


default search action
14th BigDataSE 2020: Guangzhou, China
- Guojun Wang, Carlos Becker Westphall, Arcangelo Castiglione:

14th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-0-7381-1114-8 - Kungan Zeng, Incheon Paik:

Web Service Composition Sequence Learning Based on Neural Language Networks. 1-8 - Sheheeda Manakkadu, Sourav Dutta

, Sam R. Thangiah:
Profiling of Disease-Associated Proteins Neighborhood Networks. 9-13 - Carson K. Leung

, Yubo Chen, Siyuan Shang, Deyu Deng:
Big Data Science on COVID-19 Data. 14-21 - Michael Alicea, Arlen P. McDonald, Chunyang Tang, Jeong Yang

:
Exploring the Application of Machine Learning Algorithms to the City Public Bus Transport. 22-27 - Nisha Verma, Sangaralingam Kajanan, Anindya Datta:

Goal-driven Look-alike Modelingfor Mobile Consumers. 28-35 - Ryan Yixiang Wang, Tim Qinsong Guo, Leo Guanhua Li, Julia Yutian Jiao:

Using GWAS SNPs to Determine Association between COVID-19 and Comorbid Diseases. 36-40 - Ahmed Ahmet, Tariq Abdullah:

Real-Time Social Media Analytics with Deep Transformer Language Models: A Big Data Approach. 41-48 - Lulu Ning, Jian Wang:

A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique. 49-56 - Jie Yan, Claude Turner

, Dwight H. Richards:
Animated Commentator Enhanced Network Monitoring and Visualization Application for Cyber Security Competition. 57-64 - Rong Zhu, Xiaoxi He, Jiahong Xie, Zongjie Zhang, Ping Wang:

An Improved RFID-based Authentication Protocol for Rail Transit. 65-72 - Hanbo Cai

, Jinyan Wang, Xiaohong Liu, Xianxian Li:
DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering. 73-79 - Chinguun Purevdagva, Rui Zhao, Pei-Chi Huang, William Mahoney

:
A machine-learning based framework for detection of fake political speech. 80-87 - Yulin Fan, Yang Li, Mengqi Zhan, Huajun Cui, Yan Zhang:

IoTDefender: A Federated Transfer Learning Intrusion Detection Framework for 5G IoT. 88-95 - Taifeng Hu, Liji Wu, Xiangmin Zhang, Zhaopo Liao:

Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method. 96-103 - Xin Zhou

, Reginald Cushing, Ralph Koning, Adam Belloum, Paola Grosso
, Sander Klous, Tom M. van Engers, Cees de Laat:
Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain Infrastructures. 104-113 - Ioanna Angeliki Kapetanidou

, Muhammad Hassan
, Christos-Alexandros Sarros
, Mauro Conti
, Vassilis Tsaoussidis
:
Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking. 114-121 - Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Bashir Hussain, Ghalib A. Shah, Muhammad Husnain:

A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case. 122-129 - Anni Jia, Wei Yang, Gongxuan Zhang:

Side Channel Leakage Alignment Based on Longest Common Subsequence. 130-137 - Fangjiao Zhang, Xiang Cui, Zhi Wang

, Shaomian Chen, Qixu Liu, Chaoge Liu:
A Systematic Study of AI Applications in Cybersecurity Competitions. 138-146 - Yan Tong

, Huanguo Zhang, Zhengwei Ren, Shiwei Xu:
Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations. 147-154 - Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati

:
Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks. 155-163

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














