


default search action
Security and Communication Networks, Volume 2022
Volume 2022, 2022
- Xibin Sun

, Du Zhang
, Haiou Qin
, Jiahua Tang
:
Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning. 3990386:1-3990386:20 - Pengbo Wang

, Ming Tang
, Shoukun Xiang, Yaru Wang, Botao Liu:
Gap between Prediction and Truth: A Case Study of False-Positives in Leakage Detection. 6904232:1-6904232:13 - Huiying Zou, Xiaofan Liu

, Wei Ren
, Tianqing Zhu:
A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain. 5424395:1-5424395:8 - Ying Chen, H. Xing, S. Chen, Ning Zhang, Xin Chen, Jiwei Huang:

Game-Based Channel Selection for UAV Services in Mobile Edge Computing. 4827956:1-4827956:16 - (Withdrawn) Electronic Health Record Monitoring System and Data Security Using Blockchain Technology. 2366632:1-2366632:15

- Feng Hong, Tianming Zhang

, Bin Cao, Jing Fan:
PACAM: A Pairwise-Allocated Strategy and Capability Average Matrix-Based Task Scheduling Approach for Edge Computing. 6430612:1-6430612:14 - Minsoo Lee, Hyun Kwon

, Hyunsoo Yoon:
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants. 4714899:1-4714899:13 - Xue Yuan, Guanjun Lin, Yonghang Tai

, Jun Zhang
:
Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization. 5203217:1-5203217:12 - (Withdrawn) Research on Fast Recommendation Algorithm of Library Personalized Information Based on Density Clustering. 1169115:1-1169115:9

- (Withdrawn) Taxi Dispatch Optimization in Smart Cities Using TOPSIS. 7213633:1-7213633:10

- Guangcan Yang

, Yunhua He
, Ke Xiao
, Qifeng Tang, Yang Xin, Hongliang Zhu:
Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud. 9360899:1-9360899:16 - (Withdrawn) The Application and Teaching of Digital Technology in Printmaking. 3271860:1-3271860:7

- Qingbing Ji

, Zhihong Rao
, Man Chen
, Jie Luo
:
Security Analysis of Shadowsocks(R) Protocol. 4862571:1-4862571:6 - Mohib Ullah

, Rafiullah Khan
, Irfan Ullah Khan, Nida Aslam
, Sumayh S. Aljameel
, Muhammad Inam Ul Haq, Muhammad Arshad Islam
:
Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces. 2109024:1-2109024:13 - Se-Joon Park

, Yong-Joon Lee
, Won-Hyung Park
:
Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network. 3686423:1-3686423:12 - (Withdrawn) Optimal Allocation of Human Resource Structure Based on Capability Maturity Model Integration. 3162328:1-3162328:10

- Hyun Park

, TaeGuen Kim
:
User Authentication Method via Speaker Recognition and Speech Synthesis Detection. 5755785:1-5755785:10 - Murat Odemis

, Cagatay Yucel
, Ahmet Koltuksuz
:
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System. 7620125:1-7620125:28 - Qingyi Zhu

, Pingfan Xiang, Xuhang Luo
, Chenquan Gan
:
Dynamical Behavior of Hybrid Propagation of Computer Viruses. 2576685:1-2576685:15 - (Withdrawn) Visual Dynamic Simulation Model of Unstructured Data in Social Networks. 9095330:1-9095330:10

- Qihong Yu

, Jiguo Li, Sai Ji:
Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience. 8220259:1-8220259:12 - (Withdrawn) Application of Computer-Aided Graphic Design in Enterprise Image. 6206434:1-6206434:7

- Lan Liu

, Jingjing Fan, Chengfan Li
, Xuefeng Liu
:
A Method of the Active and Passive Event Service Based on the Sensor Web. 2578744:1-2578744:11 - Da Li

, Dong Wang, Wei Jiang, Qinglei Guo
, Desheng Bai, Wei Shi, Linna Ruan
:
An Effective Credit Evaluation Mechanism with Softmax Regression and Blockchain in Power IoT. 3842077:1-3842077:12 - (Withdrawn) Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm. 3272603:1-3272603:13

- (Withdrawn) Fast Extraction Algorithm for Local Edge Features of Super-Resolution Image. 8801978:1-8801978:10

- (Withdrawn) Group Relationship Mining of College Students Based on Predictive Social Network. 5443655:1-5443655:9

- (Withdrawn) Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance. 7272048:1-7272048:10

- Zhenjie Huang

, Yafeng Guo
, Hui Huang
, Runlong Duan
, Xiaolong Zhao
:
Analysis and Improvement of Blockchain-Based Multilevel Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. 1926902:1-1926902:15 - Arun Sekar Rajasekaran

, Maria Azees
:
An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications. 2793116:1-2793116:12 - (Withdrawn) Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production. 6040371:1-6040371:9

- Yujian Zhang

, Yuhao Luo, Xing Chen
, Fei Tong
, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. 9686049:1-9686049:15 - Yaojia Tang

, Luna Wang
:
An Empirical Study of Platform Enterprises' Privacy Protection Behaviors Based on fsQCA. 9517769:1-9517769:12 - Ping Li

, Songtao Guo, Jiahui Wu
, Quanjun Zhao:
BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN. 7294638:1-7294638:16 - (Withdrawn) Multilevel Image Edge Detection Algorithm Based on Visual Perception. 3502041:1-3502041:9

- Ruizhong Du, Jingze Wang

, Shuang Li:
A Lightweight Flow Feature-Based IoT Device Identification Scheme. 8486080:1-8486080:10 - (Withdrawn) Correlation Analysis of Population Educational Structure and Program Audience Share Based on Multisample Regression for Correction. 5437816:1-5437816:9

- Hafiz Muhammad Jamsheed Nazir

, Weihong Han
:
Proliferation of Cyber Situational Awareness: Today's Truly Pervasive Drive of Cybersecurity. 6015253:1-6015253:16 - Weizhou Li, Zhiqiang Lin

, Qi Chen:
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses. 1417607:1-1417607:9 - Linhong Li

, Kaifan Huang
, Xiaofan Yang
:
Containing Misinformation Spread: A Collaborative Resource Allocation Strategy for Knowledge Popularization and Expert Education. 4510694:1-4510694:14 - Lei Zhang

, Zhisong Pan
, Yu Pan
, Shize Guo, Yi Liu, Shiming Xia
, Qibin Zheng
, Hongmei Li
, Wei Bai
:
A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient. 1488344:1-1488344:13 - Xiaoyao Liao, Changzhi Wang

, Wen Chen:
Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM. 6401316:1-6401316:13 - (Withdrawn) A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve. 2725900:1-2725900:8

- (Withdrawn) Economic Evaluation Method of Incremental Distribution Network Project Based on Value Theory. 1937177:1-1937177:11

- (Withdrawn) An Improved Image Steganography Framework Based on Y Channel Information for Neural Style Transfer. 2641615:1-2641615:12

- Jingjing Guo

, Xuliang Wei
, Yuling Zhang
, Jianfeng Ma
, Huamin Gao
, Libo Wang
, Zhiquan Liu
:
Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain. 5804109:1-5804109:19 - (Withdrawn) Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone. 7214844:1-7214844:8

- (Withdrawn) Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime. 9329715:1-9329715:10

- Naeem Ahmed

, Rashid Amin
, Hamza Aldabbas, Deepika Koundal
, Bader Alouffi, Tariq Shah
:
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges. 1862888:1-1862888:19 - Yang Ming

, Yabin Li, Yi Zhao, Pengfei Yang:
Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid. 5895176:1-5895176:18 - Xunfeng Yao

, Hao Sun, Sijun Li, Weichao Lu:
Invoice Detection and Recognition System Based on Deep Learning. 8032726:1-8032726:10 - Hongyuan Wang, Jin Meng, Xilong Du, Tengfei Cao, Yong Xie

:
Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function. 1203691:1-1203691:11 - Ran Li

, Yuanfei Zhang, Lihua Yin
, Zhe Sun
, Zheng Lin
, Peng Fu
, Weiping Wang
, Gang Shi:
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application. 1208846:1-1208846:12 - Hang Zhu

, Weina Niu
, Xuhan Liao
, Xiaosong Zhang
, Xiaofen Wang
, Beibei Li
, Zheyuan He
:
Attacker Traceability on Ethereum through Graph Analysis. 3448950:1-3448950:12 - Qi Han

, Ao Zhang
, Tengfei Weng, Yan Xie, Liping Feng
, Guorong Chen, Yuan Tian:
Lag Secure Consensus for Second-Order Nonlinear Multiagent Systems with Event-Triggered Control Strategy under DoS Attacks. 4451304:1-4451304:12 - Yi Jiang

, Dengpan Ye
:
Black-Box Adversarial Attacks against Audio Forensics Models. 6410478:1-6410478:8 - (Withdrawn) Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing. 4937588:1-4937588:13

- Usman Rauf Kamboh

, Muhammad Rehman Shahid
, Hamza Aldabbas
, Ammar Rafiq
, Bader Alouffi
, Muhammad Asif Habib
, Ubaid Ullah
:
Radio Network Forensic with mmWave Using the Dominant Path Algorithm. 9692892:1-9692892:15 - (Withdrawn) Intelligent Image Saliency Detection Method Based on Convolution Neural Network Combining Global and Local Information. 3647387:1-3647387:9

- Gotam Singh Lalotra

, Vinod Kumar
, Abhishek Bhatt
, Tianhua Chen
, Mufti Mahmud
:
iReTADS: An Intelligent Real-Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network. 9149164:1-9149164:15 - (Withdrawn) 5G-EECC: Energy-Efficient Collaboration-Based Content Sharing Strategy in Device-to-Device Communication. 1354238:1-1354238:13

- Xiaoguang Liu

, Jun Yan, Shuqiang Shan, Rongjun Wu:
A Blockchain-Assisted Electronic Medical Records by Using Proxy Reencryption and Multisignature. 6737942:1-6737942:13 - (Withdrawn) Mitigation Impact of Energy and Time Delay for Computation Offloading in an Industrial IoT Environment Using Levenshtein Distance Algorithm. 6469380:1-6469380:12

- Yan Ren

, Haipeng Guan
, Qiuxia Zhao
, Zongxiang Yi
:
Blockchain-Based Proof of Retrievability Scheme. 3186112:1-3186112:8 - (Withdrawn) An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones. 9718580:1-9718580:9

- Jhansi Rani Kaka

, K. Satya Prasad:
Differential Evolution and Multiclass Support Vector Machine for Alzheimer's Classification. 7275433:1-7275433:13 - Zhaobin Li

, Bin Yang
, Xinyu Zhang
, Chao Guo
:
DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective. 1886516:1-1886516:13 - Lin Yu

, Gang Xu
, Zhifei Wang
, Na Zhang
, Fengqi Wei
:
A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value. 6343764:1-6343764:12 - Zhenzhong Zhang, Wei Sun, Yanliang Yu

:
Research on Intelligent Scheduling Mechanism in Edge Network for Industrial Internet of Things. 5358873:1-5358873:14 - (Withdrawn) Research on Evaluation Model of Hospital Informatization Level Based on Decision Tree Algorithm. 3777474:1-3777474:9

- (Withdrawn) A Personalized Recommendation System for English Teaching Resources Based on Multi-K Nearest Neighbor Regression Algorithm. 7077123:1-7077123:11

- (Withdrawn) Rumor Detection with Bidirectional Graph Attention Networks. 4840997:1-4840997:13

- (Withdrawn) Mental and Emotional Recognition of College Students Based on Brain Signal Features and Data Mining. 4198353:1-4198353:10

- Wenjuan Jia

, Guanhao Xue, Baocang Wang
, Yupu Hu:
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism. 8299232:1-8299232:7 - Li Duan

, Yangyang Sun
, Kejia Zhang
, Yong Ding
:
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures. 5307697:1-5307697:11 - Bo Wang

, Yucai Li
, Xiaohan Wu
, Yanyan Ma
, Zengren Song
, Mingkan Wu
:
Face Forgery Detection Based on the Improved Siamese Network. 5169873:1-5169873:13 - (Withdrawn) Research on the Effect of Online Marketing Based on Multimodel Fusion and Artificial Intelligence in the Context of Big Data. 1516543:1-1516543:9

- (Withdrawn) Research on Face Recognition Classification Based on Improved GoogleNet. 7192306:1-7192306:6

- Juan Zheng

, Zhiyong Zeng
, Tao Feng
:
GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection. 4274139:1-4274139:11 - (Withdrawn) Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment. 2593672:1-2593672:14

- Vijayalakshmi Murugesan, S. Mercy Shalinie

, Ming-Hour Yang
, Shou-Chuan Lai
, Jia-Ning Luo
:
A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol. 9377818:1-9377818:12 - A. Revathi

, R. Kaladevi
, Kadiyala Ramana
, Rutvij H. Jhaveri
, Madapuri Rudra Kumar
, M. Sankara Prasanna Kumar
:
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test. 4190023:1-4190023:13 - Wansoo Kim

, Jungho Lee, Yousik Lee
, Yeon-Jin Kim
, Jingyun Chung, Samuel Woo
:
Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN. 4322148:1-4322148:11 - Jinbo Chao

, Chunhui Zhao
, Fuzhi Zhang
:
Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms. 4354086:1-4354086:13 - Lianshan Liu

, Lingzhuang Meng
, Weimin Zheng
, Yanjun Peng, Xiaoli Wang
:
A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net. 4345494:1-4345494:12 - (Withdrawn) Autonomous Orbit Determination System of Navigation Satellite Based on Spaceborne GPS Technology. 7463315:1-7463315:10

- (Withdrawn) FLOM: Toward Efficient Task Processing in Big Data with Federated Learning. 5277362:1-5277362:16

- Chien-Ming Chen

, Shehzad Ashraf Chaudhry
, Kuo-Hui Yeh
, Muhammad Naveed Aman
:
Security, Trust and Privacy for Cloud, Fog and Internet of Things. 9841709:1-9841709:2 - Jiawen Du

, Yong Pi
:
Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data. 3826126:1-3826126:9 - Jing Zhang

, Si-Tong Shi, Cai-Jie Weng, Li Xu
:
Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks. 6338123:1-6338123:13 - Xingyu Li

, Zongqu Zhao
, Yongli Tang
, Jing Zhang
, Chengyi Wu
, Ying Li
:
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain. 3111540:1-3111540:10 - Yuchen Sun

, Xiangyang Luo
, Han Wang, Zhaorui Ma:
A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic. 3306098:1-3306098:12 - Muhammad Umar Aftab

, Ali Hamza
, Ariyo Oluwasanmi
, Xuyun Nie
, Muhammad Shahzad Sarfraz
, Danish Shehzad
, Zhiguang Qin
, Ammar Rafiq
:
Traditional and Hybrid Access Control Models: A Detailed Survey. 1560885:1-1560885:12 - Efstratios Chatzoglou

, Georgios Kambourakis
, Constantinos Kolias
:
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces. 1833062:1-1833062:24 - (Withdrawn) An Improved Particle Swarm Optimisation Method for Performance Evaluation of Instructors. 3333005:1-3333005:7

- (Withdrawn) Research on Marketing Strategy of Chinese Painting and Calligraphy Art Based on Wireless Communication Network Resources. 7788645:1-7788645:9

- Xianyong Li

, Qizhi Li
, Yajun Du
, Yongquan Fan, Xiaoliang Chen
, Fashan Shen, Yunxia Xu:
A Novel Tripartite Evolutionary Game Model for Misinformation Propagation in Social Networks. 1136144:1-1136144:13 - Omid Mir

, Michael Roland
, René Mayrhofer
:
Decentralized, Privacy-Preserving, Single Sign-On. 9983995:1-9983995:18 - (Withdrawn) The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment. 2904447:1-2904447:13

- Wenguang He

, Gangqiang Xiong
, Yaomin Wang
:
Reversible Data Hiding Based on Multiple Pairwise PEE and Two-Layer Embedding. 2051058:1-2051058:12 - Yawen Ke

, Xiaofeng Xia
:
Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES. 4118994:1-4118994:16 - (Withdrawn) Invested Costs and Risk Control Model of Social Governance Based on Fuzzy Algorithm. 8797798:1-8797798:10

- Amir Anees

, Iqtadar Hussain
, Umar Mujahid Khokhar, Fawad Ahmed, Sajjad Shaukat Jamal:
Machine Learning and Applied Cryptography. 9797604:1-9797604:3 - Manohar Sai Burra

, Soumyadev Maity
:
Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPSs. 6705948:1-6705948:32 - Wajih El Hadj Youssef

, Ali Abdelli
, Fethi Dridi, Rim Brahim, Mohsen Machhout
:
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security. 9709601:1-9709601:17 - Yinghai Zhou

, Yi Tang, Ming Yi, Chuanyu Xi
, Hai Lu:
CTI View: APT Threat Intelligence Analysis System. 9875199:1-9875199:15 - (Withdrawn) Information Processing Methods of Electronic Warfare Events Based on Communication Technology. 9309710:1-9309710:11

- Wenle Bai

, Zhongjun Yang
, Jianhong Zhang
:
Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing". 9879521:1-9879521:1 - (Withdrawn) Construction of the EFL Mobile Learning Model in the Hybrid Distributed Terminal. 4429174:1-4429174:10

- (Withdrawn) Relationship Model between Human Resource Management Activities and Performance Based on LMBP Algorithm. 1125084:1-1125084:11

- Guofeng Zhang

, Xiao Chen
, Bin Feng
, Xuchao Guo
, Xia Hao
, Henggang Ren
, Chunyan Dong
, Yanan Zhang
:
BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System. 2958963:1-2958963:11 - (Withdrawn) Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data. 5365807:1-5365807:9

- Jinhui Liu

, Yong Yu
, Houzhen Wang, Huanguo Zhang:
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems. 8995704:1-8995704:9 - Boyu Wang

, Haiying Gao
, Fan Yang
:
Fast Implementation of Multiplication on Polynomial Rings. 4649158:1-4649158:9 - Xiaowei Wang, Shoulin Yin

, Muhammad Shafiq
, Asif Ali Laghari, Shahid Karim, Omar Cheikhrouhou
, Wajdi Alhakami, Habib Hamam:
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption. 4260804:1-4260804:14

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














