Stop the war!
Остановите войну!
for scientists:
default search action
BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA
- 5th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019. IEEE 2019, ISBN 978-1-7281-0006-7
- Arjun Shakdhe, Suyash Agrawal, Baijian Yang:
Security Vulnerabilities in Consumer IoT Applications. 1-6 - Abdulrahman Abu Elkhail, Tomás Cerný:
On Relating Code Smells to Security Vulnerabilities. 7-12 - Zeyad A. Al-Odat, Eman Al-qtiemat, Samee Khan:
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations. 13-18 - Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Anomaly Detection Models for Smart Home Security. 19-24 - Uttkarsh Goel, Ron Ruhl, Pavol Zavarsky:
Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System. 25-30 - Xiangwei Meng, Jianbo Xu, Wei Liang, Kuan-Ching Li:
An Anonymous Mutual Authentication and Key Agreement Scheme in WBAN. 31-36 - Kevin Mayhew, Weifeng Chen:
Blockchain - Can It Solve the Security Issues and Fraud Expenses for Credit Card Commerce? 37-41 - Haibo Wu, Shiliang Shi, Qifeng Nian:
Streaming Machine Learning For Real-Time Gas Concentration Prediction. 42-46 - Arya Renjan, Sandeep Nair Narayanan, Karuna Pande Joshi:
A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic. 47-52 - Fatima Zahra Errounda, Yan Liu:
An Analysis of Differential Privacy Research in Location Data. 53-60 - Xiang Liu, Ziyang Tang, Baijian Yang:
Predicting Network Attacks with CNN by Constructing Images from NetFlow Data. 61-66 - Suprateek Kundu, Shan Suthaharan:
Privacy-Preserving Predictive Model Using Factor Analysis for Neuroscience Applications. 67-73 - Yongze Sun, Zhonghua Lu:
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method. 74-84 - Shouyan Du, Yongze Sun, Yonghong Hu, Zhonghua Lu:
Implementation of Markowitz Mean-Variance Model Based on Matrix-Valued Factor Algorithm. 85-89 - Si Liu, Yunxia Liu, Zipei Wang, Cong Feng, Hongguo Zhao:
Privacy Protection Oriented Video Data Hiding Method. 90-95 - Zhijie Han, Huijuan Zhao, Ruchuan Wang:
Transfer Learning for Speech Emotion Recognition. 96-99 - Biao Wang, Juneui Yu, Shun Li, Guowei Bai:
The Research on Process Model of Automatic Generation of Political News Event Reports. 100-107 - Li-hua Yang, Hua Huang:
A Classification Method of Ancient Ceramics Based on Support Vector Machine in Ceramic Cloud Service Platform. 108-112 - Liehuang Zhu, Hui Dong, Meng Shen, Keke Gai:
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing. 113-118 - Hai Wang, Hao Jiang, Jing Wu:
Data-Driven Uncertain Modeling and Optimization Approach for Heterogeneous Network Systems. 119-125 - Luqi Li, Hao Jiang, He Nai:
Classification of Base Station Time Series Based on Weighted Adjustable-Parameter LPVG. 126-131 - Angxin Tong, Xiaojun Tang, Feng Zhang, Bin Wang, Wei Qiu, Leilei Xi:
Concentration Determination of Ternary Mixtures in Water using Ultraviolet Spectrophotometry and Artificial Neural Networks. 132-137 - Feng Zhang, Xiaojun Tang, Angxin Tong, Bin Wang, Leilei Xi, Wei Qiu:
Using Least Squares Support Vector Machine and Polynomial Partial Least Squares Method Quantitative Analysis of Gases in Mines. 138-143 - Kaihua Hu, Huang Hua, Yujing Zhang:
Research On 3d Interactive Model Selection And Customization Of Ceramic Products Based On Big Data Cloud Service Platform. 144-148 - Shuang Chen, Wei Hu, Zhenhao Li:
High Performance Data Encryption with AES Implementation on FPGA. 149-153 - Ningwei Li, Hang Gao, Liang Liu, Fan Zhang, Wenxuan Wang:
Attack Models for Big Data Platform Hadoop. 154-159 - Hua Huang, Yilai Zhang, Min Zhang:
Research on Cloud Workflow Engine Supporting Three-Level Isolation and Privacy Protection. 160-165 - Xiaoyun Yu, Xin Li, Jidong Li, Keke Gai:
A Geographical Behavior-Based Point-of-Interest Recommendation. 166-171 - Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang, Zhenxiang Chen:
Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification. 172-177 - Xia Lei, Wei Liang, Kuan-Ching Li, Haibo Luo, Jianqiang Hu, Jiahong Cai, Yanting Li:
A New Multilevel Circuit Partitioning Algorithm Based on the Improved KL Algorithm. 178-182 - Huijuan Zhao, Ping Wang:
A Short Review of Age and Gender Recognition Based on Speech. 183-185 - Huijuan Zhao, Zhijie Han, Ruchuan Wang:
Speech Emotion Recognition Based on Multi-Task Learning. 186-188 - Xiaoyu Du, Zhijie Han, Yinhe Huangfu:
A Summary of Hamiltonian Based on Data Center Network. 189-191 - Di Ao, Ruisheng Shi, Lina Lan, Yueming Lu:
On the Large-Scale Traffic DDoS Threat of Space Backbone Network. 192-194 - Nandita Sengupta:
Designing Security System for IoT. 195-199 - Sudeep Kumar, Deepak Kumar Vasthimal:
Raw Cardinality Information Discovery for Big Datasets. 200-205 - Shubbhi Taneja, Yi Zhou, Ajit Chavan, Xiao Qin:
Improving Energy Efficiency of Hadoop Clusters using Approximate Computing. 206-211 - Yu Feng, Yue Pan, Bo Zhu, Yuchuan Deng, Jing Wu, Hao Jiang:
A New Framework for Network Flow Queuing Delay Prediction Based on Stream Computing. 212-217 - Shuo Li, Zhonghua Lu, Yongze Sun, Sungen Deng, Beifang Niu:
Distributed Parameter Optimization Scheduling Strategy and System Design Based on Mesos. 218-224 - Gabriel Iuhasz, Dana Petcu:
Perspectives on Anomaly and Event Detection in Exascale Systems. 225-229 - Deepak Kumar Vasthimal, Pavan Kumar Srirama, Arun Kumar Akkinapalli:
Scalable Data Reporting Platform for A/B Tests. 230-238 - Grieshma Unnikrishnan, Deepa Mathew, Bijoy Antony Jose, Raju Arvind:
Hybrid Route Recommender System for Smarter Logistics. 239-244 - Zhaojun Wang, Jiaxin Huang, Sisi Gong, Jing Wu, Hao Jiang:
Handoff Mechanism Considering Growth Benefit for LEO Satellite and Terrestrial Hybrid Network. 245-250 - Shaojie Luo, Lichen Zhang, Nannan Guo:
Architecture of Cyber-Physical Systems Based on Cloud. 251-257 - Erick Skorupa Parolin, Sayeed Salam, Latifur Khan, Patrick T. Brandt, Jennifer S. Holmes:
Automated Verbal-Pattern Extraction from Political News Articles using CAMEO Event Coding Ontology. 258-266 - Qais Saif Qassim, Abdul Rahim Ahmad, Roslan Ismail, Asmidar Abu Bakar, Fiza Abdul Rahim, Mohd Zin Mokhtar, Ramona Ramli, Busyra Mohd Yusof, Mohammed Najah Mahdi:
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems. 267-272 - Md Ariful Haque, Sachin Shetty, Bheshaj Krishnappa:
ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems. 273-281 - Abbas M. Al-Ghaili, Fiza Abdul Rahim, Feninferina Azman, Hairoladenan Kasim:
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications. 282-287 - Yi Zeng, Meikang Qiu, Dan Zhu, Zhihao Xue, Jian Xiong, Meiqin Liu:
DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET. 288-293 - Yifan Shu, Qian Xu, Peng Ke:
Capturing Real World Derived Information Relevancies In XML. 294-299 - Shizhao Wang, Chunhe Xia, Tianbo Wang:
A Novel Intrusion Detector Based on Deep Learning Hybrid Methods. 300-305 - Suntherasvaran Murthy, Asmidar Abu Bakar, Fiza Abdul Rahim, Ramona Ramli:
A Comparative Study of Data Anonymization Techniques. 306-309 - Wajid Hassan, Te-Shun Chou, Leslie R. Pagliari, John Pickard, Tamer Omar:
Is Public Cloud Computing Adoption Strategically the Way to Go for All the Enterprises? 310-320 - He Nai, Hao Jiang:
Time Series Identification Method for Extracting Structural Features. 321-327 - Mohd Alif Erfan Mohd Efendi, Zul-Azri Ibrahim, Md Nabil Ahmad Zawawi, Fiza Abdul Rahim, Nor' Azuwa Muhamad Pahri, Anuar Ismail:
A Survey on Deception Techniques for Securing Web Application. 328-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.