# Title Authors
1570823581 False Data Injection Attack Detection in a Platoon of CACC in RSU Kai Gao; Xiangyu Cheng; Hao Huang; Xunhao Li; Ronghua Du
1570823872 Forgery Trajectory Injection Attack Detection for Traffic Lights Under Connected Vehicle Environment Yanghui Zhang; Kai Gao; Shuo Huang; Xunhao Li; Ronghua Du
1570824527 Battery Aging-Robust Driving Range Prediction of Electric Bus Heng Li; Zhijun Liu; Yongting Liu; Hui Peng; Rui Zhang; Jun Peng; Zhiwu Huang
1570824560 A Thermal-Aware Digital Twin Model of Permanent Magnet Synchronous Motors (PMSM) Based on BP Neural Networks Heng Li; Zeyu Zhu; Peinan He; Yingze Yang; Bin Chen; Jun Peng; Zhiwu Huang
1570842284 Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments Lukasz Krzywiecki; Hannes Salin
1570842376 Robust Perception for Autonomous Vehicles using Dimensionality Reduction Shivam Garg; Nandish Chattopadhyay; Anupam Chattopadhyay
1570824387 Vehicle Classification System With Mobile Edge Computing Based on Broad Learning Xiting Peng; Naixian Zhao; Lexi Xu; Shi Bai
1570828968 Detection of impurity content in wheat based on cone-beam CT Gangyang Wang; Chunhua Zhu; Jianhou Wang
1570832913 Performance Analysis for Bearings-only Geolocation Based on Constellation of Satellites Jinzhou Li; Shouye Lv; Liu Yang; Sheng Wu; Yang Liu; Qijun Luan
1570834077 Multi-channel Live Video Processing Method Based on Cloud-edge Collaboration Zhen Guo; Pengzhou Zhang; Junjie Xia; Zhe Zhou; Juan Cao
1570834220 Collaborative Improvement of User Experience and Network Quality Based on Big Data Chuntao Song; Jie Gao; Fan Zhang; Tao Zhang; Yi Zhang; Lixia Liu; Bei Li; Yong Wang; Lexi Xu
1570834366 Research on Intelligent 5G Remote Interference Avoidance and Clustering Scheme Tian Xiao; Bei Li; Zixiang Di; Guanghai Liu; Lexi Xu; Jian Guan; Zhaoning Wang; Chen Cheng; Yi Li
1570834376 Big Data based Potential Fixed-Mobile Convergence User Mining Qingqing Zhang; Tao Zhang; Shikun Jiang; Qiang Zhang; Yuhui Han; Xinzhou Cheng; Yunyun Wang; Xin He; Tian Xiao
1570834438 Telecom Customer Churn Prediction based on Half Termination Dynamic Label and XGBoost Yi Zhang; Fan Zhang; Chuntao Song; Xinzhou Cheng; Chen Cheng; Lexi Xu; Tian Xiao; Bei Li
1570834893 Study on Gateway Station Deployment for Large Scale LEO Satellite Constellation Networks Cheng Lei
1570817209 A Hybrid BCI System Combining Motor Imagery and Conceptual Imagery in a Smart Home Environment Ruixuan Liu; Muyang Lyu; Jiangrong Yang
1570826196 Energy-Efficient and Traffic-Aware VNF Placement for Vertical Services in 5G Networks Yi Yue; Wencong Yang; Xiao Liang; Xihuizi Meng; Rong Huang; Xiong-yan Tang
1570828135 Technical architecture of integrated big data platform Yuan Liu; Yanmei Liu; Minjing Zhong
1570832724 Research on Enterprises Loss in Regional Economic Risk Management Heng Zhang; Wenyu Li; Lianbo Song; Lexi Xu; Xinzhou Cheng; Lijuan Cao; Kun Chao; Wei Xia; Qinqin Yu; Sai Han
1570834025 Research and Application of 5G Edge AI in Medical Industry Shangyu Tang; MingDe Huo; Yi Du; Yan Zhang; Yuwen Hou; Lexi Xu; Ying Ji; Guoyu Zhou
1570834927 Telecom Big Data assisted Algorithm and System of Campus Safety Management Chen Cheng; Xinzhou Cheng; Shikun Jiang; Xin Zhao; Yuhui Han; Tao Zhang; Lijuan Cao; Yuwei Jia; Tian Xiao; Bei Li
1570835702 Research on Capability Building of Mobile Network Data Analysis and Visualization Jian Guan; Xinzhou Cheng; Kun Chao; Xin He; Yuwei Jia; Lexi Xu; Yunyun Wang; Tian Xiao; Bei Li
1570836183 User Analysis and Traffic Prediction Method based on Behavior Slicing Xin He; Lijuan Cao; Yuwei Jia; Kun Chao; Miaoqiong Wang; Chao Wang; Yunyun Wang; RunSha Dong; Zhenqiao Zhao
1570842286 An Attribute-Attack-Proof Watermarking Technique for Relational Database Shuguang Yuan; Chi Chen; Ke Yang; Tengfei Yang; Jing Yu
1570842987 Smart Grid Data Aggregation Scheme Based on Local Differential Privacy Zhongyuan Qin; Leione Zhang; Dong Mao; Yubo Song; Liquan Chen; Zuge Chen
1570812627 5G-A Capability Exposure Scheme based on Harmonized Communication and Sensing Lin Lin; Bin Zhu; ZeLin Wang; Guangquan Wang; Jianzhi Wang; Lexi Xu; Sai Han; Yuwei Jia
1570832715 Automatic Association of Cross-Domain Network Topology Sai Han; ZeLin Wang; Guangquan Wang; Qiukeng Fang; Hongbing Ma; Lin Lin; Lexi Xu; Heng Zhang
1570833409 Research on User Complaint Problem Location and Complaint Early Warning Stragegy Based on Big Data Analysis Jie Gao; Lixia Liu; Tao Zhang; Shenghao Jia; Chuntao Song; Lexi Xu; Yang Wu; Bei Li; Yunyun Wang; Xinjie Hou
1570834001 Research on 5G Network Capacity and Expansion XiaoMeng Zhu; Yi Li; Yuting Zheng; Rui Xia; Lexi Xu; Bei Li; Zixiang Di; Lu Zhi; Xinzhou Cheng
1570834057 Mahalanobis Distance and Pauta Criterion based Log Anomaly Detection Algorithm for 5G Mobile Network Yuting Zheng; Yi Li; Yuchao Jin; XiaoMeng Zhu; Lexi Xu; Tian Xiao; Bei Li; Xinzhou Cheng
1570834645 AI based Collaborative Optimization Scheme for Multi-Frequency Heterogeneous 4G/5G Networks Tian Xiao; Guoping Xu; Bei Li; Lexi Xu; Xinzhou Cheng; Feibi Lyu; Guanghai Liu; Yi Zhang; Qingqing Zhang
1570835499 Coverage Estimation of Wireless Network Using Attention U-Net Feibi Lyu; Xinzhou Cheng; Lexi Xu; Liang Liu; Jinjian Qiao; Lu Zhi; Zixiang Di; Tian Xiao; Chen Cheng
1570835531 A Novel User Mobility Prediction Scheme based on Weighted Markov Chain Model Yuwei Jia; Kun Chao; Xinzhou Cheng; Lin Lin; Lijuan Cao; Yi Li; Yuchao Jin; Zixiang Di; Chen Cheng
1570836086 Research on Voice Quality Evaluation Method Based on Artificial Neural Network Zixiang Di; Tian Xiao; Yi Li; Xinzhou Cheng; Bei Li; Lexi Xu; XiaoMeng Zhu; Lu Zhi; Rui Xia
1570844161 Pre-training Fine-tuning data Enhancement method based on active learning Deqi Cao; Zhaoyun Ding; Wangfei Wang, fei
1570825281 Performance Analysis of the IEEE 802.11p for Vehicular Networks With Bursty Packet Errors Ning Wang; Jia Hu
1570827109 Cache Top-level domain locally: make DNS respond quickly Haisheng Yu; Yan Liu; Lihong Duan; Sanwei Liu; WenYong Wang; Zirui Peng; Daobiao Gong
1570829065 An Energy-Efficient scheme for industrial wireless sensor network based on hierarchical network structure Huamei Qi
1570832565 MGF-GAN: Multi Granularity Text Feature Fusion for Text-guided-Image Synthesis Wang Xingfu; Xiangyu Li; Ammar Hawbani; Liang Zhao; Saeed Alsamhi
1570832567 Multimodal Graph Reasoning and Fusion for Video Question Answering Shuai Zhang; Wang Xingfu; Ammar Hawbani; Liang Zhao; Saeed Alsamhi
1570843290 A Secure Remote Password Protocol From The Learning With Errors Problem Huapeng Li; Baocheng Wang
1570815843 Ferrite Microstrip Limiter Based on the Equivalent Nonlinear Loss Simulation Model for the Narrow Microwave Pulse Environment Mingyu Yang; Tao Yang; Haiyang Wang; Hao Li; Tianming Li; Biao Hu
1570834760 Indoor precise positioning system of UWB/INS tight integration Lin Chen; Zhouzheng Gao
1570834852 Dynamic Resource Allocation for Beam Hopping Satellites Communication System: An Exploration XinQing Du; Xin Hu
1570835693 PAPR Suppression in Radar Communication Integration System Based on Subcarrier Reservation Biao Yang; Shanshan Zhao; Hongfei Du; Minju Yi; Ziwei Liu
1570843296 Listing the ingredients for IFTTT recipes Shirin Kalantari; Danny Hughes; Bart De Decker
1570825021 Measurement of Malware Family Classification on a Large-Scale Real-World Dataset Qinqin Wang; Hanbing Yan; Rui Mei; Zhihui Han
1570827785 Data Driven based Malicious URL Detection using Explainable AI Saranda Poddar; Deepraj Chowdhury; Ashutosh Dhar Dwivedi; Raghava Rao Mukkamala
1570831904 Towards logical specification of adversarial examples in machine learning Marwa Zeroual; Brahim Hamid; Jason Jaskolka; Morayo Adedjouma
1570832135 A Blockchain-assisted Collaborative Ensemble
Learning for Network Intrusion Detection
Lijian Liu
1570833453 Research on OTFS Systems for 6G Bei Li; Tian Xiao; Kai Zhou; Lexi Xu; Guanghai Liu; Bo Wang; Jie Gao; Jian Guan; Zixiang Di
1570833742 Benchmark Tool for Detecting Anomalous Program Behaviour on Embedded Devices Michal Borowski; Sangeet Saha; Xiaojun Zhai; Klaus McDonald-Maier
1570834280 Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect Lin Dejia
1570834481 A Compatible Security Protocol for ACARS with Identity Privacy Protection Xinwei Li; Qianyun Zhang; Lexi Xu; Tao Shang
1570836595 Hierarchical Classification of Android Malware Traffic Giampaolo Bovenzi; Valerio Persico; Antonio Pescap¨¦; Anna Piscitelli; Vincenzo Spadari
1570842281 Cache Design Effect on Microarchitecture Security: A Contrast between Xuantie-910 and BOOM Zhe Zhou; Xiaoyu Cheng; Yang Sun; Fang Jiang; Fei Tong; Yuxing Mao; Ruilin Wang
1570842285 CCTVCV: Computer Vision model/dataset supporting CCTV forensics applications Hannu Turtiainen; Andrei Costin; Timo Hämäläinen; Tuomo Lahtinen; Lauri Sintonen
1570842288 K-Time Redactable Blockchain with Controllable Cheating Editors Yong Li; Zhenghao Zhang; Xi Chen; Ruxian Li; Liang Zhang
1570842291 TINKER: A framework for Open source Cyberthreat Intelligence Nidhi Rastogi; Sharmishtha Dutta
1570842297 DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract Xiaofei Xing; Siqi He; Guojun Wang
1570842329 A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain Kealan Dunnett; Shantanu Pal; Guntur Dharma Putra; Zahra Jadidi; Raja Jurdak
1570842888 "The Need for Speed": Extracting Session Keys From the Main Memory Using Brute-force and Machine Learning Stewart Sentanoe; Christofer Fellicious; Hans Reiser; Michael Granitzer
1570842894 Understanding the Penetration Test Workflow: a security test with Tramonto in an e-Government application Daniel Dalalana Bertoglio; Luis Bier Sch¨¹ler; Avelino F. Zorzo; Roben Castagna Lunardi
1570842895 A formalization-based vulnerability detection
method for cross-subject network components
Jinfu Chen; Haodi Xie; Saihua Cai; Ye Geng; Yemin Yin
1570842897 SCEVD: Semantic-Enhanced Code Embedding for Vulnerability Discovery Joseph Gear; Yue Xu; Ernest Foo; Praveen Gauravaram; Zahra Jadidi
1570842900 Trusted Hart for Mobile RISC-V Security Vladimir Ushakov; Sampo Sovio; Qingchao Qi; Vijayanand Nayani; Valentin Manea; Philip Ginzboorg; Jan-Erik Ekberg
1570842991 Clean-Label Backdoor Attack on Machine Learning-Based Malware Detection Models and Countermeasures Wanjia Zheng; Kazumasa Omote
1570842993 Adversarial Attacks on Deep Learning-Based Methods for Network Traffic Classification Meimei Li; Yiyan Xu; Nan Li; Zhongfeng Jin
1570822709 An End-To-End Multi-Label Classification Model for Arrhythmia Based on Varied-Length ECG Signals Yanfang Dong; Wenqiang Cai; Wenliang Zhu; Lirong Wang
1570822859 Arteriovenous Fistula Stenosis Classification Method Based on Auxiliary Wave and Transformer Jinke Xu; Junwei Zhang; Yujie Chen; Gang Ma; Zhanpeng Zhu; Lirong Wang
1570823839 A Heart Sound Classification Method Based on Residual Block and Attention Mechanism Yujie Chen; Wenliang Zhu; Jinke Xu; Junwei Zhang; Zhanpeng Zhu; Lirong Wang
1570823861 Denoising Method of ECG Signal Based on Channel Attention Mechanism Junwei Zhang; Rui Bao; Lirong Wang; Jinke Xu; Yujie Chen; Xueqin Chen
1570824150 Image Encryption Algorithm Based on Convolutional Neural Network and Four Square Matrix Encoding Bin Ge; Ting Wang; Chenxing Xia; Gaole Dai
1570824340 A Study on the Exoskeleton Motion Intent Recognition Algorithm for Embedded Calculation Shi Lei
1570825199 EEG Classification Algorithm of Motor Imagery Based on CNN-Transformer Fusion Network Haofeng Liu; Yuefeng Liu; Yue Wang; Bo Liu; Xiang Bao
1570843043 CCTV-FullyAware: toward end-to-end feasible privacy-enhancing and CCTV forensics applications Hannu Turtiainen; Andrei Costin; Timo Hämäläinen; Tuomo Lahtinen; Lauri Sintonen
1570846687 Create Persona of Elderly Users by Clustering Analysis of Needs Xiaoying Li
1570828544 An Improved Actor-Critic Method for Auto-Combating In Infantry Vehicles Chen Ruizhu
1570828552 End-to-End Speech Recognition Technology Based on Multi-Stream CNN Xiao Hao
1570828685 Research And Implementation Of Fault Diagnosis Of Switch Machine Based On Data Enhancement And CNN Li Mingyue
1570828743 Guide Tracking Method Based On Particle Filter Fusion Wang Zilong
1570829064 A K-Induction Method Extended with Value Analysis for C Program Safety Verification Guo Hui; Hou Chunyan; Wang Jinsong; Chen Chen
1570842296 Fuzzy Keyword Search over Encrypted Cloud Data with Dynamic Fine-grained Access Control Boshen Shan; Yuanzhi Yao; Weihai Li; Xiaodong Zuo; Nenghai Yu
1570842896 CAHOOT: A Context-Aware veHicular intrusiOn detectiOn sysTem Davide Micale; Gianpiero Costantino; Ilaria Matteucci; Florian Fenzl; Roland Rieke; Giuseppe Patan¨¨
1570842984 Confusing Traffic against Intra-domain Webpage Fingerprinting Attacks Weilin Yang; Yi Tang; Zhonghui Du; Yonghui Wu
1570842992 On the Performance of Deep Learning Methods for Identifying Abnormal Encrypted Proxy Traffic Hongce Zhao; Shunliang Zhang; Zhuang Qiao; Xianjin Huang; Xiaohui Zhang
1570843289 Personalized User Profiles-based Insider Threat Detection for Distributed File System Wu Xin; Qingni Shen; Ke Feng; Yutang Xia; Zhonghai Wu; Zhenghao Lin