• A BP Neural Network Based Self-tuning for QoS Support in AVB Switched Ethernet

  • Priority-Based Multi-carrier Access Schemes for Safety Message Transmission in Vehicular Networks

  • Joint User Association and ABS for Energy-Efficient eICIC in Heterogeneous Cellular Network

  • Resource Allocation in OFDM-Based Cognitive Radios Under Proportional Rate Constraint

  • A Green Load Balancing Algorithm for Dynamic Spatial-Temporal Traffic Distribution in HetNets

  • Capacity Analysis of Secondary User System in Cognitive MIMO Networks Based on NOMA

  • Research on Anti PUE Attack Based on CAF Spectrum and Repeated-Game

  • Optimal Power Splitting in a Full-Duplex Wireless Powered Network with a Bidirectional Relay

  • Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption

  • Understanding Adversarial Strategies from Bot Recruitment to Scheduling

  • Very Short Intermittent DDoS Attacks in an Unsaturated System

  • Exposing LTE Security Weaknesses at Protocol Inter-layer, and Inter-radio Interactions

  • Disrupting SDN via the Data Plane: A Low-Rate Flow Table Overflow Attack

  • Turing Obfuscation

  • BluePass: A Secure Hand-Free Password Manager

  • Guilt-by-Association: Detecting Malicious Entities via Graph Mining

  • Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications

  • HDoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol

  • Query Recovery Attacks on Searchable Encryption Based on Partial Knowledge

  • Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols

  • Visual Analysis of Android Malware Behavior Profile Based on : A Pruned Lightweight APP Call Graph

  • Mending Wall: On the Implementation of Censorship in India

  • Defining and Detecting Environment Discrimination in Android Apps

  • Gray-Box Software Integrity Checking via Side-Channels

  • Enhancing Android Security Through App Splitting