default search action
ICCSIE 2023: Putrajaya, Malaysia
- Proceedings of the 8th International Conference on Cyber Security and Information Engineering, ICCSIE 2023, Putrajaya, Malaysia, September 22-24, 2023. ACM 2023
- Lan Zheng, Lei Liu:
Chaotic Digital Image Encryption Based on Fourier Transform. 1-7 - Wei Yang, Chenming Chang:
SmartGate: Accelerate Cloud Gateway with SmartNIC. 8-14 - Junkai Wang, Deng Zhang, Hanjun Gao:
Structure and key technologies of nuclear power plant network security situational awareness platform. 15-22 - Chao Lv, Kaisheng Zhang:
A Research of Improved Facial Expression Recognition Method Based on CBAM and Joint-normalization Techniques. 23-30 - Yun Zhu, Wenxiang Xu:
Research on Multi-level Trust Mechanism of Internet of Things. 31-36 - Xiaojie Xie, Gang Yang, Lei An, Yun Ren, Xiao Wu, Xin Tong, Yanhua He, Xiaojie Chen:
Research on Substation Quantum Secure Communication System Based on 5G Private Network Technology. 37-44 - Xiaomei Liu, Yujing Cao:
Research on Network Intrusion Detection Techniques Based on Feature Selection Model and Recurrent Neural Network. 45-51 - Yi Cai, Mingsheng Feng:
A Time-bound Data Access Control Scheme based on Attribute-based Encryption. 52-56 - Lixuan Zhu, Bin Xu:
Robust watermarking based on dual-random phase encryption against collusion attacks. 57-64 - Ru Han, Jin Xu:
Research Progress of Location Privacy Protection Technology in the Internet Era. 65-72 - Zhen Wang:
The Application and Practice of Computer Network Security Technology in Electronic Information Engineering. 73-77 - Lili Wang, Wei Chen, Haoliang Wang:
Data Visualization Analysis for Job Recruitment Based on Big Data. 78-83 - Yuanshi Deng, Zhengwei Chang, Jun Zhao, Wei Pu, Xuanwen Ding, Ran Zhang, Hongyan Wang, Xiaopei Guo, Hongqiang Gong:
Tag Anti-collision Algorithm for RFID in Underdetermined States Based on Local Sparse Constraints. 84-90 - Zhijiang Zhang, Yanyong Zhang, Zhibing Wang:
Bixi: A EB-level Object Storage System Based on CEPH. 91-96 - Fuzhong Hao, Lei Liang, Nuannuan Li, Linhai Mu, Haiyan Zhi:
Bluetooth AOA Localization Technology Based on LS and MUSIC Algorithms. 97-102 - Hongwei Niu, Lixuan Zhu:
Adaptive Motion Compensation and Quantized Embedded Watermarking Against Collusion Attacks. 103-110 - Xiangming Ni, Yuhong Zhao, Yue Yao:
Dynamic Heterogeneous Link Prediction Based on Hierarchical Attention Model. 111-115 - Yingying Zhang, Yue Shi:
Constructing Dynamic Honeypot Using Machine Learning. 116-120 - Jingli Han, Qing Xia, Zhaoli Wang:
Access Control Management of Information System based on Homomorphism and Blockchain Technology. 121-125 - Huizhong Liu, Suli Ge, Gaifang Tan, Song Tang:
Research on Application of Identity Authentication Encryption Technology in Blockchain Scene. 126-129 - Jixin Wei, Yanzhen Huang:
A K-means Algorithm for Blockchain the Construction of Data Privacy Security Monitoring System. 130-134 - Chenyu Yang, Rong Fei, Junxuan Shi:
Improved Indoor Location Algorithm of Multilayer Perceptron based on RSSI. 135-141 - Siyao Wen, Dandan Li, Junlong Yuan, Jingbin Huang, Long Zhou:
Design and Implementation of a Game Session Plugin based on Unreal Engine. 142-149 - Liansuo Wei, Shenhao Huan, Longyu Ma:
A Topology Control Algorithm based on Theil's Entropy lmproved Potential Game for Wireless Sensor Networks. 150-158 - Yaowen Sun:
FL Intelligent Wireless Network Optimization System. 159-165 - Xibin Sun, Wenting Li, Jiwei Qiu, Di Han:
A Maximal Information Coefficient-based Feature Selection Method for Intrusion Detection. 166-170 - Feng Li, Guangyue Jia, Chengbo Liu:
Design of RFID Data Acquisition System for Manufacturing Execution Systems. 171-176 - Yingzhuo Zhang, Minghua Wang, Haochen Shi, Jingheng Zhang:
Data Cooperative Transmission and Resource Allocation Algorithm in Aviation Communication. 177-182 - Qing Xia, Jingli Han, Zhaoli Wang:
An Extensible and Traceable Data Operation Recording System Architecture and Method. 183-187 - Xin Ye, Shimin Wang, Han Wang, Qinwei Wei, Ting Yang, Yu Tao:
Application of Knowledge Graph in Financial Information Security Strategy. 188-192 - Baizheng Wang, Qiang Zhang, Wen Shao, Kexun He, Xiyu Fang, Xuebin Shao:
A Network Security Test Evaluation Model of Automobile Digital Key. 193-199 - Yang Yang, Juxing Di, Wencheng Zhang, Fumei Yu:
Anomalous Traffic Detection in Campus Networks based on NetFlow and CNN. 200-203 - Wenjing Chen, Jingyi Liu:
Research and Implementationof National Commercial Cryptographic Algorithms. 204-210 - Canyu Huang, Dongwei Zhang, Yingzhuo Zhang:
NEMO Routing Optimization for Aviation Communication Based on Simulated Annealing Algorithm. 211-216 - Yuchuan Yang, Fan Xu, Bin Yin, Wanyu Li, Xiaochen Fan, Yiwen Hu:
Application of Network Data Transmission Module Based on Advance Planning in Aerospace Measurement and Control Simulation Field. 217-221 - Zhaoyang Liu, Ru Xue:
The EEG Signal Encryption Scheme Based on Hyperchaotic System and Identity Authentication. 222-229 - Jian Kang, Xiaodi Suo, Lu Liu, Xunshi Wang, Zhengjun He, Jinjun Chen:
Research on All-Digital Simulation Method for OTN Optical Signal Fault. 230-235 - Zhengwei Chang, Yuanshi Deng, Xuanwen Ding, Wei Pu, Fuxiang Li, Lin Yang, Jun Zhao, Hongyan Wang:
Safety Equipment Management of cabinet Based on Intelligent Information Processing Technology. 236-246 - Jianping Zhao, Huan Wang, Yichuan Wang, Hua Li, Yan Wang:
Cross-Level Network Security Element Fusion Extraction Method Based on Deep Learning. 247-254 - Yiting Yin, Jingxu Zhang, Liping Zhu, Guodong Li:
Research on Sensitive Frame Recognition Algorithm for Home Monitoring Video Based on Mixture of Gaussians Background Modeling. 255-261 - Jipeng Zhou:
Frequency-domain Generative Adversarial Image Super-Resolution Algorithm Based on Phase Attention Loss. 262-268 - Xiuxia Zhang, Dongyuan Xing, Shuyi Wei:
Simulation of Light Source Layout Characteristics for Tunnel Visible Light Communication. 269-273 - Xiaolong Li, Zhenhua Yan, Shuang Zhang, Xinghua Li, Feng Wang:
Formal Characterization of Malicious Code in Power Information Systems Based on Multidimensional Feature Fusion. 274-281 - Hao Zhou, Zhiwei Sheng:
A Federated Learning based Botnet Detection Method for Industrial Internet of Things. 282-288 - Boyi Zheng, Tao Li, Wenxia Xu, Liping Zhu:
Design and Application of Chaos Algorithm based on the Sprott-B System. 289-294 - Fengli Sun, Yan Wang:
Multi-image Multiplexing Pixel Synchronization Encryption based on Optical Scanning Holography. 295-301 - Hao Xu, Haoning Chen, Ying Nie, Yilin Li:
Research on Power Intrusion Protection System Architecture Based on Edge Computing Nodes. 302-306 - Qi Liu, Sunqing Xu:
Weak signal detection technology based on improved background noise subtraction. 307-313 - Mengting Liu:
Application of Image Sharing and Encryption Based on Visual Cryptography in Networking Systems of AI. 314-318 - Jun Zhao, Qi Liu:
Research on noise source localization technology based on improved DCS-SOMP algorithm. 319-327 - Wen Li:
Trustless Layer for Secure Fog Computing. 328-334 - Dongya Xiao, Mingda Li, Zheng Xu:
Performance Analysis of Different Intensity Modulation Techniques over Weak Turbulence Channel. 335-340 - Qi Wu, Shuo Wen, Boliang Liu:
A Method for Identifying Encrypted Webshell Traffic. 341-349 - Wei Sun, Yu Wang, Junjie Ma, Xin Wang, Weihao Shi, Fei Jiao, Ningbo Liu:
Data Privacy Protection and Sharing in Smart Grid Based on Blockchain Technology. 350-355 - Xing Zhao, Jie Heng, Qian Sun:
Research on Network Intrusion Simulation and Adversarial Strategies Based on Generate Adversarial Networks. 356-360
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.