default search action
NaNA 2024: Yinchuan City, China
- International Conference on Networking and Network Applications, NaNA 2024, Yinchuan City, China, August 9-12, 2024. IEEE 2024, ISBN 979-8-3503-7677-7
- Qiaoyang Li, Yanan Sun, Ning Xi:
LFL-COBC: Lightweight Federated Learning On Blockchain-based Device Contribution Allocation. 1-7 - Zheng Yuan, Youliang Tian, Jinbo Xiong, Linjie Wang:
Enhancing Privacy-Preserving Federated Learning: A Robust and Resilient Approach. 8-14 - Jin Liu, Zan Li, Qiguang Miao, Li Yang, Peihan Qi, Danyang Wang:
Analog Circuit Design of Normalized Bistable Stochastic Resonance Model and Its Application in Weak Signal Processing. 15-20 - Hongbin Zhang, Qingqing Ren, Bin Liu, Dongmei Zhao, Ying Li, Mingyue Qi:
System Security Assessment Method Integrating Risk Relationships of Open Source Software. 21-27 - Jian Mu, Xiaoyu Zhang, Renmin Zhao, Qiong Wang, Pujie Jing, Xia Feng:
CAKA: Certificateless Authenticated Key Agreement Scheme for Satellite-assisted Unmanned-aerial-vehicle Network. 28-34 - Junbo Huang, Youliang Tian, Kedi Yang, Linjie Wang:
A Service-Oriented Anonymous Authentication Scheme with Partial-Disclosure in C-ITS. 35-41 - Meiyun Xie, Xin Liu, Shuangrui Zhao, Yeqiu Xiao, Xiaohong Jiang:
A New Secrecy Metric for Relay-Eavesdropper Channel. 42-47 - Jiaqi Li, Ruoxia Yao, Yiping Tan, Jingwei Xuan, Yan Li:
An HIV/AIDS model with gender differences and awareness differences. 48-53 - Zhiyin Chen, Feng Zhou, Youliang Tiana, Shuai Wanga:
A Blockchain-Based Dynamic Incentive Model in Mobile Edge Computing. 54-59 - Yiwen Zhang, Shikai Shen, Bin Yang, Fei Deng, Yumei She, Kaiguo Qian, Riyu Wang, Kai Yang:
Average AoI Minimization in UAV-Enabled Covert Communication Systems. 60-65 - Abdelkader Mekkaoui, Omar Smail, Mohammed Rebbah:
Energy aware and link-Stability Routing Protocol based on Differential Evolution for MANETs. 66-71 - Xiaoxue Liu, Xinwei Duan, Xinhong Hei, Yichuan Wang, Xin Song:
Compiler Differentiation Detection Method for Binary Similarity. 72-77 - Yueyue Zhu, Huiru Wang, Hanjuan Cai, Xin Zhang, Guozhu Zhao, Ying Sun, Leilei Zhu, Huanhuan Zhao:
A Schizophrenia Screening Method Based on Fine-grained Facial Features and Network Isolation Privacy Protection. 78-83 - Kai Yang, Shikai Shen, Bin Yang, Fei Deng, Yumei She, Kaiguo Qian, Yiwen Zhang, Riyu Wang:
Covert and Secure Communications in UAV-Aided Untrusted Relay Systems. 84-88 - Yuliang Wang, Mingwei Xu, Cuiyun Hua, Jiafu Zhang, Kang Li, Zongpeng Li, Bo Yang:
RPKI Sentinel: An Efficient RPKI-based Routing Emergency Control Platform. 89-95 - Yichuan Wang, Peipei Li, Xin Song, Yeqiu Xiao, Xiaoxue Liu:
Probability analysis of system vulnerability distribution based on the matroid theory. 96-101 - Guiliang Cai, Qiang Wu, Wei Su:
Enabling Service Continuity Support for Low-Latency Services over Mobile Edge with Ubiquitous Mobility. 102-107 - Keshuang Han, Huangwenqing Shi, Runqing Wang, Pinchang Zhang:
Utilizing Space-Time Coding Metasurface for FMCW Radar Spoofing in RIS-Assisted Communication Systems. 108-111 - Changjun Ren, Lin Yan, Shujie Yang, Zan Zhou, Yi Sun:
Unveiling the Power of Collaboration: Detect DDoS Attacks on Proxies through Moving Target Defense with Multi-Proxy Synergy. 112-117 - Fangzhe Zhang, Donglan Liu, Fuhui Zhao, Xin Liu, Yingxian Chang, Rui Wang, Hao Zhang, Lili Sun, Shanjie Xu:
Security Enhancement Method for MQTT Based on TEE. 118-124 - Yanfei Cao, Naijie Gu, Xinyue Shen, Daiyuan Yang, Xingmin Zhang:
Defending Large Language Models Against Jailbreak Attacks Through Chain of Thought Prompting. 125-130 - Shuhui Fang, Xuejun Wan, Jun Wang, Lin Chai, Wenlin Pan, Wu Wang:
HiDS Data clustering algorithm based on differential privacy. 131-136 - Cheng Wu, Hong Zhong, Guilin Chen, Naji Alhusaini, Shenghui Zhao, Yuchen Zhang:
Optimizing Multimodal Federated Learning: Novel Approaches for Efficient Model Aggregation and Client Sampling. 137-146 - Phavithra Manoharan, Jiao Yin, Hua Wang, Yanchun Zhang, Wenjie Ye:
Insider Threat Detection: A Review. 147-153 - Qiaoling Lu, Feng Tian, Jie Ren, Mengdi Li:
Defense Against Membership Inference Attacks on Imbalanced Dataset Using Generated Data. 154-159 - Zijian Chen, Limei Peng, Pin-Han Ho:
A Novel GNN-based Decoding Scheme for Sparse Code Multiple Access (SCMA). 160-165 - Riyu Wang, Shikai Shen, Bin Yang, Kaiguo Qian, Fei Deng, Yumei She, Kai Yang, Yiwen Zhang:
Trajectory Optimization for UAV-Enabled Covert Communications. 166-171 - Yuanyu Zhang, Jia-Ning Wang, Zhumeng Zheng, Yulong Shen, Yunsong Jiang, Mengfei Yang:
Variational AutoEncoder-Based Radio Frequency Fingerprinting for GPS Anti-spoofing. 172-178 - Kaijun Wu, Bo Tian, Xue Wang:
A Secure Routing Method by Neural Combination Optimization Decision Algorithm Based on Overlay Network. 179-183 - Ziqing Zhang, Jie Ma, Shuoyu Mao, Peng Liang, Qi Liu:
A Low-overhead and Real-time Service Recovery Mechanism for Data Center Networks with SDN. 184-189 - Yeqiu Xiao, Yibin Ma, Yichuan Wang, Kun Jiang, Lanlan Cui:
A Novel Auralization Model for Network Security Situation Assessment. 190-195 - Yihua Peng, Wei Su, Jie Ma, Zhuojia Yang, Yuan Yuan, Lisheng Ma, Qi Liu, Peng Liang:
Sudden Traffic Prediction Based on Gated Recurrent Unit in Low Earth Orbit Satellite Networks. 196-201 - Xin Cao, Yu Han, Liumei Zhang, Yuanjiao Hu:
Research on Malicious Attack Detection and Evaluation Methods based on Entropy Increase Analysis. 202-208 - Yijun Zhang, Jun Yan, Yihui Zhou, Wenli Wang:
The Preservation of Weighted Graphs based on Shuffle differential privacy in Social Networks. 209-214 - Qifeng Miao, Yizhi Cao, Ranran Sun, Ji He, Xiaochen Li, Huihui Wu:
On Mobile Covert Communication in Wireless Networks with a Full-Duplex Receiver. 215-221 - Linying Tian, Chan Gao, Dong Zheng, Qiuxia Zhao, Yu Shi:
Covert Communication for UAV-Assisted Wireless Systems with Probabilistic Jamming. 222-228 - Zhuojia Yang, Bin Yang, Wei Su, Yudong Ma, Yihua Peng, Qi Liu, Peng Liang:
Dynamic Resource Allocation for Differentiated Service Adaptation in FANET. 229-235 - Huizhu Yang, Chao Yang, Qihang Wu, Weidong Yang:
Reputation Based Privacy-Preserving in Location-Dependent Crowdsensing for Vehicles. 236-241 - Yizhi Cao, Zewei Guo, Qifeng Miao, Ranran Sun, Ji He, Xiaochen Li:
Minimization of Age of Information for Satellite-Terrestrial Covert Communication with a Full-Duplex Receiver. 242-246 - Huangwenqing Shi, Mu Niu, Yulin Teng, Pinchang Zhang:
Privacy-Preserving Physical Layer Authentication Exploiting Carrier Frequency Offset in UAV-aided Communication Systems. 247-251 - Ruinan Peng, Xinhong Hei, Yichuan Wang, Xiaoxue Liu, Yeqiu Xiao:
Crucial Interaction Elements Detection for 5G Core Network based on the Complex Network Model. 252-257 - Qiutong Zheng, Jie Ma, Qi Liu, Peng Liang:
A Service Customize Routing Method Based on Software Defined Network Using Deep Q-Network. 258-262 - Xiaopu Wang, Jianing Sun, Chao Qi:
CEDA-TQA: Context Enhancement and Domain Adaptation Method for Textbook QA Based on LLM and RAG. 263-268 - Jianing Sun, Zhichao Zhang, Xueli He:
LLM4EduKG: LLM for Automatic Construction of Educational Knowledge Graph. 269-275 - Hui Tian, Haibao Chen, Yuyan Zhao, Pinchang Zhang, Yan Xu, Yangyang Liu:
Source Camera Device Identification Combining Sensor Intrinsic Features and Tag. 276-281 - Ruiqi Zeng, Yuxiang Chen:
A Novel Automatic Horizontal Extension Technology For Multi-instance Microservice System. 282-286 - Zhoukai Wang, Zuoyan Xu, Yaling Zhang, Xin Song, Yichuan Wang:
Research on Code Virtualization Methods for Cloud Applications. 287-292 - Xinhong Hei, Jianfeng Chen, Yichuan Wang, Xin Song, Lei Zhu:
A Novel Multipath Data Transmission Method with Traffic Obfuscation. 293-298 - Zhao Huang, Xin Gao, Xiao Liu, Lu Fan, Junjun Wang, Quan Wang:
A Dynamic Evolutionary Game-based Defense Method for Mining Pools against DDoS Attacks. 299-304 - Yunwang Xu, Jiangong Yang, Dingyang Liang, Huan Chen:
MQTT Third-party Library Porting Method and Application Based on the OpenHarmony Standard System. 305-310 - Yuliang Wang, Mingwei Xu, Kang Li, Cuiyun Hua, Jiafu Zhang, Zongpeng Li, Bo Yang:
Route Origin Authorization Emergency Synchronization Based on RPKI Relying Party Cache. 311-316 - Runqing Wang, Huangwenqing Shi, Keshuang Han, Pinchang Zhang:
Physical Layer Authentication with Cascade Channel Characteristics in IRS-Assisted UAV Communication System. 317-320 - Jiarun Ma, Shiling Feng, Jiahao Zeng, Jia Lu, Jie Chen:
Smart Contract Vulnerability Detection Based on Prompt-guided ChatGPT. 321-326 - Xin Song, Haonan Wang, Yichuan Wang, Xinhong Hei, Wenjiang Ji:
Code obfuscation protection strategies for program running states. 327-332 - Jian Li, Wei Tong, Lingxiao Yang, Xiangshang Gao, Zesong Dong, Chen Wang:
Blockchain and Oracle-Driven Web3 Architecture for Data Interaction. 333-338 - Zhijie Hu, Qing Kou, RuiBing Shen, PeiQiao Yang:
Smart Garbage Design Based on Voice Recognition. 339-344 - Chang Wang, Yuan Yuan, Haoru Li, Zijian Wang, Qi Liu:
State Update Control Based on Deep Reinforcement Learning: Balancing AoI-Update Counts. 345-350 - Liming Xu, Zhibo Zhao, Dingyang Liang:
PreKGAT: Using Course Prerequisite Relation and Knowledge Graph Attention Network for Course Recommendation. 351-356 - Yuan Zhou, Yaling Zhang:
Blockchain-based data security sharing and fair payment scheme in smart cities. 357-363 - Lina Zhang, Xueya Zhang, Xinjie Li, Kangrui Ma:
Research on Big Data Analysis of Online Learning Behavior and Predictive of Learning Effectiveness. 364-368 - Zijian Wang, Yuan Yuan, Chang Wang, Qi Liu, Peng Liang:
MEC-assisted Vertical Handover Based on Improved DQN in Heterogeneous Internet of Vehicles. 369-373 - Wanying Suo, Bello Ahmad Muhammad, Bo Liu:
LightGCN-LSC: Lightweight Graph Convolution Network for Learning Style Classification in Online Education. 374-379 - Congrui Wang, Li Li, Fei Hao:
Deep Attention Fusion Network for Attributed Graph Clustering. 380-385 - Xiaoli Ma, Guangsen Chen, Haoxuan Zhang, Tao Qin:
Towards Hierarchically Extracting Network Topologies. 386-392 - Hong Xia, Jing Xu, Bo Xiao, Hui Jia, Cong Gao, Yanping Chen:
Multi-source KPIs' root cause localization in online service systems. 393-398 - Yanni Liu, Ayong Ye, Yuanhuang Liu, Wenting Lu:
Few-Shot Malware Classification using Malware Variant and Model Augmentation. 399-404 - Tianying Chen, Jianfeng Chen, Xiao Li:
Research on Intelligent Big Data Collaborative Supervision System on Quality and Security Properties. 405-410 - Jiale Quan, Yu Han, Liumei Zhang, Yuanjiao Hu:
ElNnGA: An Artificial Intelligence Empowered Scheme for Unknown Attack Recognition and Defense Strategy Recommendation. 411-417 - Zhen Wan, Sugang Ma, Zixian Zhang, Siwei Sun:
SiamDTA: Dual-Template Siamese Network Visual Object Tracking Algorithm Based on Attention Mechanism. 418-423 - Jia Cao, Jiayue Zhou, Jianan Hong:
UE-detectable Authentication and Key Agreement Method Resisting Serving Network Forging. 424-430 - Yuyan Zhao, Haibao Chen, Boyu Li, Mengyuan Li, Siqing Tao, Hui Tian:
Hierarchical Policy Learning with Noisy Networks based Multi-round Conversational Recommendation. 431-437 - Xianyu Mu, Youliang Tian, Zhou Zhou, Jinbo Xiong:
Lightweight Federated Learning Secure Aggregation Protocols. 438-443 - Huifeng Hao, Shenghui Zhao, Guilin Chen, Shu Zhao, Yong Ge:
Segmentation of multi-residential activities based on spatial correlation and FWC-CPD. 444-452 - Yong Zhao, Liumei Zhang, Ximeng Liu, Yuanjiao Hu:
AAM-Sinc-MV1D: A Model of Short-term Speaker Recognition Based on The Raw Waveform. 453-458 - Wenhao Zhang, Ji He, Xiaohong Jiang:
Transmit Power and Flying Location Optimization for Time-Efficient Covert Multicast in UAV-Enabled Wireless Communication Systems. 459-464 - Yu Chen, Guozhu Zhao, Xu Han, Yichen Li, Chun Fang, Chongjie Wang, Yueyue Zhu:
Two-Factor Authentication for IIoT Systems Utilizing Environmental Background Features. 465-471 - Yang Yang, Bo Tian, Fei Yu, Yuanhang He:
An Anomaly Detection Model Training Method Based on LLM Knowledge Distillation. 472-477 - Yuanjun Liu, Zhihong Liu, Yong Zeng:
Divide-and-Conquer Based Traffic Classification: Towards A Cascaded Classifier. 478-483 - Hong Xia, Jing Xu, Qingyi Dong, Hui Jia, Yanping Chen:
Efficient QoS Data Prediction Based on Tensor Kernel Paradigm-Tensor Decomposition. 484-489 - Han Li, Chuanwei Yang, Baitong Zha, Lifan Liu, Zhiwei Zhang, Shuo Zhong:
A Real-time APT Attack Detection Scheme Based on Fusion Provenance Graph in Private Clouds. 490-495 - Yuchen Zhang, Hong Zhong, Guilin Chen, Naji Alhusaini, Shenghui Zhao, Cheng Wu:
Multimodal Sentiment Analysis Network Based on Distributional Transformation and Gated Cross-Modal Fusion. 496-503 - Changan Wang, Zhihong Liu, Yong Zeng:
Detecting Phishing URLs with GNN-based Network Inference. 504-509 - Na Liu, Guanghui Shao, Yanbo Yang, Jiawei Zhang, Teng Li:
Review on the Research Progress of Machine Learning in Network Coding. 510-515 - Guiyuan Tang, Junqi Zhao, Zhijian Xu, Yuzi Wang, Hanzi Yang, Zhiwei Zhang:
Continuous Smartphone User Authentication Based on Gesture-Sensor Fusion. 516-522 - Huan Chen, Li Li, Yunwang Xu:
Reducing Redundancy of Data Samples Method Based on Data-Importance Analysis. 523-528 - Qiangyi Wu, Yiyu Xiang:
Improving the Accuracy of Anomaly Detection from System Audit Logs via Heterogeneous Provenance Graphs. 529-535 - Jie Wang, Mengru Xu, Hao Chen:
Detecting Source Code Vulnerabilities using High-Precision Code Representation and Bimodal Contrastive Learning. 536-541 - Xiaodong Zhang, Jie Bao, Yulong Shen:
Testing Object Detection Models For Autonomous Vehicles Against Hazards. 542-548
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.