


default search action
22nd TrustCom 2023: Exeter, UK
- Jia Hu, Geyong Min, Guojun Wang, Nektarios Georgalas:

22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023. IEEE 2023, ISBN 979-8-3503-8199-3 - Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:

Representation-enhanced APT Detection Using Contrastive Learning. 1-9 - Jiacheng Li, Tong Li, Runzi Zhang, Di Wu, Hao Yue, Zhen Yang:

APM: An Attack Path-based Method for APT Attack Detection on Few-Shot Learning. 10-19 - Jian Chen, Jingyao Wu, Hao Yin, Qiang Li, Wensheng Zhang, Chen Wang

:
Class-Targeted Poisoning Attacks against DNNs. 20-27 - Xinwen Gao, Shaojing Fu, Lin Liu, Yuchuan Luo, Luming Yang:

EzBoost: Fast And Secure Vertical Federated Tree Boosting Framework via EzPC. 28-37 - Qi Yan, Mohan Li, Yanbin Sun:

Neighborhood Matching Entity Alignment Model for Vulnerability Knowledge Graphs. 38-45 - Jinze She, Wenhao Wang, Zihao Wang:

The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel Leakages. 46-53 - Malak Alqulaity, Po Yang:

Advanced Machine-Learning Technologies for Coronary Artery Disease Prediction Using Heterogeneous Data. 54-61 - Tanveer Khan, Antonis Michalas

:
Learning in the Dark: Privacy-Preserving Machine Learning using Function Approximation. 62-71 - Bo Song, Yunpeng Yi, Ting Zhou, Junfeng Yang, Lei Liu:

Undermining License Plate Recognition: A Data Poisoning Attack. 72-78 - Mehrdad Sheikhjaberi, Dima Alhadidi:

Reducing Model Memorization to Mitigate Membership Inference Attacks. 79-88 - Shuai Li, Yu Wen, Xu Cheng:

Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving. 89-98 - Shuai Li, Yu Wen, Huiying Wang, Xu Cheng:

BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving. 99-108 - Jin Au-Yeung, Shanshan Wang, Yuchen Liu, Zhenxiang Chen:

Safety or Not? A Comparative Study for Deep Learning Apps on Smartphones. 109-116 - Jianlin Zhang, Xiaoding Wang

, Hui Lin:
Big Data Assisted Object Detection with Privacy Protection. 117-124 - Linlin Su, Jinyan Wang, Zeming Gan, Xianxian Li:

FINDER: A Simple and Effective Defender against Unnoticeable Graph Injection Attacks. 125-132 - Quanbo Pan, Yang Yu, Hanbing Yan, Maoli Wang, Bingzhi Qi:

FlowBERT: An Encrypted Traffic Classification Model Based on Transformers Using Flow Sequence. 133-140 - Dandan Li, Yufeng Li, Guiqi Zhang, Ke Sun, Jiangtao Li

:
Fooling Object Detectors in the Physical World with Natural Adversarial Camouflage. 141-148 - Lukasz Krzywiecki, Grzegorz Zaborowski, Marcin Zawada:

Too Noisy, or Not Too Noisy? A Private Training in Machine Learning. 149-156 - Qing Yang, Youliang Tian, Jinbo Xiong:

DFedXGB: An XGB Vertical Federated Learning Framework with Data Desensitization. 157-164 - Seyedsina Nabavirazavi, Rahim Taheri

, Mohammad Shojafar, Sundaraja Sitharama Iyengar:
Impact of Aggregation Function Randomization against Model Poisoning in Federated Learning. 165-172 - Chamara Sandeepa, Bartlomiej Siniarski

, Shen Wang, Madhusanka Liyanage
:
FL-TIA: Novel Time Inference Attacks on Federated Learning. 173-180 - Chenzhuo Wang, Yanrong Lu, Athanasios V. Vasilakos:

Scalable Federated Learning for Fingerprint Recognition Algorithm. 181-188 - Gengxiang Chen, Sheng Liu

, Xu Yang, Tao Wang, Linlin You, Feng Xia:
FedRSM: Representational-Similarity-Based Secured Model Uploading for Federated Learning. 189-196 - Zhipin Gu

, Jiangyong Shi, Yuexiang Yang, Liangzhong He:
Defending against Adversarial Attacks in Federated Learning on Metric Learning Model. 197-206 - Yunpeng Yi, Hongtao Lv, Tie Luo, Junfeng Yang, Lei Liu, Lizhen Cui:

Crowdsourcing-based Model Testing in Federated Learning. 207-213 - Harsh Kasyap, Somanath Tripathy, Mauro Conti

:
HDFL: Private and Robust Federated Learning using Hyperdimensional Computing. 214-221 - Hanyu Wang, Liming Wang, Hongjia Li:

Byzantine-Robust Federated Learning through Dynamic Clustering. 222-230 - Changnan Jiang, Chunhe Xia, Chen Chen, Huacheng Li, Tianbo Wang, Xiaojian Li:

FedDLM: A Fine-Grained Assessment Scheme for Risk of Sensitive Information Leakage in Federated Learning-based Android Malware Classifier. 231-240 - Hengyu Pan, Cheng Qu, Haowen Zhang, Shuo Wang, Jing Li:

HyperChain: A Dynamic State Sharding Protocol Supporting Smart Contracts to Achieve Low Cross-Shard and Scalability. 241-248 - Yuanyuan Li, Wei Chen, Xin Huang, Peng Han, Shenhai Zheng, Zhiqin Zhu:

Efficient Covert Communication Scheme Based on Ethereum. 249-256 - Zhenkun Luo, Shuhong Chen, Guojun Wang, Hanjun Li:

Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features. 257-264 - Yufan Fu

, Jiuqi Wei, Ying Li, Botao Peng, Xiaodong Li:
TI-DNS: A Trusted and Incentive DNS Resolution Architecture based on Blockchain. 265-274 - Lianhai Wang, Qihao Huang, Wei Shao, Jinpeng Wang, Xiaoqian Liu, Fansheng Wang:

Felix: A Model of Detecting Off-chain Abnormal States in Decentralized Applications. 275-283 - Jinyao Zhu, Xiaofei Xing, Guojun Wang, Peiqiang Li:

Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning. 284-291 - Shiyong Huang, Haocong Li, Ruoting Xiong, Wei Ren, Jie He, Yi Ren

:
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain. 292-299 - Min Xu, Xiaoding Wang

, Hui Lin:
IHFBF: A High-Performance Blockchain Framework for Improving Hyperledger Fabric Permissioned Chain. 300-306 - Jun Zhao

, Jiangshan Yu, Xingliang Yuan, Joseph K. Liu, Cong Zuo:
Rethinking Practical Blockchain-Based Symmetric Searchable Encryption Services. 307-317 - Bhaskar Rongali, Satyajit Mohapatra, Sanjeet Kumar Nayak

:
A Secure Contactless Payment System with Bidirectional Blockchain and Blake Hash Function. 318-325 - Htet Htet Hlaing

, Hitoshi Asaeda:
PrivOff: Secure and Privacy-Preserving Data Management for Distributed Off-Chain Networks. 326-333 - Yuwei Xu, Ying Zhang, Haonan Shi, Jie Cao:

ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains. 334-341 - Yiping Teng, Lei Liu, Jiawei Qi, Haochun Pan, Chunlong Fan:

VMR-Tree: Efficient and Verifiable Location-based kNN Queries on Blockchain. 342-351 - Liangen He, Haiqin Wu, Liang Li, Jucai Yang:

UNITE: Privacy-Aware Verifiable Quality Assessment via Federated Learning in Blockchain-Empowered Crowdsourcing. 352-360 - Jiuzheng Wang, Ruilin Zhang, Xinyi Li, Hao Yin:

FedJudge: Blockchain-based full-lifecycle trustworthy federated learning incentive mechanism. 361-368 - Liwen Xu, Xiang Lin, Jianhua Li, Min Bai, Liejun Wang:

HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks. 369-378 - Erol Gelenbe, Mohammed Nasereddin:

Protecting IoT Servers Against Flood Attacks with the Quasi Deterministic Transmission Policy. 379-386 - Chenghe Dong, Jianhong Zhang, Zongyi Lv, Ruxuan Zhang:

Lightweight Hierarchical Deterministic Wallet Supporting Stealth Address for IoT. 387-393 - Wenrui Ma

, Ying Cong, Haitao Xu, Fan Zhang, Zhao Li, Siqi Ren:
Investigating Fraud and Misconduct in Legitimate Internet Economy based on Customer Complaints. 394-403 - Zimian Liu, Han Qiu, Rui Wang, Junhu Zhu, Qingxian Wang:

Detecting BGP Anomalies based on Spatio-Temporal Feature Representation Model for Autonomous Systems. 404-411 - Vinay Sachidananda, Sivaanandh Muneeswaran, Yang Liu

, Kwok-Yan Lam:
Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments. 412-421 - Yuanpei Li

, Qinglei Zhou, Bin Li, Yan Zhuang:
GuiDiv: Mitigating Code-reuse Attack in an IoT Cluster Using Guided Control Flow Diversification. 422-433 - Muna Al-Hawawreh

, Robin Doss:
Enhancing Security in Industrial IoT: A Taxonomy-driven Approach to Risk Assessment. 434-443 - Liang Jiao, Yujia Zhu, Baiyang Li, Qingyun Liu:

Measuring DNS-over-Encryption Performance Over IPv6. 444-451 - Jie Zhang, Hui Wen, Liting Deng, Mingfeng Xin, Zhi Li, Lun Li, Hongsong Zhu, Limin Sun:

HackMentor: Fine-Tuning Large Language Models for Cybersecurity. 452-461 - Xiuwen Sun, Zhihao Wu, Jing Lin, Pengfei Fu, Jie Cui, Hong Zhong:

Extracting Length Field of Unknown Binary Network Protocol from Static Trace. 462-469 - Huanlai Xing, Huaming Ma, Zhiwen Xiao

, Xinhan Wang, Bowen Zhao, Shouxi Luo, Li Feng, Lexi Xu:
On ECG Signal Classification: An NAS-empowered Semantic Communication System. 470-476 - Xiuwen Sun, Guangzheng Zhang, Di Wu, Qingying Yu, Jie Cui, Hong Zhong:

Parallel Pattern Matching over Brotli Compressed Network Traffic. 477-484 - Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:

Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. 485-494 - Zahra Pooranian, Mohammad Shojafar, Pedram Asef, Matthew Robinson

, Harry Lees, Mark Longden:
RCA-IDS: A Novel Real-time Cloud-based Adversarial IDS for Connected Vehicles. 495-503 - Yuwei Xu, Xiaotian Fang

, Jie Cao, Rou Yu, Kehui Song, Guang Cheng:
Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning. 504-511 - Zhefeng Nan, Qian Qiang, Tianning Zang, Changbo Tian, Shuyuan Zhao, Shuhe Liu:

Topology construction method of anti-tracking network based on cross-domain decentralized gravity model. 512-521 - Eric Klieme, Ben-Noah Engelhaupt, Vincent Xeno Rahn, Christoph Meinel:

Push It Real Good: Towards Behavioral Access Control using the Door Handle Push-Down-Phase Only. 522-530 - Chunyan Ma

, Jun Jiang, Kai Zhang, Zhengwei Jiang, Peian Yang, Xuren Wang, Huamin Feng:
FineCTI: A Framework for Mining Fine-grained Cyber Threat Information from Twitter Using NER Model. 531-538 - Yoshimichi Koga, Kenichi Kourai:

SSdetector: Secure and Manageable Host-based IDS with SGX and SMM. 539-548 - Amir Rafi, Carlton Shepherd, Konstantinos Markantonakis

:
A First Look at Digital Rights Management Systems for Secure Mobile Content Delivery. 549-558 - Jawaher Alharbi, Adam P. Chester, Arshad Jhumka:

Towards Understanding Checkpointing in Transiently Powered IoT Networks. 559-568 - Alok Kumar Trivedi, Priyanka Bagade:

PANGA: Attention-based Principal Neighborhood Aggregation for Forecasting Future Cyber Attacks. 569-576 - Haoxiang Wang, Yu'ang Zhang, Yujie Song, Yue Cao, Chee Yen Leow, Shihan Bao:

SRBR: Anti-selfish Routing Based on Social Similarity and Reputation Using Fuzzy Logic. 577-584 - Orvila Sarker, Hong Shen, Muhammad Ali Babar:

Reinforcement Learning Based Neighbour Selection for VANET with Adaptive Trust Management. 585-594 - Javad Forough

, Monowar H. Bhuyan, Erik Elmroth:
Unified Identification of Anomalies on the Edge: A Hybrid Sequential PGM Approach. 595-604 - Yumeng Cheng, Wangyang Yu, Xiaojun Zhai, Fei Hao, Yuan Liu:

Grading and Calculation of Synchronic Distance in Petri Nets for Trustworthy Modeling and analyzing. 605-611 - Xuming Cen, Nan Hu, Haozhe Wang, Shiyi Liu:

Temporal-Aware Lightweight Visual Tracking Method for Dynamic Traffic Scenes. 612-619 - Hamdi Friji, Ioannis Mavromatis, Adrián Sánchez-Mompó, Pietro Carnelli, Alexis Olivereau, Aftab Khan:

Multi-stage Attack Detection and Prediction Using Graph Neural Networks: An IoT Feasibility Study. 620-627 - Tian Tian, Yiru Gong, Bo Jiang, Junrong Liu, Huamin Feng, Zhigang Lu:

Insider Threat Detection Based On Heterogeneous Graph Neural Network. 628-635 - Muwei Jian, Yue Jin, Rui Wang, Xiaoguang Li, Hui Yu

:
Inter-slice Correlation Weighted Fusion for Universal Lesion Detection. 636-643 - Liming Wang, Jiaxing Fan, Fengzhe Zhong, Yan Liu, Jinyang Liu:

Anomaly Detection in Dynamic Networks through Edge-Tight Structure Embedding. 644-651 - Hongyu Yang, Tao Zhang, Ze Hu, Liang Zhang, Xiang Cheng:

A DGA Domain Name Detection Method Based on Two-Stage Feature Reinforcement. 652-659 - Lingvue Su, Yongli Wang:

High-knowledge shilling attack detection method based on genetic co-forest. 660-667 - Wanshuang Lin, Chunhe Xia, Tianbo Wang, Chen Chen, Yuan Zhao, Weidong Zhou

:
REDA: Malicious Traffic Detection Based on Record Length and Frequency Domain Analysis. 668-675 - Huiran Yang, Jiaqi Kang, Yueyue Dai, Jiyan Sun, Yan Zhang, Huajun Cui, Can Ma:

LActDet: An Automatic Network Attack Activity Detection Framework for Multi-step Attacks. 676-685 - Wen Liu, Degang Sun, Haitian Yang, He Zhu, Yan Wang:

IAD-Net: Multivariate KPIs Interpretable Anomaly Detection with Dual Gated Residual Fusion Networks. 686-693 - Jingyu Liu, Chunfang Yang, Ma Zhu, Baojun Qi

, Xueyuan Fu, Mengyang Zhou:
MTD-RTPE: A Malicious Traffic Detection Method Based on Relative Time-Delay Positional Encoding. 694-703 - Andrés F. Murillo

, Ayoub Messous, Andikan Otung
, Motoyoshi Sekiya:
Towards Trust-Centric Networking: A General Model for Trust Evaluation. 704-711 - Hélio Borges, Daniel Andrade

, João Nuno Silva, Miguel Correia:
TrustGlass: Human-Computer Trusted Paths with Augmented Reality Smart Glasses. 712-721 - Jerzy Konorski:

Trustworthiness and Subversion in Large Service-Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection. 722-729 - Guangqi Liu, Jingqiang Lin, Dawei Chu, Xiaokun Zhang, Qiongxiao Wang, Cunqing Ma, Fengjun Li, Dingfeng Ye:

Enhanced Ticket Transparency (eTT) Framework for Single Sign-On Services with Pseudonyms. 730-739 - Ketong Shang, Fang Lu, Ke Huang, Yu Qin, Wei Li, Wei Feng:

Cluster Nodes Integrity Attestation and Monitoring Scheme for Confidential Computing Platform. 740-749 - Michael Eckel

, Anirban Basu, Satoshi Kai, Hervais Simo Fhom, Sinisa Dukanovic, Henk Birkholz, Shingo Hane, Matthias Lieske:
SCATMAN: A Framework for Enhancing Trustworthiness in Digital Supply Chains. 750-761 - Chenkai Shen, Lei Fan:

Pldb: Protecting LSM-based Key-Value Store using Trusted Execution Environment. 762-771 - Tian Hu, Shangyuan Zhuang, Jiyan Sun, Yinlong Liu, Wei Ma, Hongchao Wang:

A Cost-effective Automation Method of Massive Vulnerabilities Analysis and Remediation Based on Cloud Native. 772-779 - Shusuke Wani, Xiaokang Zhou, Shohei Shimizu

:
BiLSTM and VAE Enhanced Multi-Task Neural Network for Trust-Aware E-Commerce Product Analysis. 780-787 - Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:

TouchEnc: a Novel Behavioural Encoding Technique to Enable Computer Vision for Continuous Smartphone User Authentication. 788-795 - Haoling Fan, Fangyu Zheng, Jingqiang Lin, Lingjia Meng, Mingyu Wang, Qiang Wang, Shijie Jia, Yuan Ma:

Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software. 796-803 - Guangqi Liu, Qiongxiao Wang, Cunqing Ma, Jingqiang Lin, Yanduo Fu, Bingyu Li, Dingfeng Ye:

The Broken Verifying: Inspections at Verification Tools for Windows Code-Signing Signatures. 804-813 - Qinghua Hu, Chunxiang Xu, Wanpeng Li

:
A Broadband Subliminal Channel in Signatures Without Sharing the Signing Key. 814-822 - Ruizhong Du, Jing Cui, Mingyue Li, Yuqing Zhang:

CEIVS: A Scalable and Secure Encrypted Image Retrieval Scheme with Vertical Subspace Clustering. 823-832 - Jinzhao Wang

, Wenlong Tian, Ruixuan Li, Junwei Tang, Xuming Ye, Yaping Wan, Zhiyong Xu:
Sym-Fed: Unleashing the Power of Symmetric Encryption in Cross-Silo Federated Learning. 833-840 - Ruoyu Huang, Abdullah Aljuffri, Said Hamdioui, Kezheng Ma, Mottaqiallah Taouil:

Securing an Efficient Lightweight AES Accelerator. 841-848 - Fengling Pang, Chingfang Hsu, Man Ho Au, Lein Harn, Ze Zhang, Li Long:

Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments. 849-856 - Dominika Regéciová, Dusan Kolár:

GenRex: Leveraging Regular Expressions for Dynamic Malware Detection. 857-864 - Xuebin Ma, Shengyi Guan, Yanan Lang:

Differential Privacy Frequent Closed Itemset Mining over Data Stream. 865-872 - Weihong Zou, Shigeng Zhang, Weiping Wang, Jian Zhang, Xuan Liu:

MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack. 873-880 - Yang Hu, Jia Chen, Xin Luo:

UFADF: A Unified Feature Analysis and Detection Framework for Malicious Office Documents. 881-888 - Hongyu Yang, Youwei Wang, Liang Zhang, Ze Hu, Xiang Cheng, Laiwei Jiang:

EAMDM: An Evolved Android Malware Detection Method Using API Clustering. 889-895 - Zhiwen Ren, Zehua Ma, Weiming Zhang, Nenghai Yu:

SPSW: Database Watermarking Based on Fake Tuples and Sparse Priority Strategy. 896-903 - Wenlin Xu, Tong Li, Jinsong Wang, Haibo Duan, Yahui Tang:

Software Vulnerabilities Detection Based on a Pre-trained Language Model. 904-911 - Yuxi Li, Fucai Zhou, Jingjing Chen, Dong Ji:

Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme. 912-919 - Danping Li, Ziyuan Zhu, Jiao Shen, Yusha Zhang, Gang Shi, Dan Meng:

Flush+Revisit: A Cross-CCX Side-Channel Attack on AMD Processors. 920-928 - Fangwei Wang, Ruixin Song, Zhiyuan Tan, Qingru Li, Changguang Wang, Yong Yang:

Self-attention is What You Need to Fool a Speaker Recognition System. 929-936 - Huasong Zhou, Xiaowei Xu, Xiaodong Wang, Leon Bevan Bullock:

SATBA: An Invisible Backdoor Attack Based on Spatial Attention. 937-945 - Tao Leng, Yuedong Pan, Lixin Zhao, Aimin Yu, Ziyuan Zhu, Lijun Cai, Dan Meng:

MemInspect: Memory Forensics for investigating Fileless Attacks. 946-955 - Zhixuan Wang, Guangping Xu, Hongzhang Yang, Yulei Wu:

Towards Survivable In-Memory Stores with Parity Coded NVRAM. 956-963 - Yiping Teng, Jiawei Qi, Lei Liu, Shiqing Wang, Li Xu, Chunlong Fan:

Secure Synchronized Spatio-Temporal Trajectory Similarity Search. 964-973 - Zeshi Zhang, Guangping Xu, Hongzhang Yang, Yulei Wu:

Sparsity Aware of TF-IDF Matrix to Accelerate Oblivious Document Ranking and Retrieval. 974-981 - Lianpei Zhou, Xi Xiao, Guangwu Hu, Hao Li, Xiangbo Wu, Tao Zhou:

A lightweight and high-precision approach for bulky JavaScript engines fuzzing. 982-989 - Yongjian Guo

, Xi Xiao, Yuanyi Lin
, Hao Li, Xiangbo Wu, Tao Zhou:
Fuzz Testing for Rust Library Functions. 990-997 - Meiqi Wang, Muqian Chen, Zeyu Li, Xuebin Wang, Jinqiao Shi, Binxing Fang:

Deanonymize Tor Hidden Services Using Remote Website Fingerprinting. 998-1005 - Man Chen, Yuyue Chen, Zoe L. Jiang:

SIMD Bootstrapping in FHEW Scheme. 1006-1013 - Mingdi Xu, Bo Xie, Feng Cui, Chaoyang Jin, Yu Wang:

SQL injection attack sample generation based on IE-GAN. 1014-1021 - Xin Tang, Yiteng Zhou, Yudan Zhu, Mingjun Fu, Luchao Jin:

Random Chunks Generation Attack Resistant Cross-User Deduplication for Cloud Storage. 1022-1030 - Dawei Li, Di Liu

, Yangkun Ren, Ziyi Wang, Yu Sun, Zhenyu Guan, Qianhong Wu, Jianwei Liu:
FPHammer: A Device Identification Framework based on DRAM Fingerprinting. 1031-1040 - Patrick Kühtreiber, Viktoriya Pak, Delphine Reinhardt:

"A method like this would be overkill": Developers' Perceived Issues with Privacy-preserving Computation Methods. 1041-1048 - Benjamin Larsen

, Nada El Kassem, Thanassis Giannetsos
, Ioannis Krontiris, Stefanos Vasileiadis, Liqun Chen:
Achieving Higher Level of Assurance in Privacy Preserving Identity Wallets. 1049-1059 - Tassos Dimitriou, Khazam Alhamdan:

CENSOR: Privacy-preserving Obfuscation for Outsourcing SAT formulas. 1060-1067 - Wentao Hu, Hui Fang:

Decentralized Matrix Factorization with Heterogeneous Differential Privacy. 1068-1075 - Everton de Matos, Conor Lennon, Eduardo K. Viegas

, Markku Ahvenjärvi, Hannu Lyytinen, Ivan Kuznetsov, Joonas Onatsu, Anh Huy Bui:
Integrating VirtIO and QEMU on seL4 for Enhanced Devices Virtualization Support. 1076-1085 - Jianming Wu, Shuhong Chen, Guojun Wang, Hao Wang, Hanjun Li:

Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text. 1086-1093 - Anis Bkakria, Lydia Brika:

A Framework for Privacy Policy Enforcement for Connected Automotive Systems. 1094-1102 - Shengyang Luo, Yaqi Liu, Xuehu Yan, Chao Huang:

Cropping Resilient Secret Image Sharing Scheme with Lossless Recovery. 1103-1110 - De Li

, Tiange Xia, Qiyu Li, Xianxian Li, Jinyan Wang:
Robustness and Privacy for Green Learning under Noisy Labels. 1111-1118 - Yuting Yang, Lin Liu, Shaojing Fu, Jun-Jie Huang, Yuchuan Luo:

SecGAN: Honest-Majority Maliciously 3PC Framework for Privacy-Preserving Image Synthesis. 1119-1126 - Cong Zha, Yulei Wu, Zexun Jiang, Wenqian Zhao, Hao Yin:

BAA: A Novel Decentralized Authorization System for Privacy-Sensitive Medical Data. 1127-1136 - Romain Dagnas, Anis Bkakria, Reda Yaich:

Robustness Assessment of Biometric Authenticators. 1137-1146 - Emmanuel Kwarteng, Mumin Cebe:

MEDICALHARM - A Threat Modeling designed for Modern Medical Devices. 1147-1156 - Yuwei Xu, Zizhi Zhu, Yunpeng Bai, Lilanyi Wu, Kehui Song, Guang Cheng:

SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization. 1157-1164 - Mingjian Tang, Weiqi Wang, Chenhan Zhang, Shui Yu

:
RUE: Realising Unlearning from the Perspective of Economics. 1165-1172 - Liuxing Su, Zhenzhen Li, Gaopeng Gou, Zhen Li, Gang Xiong, Chengshang Hou:

MENDER: Multi-level Feature Fusion Discovery Framework for Exposed ICS Remote Management Devices in the Wild. 1173-1180 - Gaowei Zhang, Xu Zhou, Xiaobo Zhang:

Fine-Grained Task Scheduling Combining DDPG and Path Selection in LEO Satellite Networks. 1181-1186 - Wenbing Zou, Xiulei Liu, Shoulu Hou, Ye Zhang, Lin Miao, Yi Gong, Ning Li:

Affinity-Based Resource and Task Allocation in Edge Computing Systems. 1187-1195 - Gergely Tuskó, Weizhi Meng

, Brooke Lampe
:
Look Closer to Touch Behavior-enabled Android Pattern Locks: A Study in the Wild. 1196-1205 - Hualong Huang, Zhekai Duan, Wenhan Zhan, Yichen Liu, Zhi Wang, Zitian Zhao:

Distributed Dependent Task Offloading in CPU-GPU Heterogenous MEC: A Federated Reinforcement Learning Approach. 1206-1213 - Degang Sun, Guokun Xu, Weijie Wang

, Yan Wang, Qiujian Lv, Xinxing Zhou, Zhiqi Li:
LWVN: A Lightweight Virtual Network View Method to Defend Lateral Movement. 1214-1221 - Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:

Membership Inference Attacks against GNN-based Hardware Trojan Detection. 1222-1229 - Anastasia Pustozerova

, Jan Baumbach, Rudolf Mayer:
Analysing Utility Loss in Federated Learning with Differential Privacy. 1230-1235 - Sarah Binhulayyil

, Shancang Li:
Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model. 1236-1240 - Longfei Li, Xiaokang Yin, Xiao Li, Xiaoya Zhu

, Shengli Liu:
ConFunc: Enhanced Binary Function-Level Representation through Contrastive Learning. 1241-1248 - Ximing Li, Linghui Li, Xiaoyong Li, Binsi Cai, Bingyu Li:

TGCN-DA: A Temporal Graph Convolutional Network with Data Augmentation for High Accuracy Insider Threat Detection. 1249-1257 - Chen Chen, Chunhe Xia, Tianbo Wang, Wanshuang Lin, Yuan Zhao, Yang Li:

EFwork: An Efficient Framework for Constructing a Malware Knowledge Graph. 1258-1265 - Shuyu Chen, Dawei Lin, Zhenping Xie, Hongbo Wang:

Temporal-Gated Graph Neural Network with Graph Sampling for Multi-step Attack Detection. 1266-1271 - Badr Bellaj, Aafaf Ouaddah, Abdellatif Mezrioui, Noël Crespi, Emmanuel Bertin:

GBTrust: Leveraging Edge Attention in Graph Neural Networks for Trust Management in P2P Networks. 1272-1278 - Helen Milner

, Md. Redowan Mahmud, Mahbuba Afrin, Sashowta G. Siddhartha, Sajib Mistry
, Aneesh Krishna:
On-graph Machine Learning-based Fraud Detection in Ethereum Cryptocurrency Transactions. 1279-1285 - Zhongyuan Qin, Jiarong Fan, Zeru Li, Xujian Liu, Xin Sun:

CWGAN-GP: Fuzzing Testcase Generation Method based on Conditional Generative Adversarial Network. 1286-1293 - Kundu Chen, Jie Luo:

Pooling Under the Sun: A Mining Pool Centralized Revisit and Solution. 1294-1299 - Xu Yang

, Ao Wang, Qiuhao Wang, Saiyu Qi, Yong Qi:
A Practical and Privacy-Preserving Vehicular Data Sharing Framework by Using Blockchain. 1300-1305 - Jingxian Cheng

, Saiyu Qi, Yong Qi, Jianfeng Wang
, Qin Jiang, Di Wu:
EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases. 1306-1311 - Karolina Bak, Hannes Salin, Karol Niczyj, Lukasz Krzywiecki:

Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping. 1312-1317 - Hui Zhao, Xiaodong Zhang

, Jinshan Shi, Ru Li:
Referable NFT-based Revenue Allocation Mechanism in Data Marketplace. 1318-1323 - Awaneesh Kumar Yadav, Manoj Misra, An Braeken

, Madhusanka Liyanage
:
A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming. 1324-1331 - Diptendu Chatterjee, Prabal Banerjee, Subhra Mazumdar:

Chrisimos: A useful Proof-of-Work for finding Minimal Dominating Set of a graph. 1332-1339 - Xionghe Yu, Xiaolan Tang, Wenlong Chen:

Blockchain-based and Privacy-Preserving Data Collection for Vehicular Crowdsensing. 1340-1347 - Mina Alishahi, Wouter Leeuw, Nicola Zannone

:
BC-FL k-means: A Blockchain-based Framework for Federated Clustering. 1348-1354 - Sandeep Srivastava, Deepshikha Agarwal, Brijesh Kumar Chaurasia:

Secure Decentralized Identity Management using Blockchain. 1355-1360 - Shalitha Wijethilaka, Awaneesh Kumar Yadav, An Braeken

, Madhusanka Liyanage
:
A Novel Blockchain-based Decentralized Multi-party Certificate Management Framework. 1361-1368 - Pierre-Antoine Rault, Claudia-Lavinia Ignat, Olivier Perrin:

Access Control based on CRDTs for Collaborative Distributed Applications. 1369-1376 - Melker Veltman, Alexandra Parkegren, Victor Morel:

Putting a Padlock on Lambda - Integrating vTPMs into AWS Firecracker. 1377-1384 - Carlos Hernandez Gañán, Siôn Lloyd, Samaneh Tajalizadehkhoob:

Phish and Chips: Language-agnostic classification of unsolicited emails. 1385-1391 - Felix Clemens Gail, Roland Rieke

, Florian Fenzl, Christoph Krauß
:
Evaluation of Decision Tree-Based Rule Derivation for Intrusion Detection in Automotive Ethernet. 1392-1399 - Shahriar Saadat:

The Impact of EMI on Security Access Control in Datacenter Data Halls. 1400-1407 - Tong Gao, Xianhui Lu:

Physical Layer Secure Communication based on MIMO Channel Constellation Flipping. 1408-1415 - Haichuan Peng, Linning Peng, Hua Fu, Lingnan Xie, Junxian Shi, Wentao Jing:

Channel-Robust Radio Frequency Fingerprint Identification for LTE Devices with Hybrid Feature. 1416-1421 - Leonard Bradatsch, Oleksandr Miroshkin, Natasa Trkulja, Frank Kargl:

Zero Trust Score-based Network-level Access Control in Enterprise Networks. 1422-1429 - Abdul-Qadir Khan, Nouredine Tamani, Saad El Jaouhari, Lina Mroueh:

A Contextual Derivation Algorithm for Cybersecurity in IoT Environments. 1430-1435 - Samed Saka

, Ali Al-Ataby, Valerio Selis
:
Generating Synthetic Tabular Data for DDoS Detection Using Generative Models. 1436-1442 - Xingyu Wang, Wenkun, Yingdan Zhang:

Network Attack Identification and Analysis Based on Graph Convolutional Neural Network. 1443-1448 - Zexiao Zou

, Yan Zhang, Jin Chen, Jianyi Zhang, Zhiqiang Wang, Lei Ju, Ri Xu:
Be like a Chameleon: Protect Traffic Privacy with Mimicry. 1449-1454 - Shashwat Adhikari

, Hafizul Asad
, Kevin D. Jones:
Enhancing IoT Security: Novel Mechanisms for Malware Detection using HPCs and Neural Networks. 1455-1463 - Chundong Wang, Yongxin Zhao:

A Novel Approach for Trajectory Partition Privacy in Location-Based Services. 1464-1469 - Yevheniya Nosyk, Maciej Korczynski, Andrzej Duda

:
Guardians of DNS Integrity: A Remote Method for Identifying DNSSEC Validators Across the Internet. 1470-1479 - Yevheniya Nosyk, Maciej Korczynski, Carlos Hernandez Gañán, Michal Król, Qasim Lone, Andrzej Duda

:
Don't Get Hijacked: Prevalence, Mitigation, and Impact of Non-Secure DNS Dynamic Updates. 1480-1489 - João Afonso Vilalonga, João S. Resende

, Henrique Domingos:
TorKameleon: Improving Tor's Censorship Resistance with K-anonymization and Media-based Covert Channels. 1490-1495 - Paulo Roberto de Oliveira, Altair O. Santin, Pedro Horchulhack, Eduardo K. Viegas

, Everton de Matos:
A Dynamic Network-based Intrusion Detection Model for Industrial Control Systems. 1496-1501 - Syafiq Al Atiiq, Yachao Yuan, Christian Gehrmann, Jakob Sternby, Luis Barriga:

Attacks Against Mobility Prediction in 5G Networks. 1502-1511 - Jingwen Su, Xiangyu Bai, Kexin Zhou:

Analysis and Comparison of Delay Tolerant Network Security Issues and Solutions. 1512-1517 - Adam Spanier, Rui Zhao, Pei-Chi Huang:

Securing Zero Trust Networks: the Decentralized Host-to-Host Authentication Policy Enforcement. 1518-1523 - Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:

Protocol Aware Unsupervised Network Intrusion Detection System. 1524-1531 - Ayush Kumar, Vrizlynn L. L. Thing:

A Public Key Infrastructure for 5G Service-Based Architecture. 1532-1539 - Nikos Fotiou, Spiros Chadoulos

, Iordanis Koutsopoulos, Vasilios A. Siris, George C. Polyzos:
Access control for interoperable energy management systems using Verifiable Credentials. 1540-1545 - Weidong Zhou

, Tianbo Wang, Guotao Huang, Xiaopeng Liang, Chunhe Xia, Xiaojian Li:
HF-Mid: A Hybrid Framework of Network Intrusion Detection for Multi-type and Imbalanced Data. 1546-1553 - Shaswata Mitra, Stephen A. Torri, Sudip Mittal:

Survey of Malware Analysis through Control Flow Graph using Machine Learning. 1554-1561 - Sunanda Bose, Dusica Marijan:

Secure Traversable Event logging for Responsible Identification of Vertically Partitioned Health Data. 1562-1571 - Peter Ince, Xiapu Luo, Jiangshan Yu, Joseph K. Liu, Xiaoning Du:

MATH - Finding and Fixing Exploits in Algorand. 1572-1579 - Rui Zhao:

CamPass: a Secure Camera-based Password Manager for Kiosk Browsing. 1580-1585 - Kaiqi Lv, Weiguo Lin, Junfeng Xu, Wanshan Xu, Shuren Chen, Shengwei Yi:

Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake. 1586-1591 - Chenyu Dong, Peijia Zheng, Weiqi Luo

:
Keyword Spotting in the Homomorphic Encrypted Domain Using Convolution Decomposition. 1592-1597 - Prasasthy Balasubramanian, Justin Seby

, Panos Kostakos:
Semantic-Driven Focused Crawling Using LASER and FAISS: A Novel Approach for Threat Detection and Improved Information Retrieval. 1598-1605 - Daniel Grahn, Lingwei Chen, Junjie Zhang:

Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models. 1606-1613 - Xianxia Zou, Cenyu Zheng, Haodong Lin, Like Du, Weiwu Xu, Chong He:

A Fine-Grained Access Control Mechanism Based on Search Trees. 1614-1620 - Rudra Prasad Baksi, Vishwas Nalka, Shambhu J. Upadhyaya:

Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information. 1621-1630 - Kalam Khadka

, Abu Barkat Ullah
, Wanli Ma, Elisa Martínez Marroquín, Yibeltal Alem:
A Survey on the Principles of Persuasion as a Social Engineering Strategy in Phishing. 1631-1638 - Junwei Yu, Yepeng Ding

, Yuheng Guo
, Kentaro Kotani, Hiroyuki Sato:
Inj-Kyber: Enhancing CRYSTALS-Kyber with Information Injection within a Bio-KEM Framework. 1639-1644 - Roland Kromes, João Rodrigues, Duarte M. Nascimento, Gonçalo Cadete, François Verdier, Kaitai Liang:

A New Design for Self-Encryption. 1645-1652 - Mustafa A. Al Sibahee, Chengwen Luo, Jin Zhang, Yijing Huang, Zaid Ameen Abduljabbar

:
Dynamic Searchable Scheme with Forward Privacy for Encrypted Document Similarity. 1653-1660 - Himanshu Goyal, Krishna Kodali, Sudipta Saha:

LiPI: Lightweight Privacy-Preserving Data Aggregation in IoT. 1661-1666 - David Pineda Reyes, Josiah Hsu, Claire Wagner, Devin J. Pohly:

Dynamic Security Parameters for Multichannel Secret Sharing Protocols. 1667-1672 - Md. Ahsan Ayub, Ambareen Siraj, Bobby Filar, Maanak Gupta:

Static-RWArmor: A Static Analysis Approach for Prevention of Cryptographic Windows Ransomware. 1673-1680 - Kailu Guo

, Yang Xin, Tianxiang Yu:
Malware Detection Using Contrastive Learning Based on Multi-Feature Fusion. 1681-1686 - Yepeng Ding

, Hiroyuki Sato:
Model-Driven Security Analysis of Self-Sovereign Identity Systems. 1687-1694 - Pranitha Sanda, Digambar Pawar, Radha Vedala:

WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach. 1695-1703 - Alexandra Tidrea, Adrian Korodi:

ECC Implementation and Performance Evaluation for Securing OPC UA Communication. 1704-1711 - Vikash Kumar Rai, Somanath Tripathy, Jimson Mathew:

LPA: A Lightweight PUF-based Authentication Protocol for IoT System. 1712-1717 - Sara Ramezanian

, Christian Gehrmann:
Practical Privacy-Preserving Ride Sharing Protocol with Symmetric Key. 1718-1727 - Raghav Bhardwaj, Morteza Noferesti, Madeline Janecek, Naser Ezzati-Jivan:

EMD-SCS: A Dynamic Behavioral Approach for Early Malware Detection with Sonification of System Call Sequences. 1728-1737 - Michela Iezzi, Carsten Maple, Danilo A. Giannone:

On the Adoption of Homomorphic Encryption by Financial Institutions*. 1738-1743 - Jayanthi Ramamoorthy

, Narasimha K. Shashidhar, Bing Zhou:
Anomaly based malware threat detection on Linux Systems. 1744-1750 - Aidan Spalding, Zhiyuan Tan, Kehinde O. Babaagba:

Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. 1751-1756 - Reham Al Tamime, Ali Farooq

, Joni Salminen, Vincent Marmion, Wendy Hall:
Understanding Privacy Concerns in Mobile Health Applications: A Scenario-based Online Survey. 1757-1765 - David Halasz

, Suyash Shandilya, Barbora Buhnova:
Trustworthy Execution in Untrustworthy Autonomous Systems. 1766-1773 - Toru Nakamura, Yukiko Sawaya, Takamasa Isohara:

Survey on Recognition of Privacy Risk from Responding on Twitter. 1774-1780 - Ziyu Fei, Ying Li, Jiuqi Wei, Yufan Fu, Botao Peng, Xiaodong Li:

FlexAuth: A Decentralized Authorization System with Flexible Delegation. 1780-1797 - Kewei Guo, Xuefei Li:

A Trustworthiness Evaluation Mechanism Based on Beta Distribution Under Selected Conditions. 1781-1789 - Quan Shi, Kaiyuan Deng:

Privacy-Preserving Detection Method for Transmission Line Based on Edge Collaboration. 1798-1805 - Florian Platzer

, York Yannikos
:
Trust Assessment of a Darknet Marketplace. 1806-1813 - M. A. Hannan Bin Azhar, Zoltán Mészáros, Tasmina Islam, Soumya Kanti Manna

:
An Interactive Web Portal for Customised Telerehabilitation in Neurological Care. 1814-1821 - Brendan Black, Philip Perry, Joseph Rafferty, Claudia Cristina, Tom Bowman, Cathryn Peoples, Andrew Ennis, Andrew Reeves, Nektarios Georgalas, Adrian Moore, Bryan W. Scotney:

Matrix Platform: Empowering Smart Ports with Advanced Video Analytics for Enhanced Security, Safety, and Efficiency. 1822-1826 - Kairen Chen, Shuhong Chen, Guojun Wang, Chenchen Wang:

CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network. 1827-1834 - Bo Yang, Yanchao Zhang, Dong Tong:

DOPS: A Practical Dual Offline Payment Scheme of CBDC for Mobile Devices. 1835-1844 - Yinzhen Wei, Shuo Lu:

Android Malicious Application Detection Based on Improved Mayfly Algorithm. 1845-1852 - Mohd Anuaruddin Bin Ahmadon

, Shingo Yamaguchi, Alireza Jolfaei
:
Game Theory-Based Trade-Off Analysis for Privacy and Openness in Decision Making by Controlling Quantity of Information. 1853-1858 - Erika A. Leal, Binlin Cheng, TuQuynh Nguyen, Alfredo Gutierrez Garcia, Nathan Cabero, Jiang Ming:

Leveraging Hardware Performance Counters for Efficient Classification of Binary Packers. 1859-1864 - Nektarios Georgalas, Andrew Ennis, Cathryn Peoples, Joseph Rafferty, Philip Perry, Claudia Cristina, Brendan Black, Adrian Moore, Tom Bowman, Bryan W. Scotney, Andrew Reeves:

IoT Device Lifecycle Management. 1865-1870 - Brendan Black, Joseph Rafferty, José A. Santos

, Andrew Ennis:
UAV Bluetooth Communication Link Assessment for Emergency Response Applications. 1871-1878 - Sanjiv S. Jha

, Simon Mayer, Kimberly García
:
Actionable Contextual Explanations for Cyber-Physical Systems. 1879-1886 - Tom Bowman, Nektarios Georgalas, Andrew Reeves, Andrew Ennis, Cathryn Peoples, Brendan Black, Fadi El-Moussa, Adrian Moore:

Proactive Device Management for the Internet of Things. 1887-1892 - Kristaps Jurkans

, Charles Fox:
Python Subset to Digital Logic Dataflow Compiler for Robots and IoT. 1893-1899 - Imran Makhdoom, Mehran Abolhasan, Justin Lipman

, Daniel Robert Franklin
, Massimo Piccardi
:
I2Map: IoT Device Attestation Using Integrity Map. 1900-1907 - Can Aknesil, Elena Dubrova, Niklas Lindskog

, Håkan Englund:
A Near-Field EM Sensor Implemented in FPGA Configurable Fabric. 1908-1913 - Talal Halabi:

Stealthy Rootkits vs Low-Power IoT Devices: A Process-level Colonel Blotto Game. 1914-1918 - Jiantao Qu, Chunyu Qi, Gaoyun An, He:

Multi-step Prediction of LTE-R Communication Quality based on CA-TCN and Differential Evolution. 1919-1924 - Talaya Farasat, Muhammad Ahmad Rathore, Akmal Khan, Jongwon Kim, Joachim Posegga:

Machine Learning-based BGP Traffic Prediction. 1925-1934 - Martin Macák, Radek Oslejsek, Barbora Buhnova:

Detecting Masquerading Traitors from Process Visualization of Computer Usage. 1935-1940 - Piyush Bajaj, Matthew Edwards

:
Automatic Scam-Baiting Using ChatGPT. 1941-1946 - Zeyi Li

, Ze Zhang, Mengyi Fu, Pan Wang:
A novel network flow feature scaling method based on cloud-edge collaboration. 1947-1953 - Juliano Pimentel

, Alistair A. McEwan, Hong Qing Yu:
A Comprehensive Machine Learning Methodology for Embedded Systems PHM. 1954-1959 - Qaizar Bamboat, Hong Qing Yu:

Literature Study on Bias and Fairness in Machine Learning Systems. 1960-1965 - Haonan Wang, Lixiang Liu, Xin Zhou, Lexi Xu, Guangyang Wu, Shuaijun Liu:

Deep Reinforcement Learning Based Interference Avoidance Beam-Hopping Allocation Algorithm in Multi-beam Satellite Systems. 1966-1973 - Hao Wang, Yun Liu, Zhiqun Song, Bing Hu, Zikai Wang, Ruiliang Song, Pei Xiao:

A Low Complexity And Efficient Algorithm for LEO Satellite Routing. 1974-1979 - Wenli Yan, Shuaijun Liu, Lixiang Liu:

Multiple Chord Distance Regression Algorithm to Judge Constellations Without Prior Information. 1980-1985 - Jifeng Liu, Yao Zhou, Cheng Wang, Yingnan Liu, Fuchang Li:

Simulation of Space-borne Digital Phased Array Anntenna. 1986-1990 - Xiang Gao, Jiangyin Fu, Xiujuan Yao, Yi Yan:

Optimization Method for LEO Constellation Frequency Compatibility Simulation Parameters. 1991-1992 - Yuqian Cai, Cheng Wang, Xiaoqian Wang, Xiaoyan Zhao, Weidong Wang:

Coexistence Analysis Between the Large-scale IMT systems and LEO Satellite communication systems. 1993-1998 - Xiaoqian Wang, Cheng Wang, Yuqian Cai, Xiaoyan Zhao, Weidong Wang:

Coexistence Analysis of 10-10.5 GHz IMT and EESS (passive) Systems. 1999-2004 - Lin Lin, Bin Zhu, Zelin Wang, Guangquan Wang, Kaichu Xing:

Service-Driven Shared QoS Orchestration for Satellite-Ground Integrated Networks. 2005-2011 - Shoufeng Wang, Hua-Min Chen, Ye Ouyang, Fan Li, Xuan Chen, Jianchao Guo, Yun Li, Sen Bian, Xidong Wang, Zhidong Ren:

Constellation Autonomy Modeling for Agile on-Orbit Communication and Computing. 2012-2017 - Mozina Afzal, Kamran Ali, Mumraiz Khan Kasi, Masood Ur Rehman, Mohammad Ali Khoshkholghi, Bushra Haq, Syed Ahmed Shah:

Analyzing Land Cover and Land Use Changes Using Remote Sensing Techniques: A Temporal Analysis of Climate Change Detection with Google Earth Engine. 2018-2023 - Jie Ren, Lin Lin, Miao Xue, Zelin Wang:

Application Scenarios of Confidential Computing in Satellite Internet. 2024-2029 - Zhen Guo, Pengzhou Zhang, Lexi Xu, Peng Liang, Shuwei Yao:

Design and Implementation of Digital Consulting Capability Platform based on Knowledge Sharing. 2030-2035 - Jinhu Shen, Rui Wang, Mingjie Yang, Liang Cui, Ao Shen, Bao Guo, Jiayu Li, Yuan Fang, Pengcheng Liu, Jimin Ling:

RedCap In-depth Research and Market Development Prospect. 2036-2041 - Bin Yang, Jing Liang, Yubin Chen, Ying Xing, Wei Gao, Yue Wang, Lexi Xu, Xinzhou Cheng:

Research on Interpretable Customer Churn Prediction Based on Attention Mechanism. 2042-2047 - Bao Guo, Lufei Zhang, Jinge Guo, Jinhu Shen, Shumin Jiang, Pengcheng Liu:

Method for Dual-path Upgrade in a Leaked Signal Indoor Distribution System in 5G Network. 2048-2051 - Peng Wu, Chengzhuo Han, Tao Yan, Lu Chen, Tianhao Guo, Zhi Li:

SSF-EDZL Scheduling Algorithm on Heterogeneous Multiprocessors. 2052-2057 - Shoufeng Wang, Hua-Min Chen, Ye Ouyang, Fan Li, Xuan Chen, Limeng Ma, Zhanwu Li, Sen Bian, Zhidong Ren:

Evaluation of Distributed Collaborative Learning Approach for 5G Network Data Analytics Function. 2058-2063 - Dongyue Zhang, Sai Han, Zelin Wang, Jingwei Wang, Guangquan Wang, Jieyan Yang:

Research on Cross-Layer Alarm Association in 5G Core Network. 2064-2069 - Ao Li, Sai Han, Zelin Wang, Guangquan Wang, Zhi Qiao, Songtao Ni:

The Research and Implementation of Optical Cable Fault Location Method Based on Navigation. 2070-2075 - Yue Wang, Wei Gao, Xinzhou Cheng, Xin Wang, Lexi Xu, Siwei Wang, Yuanguang Wang, Fanyu Meng, Kunyan Li:

User Relationship Discovery Based on Telecom Data. 2076-2081 - Liu Na, Rui Yang, Zhicheng Zang, Yu Wang, Chao Wu, Xiaofei Li, Zhendong Li, Meng Li:

A Big Data Sharing Architecture Based on Federal Learning in State Grid. 2082-2086 - Pengwei Ma, Chaolun Wang:

Research on the Construction of Information System Stability Guarantee Capability. 2087-2091 - Chaolun Wang, Jiaxing Yang, Xiaolu Han, Jianrui Ma, Siyuan Liu, Pengwei Ma:

Research on Distributed Database Stability Testing Platform based on Chaos Engineering. 2092-2097 - Yue Wang, Wei Gao, Xinzhou Cheng, Xin Wang, Huiying Zhao, Zhipu Xie, Lexi Xu:

Multi-Granularity Cross-Attention Network for Visual Question Answering. 2098-2103 - Jie Gao, Tianyi Wang, Yuhui Han, Lixia Liu, Xingwei Zhang, Lexi Xu, Yang Wu, Zijing Yang, Chen Cheng:

An Analysis Strategy of Abnormal Subscriber Warning Based on Federated Learning Technology. 2104-2109 - Yuwen Hou, Song Wu, Mingde Huo:

Medical Image Recognition Technology Based On Fusion Of Faster-RCNN And SSD. 2110-2114 - Ying Xing, Mengci Zhao, Bin Yang, Yuwei Zhang

, Wenjin Li, Jiawei Gu, Jun Yuan, Lexi Xu:
Vulnerability Name Prediction Based on Enhanced Multi-Source Domain Adaptation. 2115-2121 - Zhaoning Wang, Jiajia Zhu, Bo Cheng, Xinzhou Cheng, Feibi Lyu, Guoping Xu, Jinjian Qiao, Lu Zhi, Tian Xiao:

An AI-driven Dockerized Lightweight Framework for Smart Home Service Orchestration. 2122-2127 - Feibi Lyu, Ning Meng, Yuhui Han, Jinjian Qiao, Zhipu Xie, Xinzhou Cheng, Lexi Xu, Zhaoning Wang, Guoping Xu:

Proactive Operation and Maintenance for 5G Networks Based on Complaint Prediction. 2128-2133 - Geng Tian, Amir Rehman

, Huanlai Xing, Li Feng
, Nighat Gulzar, Abid Hussain:
Automatic Intelligent Chronic Kidney Disease Detection in Healthcare 5.0. 2134-2140 - Yang Cheng, Kai Wei, Yihui Zhang, Chunyu Jiang, Weiwei Pang, Qi Zhang, Bin Liu, Lifeng Zhang, Tingting Liu, Yinqian Wu:

TrustedBench: An Efficient and User-friendly Distributed Performance Testing Tool for Blockchain System. 2141-2146 - Bohuan Ai, Yufei Li, Wenda Ma, Mengyuan Qiu, Miao Liu:

Assessing the Value of Data Assets: An Exploratory Study of Valuation Methods. 2147-2151 - Fanqiang Meng, Jian Wang, Boxiong Li:

A Cooperative Lane Change Method for Connected and Automated Vehicles Based on Reinforcement Learning. 2152-2157 - Heng Zhang, Bing Yan, Yunpeng Li, Lexi Xu, Xinzhou Cheng, Lijuan Cao, Kun Chao, Wei Xia, Qinqin Yu:

Research on Enterprises Growth for Industries in Post-Epidemic Era. 2158-2163 - Yunlu Yang, Miaoqiong Wang, Yuming Ge, Rundong Yu:

Research on Data Security for Vehicle-Infrastructure-Cloud Integration. 2164-2169 - Zheng Yin, Shengwen Zhou, Jingjing Zhou, Minghui Tian, Musen Lin, Sida Liu:

Research on DataOps Capability - Practice and Development. 2170-2174 - Kun Chao, Zhen Xing, Xinzhou Cheng, Jian Guan, Lexi Xu, Xiqing Liu, Yuwei Jia, Lijuan Cao:

Research on Operation Evolution of 5G Non-Public Network. 2175-2180 - Jinjian Qiao, Guoping Xu, Ning Meng, Feibi Lyu, Xinzhou Cheng, Jiajia Zhu, Lexi Xu, Liang Liu:

Research on Diagnosis System of 5G Data Service Latency Problem. 2181-2186 - Weiwei Pang, Kai Wei, Yihui Zhang, Chunyu Jiang, Yang Cheng, Qi Zhang, Bin Liu, Lifeng Zhang, Tingting Liu, Yinqian Wu:

Research on Assessment System for Blockchain. 2187-2192 - Shu Yan, Sirui Zhang, Ailin Lv, Bo Yuan, Kai Wei:

Development Situation and Suggestions of Data Elements in China. 2193-2197 - Yanmei Liu, Pengwei Ma, Jiafeng Tian:

Research on Technology and Industry Situation of Lakehouse. 2198-2203 - Qingyuan Hu, Zheng Yin, Tao Tao, Jibin Wang, Zhuo Chen, Bohuan Ai, Yu Liu, Chongzhou Liu:

Research on Technologies in Data Fabric. 2204-2209 - Jiafeng Tian, Pengwei Ma, Chaolun Wang, Zhuo Wang:

Research on Development of Data Disaster Recovery System. 2210-2215 - Abdullahi Chowdhury

, Mohammad Manzurul Islam
, Shahriar Kaisar
, Mahbub E. Khoda, Ranesh Naha
, Mohammad Ali Khoshkholghi, Mahdi Aiash:
Leveraging Oversampling Techniques in Machine Learning Models for Multi-class Malware Detection in Smart Home Applications. 2216-2221 - Yi Yue

, Zhiyan Zhang, Chang Cao, Xiongyan Tang, Wencong Yang, Feile Li:
EasyOrchestrator: A Dynamic QoS-Aware Service Orchestration Platform for 6G Network. 2222-2227 - Chen Cheng, Xinzhou Cheng, Jinyou Dai, Xu Xia, Bin Yang, Feibi Lyu, Jie Gao, Wei Zhang, Tian Xiao, Tianyi Wang:

A Novel Algorithm and System of Customer Value Evaluation based on Telecom Operator Big Data. 2228-2233 - Lexi Xu, Junsheng Zhao, Hong Zhu, Mingde Huo, Xinzhou Cheng, Kun Chao, Jie Li, Jian Guan, Xiqing Liu, Jie Gao:

5G/5G-A Private Network: Construction, Operation and Applications. 2234-2239 - Shoufeng Wang, Hua-Min Chen, Ye Ouyang, Fan Li, Xuan Chen, Jianchao Guo, Yun Li, Sen Bian, Xidong Wang, You Lu:

Elastic Digital Twin Network Modeling toward Restraining Resource Occupation. 2240-2245 - Anyan Xiao, Zhuo Yan, Zheng Li, Huangxin Xu, Huixuan Zheng, Yujie Ai, Xiaocong Zhang, Qixuan Sun, Changyu Zhao:

An Improved Lightweight Linear K-value Transformer. 2246-2250 - Zijing Yang, Lexi Xu, Jie Gao, Jie Li, Yang Wu, Xinzhou Cheng:

FedQuant: Stock Prediction with Muti-Party Technical Indicators using Federated Learning Method in Quantitative Trading. 2251-2256 - Changyu Zhao, Zhuo Yan, Huangxin Xu, Xueliang Chen, Zheng Li, Xinyu Zhong, Cuiwei Liu, Anyan Xiao, Xingyan Lv:

Design and Implementation of Mask Detection System Based on Improved YOLOv5s. 2257-2262 - Tianyi Wang, Yuhui Han, Wei Zhang, Xinzhou Cheng, Jie Gao, Qingqing Zhang, Qijiao Yang, Fengqiang Chen, Chen Cheng:

Address Localization Method Based on Data Fusion of Core Network and Radio Access Network. 2263-2268 - Chao Guo, Buxin Guo

, Tingting Zhu, Peihe Liu, Cheng Gong:
FLEvaluate: Robust Federated Learning Based on Trust Evaluate. 2269-2274 - Bao Guo, Jinge Guo, Lufei Zhang, Yuan Fang, Yingtao Meng, Jiayu Li:

A Novel Uplink Coverage and Capacity Enhancement Scheme in NR TDD Network. 2275-2279 - Runsha Dong, Xiaodong Cao, Chao Wang, Zhaoyang Sun, Lexi Xu, Xin He, Yang Wu:

Smart Campus Construction based on Telecom Operators Big Data. 2280-2285 - Minjuan Zhang, Chase Q. Wu, Aiqin Hou:

Ensemble Learning Models for Large-Scale Time Series Forecasting in Supply Chain. 2286-2294 - Nhu Minh Ngoc Pham, Yixi Wu, Carson K. Leung, Mohammadafaz V. Munshi, Vrushil Kiritkumar Patel, Connor C. J. Hryhoruk:

A Big Data Science and Engineering Solution for Transit Performance Analytics. 2295-2302 - Mohammad Shahzad, Lu Liu, Nacer Edine Belkout:

Control Overhead Reduction using Length-based Same Destination Aggregation for Large Scale Software Defined Networks in Next Generation Internet of Things. 2303-2309 - Sheng Yang, Guan-Ju Peng

:
Optimizing Quantum Reversible Circuits Using Reinforcement Learning. 2310-2314 - Madathodika Asna, Hussain Shareef, Achikkulath Prasanthi:

Quantum Inspired Binary Atom Search Optimization Algorithm for Charging Station Placement Problem. 2315-2322 - Jinhua Du

, Hao Yin:
KrNER: A Novel Named Entity Recognition Method Based on Knowledge Enhancement and Remote Supervision. 2323-2332 - Jinhua Du

, Hao Yin:
KLDP: A Data Profiling Technique Based on Knowledge Graph and Large Language Modeling. 2333-2340 - Joseph Attieh, Joe Tekli:

Fast Text Classification using Lean Gradient Descent Feed Forward Neural Network for Category Feature Augmentation. 2341-2348 - Víctor Pérez-Piqueras, Pablo Bermejo, José A. Gámez:

Hybrid Multi-Objective Relinked GRASP for the constrained Next Release Problem. 2349-2356 - Rafael Cabral de Moura, Lucia Catabriga:

Stabilized Finite Element Approximation for The Transient Darcy-Brinkman-Forchheimer Model. 2357-2364 - Lochana Telugu Rajesh, Tapadhir Das, Raj Mani Shukla, Shamik Sengupta:

Give and Take: Federated Transfer Learning for Industrial IoT Network Intrusion Detection. 2365-2371 - Sankalp Vyas, Amar Nath Patra, Raj Mani Shukla:

Histopathological Image Classification and Vulnerability Analysis using Federated Learning. 2372-2377 - Filip Krakowski, Fabian Ruhland, Michael Schöttner:

High-Performance Object Serialization based on Ahead-of-Time Schema Generation. 2378-2385 - Halvin Yang, Xiao Lin

, Kai-Kit Wong, Yizhe Zhao:
Fast Fluid Antenna Multiple Access With Path Loss Consideration and Different Antenna Architecture. 2386-2393 - Adhban Farea, Moaaz Munir, Rahat Ullah, Michal Otreba, Sean Carroll, Joe Harrington:

Comparison of the Barriers to BIM Adoption and Digital Transformation within the Construction Industry of Pakistan and Ireland. 2394-2399 - Alonso Rodríguez-Iglesias, María J. Martín, Juan Touriño

:
Clupiter: a Raspberry Pi mini-supercomputer for educational purposes. 2400-2405 - Fabian Ruhland, Filip Krakowski, Michael Schöttner:

Transparent network acceleration for big data computing in Java. 2406-2413 - Jen-Chieh Yang, Hung-I Lin, Lin-Jing Kuo, Sheng-De Wang:

MOFP: Multi-Objective Filter Pruning for Deep Learning Models. 2414-2423 - Chang-Hsuan Hsieh, Jen-Chieh Yang, Hung-Yi Lin, Lin-Jing Kuo, Sheng-De Wang:

A Hybrid Filter Pruning Method Based on Linear Region Analysis. 2424-2431 - Peng-Yu Chen, Jen-Chieh Yang, Sheng-De Wang:

Soft Hybrid Filter Pruning using a Dual Ranking Approach. 2432-2439 - Sheetal Harris

, Jinshuo Liu, Hassan Jalil Hadi, Yue Cao:
Ax-to-Grind Urdu: Benchmark Dataset for Urdu Fake News Detection. 2440-2447 - Zhipeng Yuan, Nasamu Musa, Katarzyna Dybal, Matthew Back

, Daniel Leybourne, Po Yang:
Quantifying Nematodes through Images: Datasets, Models, and Baselines of Deep Learning. 2448-2455 - Louis Fortune Sahi, Romain Laborde, Mohamed Ali Kandi, Michelle Sibilla, Giorgia Macilotti, Benzekri Abdelmalek, Afonso Ferreira:

Towards Reliable Collaborative Data Processing Ecosystems: Survey on Data Quality Criteria. 2456-2464 - Haohan Zhu, Andrea Staino, Biswajit Basu:

Railway Traffic Signal Recognition System based on Spatio-Temporal Features. 2465-2471 - Arghya Kundu, Uyen Trang Nguyen:

A Large-scale Non-standard English Database and Transformer-based Translation System. 2472-2479 - Jonathan Bishop, Ashu M. G. Solo:

Increasing user seduction in e-commerce community interaction using the participation continuum. 2480-2487 - Bozheng Pang, Tim Claeys

, Kristof T'Jonck, Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens
:
Simulation for Trade-off between Interference and Performance in a Bluetooth Low Energy Network. 2488-2494 - Bozheng Pang, Jens Vankeirsbilck, Hans Hallez, Jeroen Boydens

:
Experimental Validation of Common Assumptions in Bluetooth Low Energy Interference Studies. 2495-2502 - Amaury Saint-Jore, Ye-Qiong Song, Laurent Ciarletta:

HMAS: enabling seamless collaboration between drones, quadruped robots, and human operators with efficient spatial awareness. 2503-2510 - Takumi Onozawa, Hiroshi Fujimoto, Takuya Azumi:

Model-based Development for ROS 2-based Autonomous-driving Software. 2511-2519 - Yuta Tajima, Tatsuya Miki, Takuya Azumi:

Performance Evaluation Framework for Arbitrary Nodes of Autonomous-driving Systems. 2520-2529 - Hassan Jalil Hadi, Khurram Shahzad, Naveed Ahmed, Yue Cao, Yasir Javed:

A Scalable Pattern Matching Implementation on Hardware using Data Level Parallelism. 2530-2537 - Naoki Nagamatsu, Yuko Hara-Azumi:

Dynamic Split Computing-Aware Mixed-Precision Quantization for Efficient Deep Edge Intelligence. 2538-2545 - Shashank Hegde, Deepak Munagala, Aditya Singhania, Benjamin Reed

:
A Mobile-First Disconnected Data Distribution Network. 2546-2553 - Merlin Kasirajan, M. A. Hannan Bin Azhar, Scott Turner:

Trustworthy Insights: A Novel Multi-Tier Explainable Framework for Ambient Assisted Living. 2554-2561 - Stephen Donchez, Xiaofang Wang:

Dynamic Scheduling of AES Cores for Aperiodic Tasks on Multi-tenant Cloud FPGAs. 2562-2569 - Ritesh Ratti, Sanasam Ranbir Singh, Sukumar Nandi:

Network based Intrusion Detection using Time aware LSTM Autoencoder. 2570-2578 - Hocine Boukhedouma, Abdelkrim Meziane, Slimane Hammoudi, Amel Benna, Allel Hadjali:

Towards a Context-based Mobility Prediction in Smart Cities: First Experimentations. 2579-2586 - Zhou Zhou, Yonggui Han, Mohammad Shojafar, Zhongsheng Wang, Jemal H. Abawajy:

A reliable edge server placement strategy based on DDPG in the Internet of Vehicles. 2587-2594 - Malak Alqulaity, Po Yang:

Tabular Generative Adversarial Networks with an Enhanced Sampling Approach for High-Quality Cardiovascular Disease Dataset Generation. 2595-2600 - Muhammad Senoyodha Brennaf, Po Yang, Vitaveska Lanfranchi

:
A Comparative Analysis of Federated Learning Techniques on On-Demand Platforms in Supporting Modern Web Browser Applications. 2601-2606 - Shifeng Li, Ruoling Peng, Po Yang, Yun Yang:

A Deep Learning Model for Mobility Change Prediction Based on National Prevention and Control Policy. 2607-2614 - Muyao Peng, Kun Wang, Yueli Wen:

Pollutant Concentration Prediction Based on the Optimization of Long-Short Distance in Space. 2615-2620 - Jinning Wang, Xinyuan Huang, Zichu Yang

, Weiran Zhao:
Construction of Artificial Intelligence Generated Content in Digital Film Production. 2621-2628 - Qi Li, Xinqi Shen, Zhongkai Cheng, Yu Liu:

Design and Implementation of Intelligent Pet Feeding System. 2629-2635 - Jorge López, Charalampos Chatzinakis, Marc Cartigny, Claude Poletti:

Software defined networking flow admission and routing under minimal security constraints. 2636-2643 - Qi Wen, Carson K. Leung, Adam G. M. Pazdor:

Personalized Privacy-Preserving Semi-Centralized Recommendation System in a Trust-Based Agent Network. 2644-2651 - Zheng Yang, Degang Sun, Yan Wang, Xinbo Han

, Chen Meng, Weiqing Huang:
DTrap: A cyberattack-defense confrontation technique based on Moving Target Defense. 2652-2659 - Abdullah Alhajri, Arshad Jhumka:

Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS. 2660-2667 - Zhenan Xu, Jiuzheng Wang, Cong Zha, Xinyi Li, Hao Yin:

SmartLLM: A New Oracle System for Smart Contracts Calling Large Language Models. 2668-2675 - Md Abrar Hamim, F. M. Tanmoy, Umme Fatema Tuj Asha, Md Nazmul Haq, Maruf Alam, Bijoy Ghosh:

Lung Cancer Detection using Machine Learning Approach. 2676-2682 - Euihyeon Choi, Jooyoung Kim, Wonkyung Lee:

Rethinking Evaluation Metric for Probability Estimation Models Using Esports Data. 2683-2689 - Tingting Wu, Wei Yu, Manxue Guo, Wenjing Nie, Zimeng Jia, Lun Xin:

Communication Efficient Federated Learning Based on Combination of Structural Sparsification and Hybrid Quantization Sensing. 2690-2697 - Lingfeng Zhang, Yuheng Guo

, Yepeng Ding
, Hiroyuki Sato:
1-D CNN-Based Online Signature Verification with Federated Learning. 2698-2705 - Asmaa Shati

, Ghulam Mubashar Hassan
, Amitava Datta
:
COVID-19 Detection System: A Comparative Analysis of System Performance Based on Acoustic Features of Cough Audio Signals. 2706-2713 - Xiaohui Li, Yunpei Chen, Hong Wang, Shuran Sheng:

R-SACE: RIS-Enabled Sensing-Aided Communication Enhancement in ISAC Systems. 2714-2719 - Nassim Mokhtari

, Mohamed Outlouhou, Alexis Nédélec, Pierre De Loor:
Deep learning for graph analysis: application to online human activity recognition. 2720-2726 - Vinicius Camargo Andrade, Sheila S. Reinehr, Cinthia O. A. Freitas, Andreia Malucelli:

Personal Data Privacy in Software Development Processes: A Practitioner's Point of View. 2727-2734 - Yuxiang Zhou, Xin Kang, Fuji Ren, Satoshi Nakagawa, Xiao Shan:

DEU-Net: Dual Encoder U-Net for 3D Medical Image Segmentation. 2735-2741 - Huazheng Pan, Kun Yu, Junyi Le, Wenxin Hu, Taojun Jin:

Unlocking the Potentials of Transcriptomics in Predicting Pan Cancer Immune Therapy Response: A Deep Learning Approach Using PHZNet. 2742-2748 - Luyue Kong, Shu Zhang, Jinbao Li, Song Liu:

An Instruction Inference Graph Optimal Transport Network Model For Biomedical Commonsense Question Answering. 2749-2754 - Bowen Sun, Xin Peng, Saisai Li, Jiaxin Sun, Haochuan Tian:

Ergonomic Design of Precise Percutaneous Robot for Substantial Organs Based on JACK Simulation. 2755-2762 - Yihong Zhu, Xiaoliang Chen, Junsen Fu, Yajun Du:

A novel semantic dependency and aspect interaction graph convolutional network for aspect-level sentiment analysis. 2763-2769 - Xiuyi Luo, Chongrui Lu, Siyi Ouyang, Siyu Xia:

Performance Evaluation of Flight Energy Consumption of UAVs in IRS-assisted UAV Systems. 2770-2775 - Wanying Song, Ying Lu, Jin Liu, Zilu Qin, Xiaodan Wang, Yanfang Fu:

Research on UAV Obstacle Avoidance Method Based on Virtual-real Combination Technology. 2776-2780 - Cheng Tian, Song Liu, Jinbao Li, Guangchen Wang, Luyue Kong:

A residual attention-based privacy-preserving biometrics model of transcriptome prediction from genome. 2781-2788 - Qi Guo, Binjiang Hu, Zeqi Hong, Yanjun Zhao, Shuyong Li, Liang Tu:

Designing and Implementing Communication-efficient Model of Distributed System for Real-time Electromagnetic Transient Simulation. 2789-2796 - Luyue Kong, Ling Gong, Guangchen Wang, Song Liu:

DP-ProtoNet: An interpretable dual path prototype network for medical image diagnosis. 2797-2804

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














