|
AMAD: Improving Adversarial Robustness Without Reducing Accuracy |
|
|
1 | (14) |
|
|
|
|
Multi-party Secure Comparison of Strings Based on Outsourced Computation |
|
|
15 | (16) |
|
|
|
|
Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain |
|
|
31 | (8) |
|
|
|
|
Overview of DDoS Attack Research Under SDN |
|
|
39 | (15) |
|
|
|
|
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism |
|
|
54 | (7) |
|
|
|
|
|
Performance Improvement of Classification Model Based on Adversarial Sample Generation |
|
|
61 | (14) |
|
|
|
|
Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning |
|
|
75 | (14) |
|
|
|
|
|
Federated Community Detection in Social Networks |
|
|
89 | (15) |
|
|
|
|
|
A Textual Adversarial Attack Scheme for Domain-Specific Models |
|
|
104 | (14) |
|
|
|
|
|
|
An Improved Conv-LSTM Method for Gear Fault Detection |
|
|
118 | (12) |
|
|
|
|
|
Extracting Random Secret Key Scheme for One-Time Pad Under Intelligent Connected Vehicle |
|
|
130 | (14) |
|
|
|
|
Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization |
|
|
144 | (11) |
|
|
|
|
|
|
|
|
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part I |
|
|
155 | (10) |
|
|
|
Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network |
|
|
165 | (15) |
|
|
|
Dynamic Momentum for Deep Learning with Differential Privacy |
|
|
180 | (11) |
|
|
|
|
|
|
|
|
An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP |
|
|
191 | (11) |
|
|
|
|
|
|
|
PCB Defect Detection Method Based on Improved RetinaNet |
|
|
202 | (12) |
|
|
|
|
|
|
A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning |
|
|
214 | (14) |
|
|
|
Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province |
|
|
228 | (10) |
|
|
|
Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection |
|
|
238 | (16) |
|
|
|
|
|
|
|
|
DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection |
|
|
254 | (12) |
|
|
|
|
|
|
A Lattice-Based Aggregate Signature Based on Revocable Identity |
|
|
266 | (9) |
|
|
|
|
|
Research and Design of an Emergency Supply Assurance Monitoring System in the Post-epidemic Context |
|
|
275 | (8) |
|
|
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion |
|
|
283 | (16) |
|
|
|
|
Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process |
|
|
299 | (10) |
|
|
|
|
|
|
|
|
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II |
|
|
309 | (12) |
|
|
|
|
Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks |
|
|
321 | (14) |
|
|
Overlapping Community Discovery Algorithm Based on Three-Level Neighbor Node Influence |
|
|
335 | (10) |
|
|
|
|
|
|
Content-Aware Deep Feature Matching |
|
|
345 | (10) |
|
|
|
|
|
|
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps |
|
|
355 | (15) |
|
|
|
|
An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model |
|
|
370 | (12) |
|
|
|
|
|
A Certificateless-Based Blind Signature Scheme with Message Recovery |
|
|
382 | (8) |
|
|
|
|
Fault Detection of Rolling Bearings by Using a Combination Network Model |
|
|
390 | (10) |
|
|
|
|
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs |
|
|
400 | (11) |
|
|
|
|
Research on Influential Factors of Online Learning Behavior Based on Big Data |
|
|
411 | (11) |
|
|
|
Short Speech Key Generation Technology Based on Deep Learning |
|
|
422 | (14) |
|
|
|
|
Domain Adversarial Interaction Network for Cross-Domain Fault Diagnosis |
|
|
436 | (11) |
|
|
|
|
|
|
|
|
A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain |
|
|
447 | (8) |
|
|
|
|
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric |
|
|
455 | (14) |
|
|
|
|
|
|
|
|
|
|
Research on Key Technologies for the Trusted Perception of Network Information for Big Data |
|
|
469 | (10) |
|
|
|
Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network |
|
|
479 | (16) |
|
|
|
|
|
|
Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm |
|
|
495 | (15) |
|
|
|
Towards Differentially Private Contrastive Learning |
|
|
510 | (11) |
|
|
|
|
|
|
|
Two-Stage High Precision Membership Inference Attack |
|
|
521 | (15) |
|
|
|
Secure Storage Method for Network Resources of Professional Works Based on Decision Tree Algorithm |
|
|
536 | (14) |
|
|
|
Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis |
|
|
550 | (15) |
|
|
A Broad Learning System Based on the Idea of Vertical Federated Learning |
|
|
565 | (10) |
|
|
|
|
|
PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency |
|
|
575 | (9) |
|
|
|
|
|
|
|
Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application |
|
|
584 | (25) |
|
|
|
|
|
|
|
|
A Event Extraction Method of Document-Level Based on the Self-attention Mechanism |
|
|
609 | (12) |
|
|
|
|
|
|
|
|
|
|
Author Index |
|
621 | |