• Research on Information Security Test Evaluation Method Based on Intelligent Connected Vehicle

  • Reliability Analysis of Coupled Cyber-Physical Systems Under Different Network Types

  • SE Dots: A Sensitive and Extensible Framework for Cross-Region DDoS Processing

  • A Blockchain-Based Digital Advertising Media Promotion System

  • State Consistency Checking for Non-reentrant Function Based on Taint Assisted Symbol Execution

  • Intrusion Detection System for IoT Heterogeneous Perceptual Network Based on Game Theory

  • Detecting Steganography in AMR Speech Based on Pulse Correlation

  • A Design of the Group Decision Making Medical Diagnosis Expert System Based on SED-JD Algorithm

  • Invulnerability Assessment of Cyber-Physics Systems for Blockchain Environment

  • Design and Implementation of a Lightweight Intrusion Detection and Prevention System

  • Identification and Trust Techniques Compatible with eIDAS Regulation

  • A Posted Pricing Mechanism Based on Random Forests in Crowdsourcing Market

  • A Non-repudiable Dynamic Provable Data Possession

  • A General Hardware Trojan Technique Targeted on Lightweight Cryptography with Bit-Serial Structure

  • A Novel Wireless Sensor Networks Malicious Node Detection Method

  • A Reverse Auction Incentive Mechanism Based on the Participant’s Behavior in Crowdsensing

  • Gathering Pattern Mining Method Based on Trajectory Data Stream

  • Zone Based Lossy Image Compression Using Discrete Wavelet and Discrete Cosine Transformations

  • Travel Modes Recognition Method Based on Mobile Phone Signaling Data

  • Two-Level Feature Selection Method for Low Detection Rate Attacks in Intrusion Detection

  • Design of an Urban Waterlogging Monitoring System Based on Internet of Things

  • Coordinated Web Scan Detection Based on Hierarchical Correlation

  • An Effective Encryption Scheme on Outsourcing Data for Query on Cloud Platform

  • FDSCD: Fast Deletion Scheme of Cloud Data

  • Grid Partition and Agglomeration for Bidirectional Hierarchical Clustering

  • A Multi-Objective Service Selection Method Based on Ant Colony Optimization for QoE Restrictions in the Internet of Things

  • Research on Multi Domain Based Access Control in Intelligent Connected Vehicle

  • Public Auditing of Log Integrity for Cloud Storage Systems via Blockchain

  • A RBAC Model Based on Identity-Based Cryptosystem in Cloud Storage

  • FIREWORK: Fog Orchestration for Secure IoT Networks

  • Fog-Enabled Smart Campus: Architecture and Challenges

  • A Trusted International Settlement Solution Based on Cross Check of CDRs

  • A Robust Reversible Watermarking Scheme for Relational Data

  • A One-Way Variable Threshold Proxy Re-signature Scheme for Mobile Internet

  • Application of Big Data Technology in JD

  • BL-IDS: Detecting Web Attacks Using Bi-LSTM Model Based on Deep Learning

  • A New Signcryption Scheme Based on Elliptic Curves

  • Design of ZigBee-Based Energy Harvesting Wireless Sensor Network and Modeling of Solar Energy

  • An Static Propositional Function Model to Detect Software Vulnerability

  • An Ant Colony Optimization Fuzzy Clustering Task Scheduling Algorithm in Mobile Edge Computing

  • EODVGA: An Enhanced ODV Based Genetic Algorithm for Multi-Depot Vehicle Routing Problem

  • Load Balancing Policies of Web Servers: Research Analysis, Classification and Perspectives

  • An Experimental Study with Tensor Flow for Characteristic mining of Mathematical Formulae from a Document

  • AP Deployment Optimization Based on Bluetooth Fingerprint Database Discrimination

  • A Hierarchical Bayesian Model for Matching Unlabeled Point Sets

  • Cross-social-network Interconnection Model Based on Bridge Community

  • LTE Antenna Port Number Detection Algorithm Based on Kalman Autoregression Filtering

  • A fast stitching method for container images using texture and weighted speed

  • Data Process for Indoor Positioning based on WiFi Fingerprint

  • A Mobile Edge Computing Enabled Spectrum Blockchain for the Internet of Spectrum Devices