SCN - volume 2022 论文列表 |
点击这里查看 Security and Communication Networks 的JCR分区、影响因子等信息 |
Xiaowei Wang Shoulin Yin Muhammad Shafiq Asif Ali Laghari Shahid Karim Omar Cheikhrouhou Wajdi Alhakami Habib Hamam
Fast Implementation of Multiplication on Polynomial Rings.Boyu Wang Haiying Gao Fan Yang
Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.Jinhui Liu Yong Yu Houzhen Wang Huanguo Zhang
Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data. BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System.Guofeng Zhang Xiao Chen Bin Feng Xuchao Guo Xia Hao Henggang Ren Chunyan Dong Yanan Zhang
Relationship Model between Human Resource Management Activities and Performance Based on LMBP Algorithm. Construction of the EFL Mobile Learning Model in the Hybrid Distributed Terminal.Lijie Qu Shihui Song Zuochun Xiao
Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing".Wenle Bai Zhongjun Yang Jianhong Zhang
Information Processing Methods of Electronic Warfare Events Based on Communication Technology. CTI View: APT Threat Intelligence Analysis System.Yinghai Zhou Yi Tang Ming Yi Chuanyu Xi Hai Lu
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security.Wajih El Hadj Youssef Ali Abdelli Fethi Dridi Rim Brahim Mohsen Machhout
Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPSs.Manohar S. Burra Soumyadev Maity
Machine Learning and Applied Cryptography.Amir Anees Iqtadar Hussain Umar Mujahid Khokhar Fawad Ahmed Sajjad Shaukat Jamal
Invested Costs and Risk Control Model of Social Governance Based on Fuzzy Algorithm.Shanshan Teng Huajun Li Desheng Zhang
Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES. Reversible Data Hiding Based on Multiple Pairwise PEE and Two-Layer Embedding.Wenguang He Gangqiang Xiong Yaomin Wang
The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment.Jihua Cao Jie Li Yunfeng Wang Mengqi Ai
Decentralized, Privacy-Preserving, Single Sign-On.Omid Mir Michael Roland René Mayrhofer
A Novel Tripartite Evolutionary Game Model for Misinformation Propagation in Social Networks.Xianyong Li Qizhi Li Yajun Du Yongquan Fan Xiaoliang Chen Fashan Shen Yunxia Xu
Research on Marketing Strategy of Chinese Painting and Calligraphy Art Based on Wireless Communication Network Resources. An Improved Particle Swarm Optimisation Method for Performance Evaluation of Instructors. Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias
Traditional and Hybrid Access Control Models: A Detailed Survey.Muhammad Umar Aftab Ali Hamza Ariyo Oluwasanmi Xuyun Nie Muhammad Shahzad Sarfraz Danish Shehzad Zhiguang Qin Ammar Rafiq
A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic.Yuchen Sun Xiangyang Luo Han Wang Zhaorui Ma
An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain.Xingyu Li Zongqu Zhao Yongli Tang Jing Zhang Chengyi Wu Ying Li
Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks.Jing Zhang Si-Tong Shi Cai-Jie Weng Li Xu
Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data. Security, Trust and Privacy for Cloud, Fog and Internet of Things.Chien-Ming Chen Shehzad Ashraf Chaudhry Kuo-Hui Yeh Muhammad Naveed Aman
FLOM: Toward Efficient Task Processing in Big Data with Federated Learning. Autonomous Orbit Determination System of Navigation Satellite Based on Spaceborne GPS Technology.Li Yang Haote Ruan Yunhan Zhang
A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net.Lianshan Liu Lingzhuang Meng Weimin Zheng Yanjun Peng Xiaoli Wang
Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms.Jinbo Chao Chunhui Zhao Fuzhi Zhang
Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN.Wansoo Kim Jungho Lee Yousik Lee Yoenjin Kim Jingyun Chung Samuel Woo
Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test.A. Revathi R. Kaladevi Kadiyala Ramana Rutvij H. Jhaveri Madapuri Rudra Kumar M. Sankara Prasanna Kumar
A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol.Vijayalakshmi Murugesan S. Mercy Shalinie Ming-Hour Yang Shou-Chuan Lai Jia-Ning Luo
Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment.Sehrish Batool Farrukh Zeeshan Khan Syed Qaiser Ali Shah Muneer Ahmed Roobaea Alroobaea Abdullah M. Baqasah Ihsan Ali Muhammad Ahsan Raza
GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection.Juan Zheng Zhiyong Zeng Tao Feng
Research on Face Recognition Classification Based on Improved GoogleNet.Zhigang Yu Yunyun Dong Jihong Cheng Miaomiao Sun Feng Su
Research on the Effect of Online Marketing Based on Multimodel Fusion and Artificial Intelligence in the Context of Big Data.Hongyu Zhao Fang Lyu Yalan Luo
Face Forgery Detection Based on the Improved Siamese Network.Bo Wang Yucai Li Xiaohan Wu Yanyan Ma Zengren Song Mingkan Wu
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures.Li Duan Yangyang Sun Kejia Zhang Yong Ding
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism.Wenjuan Jia Guanhao Xue Baocang Wang Yupu Hu
Mental and Emotional Recognition of College Students Based on Brain Signal Features and Data Mining. Rumor Detection with Bidirectional Graph Attention Networks.Xiaohui Yang Hailong Ma Miao Wang
A Personalized Recommendation System for English Teaching Resources Based on Multi-K Nearest Neighbor Regression Algorithm. Research on Evaluation Model of Hospital Informatization Level Based on Decision Tree Algorithm.Fenglang Wu Xinran Liu Yudan Wang Xiaoliang Li Ming Zhou
Research on Intelligent Scheduling Mechanism in Edge Network for Industrial Internet of Things.Zhenzhong Zhang Wei Sun Yanliang Yu
A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value.Lin Yu Gang Xu Zhifei Wang Na Zhang Fengqi Wei
DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective.Zhaobin Li Bin Yang Xinyu Zhang Chao Guo
Differential Evolution and Multiclass Support Vector Machine for Alzheimer's Classification.Jhansi Rani Kaka K. Satya Prasad
An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones.Muhammad Asghar Khan Insaf Ullah Mohammed H. Alsharif Abdulaziz H. Alghtani Ayman A. Aly Chien-Ming Chen
Blockchain-Based Proof of Retrievability Scheme.Yan Ren Haipeng Guan Qiuxia Zhao Zongxiang Yi
Mitigation Impact of Energy and Time Delay for Computation Offloading in an Industrial IoT Environment Using Levenshtein Distance Algorithm.Ahsan Rafiq Ping Wang Min Wei Mohammed Saleh Ali Muthanna Nteziriza Nkerabahizi Josbert
A Blockchain-Assisted Electronic Medical Records by Using Proxy Reencryption and Multisignature.Xiaoguang Liu Jun Yan Shuqiang Shan Rongjun Wu
5G-EECC: Energy-Efficient Collaboration-Based Content Sharing Strategy in Device-to-Device Communication.Nauman Khan Imran Ali Khan Jawad Usman Arshed Mehtab Afzal Muhammad Masroor Ahmed Muhammad Arif
iReTADS: An Intelligent Real-Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network.Gotam Singh Lalotra Vinod Kumar Abhishek Bhatt Tianhua Chen Mufti Mahmud
Intelligent Image Saliency Detection Method Based on Convolution Neural Network Combining Global and Local Information.Songshang Zou Wenshu Chen Hao Chen
Radio Network Forensic with mmWave Using the Dominant Path Algorithm.Usman Rauf Kamboh Muhammad Rehman Shahid Hamza Aldabbas Ammar Rafiq Bader Alouffi Muhammad Asif Habib Ubaid Ullah
Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing.Muhammad Arif F. Ajesh Shermin Shamsudheen Muhammad Shahzad
Black-Box Adversarial Attacks against Audio Forensics Models. Lag Secure Consensus for Second-Order Nonlinear Multiagent Systems with Event-Triggered Control Strategy under DoS Attacks.Qi Han Ao Zhang Tengfei Weng Yan Xie Liping Feng Guorong Chen Yuan Tian
Attacker Traceability on Ethereum through Graph Analysis.Hang Zhu Weina Niu Xuhan Liao Xiaosong Zhang Xiaofen Wang Beibei Li Zheyuan He
EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application.Ran Li Yuanfei Zhang Lihua Yin Zhe Sun Zheng Lin Peng Fu Weiping Wang Gang Shi
Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function.Hongyuan Wang Jin Meng Xilong Du Tengfei Cao Yong Xie
Invoice Detection and Recognition System Based on Deep Learning.Xunfeng Yao Hao Sun Sijun Li Weichao Lu
Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid.Yang Ming Yabin Li Yi Zhao Pengfei Yang
Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges.Naeem Ahmed Rashid Amin Hamza Aldabbas Deepika Koundal Bader Alouffi Tariq Shah
Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime.Muhammad Hameed Siddiqi Ibrahim Alrashdi
Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone. Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain.Jingjing Guo Xuliang Wei Yuling Zhang Jianfeng Ma Huamin Gao Libo Wang Zhiquan Liu
An Improved Image Steganography Framework Based on Y Channel Information for Neural Style Transfer.Wenjie Lin Xueke Zhu Wujian Ye Chin-Chen Chang Yijun Liu Chengmin Liu
Economic Evaluation Method of Incremental Distribution Network Project Based on Value Theory. A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve. Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM.Xiaoyao Liao Changzhi Wang Wen Chen
A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient.Lei Zhang Zhisong Pan Yu Pan Shize Guo Yi Liu Shiming Xia Qibin Zheng Hongmei Li Wei Bai
Containing Misinformation Spread: A Collaborative Resource Allocation Strategy for Knowledge Popularization and Expert Education.Linhong Li Kaifan Huang Xiaofan Yang
A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses.Weizhou Li Zhiqiang Lin Qi Chen
Proliferation of Cyber Situational Awareness: Today's Truly Pervasive Drive of Cybersecurity.Hafiz Muhammad Jamsheed Nazir Weihong Han
Correlation Analysis of Population Educational Structure and Program Audience Share Based on Multisample Regression for Correction. A Lightweight Flow Feature-Based IoT Device Identification Scheme.Ruizhong Du Jingze Wang Shuang Li
Multilevel Image Edge Detection Algorithm Based on Visual Perception. BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN.Ping Li Songtao Guo Jiahui Wu Quanjun Zhao
An Empirical Study of Platform Enterprises' Privacy Protection Behaviors Based on fsQCA. A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.Yujian Zhang Yuhao Luo Xing Chen Fei Tong Yuwei Xu Jun Tao Guang Cheng
Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production. An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications.Arun Sekar Rajasekaran Maria Azees
Analysis and Improvement of Blockchain-Based Multilevel Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.Zhenjie Huang Yafeng Guo Hui Huang Runlong Duan Xiaolong Zhao
Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance. Group Relationship Mining of College Students Based on Predictive Social Network. Fast Extraction Algorithm for Local Edge Features of Super-Resolution Image. Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm. An Effective Credit Evaluation Mechanism with Softmax Regression and Blockchain in Power IoT.Da Li Dong Wang Wei Jiang Qinglei Guo Desheng Bai Wei Shi Linna Ruan
A Method of the Active and Passive Event Service Based on the Sensor Web.Lan Liu Jingjing Fan Chengfan Li Xuefeng Liu
Application of Computer-Aided Graphic Design in Enterprise Image. Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience. Visual Dynamic Simulation Model of Unstructured Data in Social Networks. Dynamical Behavior of Hybrid Propagation of Computer Viruses.Qingyi Zhu Pingfan Xiang Xuhang Luo Chenquan Gan
Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System.Murat Odemis Cagatay Yucel Ahmet Koltuksuz
User Authentication Method via Speaker Recognition and Speech Synthesis Detection. Optimal Allocation of Human Resource Structure Based on Capability Maturity Model Integration. Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network.Se-Joon Park Yong-Joon Lee Won-Hyung Park
Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces.Mohib Ullah Rafiullah Khan Irfan Ullah Khan Nida Aslam Sumayh S. Aljameel Muhammad Inam Ul Haq Muhammad Arshad Islam
Security Analysis of Shadowsocks(R) Protocol.Qingbing Ji Zhihong Rao Man Chen Jie Luo
The Application and Teaching of Digital Technology in Printmaking. Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.Guangcan Yang Yunhua He Ke Xiao Qifeng Tang Yang Xin Hongliang Zhu
Taxi Dispatch Optimization in Smart Cities Using TOPSIS.Adnan Abid Naeem A. Nawaz Muhammad Shoaib Farooq Uzma Farooq Irfan Abid Iqra Obaid
Research on Fast Recommendation Algorithm of Library Personalized Information Based on Density Clustering. Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization.Xue Yuan Guanjun Lin Yonghang Tai Jun Zhang
Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants.Minsoo Lee Hyun Kwon Hyunsoo Yoon
PACAM: A Pairwise-Allocated Strategy and Capability Average Matrix-Based Task Scheduling Approach for Edge Computing.Feng Hong Tianming Zhang Bin Cao Jing Fan
Electronic Health Record Monitoring System and Data Security Using Blockchain Technology.Kazi Tamzid Akhter Md Hasib Ixion Chowdhury Saadman Sakib Mohammad Monirujjaman Khan Nawal Alsufyani Abdulmajeed Alsufyani Sami Bourouis
Game-Based Channel Selection for UAV Services in Mobile Edge Computing.Ying Chen H. Xing S. Chen Ning Zhang Xin Chen Jiwei Huang
A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain.Huiying Zou Xiaofan Liu Wei Ren Tianqing Zhu
Gap between Prediction and Truth: A Case Study of False-Positives in Leakage Detection. Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning.