


default search action
4th BigDataSecurity/HPSC/IDS 2018: Omaha, NE, USA
- 4th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2018, Omaha, NE, USA, May 3-5, 2018. IEEE 2018, ISBN 978-1-5386-4400-3

BigDataSecurity 1
- Sam Forman, Bharath Kumar Samanthula:

Secure Similar Document Detection: Optimized Computation Using the Jaccard Coefficient. 1-4 - Khaled Alrawashdeh

, Carla Purdy:
Fast Activation Function Approach for Deep Learning Based Online Anomaly Intrusion Detection. 5-13 - Biao Wang, Yiwei Zhang, Ding Wang:

Research on a New Metadata Model of Political Event Data Set. 14-19 - Huijuan Zhao, Ning Ye, Ruchuan Wang:

Transferring Age and Gender Attributes for Dimensional Emotion Prediction from Big Speech Data Using Hierarchical Deep Learning. 20-24
BigDataSecurity 2
- Yenumula B. Reddy

:
Big Data Processing and Access Controls in Cloud Environment. 25-33 - Zhijie Han

, Ji-Ao Ma, Hui Zhao:
An Access Pattern Model Analysis for Online VoD Multimedia Flow for Bigdata. 34-38 - Xin He, Mingshu He, Zhijie Han

:
A Survey of Network Topology of Data Center. 39-41 - Lena Ara, Xiao Luo:

Identify the Maximal Cluster of Hosts Based on Data Fusion and Machine Learning Algorithms for Intrusion Detection. 42-46
BigDataSecurity 3
- Weibei Fan, Zhijie Han

, Yujie Zhang, Ruchuan Wang:
Method of Maintaining Data Consistency in Microservice Architecture. 47-50 - Zhijie Han

, Yujie Zhang, Ruchuan Wang:
A Locality Live Migration Strategy Based on Docker Containers. 51-54 - Zhijie Han

, Yalu Wang, Hui Zhao:
Web Load Balance Strategy with Energy Consumption Constrained Based on DNS Collaboration. 55-58 - Hui Li, Xiaoyu Du, Zhijie Han

:
A Coverage Algorithm in Circular Area Based on Polar Coordinates for WSNs. 59-64
BigDataSecurity 4
- Yujie Zhang, Weibei Fan, Zhijie Han

, Ruchuan Wang:
Research on Security Public Opinion Based on Declining Value of Big Data. 65-68 - Marwa Elsayed

, Mohammad Zulkernine:
Towards Security Monitoring for Cloud Analytic Applications. 69-78 - Bo Cai, Xuanxuan Wang, Peng Li, Zhijie Han

:
A Summary of Data Analysis Based on Differential Privacy. 79-82 - Xiaolong Xu, Qingxiang Liu

, Lianyong Qi, Yuan Yuan, Wanchun Dou, Alex X. Liu:
A Heuristic Virtual Machine Scheduling Method for Load Balancing in Fog-Cloud Computing. 83-88
BigDataSecurity 5
- Guo Niu, Meikang Qiu, Yanchun Gu:

Kernel Learning Method on Riemannian Manifold with Geodesic Distance Preservation. 89-94 - Wenwen Gong, Chengming Zhang, Qing Cheng, Hang Zhang:

A Trust Model for Secure and Reliable Cloud Service Systems. 95-99 - Yenumula B. Reddy

:
Big Data Security in Cloud Environment. 100-106 - Yunhe Feng, Zheng Lu, Qing Cao:

Secure Sharing of Private Locations through Homomorphic Bloom Filters. 107-113
BigDataSecurity 6
- Prasanthi Sreekumari:

Privacy-Preserving Keyword Search Schemes over Encrypted Cloud Data: An Extensive Analysis. 114-120 - Parinya Suwansrikham, Kun She:

Asymmetric Secure Storage Scheme for Big Data on Multiple Cloud Providers. 121-125 - Keke Gai

, Meikang Qiu, Meiqin Liu:
Privacy-Preserving Access Control Using Dynamic Programming in Fog Computing. 126-132 - K. Anitha Kumari

, G. Sudha Sadasivam
, Shymala Gowri Selvaganapathy
, Sebastin Arockia Akash, E. G. Radhika:
An Approach for End-to-End (E2E) Security of 5G Applications. 133-138
BigDataSecurity Short Papers
- Huijuan Zhao, Ning Ye, Ruchuan Wang:

A Survey on Automatic Emotion Recognition Using Audio Big Data and Deep Learning Architectures. 139-142 - Zhijie Han

, Xinjian Zhang, Jie Li:
The Analysis and Proof of the Hamiltonian Property in GBC3 Network Topology. 143-146 - Xin He, Qingfang Zhang, Zhijie Han

:
The Hamiltonian of Data Center Network BCCC. 147-150 - Xiaoyu Du, Yinhe Huangfu, Zhijie Han

:
The Hamiltonian Property Analysis and Proof of BCube Topology. 151-154 - Yang Xin, Chensu Zhao, Hongliang Zhu, Mingcheng Gao:

A Survey of Malicious Accounts Detection in Large-Scale Online Social Networks. 155-158
HPSC 1
- Zheng Li, Hao Wu, Shuibing He:

Timing Prediction for Dynamic Application Migration on Multi-core Embedded Systems. 159-164 - Elena Alexandrova, Ali Ahmadinia

:
Real-Time Intelligent Air Quality Evaluation on a Resource-Constrained Embedded Platform. 165-170 - Jinhai Wang, Yanchuan Gu, Zhimin He, Meikang Qiu:

A Resource Scheduling Algorithm Based on Maximum Discrete VM in Heterogeneity Cloud. 171-176 - Guifang Cao:

An Event Matching Algorithm of Attribute Value Domain Division for Content-Based Publish/Subscribe System. 177-182 - Weili Zhou, Zhen Zhu, Changle Zhong, Meikang Qiu:

Speech Denoising Using Bayesian NMF with Online Base Update. 183-187
HPSC 2
- Ravindra Sandaruwan Ranaweera, Eiji Oki, Nattapong Kitsuwan

:
Non-local Data Fetch Scheme Based on Delay Distribution for Hadoop Clusters in Public Cloud. 188-193 - Jason M. McGinthy, Alan J. Michaels:

Session Key Derivation for Low Power IoT Devices. 194-203 - Junnan Liu, Xing Zhai, Aiqing Han, Shuang Ding, Min Wang, Peng Yin:

The Future Development of Traditional Chinese Medicine from the Perspective of Artificial Intelligence with Big Data. 204-209 - Wanxing Sheng

, Yiming Lu, Peipei Jin, Riliang Liu, Jian Du:
Design and Implementation of the Distribution Power Network Model Construction Technology. 210-215 - Xiaotong Sun:

Critical Security Issues in Cloud Computing: A Survey. 216-221
HPSC Short Papers
- Mengxiao Jin, Canshuai Wang, Peng Li, Zhijie Han

:
Survey of Load Balancing Method Based on DPDK. 222-224 - Zhijie Han

, Yanhao Jing:
Multicast Routing Algorithm for ExCCC Networks. 225-228 - Zhijie Han

, Lin Yu:
A Survey of the BCube Data Center Network Topology. 229-231
IDS 1
- Biao Wang, Ding Wang, Yingchu Xie:

Research on the Construction and Application of Burma-Vietnam's Political Event Data Set. 232-237 - Yuxin Chen, Shun Li, Jiahui Yao:

Missing Information Management for Massive Sparse Data. 238-243 - Baozhou Luo, Wenjun Zhu, Peng Li, Zhijie Han

:
Distributed Dynamic Cuckoo Filter System Based on Redis Cluster. 244-247 - Xiaoyu Shan, Hanxiao Zhi, Peng Li, Zhijie Han

:
A Survey on Computation Offloading for Mobile Edge Computing Information. 248-251
IDS 2
- Mengfan Wei, Baojun Qiao, Jianhui Zhao, Xianyu Zuo:

Application of Remote Sensing Technology in Crop Estimation. 252-257 - Zhimin He, Haozhen Situ, Yan Zhou, Jinhai Wang, Fei Zhang, Meikang Qiu:

A Fast Security Evaluation of Support Vector Machine Against Evasion Attack. 258-263 - Xing Zhai, Junnan Liu, Aiqing Han, Shuang Ding, Youliang Huang, Peng Yin, Min Wang:

Research on the Biological Basis of Treating Different Diseases with Same Method Based on Big Data Mining and Complex Network. 264-269
IDS Short Papers
- Zhijie Han

, Weiwei Zhang:
A Summary of the BCCC Data Center Network Topology. 270-272 - Chang-O Eun, Taehyoung Kim, Im Young Jung:

Which Devices are Connected around us? 273-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














