# | Title | Authors |
1570823581 | False Data Injection Attack Detection in a Platoon of CACC in RSU | Kai Gao; Xiangyu Cheng; Hao Huang; Xunhao Li; Ronghua Du |
1570823872 | Forgery Trajectory Injection Attack Detection for Traffic Lights Under Connected Vehicle Environment | Yanghui Zhang; Kai Gao; Shuo Huang; Xunhao Li; Ronghua Du |
1570824527 | Battery Aging-Robust Driving Range Prediction of Electric Bus | Heng Li; Zhijun Liu; Yongting Liu; Hui Peng; Rui Zhang; Jun Peng; Zhiwu Huang |
1570824560 | A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural Networks | Heng Li; Zeyu Zhu; Peinan He; Yingze Yang; Bin Chen; Jun Peng; Zhiwu Huang |
1570842284 | Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments | Lukasz Krzywiecki; Hannes Salin |
1570842376 | Robust Perception for Autonomous Vehicles using Dimensionality Reduction | Shivam Garg; Nandish Chattopadhyay; Anupam Chattopadhyay |
1570824387 | Vehicle Classification System With Mobile Edge Computing Based on Broad Learning | Xiting Peng; Naixian Zhao; Lexi Xu; Shi Bai |
1570828968 | Detection of impurity content in wheat based on cone-beam CT | Gangyang Wang; Chunhua Zhu; Jianhou Wang |
1570832913 | Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites | Jinzhou Li; Shouye Lv; Liu Yang; Sheng Wu; Yang Liu; Qijun Luan |
1570834077 | Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration | Zhen Guo; Pengzhou Zhang; Junjie Xia; Zhe Zhou; Juan Cao |
1570834220 | Collaborative Improvement of User Experience and Network Quality Based on Big Data | Chuntao Song; Jie Gao; Fan Zhang; Tao Zhang; Yi Zhang; Lixia Liu; Bei Li; Yong Wang; Lexi Xu |
1570834366 | Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme | Tian Xiao; Bei Li; Zixiang Di; Guanghai Liu; Lexi Xu; Jian Guan; Zhaoning Wang; Chen Cheng; Yi Li |
1570834376 | Big Data based Potential Fixed-Mobile Convergence User Mining | Qingqing Zhang; Tao Zhang; Shikun Jiang; Qiang Zhang; Yuhui Han; Xinzhou Cheng; Yunyun Wang; Xin He; Tian Xiao |
1570834438 | Telecom Customer Churn Prediction based on Half Termination Dynamic Label and XGBoost | Yi Zhang; Fan Zhang; Chuntao Song; Xinzhou Cheng; Chen Cheng; Lexi Xu; Tian Xiao; Bei Li |
1570834893 | Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks | Cheng Lei |
1570817209 | A Hybrid BCI System Combining Motor Imagery and Conceptual Imagery in a Smart Home Environment | Ruixuan Liu; Muyang Lyu; Jiangrong Yang |
1570826196 | Energy-Efficient and Traffic-Aware VNF Placement for Vertical Services in 5G Networks | Yi Yue; Wencong Yang; Xiao Liang; Xihuizi Meng; Rong Huang; Xiong-yan Tang |
1570828135 | Technical architecture of integrated big data platform | Yuan Liu; Yanmei Liu; Minjing Zhong |
1570832724 | Research on Enterprises Loss in Regional Economic Risk Management | Heng Zhang; Wenyu Li; Lianbo Song; Lexi Xu; Xinzhou Cheng; Lijuan Cao; Kun Chao; Wei Xia; Qinqin Yu; Sai Han |
1570834025 | Research and Application of 5G Edge AI in Medical Industry | Shangyu Tang; MingDe Huo; Yi Du; Yan Zhang; Yuwen Hou; Lexi Xu; Ying Ji; Guoyu Zhou |
1570834927 | Telecom Big Data assisted Algorithm and System of Campus Safety Management | Chen Cheng; Xinzhou Cheng; Shikun Jiang; Xin Zhao; Yuhui Han; Tao Zhang; Lijuan Cao; Yuwei Jia; Tian Xiao; Bei Li |
1570835702 | Research on Capability Building of Mobile Network Data Analysis and Visualization | Jian Guan; Xinzhou Cheng; Kun Chao; Xin He; Yuwei Jia; Lexi Xu; Yunyun Wang; Tian Xiao; Bei Li |
1570836183 | User Analysis and Traffic Prediction Method based on Behavior Slicing | Xin He; Lijuan Cao; Yuwei Jia; Kun Chao; Miaoqiong Wang; Chao Wang; Yunyun Wang; RunSha Dong; Zhenqiao Zhao |
1570842286 | An Attribute-Attack-Proof Watermarking Technique for Relational Database | Shuguang Yuan; Chi Chen; Ke Yang; Tengfei Yang; Jing Yu |
1570842987 | Smart Grid Data Aggregation Scheme Based on Local Differential Privacy | Zhongyuan Qin; Leione Zhang; Dong Mao; Yubo Song; Liquan Chen; Zuge Chen |
1570812627 | 5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing | Lin Lin; Bin Zhu; ZeLin Wang; Guangquan Wang; Jianzhi Wang; Lexi Xu; Sai Han; Yuwei Jia |
1570832715 | Automatic Association of Cross-Domain Network Topology | Sai Han; ZeLin Wang; Guangquan Wang; Qiukeng Fang; Hongbing Ma; Lin Lin; Lexi Xu; Heng Zhang |
1570833409 | Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis | Jie Gao; Lixia Liu; Tao Zhang; Shenghao Jia; Chuntao Song; Lexi Xu; Yang Wu; Bei Li; Yunyun Wang; Xinjie Hou |
1570834001 | Research on 5G Network Capacity and Expansion | XiaoMeng Zhu; Yi Li; Yuting Zheng; Rui Xia; Lexi Xu; Bei Li; Zixiang Di; Lu Zhi; Xinzhou Cheng |
1570834057 | Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network | Yuting Zheng; Yi Li; Yuchao Jin; XiaoMeng Zhu; Lexi Xu; Tian Xiao; Bei Li; Xinzhou Cheng |
1570834645 | AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks | Tian Xiao; Guoping Xu; Bei Li; Lexi Xu; Xinzhou Cheng; Feibi Lyu; Guanghai Liu; Yi Zhang; Qingqing Zhang |
1570835499 | Coverage Estimation of Wireless Network Using Attention U-Net | Feibi Lyu; Xinzhou Cheng; Lexi Xu; Liang Liu; Jinjian Qiao; Lu Zhi; Zixiang Di; Tian Xiao; Chen Cheng |
1570835531 | A Novel User Mobility Prediction Scheme based on Weighted Markov Chain Model | Yuwei Jia; Kun Chao; Xinzhou Cheng; Lin Lin; Lijuan Cao; Yi Li; Yuchao Jin; Zixiang Di; Chen Cheng |
1570836086 | Research on Voice Quality Evaluation Method Based on Artificial Neural Network | Zixiang Di; Tian Xiao; Yi Li; Xinzhou Cheng; Bei Li; Lexi Xu; XiaoMeng Zhu; Lu Zhi; Rui Xia |
1570844161 | Pre-training Fine-tuning data Enhancement method based on active learning | Deqi Cao; Zhaoyun Ding; Wangfei Wang, fei |
1570825281 | Performance Analysis of the IEEE 802.11p for Vehicular Networks With Bursty Packet Errors | Ning Wang; Jia Hu |
1570827109 | Cache Top-level domain locally: make DNS respond quickly | Haisheng Yu; Yan Liu; Lihong Duan; Sanwei Liu; WenYong Wang; Zirui Peng; Daobiao Gong |
1570829065 | An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure | Huamei Qi |
1570832565 | MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis | Wang Xingfu; Xiangyu Li; Ammar Hawbani; Liang Zhao; Saeed Alsamhi |
1570832567 | Multimodal Graph Reasoning and Fusion for Video Question Answering | Shuai Zhang; Wang Xingfu; Ammar Hawbani; Liang Zhao; Saeed Alsamhi |
1570843290 | A Secure Remote Password Protocol From The Learning With Errors Problem | Huapeng Li; Baocheng Wang |
1570815843 | Ferrite Microstrip Limiter Based on the Equivalent Nonlinear Loss Simulation Model for the Narrow Microwave Pulse Environment | Mingyu Yang; Tao Yang; Haiyang Wang; Hao Li; Tianming Li; Biao Hu |
1570834760 | Indoor precise positioning system of UWB/INS tight integration | Lin Chen; Zhouzheng Gao |
1570834852 | Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration | XinQing Du; Xin Hu |
1570835693 | PAPR Suppression in Radar Communication Integration System Based on Subcarrier Reservation | Biao Yang; Shanshan Zhao; Hongfei Du; Minju Yi; Ziwei Liu |
1570843296 | Listing the ingredients for IFTTT recipes | Shirin Kalantari; Danny Hughes; Bart De Decker |
1570825021 | Measurement of Malware Family Classification on a Large-Scale Real-World Dataset | Qinqin Wang; Hanbing Yan; Rui Mei; Zhihui Han |
1570827785 | Data Driven based Malicious URL Detection using Explainable AI | Saranda Poddar; Deepraj Chowdhury; Ashutosh Dhar Dwivedi; Raghava Rao Mukkamala |
1570831904 | Towards logical specification of adversarial examples in machine learning | Marwa Zeroual; Brahim Hamid; Jason Jaskolka; Morayo Adedjouma |
1570832135 | A Blockchain-assisted
Collaborative Ensemble Learning for Network Intrusion Detection |
Lijian Liu |
1570833453 | Research on OTFS Systems for 6G | Bei Li; Tian Xiao; Kai Zhou; Lexi Xu; Guanghai Liu; Bo Wang; Jie Gao; Jian Guan; Zixiang Di |
1570833742 | Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices | Michal Borowski; Sangeet Saha; Xiaojun Zhai; Klaus McDonald-Maier |
1570834280 | Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect | Lin Dejia |
1570834481 | A Compatible Security Protocol for ACARS with Identity Privacy Protection | Xinwei Li; Qianyun Zhang; Lexi Xu; Tao Shang |
1570836595 | Hierarchical Classification of Android Malware Traffic | Giampaolo Bovenzi; Valerio Persico; Antonio Pescap¨¦; Anna Piscitelli; Vincenzo Spadari |
1570842281 | Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM | Zhe Zhou; Xiaoyu Cheng; Yang Sun; Fang Jiang; Fei Tong; Yuxing Mao; Ruilin Wang |
1570842285 | CCTVCV: Computer Vision model/dataset supporting CCTV forensics applications | Hannu Turtiainen; Andrei Costin; Timo Hämäläinen; Tuomo Lahtinen; Lauri Sintonen |
1570842288 | K-Time Redactable Blockchain with Controllable Cheating Editors | Yong Li; Zhenghao Zhang; Xi Chen; Ruxian Li; Liang Zhang |
1570842291 | TINKER: A framework for Open source Cyberthreat Intelligence | Nidhi Rastogi; Sharmishtha Dutta |
1570842297 | DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract | Xiaofei Xing; Siqi He; Guojun Wang |
1570842329 | A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain | Kealan Dunnett; Shantanu Pal; Guntur Dharma Putra; Zahra Jadidi; Raja Jurdak |
1570842888 | "The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning | Stewart Sentanoe; Christofer Fellicious; Hans Reiser; Michael Granitzer |
1570842894 | Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application | Daniel Dalalana Bertoglio; Luis Bier Sch¨¹ler; Avelino F. Zorzo; Roben Castagna Lunardi |
1570842895 | A formalization-based
vulnerability detection method for cross-subject network components |
Jinfu Chen; Haodi Xie; Saihua Cai; Ye Geng; Yemin Yin |
1570842897 | SCEVD: Semantic-Enhanced Code Embedding for Vulnerability Discovery | Joseph Gear; Yue Xu; Ernest Foo; Praveen Gauravaram; Zahra Jadidi |
1570842900 | Trusted Hart for Mobile RISC-V Security | Vladimir Ushakov; Sampo Sovio; Qingchao Qi; Vijayanand Nayani; Valentin Manea; Philip Ginzboorg; Jan-Erik Ekberg |
1570842991 | Clean-Label Backdoor Attack on Machine Learning-Based Malware Detection Models and Countermeasures | Wanjia Zheng; Kazumasa Omote |
1570842993 | Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification | Meimei Li; Yiyan Xu; Nan Li; Zhongfeng Jin |
1570822709 | An End-To-End Multi-Label Classification Model for Arrhythmia Based on Varied-Length ECG Signals | Yanfang Dong; Wenqiang Cai; Wenliang Zhu; Lirong Wang |
1570822859 | Arteriovenous Fistula Stenosis Classification Method Based on Auxiliary Wave and Transformer | Jinke Xu; Junwei Zhang; Yujie Chen; Gang Ma; Zhanpeng Zhu; Lirong Wang |
1570823839 | A Heart Sound Classification Method Based on Residual Block and Attention Mechanism | Yujie Chen; Wenliang Zhu; Jinke Xu; Junwei Zhang; Zhanpeng Zhu; Lirong Wang |
1570823861 | Denoising Method of ECG Signal Based on Channel Attention Mechanism | Junwei Zhang; Rui Bao; Lirong Wang; Jinke Xu; Yujie Chen; Xueqin Chen |
1570824150 | Image Encryption Algorithm Based on Convolutional Neural Network and Four Square Matrix Encoding | Bin Ge; Ting Wang; Chenxing Xia; Gaole Dai |
1570824340 | A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation | Shi Lei |
1570825199 | EEG Classification Algorithm of Motor Imagery Based on CNN-Transformer Fusion Network | Haofeng Liu; Yuefeng Liu; Yue Wang; Bo Liu; Xiang Bao |
1570843043 | CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications | Hannu Turtiainen; Andrei Costin; Timo Hämäläinen; Tuomo Lahtinen; Lauri Sintonen |
1570846687 | Create Persona of Elderly Users by Clustering Analysis of Needs | Xiaoying Li |
1570828544 | An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles | Chen Ruizhu |
1570828552 | End-to-End Speech Recognition Technology Based on Multi-Stream CNN | Xiao Hao |
1570828685 | Research And Implementation Of Fault Diagnosis Of Switch Machine Based On Data Enhancement And CNN | Li Mingyue |
1570828743 | Guide Tracking Method Based On Particle Filter Fusion | Wang Zilong |
1570829064 | A K-Induction Method Extended with Value Analysis for C Program Safety Verification | Guo Hui; Hou Chunyan; Wang Jinsong; Chen Chen |
1570842296 | Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control | Boshen Shan; Yuanzhi Yao; Weihai Li; Xiaodong Zuo; Nenghai Yu |
1570842896 | CAHOOT: A Context-Aware veHicular intrusiOn detectiOn sysTem | Davide Micale; Gianpiero Costantino; Ilaria Matteucci; Florian Fenzl; Roland Rieke; Giuseppe Patan¨¨ |
1570842984 | Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks | Weilin Yang; Yi Tang; Zhonghui Du; Yonghui Wu |
1570842992 | On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic | Hongce Zhao; Shunliang Zhang; Zhuang Qiao; Xianjin Huang; Xiaohui Zhang |
1570843289 | Personalized User Profiles-based Insider Threat Detection for Distributed File System | Wu Xin; Qingni Shen; Ke Feng; Yutang Xia; Zhonghai Wu; Zhenghao Lin |