default search action
13th ICCNS 2023: Fuzhou, China
- Proceedings of the 2023 13th International Conference on Communication and Network Security, ICCNS 2023, Fuzhou, China, December 6-8, 2023. ACM 2023
Chapter 1 Software Detection and Information Security
- Chenxi Lyu, Yinan Yao, Xiaodong Guo, Zihong Huang, Chen Dong, Yuanyuan Zhang, Zhenyi Chen:
AntiMal: an Approach of Malware Detection Employing Swin Transformer. 1-5 - Wei Zhao, Zhiwei Li, Ruilin Li, Chaojing Tang:
CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior. 6-11 - Chengling Wang, Yunru Ma, Yuexin Zhang, Ayong Ye, Li Xu:
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder. 12-18 - Xiaozhou Wang, Jianfei Ye, Linjie Feng, Chenji Feng, Jun Chen:
Trusted Delivery Mechanisms for Software Supply Chains Based on Trusted Execution Environment. 19-25 - Zhihao Li, Zhongwei Sun:
A Cross-Domain Authentication Scheme for Electric Vehicle Intelligent Charging for Multiple Power Service Providers. 26-31 - Lei Liu, Ziyou He:
Webshell Detection Based On CodeBERT And Deep Learning. 32-39 - Zhongliao Yang, Yinan Yao, Xiaodong Guo, Peixin Huang, Jiayin Li, Yuzhong Chen, Xintian Liang:
A Module Placement Method for Digital Microfluidic Biochips Based on Security Design. 40-45 - Abdur Rashid Sangi, Jyothish Nagaram, Akshara Sudulagunta, Sai Sandeep Talari, Vinay Malla, Murali Krishna Enduri, Satish Anamalamudi:
Tackling Disinformation: Machine Learning Solutions for Fake News Detection. 46-51
Chapter 2 Advanced Data Encryption Technology and Information Authentication
- Mao Wang, Shanshan Tu, Haoyu Yu, Peihe Yan:
Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private Blockchain. 52-61 - Rui Ma, Xvhong Zhou, Xiajing Wang, Zheng Zhang, Jinman Jiang, Wei Huo:
pAFL: Adaptive Energy Allocation with Upper Confidence Bound. 62-68 - Yinan Yao, Chen Dong, Zhengye Xie, Yuqing Li, Xiaodong Guo, Yang Yang, Xiaoding Wang:
A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning. 69-76 - Yufeng Li, Xu Yan, Mingxuan Xiao, Weimin Wang, Fei Zhang:
Investigation of Creating Accessibility Linked Data Based on Publicly Available Accessibility Datasets. 77-81 - Qiaowen Wu, Yaojie Ke, Zhanghui Liu, Yuanyuan Zhang, Qiyan Wu:
Marine litter detection based on YOLOv7 algorithm and data encryption protection. 82-87 - Jianhui Huang, Changxiang Shen, Jianbiao Zhang, Liang Wang, Ruqian Li:
A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM. 88-93 - Qian Zhang, Xing Zhang, Wei Shi:
Privacy-preserving Trajectory Data Release Hierarchical Model. 94-99 - Zhirun Lin, Yang Yang, Yonghua Zhan, Jiayin Li, Chen Dong:
Blockchain-based Searchable Encryption Scheme for Spatial Text Data. 100-105
Chapter 3 Modern Cryptography Theory and Encryption Technology
- Xiaodong Guo, Chenxi Lyu, Zhenyi Chen, Xiaoding Wang, Ruishen Bao, Chen Dong:
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication. 106-111 - Wentao Xi, Xingjun Wu, Kai Zhang:
A low-cost configurable hash computing circuit for PQC algorithm. 112-116 - Liang Ni, Hengsheng Zhou, Yawei Zhang, Xiaoyan Liu, Bingke Gu:
Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol. 117-126 - Wei Zou, Shanshan Tu, Zhenhu Ning, Jiawei Xu, Shuaikun Xing, Xue Liao:
An improved particle swarm optimization algorithm for P300 Neural network recognizer. 127-135 - Jinxing Xu, Jian Zou, Qiufu Lan, Jiayin Li:
Improved Meet-in-the-Middle Cryptanalysis on Kupyna. 136-143 - Nianhao Xiao, Long Wang, Jing Fan, Chunzhu Shi, Yutong Xie:
A Certificateless Trusted Connection Protocol for Smart Factories. 144-150 - Han Lin, Jian Zou, Jiayin Li:
The differential meet-in-the-middle attack on FUTURE and CRAFT. 151-158
Chapter 4 Data Centric Network Detection and Security Protection
- Antonin Bohacik, Eva Holasova, Radek Fujdiak, Jan Racka:
Convolutional Neural Network-Based Classification of Secured IEC 104 Traffic in Energy Systems. 159-165 - Daowei Chen, Hongsheng Yan, Wei Dai:
Selection of defense strategy for high-level network based on multistage APT attack-defense game. 166-172 - Ondrej Pospisil, Radek Fujdiak:
Identifying Industry Devices via Time Delay in Dataflow. 173-177 - Yanming Chen:
Optoelectronic Task Processing based on Multilevel Collaborative Computing Networks: An Optimization-based Approach. 178-182 - Dandan Xing, Suzhen Cao, Yifan Zhang:
Environment monitoring solution for Flying Ad-hoc Networks based on certificateless aggregate signature. 183-188 - Peihe Yan, Shanshan Tu, Mao Wang:
Multi-User Identity Authentication in Wireless Communication Based on Deep Learning and Data Augmentation. 189-195 - Jian Jiao, Zhifei Liu, Lan Li:
Intranet security detection based on image and deep transfer learning. 196-202 - Xin Ai, Qingqing Yue, Hongchen Li, Wenlong Li, Shanshan Tu, Sadaqat ur Rehman:
Physical Layer Authentication Based on Transformer. 203-208 - Karel Kuchar, Petr Blazek, Radek Fujdiak:
From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity Education. 209-214 - Eva Holasova, Radek Fujdiak, Petr Blazek, Antonin Bohacik:
Automated Neural Network Structure Design for Efficient. 215-221 - Changping Lai, Yinan Yao, Yuzhong Chen, Xintian Liang, Tianqi Cai, Yiqing Shi:
Detection of IoT Botnet Based on Convolutional Neural Network and Linear Support Vector Machine. 222-226 - Chaoyang Zhu, Xiao Zhu, Zhenrong Zhang, Tuanfa Qin:
A Privacy Protecting Mechanism in UAV-MEC Network with Blockchain-Enabled Federated Learning. 227-233 - Bingquan Wang, Meili Cui, Junchen Gao:
Security authentication protocol for Industrial Internet of Things. 234-240 - Xiaozhou Wang, Jianfei Ye, Tong Liu, Yinjie Wang, Xuefang Li, Lin Lin:
Dynamic Trust Assessment Method for Mobile Network Devices. 241-245
Chapter 5 Communication Resource Management and Network Optimization
- Wenzhe Gu, Botao Feng, Yiyuan Luo, Jianchao Zheng, Yun Lu:
A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications. 246-251 - Yanggege Zhang, Bo Zhang, Te Ma, Jie Hu:
Multi-UAVs Cooperative Target Search with Communication Constraint. 252-257 - Ning Wu, Li Li, Xingyu Liu, Ziwen Wang, Tongyao Jia:
Enhancing UAV Swarm Routing with Multi-Agent Attention Reinforcement Learning. 258-264 - Zeyi Liu, Xiaodong Guo, Yinan Yao, Yuzhong Chen, Xin Yang, Jiayin Li:
Nonstationary Network Traffic Prediction With RevIN-based LSTM. 265-269 - Youwu Liu, Rajamohan Parthasarathy:
Optimizing Wireless Mesh Network Gateway Deployment Using an Enhanced Sparrow Optimization Algorithm. 270-275 - Taoshen Li, Zhijun Qi:
D2D communication resource allocation algorithm based on multi-agent reinforcement learning. 276-281 - Da Chen, Feng Biao Zan, Xin Liu, Xuan Meng:
DROO-C Data Transfer in a Mobile Edge Computing Offloading Framework. 282-293 - Jiayuan Zhong, Yuzhong Chen, Yiqing Shi, Yan Li, Peiqing Chen:
A Novel Network Traffic Prediction Method Based on Complete Ensemble Empirical Mode Decomposition with Adaptive Noise. 294-299 - Shihui Duan, Renhe Yan, Jie Chen, Meihui Liu, Qichen Xu:
Comparison and Testing of Time Synchronization Accuracy between IEEE 1588v2 and IEEE 802.1AS. 300-305
Chapter 6 Digital Signal Analysis and Processing
- Aiguo Li, Zhuoping Qiang:
Multi-sensor data fusion method based on adaptive Kalman filtering. 306-311 - Zhiyi Chen, Peizhe Xin, Peng Zhan, Menhua Zheng, Yuxiao Sun, Can Li, Ping Meng, Yajie Li, Yongli Zhao:
Learned Digital Back-Propagation for an optical-domain waveform integrated with communication and sensing. 312-316 - Zhichao Xu, Faping Lu, Zhilin Zhang, Dongkai Yang, Xiguo Liu, Jiafang Kang, Yaozong Pan, Qi An:
A Flexible Waveform Based on PSWFs Signal for Next-Generation Communication. 317-322 - Hangyu Zhao, Daobin Wang, Quansheng Huang, Guangfu Li, Kun Wen:
A Phase Noise Suppression Method Based on Real-imaginary Alternating Pilots for Coherent Optical OFDM-OQAM Communication Systems. 323-329 - Jan Pospisil, Radek Fujdiak:
Increasing data rate of LoRa technology using frequency division multiplex. 330-334 - Jiazi Gao, Xin Sun, Zhengyu Song, Jun Wang, Tianwei Hou:
A Novel Single-Station Tracking Algorithm towards High-Dynamic Targets in 3D Space. 335-341 - Ruishen Bao, Jiayin Li, Yuzhong Chen, Kaihui Yang, Ziyang Chen, Yuanyuan Zhang:
PracticalHAR: A Practical Method of Human Activity Recognition Based on Embedded Sensors of Mobile Phone. 342-349 - Shanshan Tu, Wenlong Li, Xin Ai, Hongchen Li, Qingqing Yue, Sadaqat ur Rehman:
A Hybrid Deep Learning Model for Breast Cancer Detection and Classification. 350-353
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.