The proceedings contain 76 papers. The topics discussed include: analysis of blockchain technology for higher education;performance analysis for blockchain driven wireless iot systems based on tempo-spatial model;a TS...
ISBN:
(纸本)9781728125411
The proceedings contain 76 papers. The topics discussed include: analysis of blockchain technology for higher education;performance analysis for blockchain driven wireless iot systems based on tempo-spatial model;a TSGP-based tip search optimization algorithm;hierarchical key managementschemewith multilevel secure access;basis path coverage criteria forsmart contract application testing;supply-demand collaborative energy internet for smart city: a three-stage Stackelberg game approach;endpoint protection: measuring the effectiveness of remediation technologies and methodologies for insider threat;and NERD:neural network for edict of risky data streams.
The proceedings contain 98 papers. The topics discussed include: a novel implementation of a hash function based on XML DOM parser;kernel malware core implementation: a survey;simulation of the users' email behavi...
ISBN:
(纸本)9781467391993
The proceedings contain 98 papers. The topics discussed include: a novel implementation of a hash function based on XML DOM parser;kernel malware core implementation: a survey;simulation of the users' email behavior based on BP-BDI model;a hierarchical framework of security situation assessment for information system;XSS vulnerability detection using optimized attack vector repertory;a 4-dimensional discrete chaotic system and application in image encryption with avalanche effects;advanced classification lists (dirty word lists) for automatic security classification;analysis of time-dependencies in automatic security classification;recovery of evidence and the judicial identification of electronic data based on ExFAT;and application and management of cybersecurity measures for protection and control.
The proceedings contain 83 papers. The topics discussed include: a cluster based smart MAC layer protocol for delay-tolerant underwater wireless sensor networks;an energy-efficient asynchronous MAC for bulk-data colle...
ISBN:
(纸本)9780768551067
The proceedings contain 83 papers. The topics discussed include: a cluster based smart MAC layer protocol for delay-tolerant underwater wireless sensor networks;an energy-efficient asynchronous MAC for bulk-data collection in wireless sensor networks;analysis of image transmission for wireless sensor networks in the mine tunnel;improved PCA based step direction estimation for dead-reckoning localization;dynamic collaborative change point detection in wireless sensor networks;sketch based anomaly detection scheme in wireless sensor networks;to split or not to split? from the perspective of a delay-aware data collection network structure;traffic-differentiated two-hop routing for QoS in wireless sensor networks;UFO: a united framework for target localization in wireless sensor networks;and an efficient localization algorithm using sparse anchors for the Internet of things.
The proceedings contain 60 papers. The topics discussed include: an image data query algorithm based on ontology and singular value decomposition;hand-assisted rehabilitation robot based on human-machine master-slave ...
ISBN:
(纸本)9781728184487
The proceedings contain 60 papers. The topics discussed include: an image data query algorithm based on ontology and singular value decomposition;hand-assisted rehabilitation robot based on human-machine master-slave motion mode;convolutional recurrent neural networks for knowledge tracing;multi-grained rough set in job guidance for college graduates;database traceability algorithm based on zero watermark;research on open entity semantic relation extraction in big data environment;attentional autoencoder for course recommendation in MOOC with course relevance;algebraic decision diagram-based CP-ABE with constant secret and fast decryption;and relational database watermarking for data tracing.
The proceedings contain 83 papers. The topics discussed include: a SDKEY-based secure storage and transmission approach for android phone;random characteristics for LSR, RC4, and logistic stream cipher;a robust collab...
ISBN:
(纸本)9781479962358
The proceedings contain 83 papers. The topics discussed include: a SDKEY-based secure storage and transmission approach for android phone;random characteristics for LSR, RC4, and logistic stream cipher;a robust collaborative threshold authenticated encryption scheme based on message blocking;an efficient trusted mobile router selection mechanism for multihomed NEMO network;a multilayer evolutionary homomorphic encryption approach for privacy preserving over big data;a robust collaborative threshold authenticated encryption scheme based on message blocking;exponential optimal synchronization of chaotic cryptosystems: neural-network-based approach;a heuristic method of attack graph analysis for network security hardening;shell-based block ciphering structure (SBCS) for AES parallelism with feedback-data mode;and positive selection-inspired anomaly detection model with artificial immune.
The proceedings contain 87 papers. The topics discussed include: information fusion VIA optimized KECA with application to audio emotion recognition;an efficient high speed AES implementation using traditional FPGA an...
ISBN:
(纸本)9781728109749
The proceedings contain 87 papers. The topics discussed include: information fusion VIA optimized KECA with application to audio emotion recognition;an efficient high speed AES implementation using traditional FPGA and LabVIEW FPGA platforms;spark load balancing strategy optimization based on internet of things;cooperative jamming and relay beamforming design for physical layer secure two-way relaying;mobile data gathering and charging in wireless rechargeable sensor networks;an algorithm to generate password structure dictionary based on gene bank;UWB-based real-time continuous positioning system in NLOS tunnel environment;prior-information associated channel parameter estimation for aeronautical communications;construction of MeSH-like obstetric knowledge graph;credit scoring based on transaction sequence classification;and CPS event driving method based on micro PMU of Distribution Network.
The proceedings contain 57 papers. The topics discussed include: on the basin of attraction and capacity of restricted Hopfield network as an auto-associative memory;a type of recharging scheduling strategy based on a...
ISBN:
(纸本)9798350308693
The proceedings contain 57 papers. The topics discussed include: on the basin of attraction and capacity of restricted Hopfield network as an auto-associative memory;a type of recharging scheduling strategy based on adjustable request threshold in WRSNs;classification and identification of phishing websites based on machine learning;patch-based multi-level attention mechanism for few-shot multi-label medical image classification;exploring event-based dynamic topic modeling;improvement of passkey entry protocol for secure simple pairing;application of Voformer-EC clustering algorithm to stock multivariate time series data;and multimodal deep learning for enhanced arrhythmia detection using ECG time series and image data.
The proceedings contain 92 papers. The topics discussed include: standard additive model in data mining;toward an integrative model for consumer behavior regarding mobile commerce adoption;an overlay-based approach fo...
ISBN:
(纸本)9780769542355
The proceedings contain 92 papers. The topics discussed include: standard additive model in data mining;toward an integrative model for consumer behavior regarding mobile commerce adoption;an overlay-based approach for replacing failed sensors by mobile robots;unsupervised learning approaches for the finite mixture models: EM versus MCMC;comment on an improved signature without using one-way hash functions;research of an improved weighted centroid localization algorithm and anchor distribution;performance analysis of beamforming algorithm for noise cancellation with respect to the arrival angles of interference signal;performance analysis and simulation of SAE J1939 protocol with DSPN model;location-based routing algorithms for mobile ad hoc networks with holes;heuristic methods for filtering newly coined profanities using phylogenetic analysis;an attempt to find neighbors;and a new top-down algorithm for tree inclusion.
The proceedings contain 92 papers. The topics discussed include: MPI-based twi-extraction of traffic state evaluation rules;exploiting attribute redundancy in extracting open source forge websites;enabling dynamic ana...
ISBN:
(纸本)9780769548104
The proceedings contain 92 papers. The topics discussed include: MPI-based twi-extraction of traffic state evaluation rules;exploiting attribute redundancy in extracting open source forge websites;enabling dynamic analysis of anonymized social network data;social network analysis in multiple social networks data for criminal group discovery;local oriented efficient detection of overlapping communities in large networks;BTMD: a framework of binary translation based malcode detector;scrapy-based crawling and user-behavior characteristics analysis on taobao;a new evidence combination scheme for decision assistant;a high performance and high reliability storage server for parallel file system;offline downloading: a non-traditional cloud-accelerated and peer-assisted content distribution service;file exchange in a private cloud supported by a trust model;holistic view angles of cloud computing services provisions;and deadline based performance evaluation of job scheduling algorithms.
The proceedings contain 96 papers. The topics discussed include: a social-knowledge-directed query suggestion approach for exploratory search;a two-layer SVM classification mechanism for Chinese blog article;an AHP-ba...
ISBN:
(纸本)9780769545578
The proceedings contain 96 papers. The topics discussed include: a social-knowledge-directed query suggestion approach for exploratory search;a two-layer SVM classification mechanism for Chinese blog article;an AHP-based recommendation system for exclusive or specialty stores;can collective use help for searching?;exploring event evolution patterns at the atomic level;frequent items mining on data stream based on weighted counts;iterative multivariate regression model for correlated responses prediction;router: a message passing model for large-scale graph mining;a cross-platform runtime environment for mobile widget-based application;aspect-oriented web service composition: a Petri net based approach;on achieving robustness and fairness in call admission control for voice services within NGN environment;a parallelized network traffic classification based on hidden Markov model;and a label based greedy algorithm for minimum energy consumption multicast routing in ad hoc networks.
暂无评论