{"title":"Cooperative control method for heterogeneous wireless networked robots based on parallel control","authors":"Beibei Su, Xingjie Huang, Jinmeng Zhao, Chan Wang, Zixian Dong, Jianqi Duan","doi":"10.1117/12.2683560","DOIUrl":"https://doi.org/10.1117/12.2683560","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127606106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear congruential generator over a GF(2^8) and its applications in improving AES key expansion algorithm","authors":"Yuxuan Li","doi":"10.1117/12.2683161","DOIUrl":"https://doi.org/10.1117/12.2683161","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129995898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A rational decision-making approach based on Bayesian network and BDI model for autonomous driving system","authors":"Xinyuan Zhang, Dehui Du","doi":"10.1117/12.2683203","DOIUrl":"https://doi.org/10.1117/12.2683203","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124954130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on ARP attack principle and defense measures in LAN","authors":"Zhaozhan Chen","doi":"10.1117/12.2683288","DOIUrl":"https://doi.org/10.1117/12.2683288","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131038888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on construction and application of stack overflow Q and A website ontology","authors":"Shuhe Ruan, Qiaoqiao Qu, Linhui Zhong, Tengjun Lu, Chaoyi Yang, YanXia Zhu","doi":"10.1117/12.2683195","DOIUrl":"https://doi.org/10.1117/12.2683195","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"323 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122709053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DeCsmith, an automatic generation tool of equivalent program","authors":"Zan Chen, Liyao Wang, Lei Liu, P. Zhang","doi":"10.1117/12.2683172","DOIUrl":"https://doi.org/10.1117/12.2683172","url":null,"abstract":"","PeriodicalId":447897,"journal":{"name":"International Conference on Computer Network Security and Software Engineering (CNSSE 2023)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131724624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}