The proceedings contain 48 papers. The topics discussed include: analysis of zero-key authentication and zero-knowledge proof;on the security of verifiable privacy-preserving multi-type data aggregation scheme in smar...
ISBN:
(纸本)9798350331547
The proceedings contain 48 papers. The topics discussed include: analysis of zero-key authentication and zero-knowledge proof;on the security of verifiable privacy-preserving multi-type data aggregation scheme in smart grid;flexible android malware detection model based on generative adversarial networks with code tensor;DPP: data privacy-preserving for cloud computing based on homomorphic encryption;adversarial attack and defense for webshell detection on machine learning models;blockchain-based multi-layer data security sharing model;a privacy-preserving blockchain-based energy supply chain system supporting supervision;a multimodal off-road terrain classification benchmark for extraterrestrial traversability analysis;an enhanced interpretable deep learning approach for diabetic retinopathy detection;ghost expectation point with deep reinforcement learning in financial portfolio management;and MDAEN: multi-dimensional attention-based ensemble network in deep reinforcement learning framework for portfolio management.
The proceedings contain 90 papers. The topics discussed include: a new compile-time obfuscation scheme for software protection;inferring phylogenetic networks of malware families from API sequences;reviving android ma...
ISBN:
(纸本)9781509051540
The proceedings contain 90 papers. The topics discussed include: a new compile-time obfuscation scheme for software protection;inferring phylogenetic networks of malware families from API sequences;reviving android malware with DroidRide: and how not to;software system for automatic reaction to network anomalies and in real time data capturing necessary for investigation of digital forensics;a novel Botnet detection method based on preprocessing data packet by graph structure clustering;a lattice-based access control model for social networks;a novel design of pipeline MDC-FFT processor based on various memory access mechanism;a LEAP PLUS key management scheme with sliding time interval;a particle filter-based approach for effectively detecting low-rate denial of service attacks;distributed air traffic flow management at terminal control area;a method of meta-context ontology modeling and uncertainty reasoning in SWoT;a scalable object detection framework based on embedded Manycore;comparative analysis on the conjunctive and disjunctive assumptions for the belief rule base;analysis of crime rate distribution based on TPML-WMA;factors dominating individuals' retweeting decisions;classification of massive user load characteristics in distribution network;a breast cancer risk classification model based on the features selected by novel F-score index for the imbalanced multi-feature dataset;deepening prose comprehension by incremental free text conceptual graph mining and knowledge;discovering bloom taxonomic relationships between knowledge units using semantic graph triangularity mining;and multi-source and heterogeneous data integration model for big data analytics in power DCS.
The proceedings contain 90 papers. The topics discussed include: SIRS model and stability based on open cyber ecosystem;routing the cyber-attack path with the Bayesian network deducing approach;analyzing and recognizi...
ISBN:
(纸本)9781538622094
The proceedings contain 90 papers. The topics discussed include: SIRS model and stability based on open cyber ecosystem;routing the cyber-attack path with the Bayesian network deducing approach;analyzing and recognizing android malware via semantic-based malware gene;CENTRA: centrally trusted routing validation for IGP;evaluating features and effectiveness of secure QR code scanners;a novel framework for zero-day attacks detection and response with cyberspace mimic defense architecture;resist the database intrusion caused by functional dependency;performance analysis of turbo code and Trellis BICM-ID on PNC over impulsive channel;an ipv6-based load balancing strategy for ecological monitoring network;design and implementation of the prototype of high-available distributed communication system;energy-efficient and fair power allocation approach for NOMA in ultra-dense heterogeneous networks;POPBrick: a high-elasticity, reconfigurable network infrastructure to support POP applications;time-domain greedy heuristic approximation algorithm for multi-channel assignment in wireless mesh network;JPEG image security by block size estimation and quality factor classification;real time target tracking scale adaptive based on LBP operator and nonlinear meanshift;implementing a real time production monitoring system: a web design incorporating the Google;a faster without scarifying accuracy online decomposition approach for higher-order tensors;and fault data diagnosis of energy consumption equipment for urban rail transit based on ART2 model.
The proceedings contain 70 papers. The topics discussed include: an adaptive rate control mechanism for congestion avoidance in wireless body area networks;a new attribute reduction algorithm dealing with the incomple...
ISBN:
(纸本)9781424452187
The proceedings contain 70 papers. The topics discussed include: an adaptive rate control mechanism for congestion avoidance in wireless body area networks;a new attribute reduction algorithm dealing with the incomplete information system;an effective multi-classifier strategy for attributes matching in heterogeneous databases;the application of the data mining based on adaptive immune algorithm for power transformer fault diagnosis;a novel cross layer design approach for video transmission over wireless ad hoc networks;exponential random geometric graph process models for mobile wireless networks;the implementation and performance analysis of mobile multicast in WLAN environments;time synchronization with fast asynchronous diffusion in wireless sensor network;towards service composition middleware embedded in web browser;and secure mobile agent protocol by using signcryption schemes.
The proceedings contain 37 papers. The topics discussed include: few-shot image classification method with label consistent and inconsistent self-supervised learning;a high performance ai-powered cache mechanism for I...
ISBN:
(纸本)9798331506896
The proceedings contain 37 papers. The topics discussed include: few-shot image classification method with label consistent and inconsistent self-supervised learning;a high performance ai-powered cache mechanism for IoT devices;Q-MMT: Qinqiang Opera generation based on multi-track music transformer;research on human combination continuous motion recognition method;multispectral registration algorithm based on fusion of infrared and color images;improved detection of forged and generated facial images based on ResNet-50;intelligent spectrum management for UAV swarm with multiple combat missions: a DQN-based solution;multispectral registration algorithm based on fusion of infrared and color images;and OCDE: adaptive differential evolution algorithm in distributed intelligent systems.
暂无评论