Accepted papers

Energy-efficient Resource Allocation in Future IoT with Knowledge Collaboration
Zhongwei Huang, Dagang Li, Jun Cai

HybridFL: Hybrid approach toward privacy-preserving Federated Learning
Sheraz Ali, Saqib Mamoon, Areeba Usman, Chuan Zhao

Image copy-move forgery detection in the social media based on a prior density clustering
and the point density
Cong Lin, Hai Yang, Ke Huang, Yufeng Wu, Yamin Wen, Yuqiao Deng

Stable NICE Model-Based Image Generation for Generative Steganography
Xutong Cui, Zhili Zhou, Jianhua Yang, Chengsheng Yuan, Weixuan Tang

The Design of a Multi-application micro-operating system platform in the context of big data
Wenpan Mo, Zhicheng Shen

Packet-level Application Identification for IIoT Encrypted Traffic Based on 1D-CNN
Yun Cai, Yufan Luo, Jianzhen Luo

Resource Bottleneck Aware vPLC Deployment Algorithm for Industrial Edge Computing Power Network
Jianzhen Luo, Chunzhou Cai, Zhixuan Tong, Jun Cai

Computer-generated Image Forensics Based on Vision Transformer
with Forensic Feature Pre-processing Module
Yifang Chen, Guanchen Wen, Yong Wang, Jianhua Yang, Yu Zhang

Consortium Blockchain Storage Optimization Based on Fountain Codes
Jianhong Li, Qi Chen, Xianmin Wang, Guoyu Yang, Zihan Jiang, Teng Huang, Li Hu

A Multiparty Reversible Data Hiding Scheme in Encrypted Domain Based on Hybrid Encryption
Bing Chen, Lu Chai, Ranran Yang

An Enhanced Data-sharing Method based on Blockchain and Random Forest
Haiyan Kang, Dongting Li, Tao Cheng, Xiaoshi Wang

An Incentive Mechanism and An Offline Trajectory Publishing Algorithm Considering Sensing Area Coverage Maximization and Participant Privacy Level
Qing Cao, Yunfei Tan, Guozheng Zhang

Research on Face Recognition System Based on RLWE Homomorphic Encryption
YuLin Wang, HaiLin Huang, ZiHao Fang, YuQui Zhao, JinHeng Wang

An integration-enhanced ZNN approach for chaotic combined synchronization with external disturbances
Chenfu Yi, Mingdong Zhu, Jingjing Chen

A lightweight anomaly detection method for industrial processes based on event correlation behavior
Yan Cai, Jianzhen Luo, Jun Cai, Wanhan Fang

A Novel Polar Code-Based Key Encapsulation Mechanism with Non-Permutation Equivalent Public Key
Huiling Zhang, Zhiqiang Lin, Jingang Liu, Haixiong Zhou

Two-stage Multi-lingual Speech Emotion Recognition for Multi-lingual Emotional Speech Synthesis
Xin Huang, Zuqiang Zeng, Chenjing Sun, JiChen Yang

EncoderMU: Machine Unlearning In Contrastive Learning
Zixin Wang, Bing Mi, Kongyang Chen

SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Scheduling in Cloud-Fog Computing
Santhosh Kumar Medishetti, Ganesh Reddy Karri

VoIP steganalysis using shallow multiscale convolution and transformer
JingHui Peng, Shanyu Tang

NoCrypto: A Web Mining Behavior Detection Method Based on RGB Images
Hui Wang, Yu Zhang, Ming Xiao Pan, Yi Wei Huang

Feedback Feed-forward Iterative Learning Control for Non-affine Nonlinear discrete-time Systems with Varying Trail Lengths
Sixian Xiong, Yun-Shan Wei, Mengtao Lei

Open-Closed-Loop Iterative Learning Control Based on Differential Evolution Algorithm for Nonlinear System
Mengtao Lei, Yun-Shan Wei, Sixian Xiong

Overview of Vehicle Edge Computing and Its Security
Shaodong Han, Maojie Wang, Guihong Chen

Speech Emotion Recognition Based on Recurrent Neural Networks with Conformer for Emotional Speech Synthesis
Xin Huang, Chenjing Sun, Jichen Yang, Xianhua Hou

Detection of Speech Spoofing Based on Dense Convolutional Network
Yong Wang, Xiaozong Chen, Yifang Chen, Shunsi Zhang

Route Privacy-Preserving Authentication Scheme based on PUF in VANETs
Hanwen Deng, Yining Liu, Dong Wang

Anomaly Detection of Unstable Log Data Based on Contrastive Learning
Lan Liu, Huang Zhihao, Kangjian He, Jun Lin

ConFlow: Contrast Network Flow Improving Class-Imbalanced Learning in Network Intrusion Detection
Jianliang Ruan, Lan Liu, Pengcheng Wang, Jun Lin, Junhan Lu