ma, Xiaohe Chen, Lirong Wang:

Beat-to-beat Heart Rate Detection Based on Seismocardiogram Using BiLSTM Network. 1503-1507 - Yuhui Han, Chen Cheng, Xinzhou Cheng, Lexi Xu

, Yuchao Jin, Yuwei Jia, Jie Gao:
A new algorithm for demographic expansion based on multi-scene differentiated communication data. 1508-1513 - Ming Gao, Xiaokun Yu, Lei Ren, Hongxiang Cai, Zhiyong Wang, Yuyang Zhou:

A Renewable Energy Certificate Trading System Based on Blockchain. 1514-1518 - Yuwei Jia, Kun Chao, Xinzhou Cheng, Jian Guan, Lijuan Cao, Yi Li, Chen Cheng, Yuchao Jin, Lexi Xu

:
A Hybrid User Recommendation Scheme Based on Collaborative Filtering and Association Rules. 1519-1524 - Lijuan Cao, Xinzhou Cheng, Lexi Xu

, Chen Cheng, Yi Li, Yuwei Jia, Chuntao Song, Heng Zhang:
Preference Recommendation Scheme based on Social Networks of Mobile Users. 1525-1530 - Yuchao Jin, Yi Li, Deyi Li, Xinzhou Cheng, Lexi Xu

, Yuhui Han:
Cell Boundary Prediction and Base Station Location Verification based on Machine Learning. 1531-1536 - Jinge Guo, Yang Zhang, Zhongsheng Fan, Wei Wei, Bao Guo, Huangtao Song:

Investigation on Multi-Antenna Technologies Evolution from FDD LTE to NR FDD. 1537-1541 - Mingxin Li, Mingde Huo, Xinzhou Cheng, Lexi Xu

, Xiaojing Liu, Rui Yang:
Joint Offloading Decision and Resource Allocation of 5G Edge Intelligent Computing for Complex Industrial Application. 1542-1547 - Yiying Niu, Yao Zhou, Tao Zhang, Fuchang Li:

Study on TDD Unsynchronized Interference from Outdoor to Indoor Scenario in 3.3-3.6 GHz. 1548-1553 - Shiyu Zhou, Jie Miao, Xiqing Liu, Xinzhou Cheng, Zhenqiao Zhao, Xin Zhao:

Fault Diagnosis of 5G Voice Service Based on Multi-sources data. 1554-1558 - Xiqing Liu, Hongshui Jing, Shiyu Zhou, Zhenqiao Zhao, Xinzhou Cheng, Lexi Xu

:
Key technologies for 5G co-construction and shared base station data automatic configuration. 1559-1563 - Zhuo Wang, Kai Wei, Chunyu Jiang, Jiafeng Tian, Minjing Zhong, Yuan Liu, Yanmei Liu:

Research on Productization and Development Trend of Data Desensitization Technology. 1564-1569 - Wenliang Zhu, Gang Ma, Yuhang Chen, Lishen Qiu, Lesong Zheng, Lirong Wang:

A Novel Method for Detecting Noise Segments in ECG Signals. 1570-1574 - Jithu Geevargheese Panicker, Ahmad Salehi S., Carsten Rudolph:

Authentication and Access Control in 5G Device-to-Device Communication. 1575-1582 - Weifeng Sun, Yiming Wang, Kangkang Chang, Kelong Meng:

IdiffGrad: A Gradient Descent Algorithm for Intrusion Detection Based on diffGrad. 1583-1590

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














