1939-0114
Volume 2022, 2022
A New V-Net Convolutional Neural Network Based on Four-Dimensional Hyperchaotic System for Medical Image Encryption.

Xiaowei Wang Shoulin Yin Muhammad Shafiq Asif Ali Laghari Shahid Karim Omar Cheikhrouhou Wajdi Alhakami Habib Hamam

Fast Implementation of Multiplication on Polynomial Rings.

Boyu Wang Haiying Gao Fan Yang

Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems.

Jinhui Liu Yong Yu Houzhen Wang Huanguo Zhang

Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data.

Zhang Xun

BCST-APTS: Blockchain and CP-ABE Empowered Data Supervision, Sharing, and Privacy Protection Scheme for Secure and Trusted Agricultural Product Traceability System.

Guofeng Zhang Xiao Chen Bin Feng Xuchao Guo Xia Hao Henggang Ren Chunyan Dong Yanan Zhang

Relationship Model between Human Resource Management Activities and Performance Based on LMBP Algorithm.

Qiang Liu Zhongwei Zhao

Construction of the EFL Mobile Learning Model in the Hybrid Distributed Terminal.

Lijie Qu Shihui Song Zuochun Xiao

Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing".

Wenle Bai Zhongjun Yang Jianhong Zhang

Information Processing Methods of Electronic Warfare Events Based on Communication Technology.

Hongyan Mao

CTI View: APT Threat Intelligence Analysis System.

Yinghai Zhou Yi Tang Ming Yi Chuanyu Xi Hai Lu

An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security.

Wajih El Hadj Youssef Ali Abdelli Fethi Dridi Rim Brahim Mohsen Machhout

Certificateless Reliable and Privacy-Preserving Auditing of Group Shared Data for FOG-CPSs.

Manohar S. Burra Soumyadev Maity

Machine Learning and Applied Cryptography.

Amir Anees Iqtadar Hussain Umar Mujahid Khokhar Fawad Ahmed Sajjad Shaukat Jamal

Invested Costs and Risk Control Model of Social Governance Based on Fuzzy Algorithm.

Shanshan Teng Huajun Li Desheng Zhang

Timed Automaton-Based Quantitative Feasibility Analysis of Symmetric Cipher in Embedded RTOS: A Case Study of AES.

Yawen Ke Xiaofeng Xia

Reversible Data Hiding Based on Multiple Pairwise PEE and Two-Layer Embedding.

Wenguang He Gangqiang Xiong Yaomin Wang

The Impact of Self-Efficacy and Perceived Value on Customer Engagement under Live Streaming Commerce Environment.

Jihua Cao Jie Li Yunfeng Wang Mengqi Ai

Decentralized, Privacy-Preserving, Single Sign-On.

Omid Mir Michael Roland René Mayrhofer

A Novel Tripartite Evolutionary Game Model for Misinformation Propagation in Social Networks.

Xianyong Li Qizhi Li Yajun Du Yongquan Fan Xiaoliang Chen Fashan Shen Yunxia Xu

Research on Marketing Strategy of Chinese Painting and Calligraphy Art Based on Wireless Communication Network Resources.

Tian Zhong

An Improved Particle Swarm Optimisation Method for Performance Evaluation of Instructors.

Yuanhong Mu

Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.

Efstratios Chatzoglou Georgios Kambourakis Constantinos Kolias

Traditional and Hybrid Access Control Models: A Detailed Survey.

Muhammad Umar Aftab Ali Hamza Ariyo Oluwasanmi Xuyun Nie Muhammad Shahzad Sarfraz Danish Shehzad Zhiguang Qin Ammar Rafiq

A Method for Identifying Tor Users Visiting Websites Based on Frequency Domain Fingerprinting of Network Traffic.

Yuchen Sun Xiangyang Luo Han Wang Zhaorui Ma

An Android Malicious Application Detection Method with Decision Mechanism in the Operating Environment of Blockchain.

Xingyu Li Zongqu Zhao Yongli Tang Jing Zhang Chengyi Wu Ying Li

Individual Attribute and Cascade Influence Capability-Based Privacy Protection Method in Social Networks.

Jing Zhang Si-Tong Shi Cai-Jie Weng Li Xu

Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data.

Jiawen Du Yong Pi

Security, Trust and Privacy for Cloud, Fog and Internet of Things.

Chien-Ming Chen Shehzad Ashraf Chaudhry Kuo-Hui Yeh Muhammad Naveed Aman

FLOM: Toward Efficient Task Processing in Big Data with Federated Learning.

Chunyi Wu Ya Li

Autonomous Orbit Determination System of Navigation Satellite Based on Spaceborne GPS Technology.

Li Yang Haote Ruan Yunhan Zhang

A Novel High-Capacity Information Hiding Scheme Based on Improved U-Net.

Lianshan Liu Lingzhuang Meng Weimin Zheng Yanjun Peng Xiaoli Wang

Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms.

Jinbo Chao Chunhui Zhao Fuzhi Zhang

Vehicular Multilevel Data Arrangement-Based Intrusion Detection System for In-Vehicle CAN.

Wansoo Kim Jungho Lee Yousik Lee Yoenjin Kim Jingyun Chung Samuel Woo

Early Detection of Cognitive Decline Using Machine Learning Algorithm and Cognitive Ability Test.

A. Revathi R. Kaladevi Kadiyala Ramana Rutvij H. Jhaveri Madapuri Rudra Kumar M. Sankara Prasanna Kumar

A Blockchain-Based Secure Radio Frequency Identification Ownership Transfer Protocol.

Vijayalakshmi Murugesan S. Mercy Shalinie Ming-Hour Yang Shou-Chuan Lai Jia-Ning Luo

Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment.

Sehrish Batool Farrukh Zeeshan Khan Syed Qaiser Ali Shah Muneer Ahmed Roobaea Alroobaea Abdullah M. Baqasah Ihsan Ali Muhammad Ahsan Raza

GCN-ETA: High-Efficiency Encrypted Malicious Traffic Detection.

Juan Zheng Zhiyong Zeng Tao Feng

Research on Face Recognition Classification Based on Improved GoogleNet.

Zhigang Yu Yunyun Dong Jihong Cheng Miaomiao Sun Feng Su

Research on the Effect of Online Marketing Based on Multimodel Fusion and Artificial Intelligence in the Context of Big Data.

Hongyu Zhao Fang Lyu Yalan Luo

Face Forgery Detection Based on the Improved Siamese Network.

Bo Wang Yucai Li Xiaohan Wu Yanyan Ma Zengren Song Mingkan Wu

Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures.

Li Duan Yangyang Sun Kejia Zhang Yong Ding

Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism.

Wenjuan Jia Guanhao Xue Baocang Wang Yupu Hu

Mental and Emotional Recognition of College Students Based on Brain Signal Features and Data Mining.

Shaobo An Zhifen Yu

Rumor Detection with Bidirectional Graph Attention Networks.

Xiaohui Yang Hailong Ma Miao Wang

A Personalized Recommendation System for English Teaching Resources Based on Multi-K Nearest Neighbor Regression Algorithm.

Yan Tang Yang Yu

Research on Evaluation Model of Hospital Informatization Level Based on Decision Tree Algorithm.

Fenglang Wu Xinran Liu Yudan Wang Xiaoliang Li Ming Zhou

Research on Intelligent Scheduling Mechanism in Edge Network for Industrial Internet of Things.

Zhenzhong Zhang Wei Sun Yanliang Yu

A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value.

Lin Yu Gang Xu Zhifei Wang Na Zhang Fengqi Wei

DDoS Defense Method in Software-Defined Space-Air-Ground Network from Dynamic Bayesian Game Perspective.

Zhaobin Li Bin Yang Xinyu Zhang Chao Guo

Differential Evolution and Multiclass Support Vector Machine for Alzheimer's Classification.

Jhansi Rani Kaka K. Satya Prasad

An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones.

Muhammad Asghar Khan Insaf Ullah Mohammed H. Alsharif Abdulaziz H. Alghtani Ayman A. Aly Chien-Ming Chen

Blockchain-Based Proof of Retrievability Scheme.

Yan Ren Haipeng Guan Qiuxia Zhao Zongxiang Yi

Mitigation Impact of Energy and Time Delay for Computation Offloading in an Industrial IoT Environment Using Levenshtein Distance Algorithm.

Ahsan Rafiq Ping Wang Min Wei Mohammed Saleh Ali Muthanna Nteziriza Nkerabahizi Josbert

A Blockchain-Assisted Electronic Medical Records by Using Proxy Reencryption and Multisignature.

Xiaoguang Liu Jun Yan Shuqiang Shan Rongjun Wu

5G-EECC: Energy-Efficient Collaboration-Based Content Sharing Strategy in Device-to-Device Communication.

Nauman Khan Imran Ali Khan Jawad Usman Arshed Mehtab Afzal Muhammad Masroor Ahmed Muhammad Arif

iReTADS: An Intelligent Real-Time Anomaly Detection System for Cloud Communications Using Temporal Data Summarization and Neural Network.

Gotam Singh Lalotra Vinod Kumar Abhishek Bhatt Tianhua Chen Mufti Mahmud

Intelligent Image Saliency Detection Method Based on Convolution Neural Network Combining Global and Local Information.

Songshang Zou Wenshu Chen Hao Chen

Radio Network Forensic with mmWave Using the Dominant Path Algorithm.

Usman Rauf Kamboh Muhammad Rehman Shahid Hamza Aldabbas Ammar Rafiq Bader Alouffi Muhammad Asif Habib Ubaid Ullah

Secure and Energy-Efficient Computational Offloading Using LSTM in Mobile Edge Computing.

Muhammad Arif F. Ajesh Shermin Shamsudheen Muhammad Shahzad

Black-Box Adversarial Attacks against Audio Forensics Models.

Yi Jiang Dengpan Ye

Lag Secure Consensus for Second-Order Nonlinear Multiagent Systems with Event-Triggered Control Strategy under DoS Attacks.

Qi Han Ao Zhang Tengfei Weng Yan Xie Liping Feng Guorong Chen Yuan Tian

Attacker Traceability on Ethereum through Graph Analysis.

Hang Zhu Weina Niu Xuhan Liao Xiaosong Zhang Xiaofen Wang Beibei Li Zheyuan He

EmoMix+: An Approach of Depression Detection Based on Emotion Lexicon for Mobile Application.

Ran Li Yuanfei Zhang Lihua Yin Zhe Sun Zheng Lin Peng Fu Weiping Wang Gang Shi

Lightweight and Anonymous Mutual Authentication Protocol for Edge IoT Nodes with Physical Unclonable Function.

Hongyuan Wang Jin Meng Xilong Du Tengfei Cao Yong Xie

Invoice Detection and Recognition System Based on Deep Learning.

Xunfeng Yao Hao Sun Sijun Li Weichao Lu

Efficient Privacy-Preserving Data Aggregation Scheme with Fault Tolerance in Smart Grid.

Yang Ming Yabin Li Yi Zhao Pengfei Yang

Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges.

Naeem Ahmed Rashid Amin Hamza Aldabbas Deepika Koundal Bader Alouffi Tariq Shah

Sharpening and Detection of Road Studs for Intelligent Vehicles at Nighttime.

Muhammad Hameed Siddiqi Ibrahim Alrashdi

Construction of Ideological and Political Education in Colleges and Universities Based on the Carrier of Smartphone.

Tingma Tao Xinyu Lv

Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain.

Jingjing Guo Xuliang Wei Yuling Zhang Jianfeng Ma Huamin Gao Libo Wang Zhiquan Liu

An Improved Image Steganography Framework Based on Y Channel Information for Neural Style Transfer.

Wenjie Lin Xueke Zhu Wujian Ye Chin-Chen Chang Yijun Liu Chengmin Liu

Economic Evaluation Method of Incremental Distribution Network Project Based on Value Theory.

Weiming Xie Linda Qiu

A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve.

Jiaju Zhu Meng Zhang

Anomaly Detection of System Call Sequence Based on Dynamic Features and Relaxed-SVM.

Xiaoyao Liao Changzhi Wang Wen Chen

A Hidden Attack Sequences Detection Method Based on Dynamic Reward Deep Deterministic Policy Gradient.

Lei Zhang Zhisong Pan Yu Pan Shize Guo Yi Liu Shiming Xia Qibin Zheng Hongmei Li Wei Bai

Containing Misinformation Spread: A Collaborative Resource Allocation Strategy for Knowledge Popularization and Expert Education.

Linhong Li Kaifan Huang Xiaofan Yang

A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses.

Weizhou Li Zhiqiang Lin Qi Chen

Proliferation of Cyber Situational Awareness: Today's Truly Pervasive Drive of Cybersecurity.

Hafiz Muhammad Jamsheed Nazir Weihong Han

Correlation Analysis of Population Educational Structure and Program Audience Share Based on Multisample Regression for Correction.

Jingyuan Chen Han Wu

A Lightweight Flow Feature-Based IoT Device Identification Scheme.

Ruizhong Du Jingze Wang Shuang Li

Multilevel Image Edge Detection Algorithm Based on Visual Perception.

Hui Li

BlockREV: Blockchain-Enabled Multi-Controller Rule Enforcement Verification in SDN.

Ping Li Songtao Guo Jiahui Wu Quanjun Zhao

An Empirical Study of Platform Enterprises' Privacy Protection Behaviors Based on fsQCA.

Yaojia Tang Luna Wang

A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.

Yujian Zhang Yuhao Luo Xing Chen Fei Tong Yuwei Xu Jun Tao Guang Cheng

Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production.

Yating Wei

An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications.

Arun Sekar Rajasekaran Maria Azees

Analysis and Improvement of Blockchain-Based Multilevel Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.

Zhenjie Huang Yafeng Guo Hui Huang Runlong Duan Xiaolong Zhao

Multiclass Interactive Martial Arts Teaching Optimization Method Based on Euclidean Distance.

Zhechun Hu Yunxing Wang

Group Relationship Mining of College Students Based on Predictive Social Network.

Huazhang Liu

Fast Extraction Algorithm for Local Edge Features of Super-Resolution Image.

Feng Chen Botao Yang

Big Data Analytics and Discrete Choice Model for Enterprise Credit Risk Early Warning Algorithm.

Jiangbo Yu

An Effective Credit Evaluation Mechanism with Softmax Regression and Blockchain in Power IoT.

Da Li Dong Wang Wei Jiang Qinglei Guo Desheng Bai Wei Shi Linna Ruan

A Method of the Active and Passive Event Service Based on the Sensor Web.

Lan Liu Jingjing Fan Chengfan Li Xuefeng Liu

Application of Computer-Aided Graphic Design in Enterprise Image.

Shizhuo Zhang

Fully Secure ID-Based Signature Scheme with Continuous Leakage Resilience.

Qihong Yu Jiguo Li Sai Ji

Visual Dynamic Simulation Model of Unstructured Data in Social Networks.

Zhang Xiang

Dynamical Behavior of Hybrid Propagation of Computer Viruses.

Qingyi Zhu Pingfan Xiang Xuhang Luo Chenquan Gan

Detecting User Behavior in Cyber Threat Intelligence: Development of Honeypsy System.

Murat Odemis Cagatay Yucel Ahmet Koltuksuz

User Authentication Method via Speaker Recognition and Speech Synthesis Detection.

Hyun Park TaeGuen Kim

Optimal Allocation of Human Resource Structure Based on Capability Maturity Model Integration.

Li Hao

Configuration Method of AWS Security Architecture That Is Applicable to the Cloud Lifecycle for Sustainable Social Network.

Se-Joon Park Yong-Joon Lee Won-Hyung Park

Profile Aware ObScure Logging (PaOSLo): A Web Search Privacy-Preserving Protocol to Mitigate Digital Traces.

Mohib Ullah Rafiullah Khan Irfan Ullah Khan Nida Aslam Sumayh S. Aljameel Muhammad Inam Ul Haq Muhammad Arshad Islam

Security Analysis of Shadowsocks(R) Protocol.

Qingbing Ji Zhihong Rao Man Chen Jie Luo

The Application and Teaching of Digital Technology in Printmaking.

Hao Zhang Hongyan Zheng

Privacy-Preserving Query Scheme (PPQS) for Location-Based Services in Outsourced Cloud.

Guangcan Yang Yunhua He Ke Xiao Qifeng Tang Yang Xin Hongliang Zhu

Taxi Dispatch Optimization in Smart Cities Using TOPSIS.

Adnan Abid Naeem A. Nawaz Muhammad Shoaib Farooq Uzma Farooq Irfan Abid Iqra Obaid

Research on Fast Recommendation Algorithm of Library Personalized Information Based on Density Clustering.

Yuqing Shi Yuelong Zhu

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization.

Xue Yuan Guanjun Lin Yonghang Tai Jun Zhang

Compliance-Driven Cybersecurity Planning Based on Formalized Attack Patterns for Instrumentation and Control Systems of Nuclear Power Plants.

Minsoo Lee Hyun Kwon Hyunsoo Yoon

PACAM: A Pairwise-Allocated Strategy and Capability Average Matrix-Based Task Scheduling Approach for Edge Computing.

Feng Hong Tianming Zhang Bin Cao Jing Fan

Electronic Health Record Monitoring System and Data Security Using Blockchain Technology.

Kazi Tamzid Akhter Md Hasib Ixion Chowdhury Saadman Sakib Mohammad Monirujjaman Khan Nawal Alsufyani Abdulmajeed Alsufyani Sami Bourouis

Game-Based Channel Selection for UAV Services in Mobile Edge Computing.

Ying Chen H. Xing S. Chen Ning Zhang Xin Chen Jiwei Huang

A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain.

Huiying Zou Xiaofan Liu Wei Ren Tianqing Zhu

Gap between Prediction and Truth: A Case Study of False-Positives in Leakage Detection.

Pengbo Wang Ming Tang Shoukun Xiang Yaru Wang Botao Liu

Bridging the Last-Mile Gap in Network Security via Generating Intrusion-Specific Detection Patterns through Machine Learning.

Xibin Sun Du Zhang Haiou Qin Jiahua Tang