The proceedings contain 35 papers. The topics discussed include: leveraging electric power data for enhanced credit assessment and risk control: a framework for data monetization and innovation;research on index optim...
ISBN:
(纸本)9798350376982
The proceedings contain 35 papers. The topics discussed include: leveraging electric power data for enhanced credit assessment and risk control: a framework for data monetization and innovation;research on index optimization method based on line quantification in topic network crawler;LRPAFL: layer-wise relevance propagation-based adaptive federated learning;COMURICE: closing source code leakage in cloud-based compiling via enclave;lightweight privacy-preserving mechanisms for cross-chain transactions;a few-shot network flow attack classification via graph contrastive learning;Niect: a model for intrusion security detection applied to campus video surveillance edge networks;and liver fibrosis classification based on multimodal imaging feature fusion.
The proceedings contain 39 papers. The topics discussed include: fog computing and the Internet of Things (IoT): a review;security and privacy challenges in 5G-enabled technology;blockchain-based access control approa...
ISBN:
(纸本)9781665443777
The proceedings contain 39 papers. The topics discussed include: fog computing and the Internet of Things (IoT): a review;security and privacy challenges in 5G-enabled technology;blockchain-based access control approaches;a survey on cloudlets, mobile edge, and fog computing;secure neural network in federated learning with model aggregation under multiple keys;research on load-balancing index algorithm for smart grid system;machine learning based network censorship;ceramic anti-counterfeiting technology identification method based on blockchain;network intrusion detection based on subspace clustering and BP neural network;optimizing the allocation of secure fog resources based on QoS requirements;and attention based multi-unit spatial-temporal network for traffic flow forecasting.
The proceedings contain 47 papers. The topics discussed include: green computing for internet of things;traffic identification algorithm based on improved LRU;deep binarized convolutional neural network inferences ove...
ISBN:
(纸本)9781728165509
The proceedings contain 47 papers. The topics discussed include: green computing for internet of things;traffic identification algorithm based on improved LRU;deep binarized convolutional neural network inferences over encrypted data;clustering ensembles based on probability density function estimation;empirical evaluation of the ensemble framework for feature selection in DDoS attack;deep learning, cloudcomputing for credit/debit industry analysis of consumer behavior;automated student engagement monitoring and evaluation during learning in the wild;research on edge intelligence-based security analysis method for power operation system;assessing the reliability of hybrid clouds with Monte Carlo simulation;and observation points-based particle swarm optimization algorithm.
The proceedings contain 38 papers. The topics discussed include: a strong authentication method for web/mobile services;efficient shoulder surfing resistant PIN authentication scheme based on localized tactile feedbac...
ISBN:
(纸本)9781728116600
The proceedings contain 38 papers. The topics discussed include: a strong authentication method for web/mobile services;efficient shoulder surfing resistant PIN authentication scheme based on localized tactile feedback;detection of sources being used in DDoS attacks;automatic question tagging using multi-label classification in community question answering sites;enabling privacy-preserving sharing of cyber threat information in the cloud;a survey on cryptography: comparative study between RSA vs ECC algorithms, and RSA vs El-Gamal algorithms;cost and effect of using scheduling security model in a cloud environment;estimating web attack detection via model uncertainty from inaccurate annotation;and assessing the security risks of multicloud SaaS applications: a real-world case study.
The proceedings contain 38 papers. The topics discussed include: a system for exploratory analysis in cloud;privacy-preserving and unforgeable searchable encrypted audit logs for cloud storage;a real-time sensor netwo...
ISBN:
(纸本)9781538658505
The proceedings contain 38 papers. The topics discussed include: a system for exploratory analysis in cloud;privacy-preserving and unforgeable searchable encrypted audit logs for cloud storage;a real-time sensor network aggregation computing system;a distributed technique for repairing inconsistencies of functional dependencies;MTComm based virtualization and integration of physical machine operations with digital-twins in cyber-physical manufacturing cloud;difference function projective synchronization for secure communication based on complex chaotic systems;an approach of fog detecting magnitude using referenceless perceptual image defogging;reliability ranking prediction for cloud services via skyline;a cooperative game for online cloud federation formation based on security risk assessment;a knowledge-based approach to reducing complexity of maintaining semantic constraints in data exchange and integration;review on big data fusion methods of quality inspection for consumer goods;unique topic query processing on cloud;enterprise workflow modeling based on priced timed Petri nets;performance evaluation of BATMAN-adv wireless mesh network routing algorithms;FASTBEE: a fast and self-adaptive clustering algorithm towards to edge computing;cryptanalysis of an RFID ownership transfer protocol based on cloud;network security based on d-s evidence theory optimizing CS-BP neural network situation assessment;access control scheme based on combination of blockchain and XOR-coding for ICN;and an effective scheme to detect and prevent tampering on the physical layer of WSN.
The proceedings contain 60 papers. The topics discussed include: power and performance study of HPC applications on QCT developer cloud;speed up weather prediction on QCT developer cloud: a case study on knights landi...
ISBN:
(纸本)9781509066438
The proceedings contain 60 papers. The topics discussed include: power and performance study of HPC applications on QCT developer cloud;speed up weather prediction on QCT developer cloud: a case study on knights landing platform;evaluation of combining bootstrap with multiple imputation using r on knights landing platform;finding the best box-COX transformation in big data with meta-model learning: a case study on QCT developer cloud;an improved budget-deadline constrained workflow scheduling algorithm on heterogeneous resources;security threats and challenges in cloudcomputing;privacy-preserving and secure recommender system enhance with k-NN and social tagging;advanced fully homomorphic encryption scheme over real numbers;research on faceted search method for water data catalogue service;power control weakness in long term evolution network;an efficient secure storage scheme based on information fragmentation;machine learning based DDOS attack detection from source side in cloud;architecting cyber defense: a survey of the leading cyber reference architectures and frameworks;distributed shuffle index in the cloud: implementation and evaluation;vulnerability assessment for security in aviation cyber-physical systems;and end-to-end IoT security middleware for cloud-fog communication.
The proceedings contain 77 papers. The topics discussed include: multimodal data trajectory prediction: a review;a systematic review on detection of manipulated satellite images;simulation for urban computing scenario...
ISBN:
(纸本)9798350312461
The proceedings contain 77 papers. The topics discussed include: multimodal data trajectory prediction: a review;a systematic review on detection of manipulated satellite images;simulation for urban computing scenarios: an overview and research challenges;a short review of truck and drone collaborative delivery problem;an aggregation protocol resisting collusion attacks in the Internet of vehicles environment;anomaly detection based on deep learning: insights and opportunities;trajectory privacy protection with pricing awareness on ride-on-demand system;near-source attack for isolated networks with covert channel transmission;a traceable location privacy preserving scheme for data collection in vehicular fog computing;and achieving efficient and secure task allocation scheme in mobile crowd sensing.
The proceedings contain 33 papers. The topics discussed include: quantum federated learning: remarks and challenges;recommendation system design for social media using reinforcement learning;a secure federated learnin...
ISBN:
(纸本)9781665480666
The proceedings contain 33 papers. The topics discussed include: quantum federated learning: remarks and challenges;recommendation system design for social media using reinforcement learning;a secure federated learning framework using blockchain and differential privacy;current status and prospects of blockchain security standardization;standardization of financial blockchain: technologies, challenges, and future;a fundamental analysis of standardization for blockchain and distributed ledger technologies in ISO;balance multi-head attention based on software and hardware co-design;low energy consumption and time deterministic energy-saving workflow task scheduling algorithm based on DVFS;graph-based malicious account groups detection in electronic trading of bulk commodities;a secure and decentralized auditing scheme for cloud ensuring data integrity and fairness in auditing;and advanced analysis of email sender spoofing attack and related security problems.
The proceedings contain 49 papers. The topics discussed include: electricity cost management for cloud data centers under diverse delay constraints;SE-ORAM: a storage-efficient oblivious RAM for privacy-preserving acc...
ISBN:
(纸本)9781509009459
The proceedings contain 49 papers. The topics discussed include: electricity cost management for cloud data centers under diverse delay constraints;SE-ORAM: a storage-efficient oblivious RAM for privacy-preserving access to cloud storage;controlling a car through OBD injection;a novel software defined networking framework for cloud environments;Saphena: an approach for analyzing similarity of heterogeneous policies in cloud environment;towards an out-of-the-box cloud application monitoring framework;cloudAuditor: a cloud auditing framework based on nested virtualization;a new block-based data distribution mechanism in cloudcomputing;an analysis of server-side design for seed-based mobile authentication;MongoDB NoSQL injection analysis and detection;security vulnerabilities and countermeasures for time synchronization in ieee802.15.4e networks;a threshold multi-server protocol for password-based authentication;and shortest processing time first algorithm for Hadoop.
The proceedings contain 89 papers. The topics discussed include: game theoretic modeling to enforce security information sharing among firms;adaptive resource allocation optimization in heterogeneous mobile cloud syst...
ISBN:
(纸本)9781467392990
The proceedings contain 89 papers. The topics discussed include: game theoretic modeling to enforce security information sharing among firms;adaptive resource allocation optimization in heterogeneous mobile cloud systems;performance metrics of local cloudcomputing architectures;an approach to minimize crossings in phylogenetic trees;CPAV: computationally efficient privacy preserving anonymous authentication scheme for vehicular ad hoc networks;integral attack on reduced-round rectangle;search engine: a hidden power for virus propagation in community networks;the software design of car low-speed intelligent braking system;ontology-based knowledge representation for secure self-diagnosis in patient-centered teleheath with cloud systems;secure and efficient personal health record scheme using attribute-based encryption;an SDN-based fabric for flexible data-center networks;and PERM-GUARD: authenticating the validity of flow rules in software defined networking.
暂无评论