Cloud Computing and Security.- Evaluation and Testing of PCI Express 8-Gbps Re-timer in Storage Server.- Virtualization of 5G Cellular Networks: A Combinatorial Share-averse Auction Approach.- Equipment Fault Detection Based on SENCForest.- Research on Telemedical Monitoring System Based on Homomorphic Encryption.- Phase Retrieval via Accelerated Gradient Descent.- Anti-Noise Quantum Network Coding Protocol Based on Bell States and Butterfly Network Model.- A Privacy-preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.- Application of Blockchain Technology in Agricultural Product Traceability System.- Anonymous Authentication Scheme for Machine-To-Machine Communication Based on Elliptic Curve.- Linear Complexity of R-Ary Sequences Derived from Euler Quotients Modulo 2p.- Information Hiding.- An Improved Steganalysis Method Using Feature Combinations.- Research on Application of OFD Technology in Secure Electronic Bills.- A Generative Method for Image Steganography Based on Semantics.- Review on Text Watermarking Resistant to Print-scan, Screen-shooting.- A Novel Reversible Data Hiding Scheme for Encrypted VQ-Compressed Image.- IoT Security.- An Landmark Evaluation Alogrithm Based on Router Identification and Delay Measurement.- Multiplicative Linear Secret Sharing without Interaction.- Positioning Improvement Algorithm Based on LoRa Wireless Networks.- Time-aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks.- An Implementation of CoAP-Based Semantic Resource Directory in Californium.- A Survey of Simulators for Home Energy Management: System Architecture, Intelligence, UI and Efficiency.- Relay Location Optimization and Relay Coordination in Multi-hop Cognitive Radio Networks.- Subspace Extension Algorithm for Joint DOA and DOD Estimation in Bistatic MIMO Radar.- Under-Determined Blind Source Separation Anti-Collision Algorithm for Rfid Based on Adaptive Tree Grouping.- Design of a Peristaltic Pump Driven by Pneumatic Artificial Muscles.- An Approach to Deep Learning Service Provision with Elastic Remote Interfaces.- Design of an IoT-based Efficient Security Scheme in Home Wireless System.- Discussion on the Application of Industrial Internet.- Performance Analysis of a NB-IoT based Smart Lamp Solution with Application Enabled Platform.- Mining Hypernym-Hyponym Relations from Social Tags via Tag Embedding.- Accurate and Fast DV-hop Localization Algorithm in Irregular Networks.- Shape Recognition with Recurrent Neural Network.- WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model.- Tobacco Intelligent Management System Based on Internet of Things.- Research on Fault Self Diagnosis Technology of Agricultural Internet of Things Information Collection System.- Analysis of Antenna Array Parameter Effect for Massive MIMO Transmission.- Intelligent Irrigation System of Balcony Flowers Based on Internet of Things.- Multimedia Forensics.- The Impact of Using Facebook on the Academic Performance of University Students.- Robust Audio Watermarking Algorithm Based on Moving Average and DCT.- Computer Evidence Analysis Technology Based on Weighted Frequent Pattern Growth Algorithm.- Reversible Data Hiding in JPEG Images Based on Multiple Histograms Modification.- Image Hashing based on CS-LBP and DCT for Copy Detection.- KMSVM: A Efficient Min-Max Modular Support Vector Machine Based on Clustering.- An Image Forensic Method for AI Inpainting Using Faster R-CNN.- Kernel Generalized Canonical Correlation and A New Feature Fusion Strategy.- Multiple Obstacle Detection for Assistance Driver System Using Deep Neural Networks.- Encryption and Cybersecurity.- CABAC: A Content-Driven Attribute-Based Access Control Model for Big Data.- Calculation of Network Security Index Based on Convolution Neural Networks.- A Method to Defense APT based on Dynamic ID Transformation.- Emergency analysis Based on Affective Computing in Universities Forum.- Network Attack and Defense Effectiveness Evaluation Based on Dematel Method.- Web Application-layer DDoS Attack Detection Based on generalized Jaccard Similarity and Information Entropy.- Ultra-broad Bandpass Filter Based on Composite Right-Left Handed Transmission Line Model.- An Automatic Identification Algorithm for Encrypted Anti-counterfeiting Tag Based on DWT-DCT and Chen's Chaos.- Security Analysis and Improvement of Elliptic Curve Digital Signature Scheme.- Risk Taking Behavior in Crowdsourcing Adoption: The Case of Witkey.- Anomaly detection in Wireless Sensor Networks based on KNN.- Comparison of The Legal Principle Foundation of Chinese And American Secret Information Access Control Technique.