


default search action
13th ICCNS 2023: Fuzhou, China
- Proceedings of the 2023 13th International Conference on Communication and Network Security, ICCNS 2023, Fuzhou, China, December 6-8, 2023. ACM 2023
Chapter 1 Software Detection and Information Security
- Chenxi Lyu
, Yinan Yao
, Xiaodong Guo
, Zihong Huang
, Chen Dong
, Yuanyuan Zhang
, Zhenyi Chen
:
AntiMal: an Approach of Malware Detection Employing Swin Transformer. 1-5 - Wei Zhao
, Zhiwei Li
, Ruilin Li
, Chaojing Tang
:
CapSan-UB: Bug Capabilities Detector Based on Undefined Behavior. 6-11 - Chengling Wang
, Yunru Ma
, Yuexin Zhang
, Ayong Ye
, Li Xu
:
A Continuous Authentication Scheme for Digital Therapeutics Using Denoising Autoencoder. 12-18 - Xiaozhou Wang, Jianfei Ye
, Linjie Feng
, Chenji Feng
, Jun Chen
:
Trusted Delivery Mechanisms for Software Supply Chains Based on Trusted Execution Environment. 19-25 - Zhihao Li
, Zhongwei Sun
:
A Cross-Domain Authentication Scheme for Electric Vehicle Intelligent Charging for Multiple Power Service Providers. 26-31 - Lei Liu
, Ziyou He
:
Webshell Detection Based On CodeBERT And Deep Learning. 32-39 - Zhongliao Yang
, Yinan Yao
, Xiaodong Guo
, Peixin Huang
, Jiayin Li
, Yuzhong Chen
, Xintian Liang
:
A Module Placement Method for Digital Microfluidic Biochips Based on Security Design. 40-45 - Abdur Rashid Sangi
, Jyothish Nagaram
, Akshara Sudulagunta
, Sai Sandeep Talari
, Vinay Malla
, Murali Krishna Enduri
, Satish Anamalamudi
:
Tackling Disinformation: Machine Learning Solutions for Fake News Detection. 46-51
Chapter 2 Advanced Data Encryption Technology and Information Authentication
- Mao Wang
, Shanshan Tu
, Haoyu Yu
, Peihe Yan
:
Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private Blockchain. 52-61 - Rui Ma
, Xvhong Zhou
, Xiajing Wang
, Zheng Zhang
, Jinman Jiang
, Wei Huo
:
pAFL: Adaptive Energy Allocation with Upper Confidence Bound. 62-68 - Yinan Yao
, Chen Dong
, Zhengye Xie
, Yuqing Li
, Xiaodong Guo
, Yang Yang
, Xiaoding Wang
:
A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning. 69-76 - Yufeng Li
, Xu Yan
, Mingxuan Xiao
, Weimin Wang
, Fei Zhang
:
Investigation of Creating Accessibility Linked Data Based on Publicly Available Accessibility Datasets. 77-81 - Qiaowen Wu
, Yaojie Ke
, Zhanghui Liu
, Yuanyuan Zhang
, Qiyan Wu
:
Marine litter detection based on YOLOv7 algorithm and data encryption protection. 82-87 - Jianhui Huang
, Changxiang Shen
, Jianbiao Zhang
, Liang Wang
, Ruqian Li
:
A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM. 88-93 - Qian Zhang
, Xing Zhang
, Wei Shi
:
Privacy-preserving Trajectory Data Release Hierarchical Model. 94-99 - Zhirun Lin
, Yang Yang
, Yonghua Zhan
, Jiayin Li
, Chen Dong
:
Blockchain-based Searchable Encryption Scheme for Spatial Text Data. 100-105
Chapter 3 Modern Cryptography Theory and Encryption Technology
- Xiaodong Guo
, Chenxi Lyu
, Zhenyi Chen
, Xiaoding Wang
, Ruishen Bao
, Chen Dong
:
Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication. 106-111 - Wentao Xi
, Xingjun Wu
, Kai Zhang
:
A low-cost configurable hash computing circuit for PQC algorithm. 112-116 - Liang Ni
, Hengsheng Zhou
, Yawei Zhang
, Xiaoyan Liu
, Bingke Gu
:
Provably Secure Symmetric-Key Privacy-Preserving authenticated key agreement protocol. 117-126 - Wei Zou
, Shanshan Tu
, Zhenhu Ning
, Jiawei Xu
, Shuaikun Xing
, Xue Liao
:
An improved particle swarm optimization algorithm for P300 Neural network recognizer. 127-135 - Jinxing Xu
, Jian Zou
, Qiufu Lan
, Jiayin Li
:
Improved Meet-in-the-Middle Cryptanalysis on Kupyna. 136-143 - Nianhao Xiao
, Long Wang
, Jing Fan
, Chunzhu Shi
, Yutong Xie
:
A Certificateless Trusted Connection Protocol for Smart Factories. 144-150 - Han Lin
, Jian Zou
, Jiayin Li
:
The differential meet-in-the-middle attack on FUTURE and CRAFT. 151-158
Chapter 4 Data Centric Network Detection and Security Protection
- Antonin Bohacik
, Eva Holasova
, Radek Fujdiak
, Jan Racka
:
Convolutional Neural Network-Based Classification of Secured IEC 104 Traffic in Energy Systems. 159-165 - Daowei Chen
, Hongsheng Yan
, Wei Dai
:
Selection of defense strategy for high-level network based on multistage APT attack-defense game. 166-172 - Ondrej Pospisil
, Radek Fujdiak
:
Identifying Industry Devices via Time Delay in Dataflow. 173-177 - Yanming Chen
:
Optoelectronic Task Processing based on Multilevel Collaborative Computing Networks: An Optimization-based Approach. 178-182 - Dandan Xing
, Suzhen Cao
, Yifan Zhang
:
Environment monitoring solution for Flying Ad-hoc Networks based on certificateless aggregate signature. 183-188 - Peihe Yan
, Shanshan Tu
, Mao Wang
:
Multi-User Identity Authentication in Wireless Communication Based on Deep Learning and Data Augmentation. 189-195 - Jian Jiao
, Zhifei Liu
, Lan Li
:
Intranet security detection based on image and deep transfer learning. 196-202 - Xin Ai
, Qingqing Yue
, Hongchen Li
, Wenlong Li
, Shanshan Tu
, Sadaqat ur Rehman
:
Physical Layer Authentication Based on Transformer. 203-208 - Karel Kuchar
, Petr Blazek
, Radek Fujdiak
:
From Playground to Battleground: Cyber Range Training for Industrial Cybersecurity Education. 209-214 - Eva Holasova
, Radek Fujdiak
, Petr Blazek
, Antonin Bohacik
:
Automated Neural Network Structure Design for Efficient. 215-221 - Changping Lai
, Yinan Yao
, Yuzhong Chen
, Xintian Liang
, Tianqi Cai
, Yiqing Shi
:
Detection of IoT Botnet Based on Convolutional Neural Network and Linear Support Vector Machine. 222-226 - Chaoyang Zhu
, Xiao Zhu
, Zhenrong Zhang
, Tuanfa Qin
:
A Privacy Protecting Mechanism in UAV-MEC Network with Blockchain-Enabled Federated Learning. 227-233 - Bingquan Wang
, Meili Cui
, Junchen Gao
:
Security authentication protocol for Industrial Internet of Things. 234-240 - Xiaozhou Wang, Jianfei Ye
, Tong Liu
, Yinjie Wang
, Xuefang Li
, Lin Lin:
Dynamic Trust Assessment Method for Mobile Network Devices. 241-245
Chapter 5 Communication Resource Management and Network Optimization
- Wenzhe Gu
, Botao Feng
, Yiyuan Luo
, Jianchao Zheng
, Yun Lu
:
A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications. 246-251 - Yanggege Zhang
, Bo Zhang
, Te Ma
, Jie Hu
:
Multi-UAVs Cooperative Target Search with Communication Constraint. 252-257 - Ning Wu
, Li Li
, Xingyu Liu
, Ziwen Wang
, Tongyao Jia
:
Enhancing UAV Swarm Routing with Multi-Agent Attention Reinforcement Learning. 258-264 - Zeyi Liu
, Xiaodong Guo
, Yinan Yao
, Yuzhong Chen
, Xin Yang
, Jiayin Li
:
Nonstationary Network Traffic Prediction With RevIN-based LSTM. 265-269 - Youwu Liu
, Rajamohan Parthasarathy
:
Optimizing Wireless Mesh Network Gateway Deployment Using an Enhanced Sparrow Optimization Algorithm. 270-275 - Taoshen Li
, Zhijun Qi
:
D2D communication resource allocation algorithm based on multi-agent reinforcement learning. 276-281 - Da Chen
, Feng Biao Zan
, Xin Liu
, Xuan Meng
:
DROO-C Data Transfer in a Mobile Edge Computing Offloading Framework. 282-293 - Jiayuan Zhong
, Yuzhong Chen
, Yiqing Shi
, Yan Li
, Peiqing Chen
:
A Novel Network Traffic Prediction Method Based on Complete Ensemble Empirical Mode Decomposition with Adaptive Noise. 294-299 - Shihui Duan
, Renhe Yan
, Jie Chen
, Meihui Liu
, Qichen Xu
:
Comparison and Testing of Time Synchronization Accuracy between IEEE 1588v2 and IEEE 802.1AS. 300-305
Chapter 6 Digital Signal Analysis and Processing
- Aiguo Li
, Zhuoping Qiang
:
Multi-sensor data fusion method based on adaptive Kalman filtering. 306-311 - Zhiyi Chen
, Peizhe Xin
, Peng Zhan
, Menhua Zheng
, Yuxiao Sun
, Can Li
, Ping Meng
, Yajie Li
, Yongli Zhao
:
Learned Digital Back-Propagation for an optical-domain waveform integrated with communication and sensing. 312-316 - Zhichao Xu
, Faping Lu
, Zhilin Zhang
, Dongkai Yang
, Xiguo Liu
, Jiafang Kang
, Yaozong Pan
, Qi An
:
A Flexible Waveform Based on PSWFs Signal for Next-Generation Communication. 317-322 - Hangyu Zhao
, Daobin Wang
, Quansheng Huang
, Guangfu Li
, Kun Wen
:
A Phase Noise Suppression Method Based on Real-imaginary Alternating Pilots for Coherent Optical OFDM-OQAM Communication Systems. 323-329 - Jan Pospisil
, Radek Fujdiak
:
Increasing data rate of LoRa technology using frequency division multiplex. 330-334 - Jiazi Gao
, Xin Sun
, Zhengyu Song
, Jun Wang
, Tianwei Hou
:
A Novel Single-Station Tracking Algorithm towards High-Dynamic Targets in 3D Space. 335-341 - Ruishen Bao
, Jiayin Li
, Yuzhong Chen
, Kaihui Yang
, Ziyang Chen
, Yuanyuan Zhang
:
PracticalHAR: A Practical Method of Human Activity Recognition Based on Embedded Sensors of Mobile Phone. 342-349 - Shanshan Tu
, Wenlong Li
, Xin Ai
, Hongchen Li
, Qingqing Yue
, Sadaqat ur Rehman
:
A Hybrid Deep Learning Model for Breast Cancer Detection and Classification. 350-353

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.