default search action
8th BigDataSecurity/HPSC/IDS 2022: Jinan, China
- 8th IEEE Intl Conference on Big Data Security on Cloud, IEEE Intl Conference on High Performance and Smart Computing and IEEE Intl Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS, Jinan, China, May 6-8, 2022. IEEE 2022, ISBN 978-1-6654-8069-7
- Hongjun Dai:
Message from the General Chairs. 1 - Yonghao Wang, Shui Yu, Yongxin Zhu:
Message from the Program Chairs BigDataSecurity 2022. 1 - Cheng Zhang, Keke Gai, Jihe Wang:
Message from the Program Chairs HPSC 2022. 1 - Han Qiu, Luna Li, Linghe Kong:
Message from the Program Chairs IDS 2022. 1 - Sharad Dixit, Karuna Pande Joshi, Seung Geol Choi, Lavanya Elluri:
Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE. 1-10 - Chaofan Zheng, Wenhui Hu, Tianci Li, Xueyang Liu, Jinchan Zhang, Litian Wang:
An Insider Threat Detection Method Based on Heterogeneous Graph Embedding. 11-16 - Pengyu Zhang, Yufei Li, Xinliang Ge, Wenhui Hu, Lizhuang Sun, Xueyang Liu:
Predicting Relations in SG-CIM Model Based on Graph Structure and Semantic Information. 17-22 - Xingrun Yan, Shuo Wang, Keke Gai:
A Semantic Analysis-Based Method for Smart Contract Vulnerability. 23-28 - Shijun Ding, An Wang, Shaofei Sun, Yaoling Ding, Xintian Hou, Dong Han:
Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH. 29-34 - Feng Yang, Liao Lei, Hangyu Zhu:
Overview of Blockchain and Cloud Service Integration. 35-40 - Xin Wen, Yulan Wang, Kai Wang, Ran Sui:
A Russian Hate Speech Corpus for Cybersecurity Applications. 41-47 - Fang Liu, Zimeng Fan, Feihu Huang, Yining Li, Yanxiang He, Wei Hu:
Modeling Learner Behavior Analysis Based on Educational Big Data and Dynamic Bayesian Network. 48-53 - Chenjun Liang, Li Deng, Jincan Zhu, Zhen Cao, Chao Li:
Cloud Storage I/O Load Prediction Based on XB-IOPS Feature Engineering. 54-60 - Dawei Li, Yingpeng Zhang, Jian Cui, Di Liu, Yu Sun, Zhenyu Guan, Xu Wang:
Remote Audit Scheme of Embedded Device Software Based on TPM. 61-66 - Xunwu Gong, Bin Hu, Yunqiang Xiong, Xiaofang Zhao:
Practical Verifiable Computation on Encrypted Data. 67-74 - Guoqing Wang, Yiming Lu, Peng Liu, Wang Zhou:
High-performance Distributed Feature Storage and Consumption Services in Power Grid Scenarios. 75-80 - Fangjun Li, Runzhen Yan, Rui Su, Yating Wang, Xueyang Liu, Kehui Xu:
An Automatic Model Table Entity Alignment Framework for SG-CIM Model. 81-86 - Xiao Chen:
Job Scheduling on Edge and Cloud Servers. 87-91 - Joshua Smith, Yingying Zhu, Zheng Li:
Public Transit Prediction During COVID-19 Pandemic. 92-94 - Chenjun Liang, Li Deng, Jincan Zhu, Zhen Cao, Chao Li:
Disk Failure Prediction Based on SW-Disk Feature Engineering. 95-100 - Feng Yang, Liao Lei, Lin Chen:
Method of Interaction between Blockchain and the World outside the Chain based on Oracle Machine. 101-106 - Ming Wu, Lei Zhou, Fujin Huang:
EVCS: An Edge-assisted Virtual Computing and Storage Approach for Heterogeneous Desktop Deployment. 107-112 - Xiangyu Gao, Meikang Qiu:
Efficient Process Scheduling for Multi-core Systems. 113-118 - Gang Qiu, Yanli Guo, Changjun Song:
TANN: Text-based Attention Neural Network Recommendation Model. 119-124 - Haixia Hou, Zijun Di, Mingqiang Zhang, Dongfeng Yuan:
An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTM. 125-130 - Tengfei Lei, Haiyan Fu, Lili Huang, Hongyan Zang, You Zhou, Tingyang Yan:
Prediction of CNC Machine Tool Wear Stat Based on LSTM. 131-136 - Rahul Kale, Zhi Lu, Kar-Wai Fok, Vrizlynn L. L. Thing:
A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection. 137-142 - Luoyifan Zhong, Na Li, Yi Sun:
Research and Application of Image Style Transfer Method. 143-147 - Yi Sun, Luoyifan Zhong, Hao Yue, Tao Mi:
Identification and Analysis of Tool Wear State Based on Deep Learning. 148-153 - Chenyang Yan, Hongshuo Wang, Songsong Yan:
An identity-based message authentication scheme for Internet of vehicles. 154-156 - Feng Cao, Min Su:
Research on Face Recognition Algorithm Based on CNN and Image Super-resolution Reconstruction. 157-161 - Tao Mi, Luoyifan Zhong, Xin He, Yi Sun, Chenyang Yan, Hao Yue:
Fault Prediction of Process Industry Based on Fuzzy Clustering. 162-167 - Ying Yu:
New Method of Song Sentiment Classification Based on Neural Network. 168-173 - Litian Wang, Wenhui Hu, Tong Zheng, Shanshan Yin, Xiaoya Zhang, Xueyang Liu:
Node Similarity-based Search Method for Medical Insurance Heterogeneous Information Network. 174-179 - Sukun Li, Xiaoxing Liu:
Toward a BCI-Based Personalized Recommender System Using Deep Learning. 180-185 - Luoyifan Zhong:
Optimization and Prediction of Intelligent Tourism Data. 186-188 - Art Sedighi, Thomas Daniels, Doug Jacobson:
On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments. 189-193 - Zhi Lu, Vrizlynn L. L. Thing:
"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector. 194-199 - Jinchan Zhang, Xueyang Liu, Wenyu Shao, Wenhui Hu, Wenmo Zhang, Chaofan Zheng:
Civil Servant Position Recommendation Algorithm Based on Model Fusion. 200-205 - Wenmo Zhang, Xueyang Liu, Xiaoya Zhang, Wenhui Hu, Jinchan Zhang, Wenyu Shao:
Medicare Fraud Gang Discovery Based on Community Discovery Algorithms. 206-211 - Ce Yang, Juan Chen, Bin Zeng, Lei Liao:
Overview of Blockchain Privacy Protection. 212-217 - Sadaf Md. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md Delwar Hossain:
A Federated Approach for Learning from Electronic Health Records. 218-223 - Saquib Irtiza, Latifur Khan, Kevin W. Hamlen:
SentMod: Hidden Backdoor Attack on Unstructured Textual Data. 224-231
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.