New AES Dual Ciphers Based on Rotation of Columns Min YangBenchang XiaoQingshu Meng OriginalPaper 20 March 2019 Pages: 93 - 97
Differentially Private Top-k Items Based on Least Mean Square——Take E-Commerce Platforms for Example Mengyue CaoFusheng WuJun Wang OriginalPaper 20 March 2019 Pages: 98 - 106
A Method for Time-Series Location Data Publication Based on Differential Privacy Haiyan KangShuxuan ZhangQianqian Jia OriginalPaper 20 March 2019 Pages: 107 - 115
Aggregation Tree Statistical Computing Based on Functional Encryption Guangli XiangDengjia WangAnkang Li OriginalPaper 20 March 2019 Pages: 116 - 124
An Inner Product Encryption Scheme Based on Dual Systems Duo WeiHaiying Gao OriginalPaper 20 March 2019 Pages: 125 - 133
Scheme on Cross-Domain Identity Authentication Based on Group Signature for Cloud Computing Yanyan YangMingsheng HuXinxin Liu OriginalPaper 20 March 2019 Pages: 134 - 140
A Python Security Analysis Framework in Integrity Verification and Vulnerability Detection Shuanghe PengPeiyao LiuJing Han OriginalPaper 20 March 2019 Pages: 141 - 148
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph Minmin ZhouJinfu ChenZhifeng Zeng OriginalPaper 20 March 2019 Pages: 149 - 160
Learning Multi Labels from Single Label —— An Extreme Weak Label Learning Algorithm Junhong DuanXiaoyu LiDejun Mu OriginalPaper 20 March 2019 Pages: 161 - 168
An Association Ring Signature for Block Chain E-Money Transactions Kai YangMingsheng HuXiaofei Zhang OriginalPaper 20 March 2019 Pages: 169 - 175
Simultaneous Localization and Mapping Technology Based on Project Tango Pei XuKehua SuDengyi Zhang OriginalPaper 20 March 2019 Pages: 176 - 184