Skip to Main Content

Latest Articles

Research Article
Methodology for the security analysis of IPv4-as-a-Service IPv6 transition technologies
Ameen Al-Azzawi and Gábor Lencse
As the depletion of IPv4 addresses accelerates, the urgency of transitioning to IPv6 has intensified. To address this imperative, numerous IPv6 transition technologies have emerged to facilitate this migration process. While existing methodologies offer insights into the security implications of ...
Research Article
A DDoS attack detection method combining federated learning and hybrid deep learning in software-defined networking
Qi Zhou and others
Software-defined networking (SDN) improves network flexibility by separating the control plane and data plane, but centralized control architecture also increases the risk of distributed denial of service (DDoS) attacks. Traditional detection methods often face performance bottlenecks when dealing ...
Research Article
Multiscale fingerprinting for robust website fingerprinting attack
Jiadong Shi and others
Website fingerprinting (WF) attacks based on deep neural networks can effectively identify the target website. Recently, WF defence methods with trace adversarial examples (DTAE) can reduce classification accuracy of existing deep WF attacks from over 98% to approximately 50%. To overcome the ...
Research Article
Towards secure healthcare: SA-GBO-ODBN model utilizing Blockchain and deep learning for data handling and diagnosis
Nikhil Sharma and Prashant Giridhar Shambharkar
The integration of Electronic Health Records (EHRs) in healthcare has significantly advanced the field but introduced challenges related to data security and precise diagnoses due to the large data volume. To address these issues, we propose the SA-GBO-ODBN model, combining Blockchain and deep ...
Editorial
Multilingual knowledge graph completion based on structural features
Jinyan He and Haitong Yang
Multilingual knowledge graph completion predicts missing facts in the target language knowledge graph by learning and inferring knowledge and rules in other language knowledge graphs. Existing methods tend to use aligned entities between knowledge graphs in different languages as alignment seeds, ...
Research Article
Energy efficient data transmission scheme integrating clustering and compressive sensing in wireless sensor networks
Haitao Wang
Aiming at the actual situation where sensor nodes in wireless sensor networks collect and transmit a large amount of redundant data, an energy-efficient data transmission scheme named EETICC has been proposed, which integrates an appropriate clustering algorithm and compressive sensing (CS) ...
Research Article
BDEA: blockchain-based secure deduplication for low-entropy data supporting public auditing
Longxia Huang and others
In cloud storage, deduplication techniques are essential for improving storage capacity. Low-entropy data, due to its predictable structure, pose security risks and challenges for convergent encryption, which can compromise semantic security and increase the likelihood of information leakage. To ...
Research Article
CLIP-based semantic refinement method for image-text retrieval
Ruidong Chen and others
Although existing image-text retrieval methods show strong retrieval performance, they generally fail to explicitly model the subtle semantic difference within categories. To address this problem, we propose a new image-text retrieval method, called CLIP-based Semantic Refinement Method For ...
Research Article
Unravelling the semantic mysteries of transformers layer by layer
Cheng Zhang and others
Despite the significant success of transformer models and their successors in various natural language processing (NLP) applications, their internal workings are still not fully understood. Much of the current interpretability research has focused primarily on numerical components, often missing ...
Research Article
Spatio-temporal traffic flow forecasting based on second-order continuous graph neural network
Zhaobin Ma and others
Spatio-temporal forecasting has wide applications across various domains, particularly in intelligent transportation systems, where it plays a crucial role. Traffic flow prediction, a typical spatio-temporal forecasting task, involves complex dependencies across both time and space dimensions. ...
Impact Factor
1.5
5 year Impact Factor
1.5

The Wilkes Award

Each year The Wilkes Award is presented to the authors of the best paper published in the previous volume of the journal.

Read the winning and shortlisted papers for 2024

Close
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close

This PDF is available to Subscribers Only

View Article Abstract & Purchase Options

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

Close