Energy-efficient Resource Allocation in Future IoT with Knowledge Collaboration
Zhongwei Huang, Dagang Li, Jun Cai
HybridFL: Hybrid approach toward privacy-preserving Federated Learning
Sheraz Ali, Saqib Mamoon, Areeba Usman, Chuan Zhao
Image copy-move forgery detection in the social media based on a prior density clustering
and the point density
Cong Lin, Hai Yang, Ke Huang, Yufeng Wu, Yamin Wen, Yuqiao Deng
Stable NICE Model-Based Image Generation for Generative Steganography
Xutong Cui, Zhili Zhou, Jianhua Yang, Chengsheng Yuan, Weixuan Tang
The Design of a Multi-application micro-operating system platform in the context of big data
Wenpan Mo, Zhicheng Shen
Packet-level Application Identification for IIoT Encrypted Traffic Based on 1D-CNN
Yun Cai, Yufan Luo, Jianzhen Luo
Resource Bottleneck Aware vPLC Deployment Algorithm for Industrial Edge Computing Power Network
Jianzhen Luo, Chunzhou Cai, Zhixuan Tong, Jun Cai
Computer-generated Image Forensics Based on Vision Transformer
with Forensic Feature Pre-processing Module
Yifang Chen, Guanchen Wen, Yong Wang, Jianhua Yang, Yu Zhang
Consortium Blockchain Storage Optimization Based on Fountain Codes
Jianhong Li, Qi Chen, Xianmin Wang, Guoyu Yang, Zihan Jiang, Teng Huang, Li Hu
A Multiparty Reversible Data Hiding Scheme in Encrypted Domain Based on Hybrid Encryption
Bing Chen, Lu Chai, Ranran Yang
An Enhanced Data-sharing Method based on Blockchain and Random Forest
Haiyan Kang, Dongting Li, Tao Cheng, Xiaoshi Wang
An Incentive Mechanism and An Offline Trajectory Publishing Algorithm Considering Sensing Area Coverage Maximization and Participant Privacy Level
Qing Cao, Yunfei Tan, Guozheng Zhang
Research on Face Recognition System Based on RLWE Homomorphic Encryption
YuLin Wang, HaiLin Huang, ZiHao Fang, YuQui Zhao, JinHeng Wang
An integration-enhanced ZNN approach for chaotic combined synchronization with external disturbances
Chenfu Yi, Mingdong Zhu, Jingjing Chen
A lightweight anomaly detection method for industrial processes based on event correlation behavior
Yan Cai, Jianzhen Luo, Jun Cai, Wanhan Fang
A Novel Polar Code-Based Key Encapsulation Mechanism with Non-Permutation Equivalent Public Key
Huiling Zhang, Zhiqiang Lin, Jingang Liu, Haixiong Zhou
Two-stage Multi-lingual Speech Emotion Recognition for Multi-lingual Emotional Speech Synthesis
Xin Huang, Zuqiang Zeng, Chenjing Sun, JiChen Yang
EncoderMU: Machine Unlearning In Contrastive Learning
Zixin Wang, Bing Mi, Kongyang Chen
SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Scheduling in Cloud-Fog Computing
Santhosh Kumar Medishetti, Ganesh Reddy Karri
VoIP steganalysis using shallow multiscale convolution and transformer
JingHui Peng, Shanyu Tang
NoCrypto: A Web Mining Behavior Detection Method Based on RGB Images
Hui Wang, Yu Zhang, Ming Xiao Pan, Yi Wei Huang
Feedback Feed-forward Iterative Learning Control for Non-affine Nonlinear discrete-time Systems with Varying Trail Lengths
Sixian Xiong, Yun-Shan Wei, Mengtao Lei
Open-Closed-Loop Iterative Learning Control Based on Differential Evolution Algorithm for Nonlinear System
Mengtao Lei, Yun-Shan Wei, Sixian Xiong
Overview of Vehicle Edge Computing and Its Security
Shaodong Han, Maojie Wang, Guihong Chen
Speech Emotion Recognition Based on Recurrent Neural Networks with Conformer for Emotional Speech Synthesis
Xin Huang, Chenjing Sun, Jichen Yang, Xianhua Hou
Detection of Speech Spoofing Based on Dense Convolutional Network
Yong Wang, Xiaozong Chen, Yifang Chen, Shunsi Zhang
Route Privacy-Preserving Authentication Scheme based on PUF in VANETs
Hanwen Deng, Yining Liu, Dong Wang
Anomaly Detection of Unstable Log Data Based on Contrastive Learning
Lan Liu, Huang Zhihao, Kangjian He, Jun Lin
ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection
Jianliang Ruan, Lan Liu, Pengcheng Wang, Jun Lin, Junhan Lu