Abstract is missing.
- Privacy-Preserving and Scalable Data Access Control Based on Self-sovereign Identity Management in Large-Scale Cloud StorageMin Xiao, Zhongyue Ma, Tao Li. 1-18 [doi]
- Attention Mechanism Based Adversarial Attack Against Deep Reinforcement LearningJinyin Chen, Xueke Wang, Yan Zhang, Haibin Zheng, Shouling Ji. 19-43 [doi]
- Attribute-Based Searchable Encryption Scheme with Fuzzy KeywordsXinyu Song, Zhan Zhou, Weijie Duan, Zhongyi Liu, Chungen Xu. 44-61 [doi]
- Improving Deep Neural Network Robustness with Siamese Empowered Adversarial TrainingYu Zhu, Zongfei Li, Fengyuan Xu, Sheng Zhong. 62-75 [doi]
- Predicting Advanced Persistent Threats for IoT Systems Based on Federated LearningZitong Li, Xiang Cheng 0004, Jiale Zhang, Bing Chen. 76-89 [doi]
- DFspliter: Data Flow Oriented Program Partitioning Against Data Stitching AttacksChenyu Zhao, Hao Han. 90-103 [doi]
- Revisiting Attacks and Defenses in Connected and Autonomous VehiclesZiyan Fang, Weijun Zhang, Zongfei Li, Huaao Tang, Hao Han, Fengyuan Xu. 104-117 [doi]
- An Improved Cryptanalysis Algorithm for Chebyshev Map-Based Discrete Logarithm ProblemWei Peng 0005, Shang Song, Wenzheng Liu. 118-130 [doi]
- Reinforcement-Learning Based Network Intrusion Detection with Human Interaction in the LoopZe Liu. 131-144 [doi]
- Research on Security of Access Control for Cloud Computing EnvironmentZhengdong Cui, Feng Xu. 145-158 [doi]
- Research and Development of Privacy Protection of WSN Routing ProtocolPanfei Liu, Feng Xu, Ying Zhu. 159-172 [doi]
- Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection SystemsVincent C. Hu. 173-187 [doi]
- A Semi-supervised Intrusion Detection Algorithm Based on Auto-encoderXiangtong Du, Yongzhong Li, Zunlei Feng. 188-199 [doi]
- Research on Arm TrustZone and Understanding the Security Vulnerability in Its Cache ArchitecturePengfei Guo, Yingjian Yan, Chunsheng Zhu, Junjie Wang. 200-213 [doi]
- Scrutinizing Trust and Transparency in Cash on Delivery SystemsHa Xuan Son, Hai Trieu Le, Tan Tai Phan, Hung Nguyen Duc Huy, Hong Khanh Vo, Nghia Duong-Trung. 214-227 [doi]
- Expansion Adaptation of Attack-Aware Controller-Link-Switch Cost Minimization Placement in Software-Defined NetworkingCheng Chi Qin, Tan Saw Chin, Ching Kwang Lee, Zulfadzli Yusoff, Rizaluddin Kaspin. 228-240 [doi]
- A Weighted Federated Averaging Framework to Reduce the Negative Influence from the Dishonest UsersFengpan Zhao, Yan Huang, Saide Zhu, Venkata Malladi, Yubao Wu. 241-250 [doi]
- I Can Think Like You! Towards Reaction Spoofing Attack on Brainwave-Based AuthenticationWei-Yang Chiu, Weizhi Meng, Wenjuan Li 0001. 251-265 [doi]
- Cubic Permutation Polynomials-Based Block RLNC Algorithm in Wireless NetworksHongwei Luo, Wanyi Feng, Baolin Sun, Ying Song. 266-275 [doi]
- A Lightweight Blockchain-Based Trust Model for Smart Vehicles in VANETsSeyedvalyallah Ayobi, Yongli Wang, Mahdi Rabbani, Ali Dorri, Hamed Jelodar, Hucheng Huang, Siamak Yarmohammadi. 276-289 [doi]
- Light Intensity Based IoT Device Positioning for Indoor MonitoringGaofei Sun, Xiaoshuang Xing, Zhenjiang Qian, Zhiguo Wang, Saide Zhu. 290-300 [doi]
- A Blockchain-Based Reconstruction Framework for UAV NetworkGongzhe Qiao, Yi Zhuang. 301-311 [doi]
- A New Certificateless Aggregate Signature Scheme for Wireless Sensor NetworksYihong Wen, Yi Yang, Shicheng Wang, Li Li, Min Luo. 312-330 [doi]
- Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0Muhammad Shakeel Faridi, Saqib Ali, Guihua Duan, Guojun Wang 0001. 331-344 [doi]
- A Network Security Situational Awareness Framework Based on Situation FusionSai Lu, Yi Zhuang. 345-355 [doi]
- Intelligent Medical Security Framework of Body Area Network Based on Fog ComputingSongpeng Zhang, Yi Zhuang, Zining Cao. 356-366 [doi]
- Secure and Traceable Attribute-Based Sequential Aggregate SignatureRuili Yang, Jiageng Chen, Shangle Li. 367-381 [doi]
- Social Spammer Detection Based on PSO-CatBoostShupeng Li, F. Jiang, Yunbai Qin, Kunkun Zheng. 382-395 [doi]
- Software Developer Recommendation in Terms of Reducing Bug Tossing LengthMuhammad Zubair Baloch, Shahid Hussain 0001, Humaira Afzal, Muhammad Rafiq Mufti, Bashir Ahmad 0001. 396-407 [doi]
- A Methodology to Automate the Security Patterns SelectionKhudema Zahra, Shahid Hussain 0001, Humaira Afzal, Muhammad Rafiq Mufti, Dost Muhammad Khan, Mohammad Khalid Sohail. 408-419 [doi]