


default search action
10th BigDataSecurity 2024: New York, NY, USA
- 10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024, New York City, NY, USA, May 10-12, 2024. IEEE 2024, ISBN 979-8-3503-8952-4

- Bhavani Thuraisingham, Kim Nimon, Latifur Khan:

An Education Program for Big Data Security and Privacy. 1-4 - Dongfeng Lv, Manman Ma, Hanxia Dong, Yishan Shang, Kuo Bao:

Anomaly Detection in Multivariate Time Series with Contaminated Training Data Using VAE. 5-10 - Zhouji Wang, Xinyue Lu, Kui Li, Wei Gong:

A Low-Cost Positioning Beacon in Rail Transit System. 11-16 - Shuyi Li, Pengyu Zhang, Xueyang Liu, Wenhui Hu:

Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks. 17-22 - Wenjia Wang

, Seyed Masoud Sadjadi, Naphtali Rishe
:
A Survey of Major Cybersecurity Compliance Frameworks. 23-34 - Yingying Cai, Wenhui Hu, Xueyang Liu, Haoxuan Wang, Xiankui Zhang, Jiaxi Wang:

User Dual Intents Graph Modeling for Information Diffusion Prediction. 35-40 - Luxiu Yin, Qihui Huang, Xuanya Wang, Wei Liang

, Chun Wang:
Towards Privacy Protection: A Non-Invasive Human Detection Method via Edge-Cloud Collaboration. 41-46 - Beihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang, Shuyi Li:

Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language Models. 47-51 - Xinyi Yang, Kaipei Li, Jie Tian:

A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-Cloud Hybrid Environments. 52-57 - Yong Lin, Peng Jiang

, Keke Gai, Liehuang Zhu:
Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification. 58-65 - Chen Yang, Xueyang Liu, Shuyi Li, Wenhui Hu, Beihu Wu, Hao Tian:

Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series Models. 66-70 - Taolei Shi, Wei Gong:

A Survey of Bluetooth Indoor Localization. 71-77 - Fangming Jing, Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu:

Precision Assistance for Residents with Subsistence Allowance: Cluster Analysis of Mixed-Type Data Based on K-Prototypes. 78-83 - Xiaohui Wei, Mengting Zhou, Nan Jiang, Hengshan Yue:

Evaluating the Soft Error Resilience of Graph Applications on GPGPUs. 84-89 - Shizhong Li, Wei Zhang, Ruonan Chen, Dawei Li:

A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoT. 90-95 - Jingnian Liu, Wei Liang

, Yuxiang Chen, Kai Jin:
SyNet: Medical image anomaly detection with noise synthesis network. 96-100 - Xiangyun Qian, Rui Zhang, Zi Kang, Hui Xia:

An Invisible Backdoor Attack on Cloud Computing in the Internet of Things. 101-106 - Ming Chen, Sen Yang, Wenbo Dai, Zisheng Wang, Jun Xu:

A Method for Anomaly Detection in Power Energy Topology Graph Data Based on Domain Knowledge Graph and Graph Neural Networks. 107-112 - Wei Yu, Jianguo Qian, Ranyue Xu, Chenxing Jin, Haina Fang, Xianhai Shi:

Improving Substation Network Security with DevSecOps and AIOps. 113-118 - Zijun Wang, Hongchen Guo, Keke Gai:

Decision Tree-based Privacy Protection in Federated Learning: A Survey. 119-124 - Chen Jiang, Mengxian Chen, Huasen Xie, Hua Wang, Jun Xu:

A Method for Anomaly Detection in Power Time Series Data within Energy Big Data Based on Generative Adversarial Networks. 125-129 - Xintian Ren, Jun Wu, Hansong Xu, Xiuzhen Chen:

Diffusion Model Based Secure Semantic Communications with Adversarial Purification. 130-134 - Mengyuan Zhang, Yingying Zhao, Yingjie Tian:

Research on Production Capacity Utilization Index Based on Electricity Big Data. 135-138 - Haozhe Chai, Jun Wu, Qianqian Pan, Xinzheng Feng:

Sound-LDR Sensors Empowered Secure True Random Number Generator for PoS Consensus in Blockchain. 139-144 - Guohao Cui, Hao Wang, Wentao Hao, Xiaoyi Zhou:

OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation. 145-149 - Yanlu Li, Yufeng Xiao, Yinyan Gong, Ronglin Zhang, Yingzi Huo, Yanbing Wu:

Explainable AI: A Way to Achieve Trustworthy AI. 150-155 - Wenjing Xu, Yulun Song, Haochen Liang, Lin Sun, Yunlong Xie:

A Blockchain-Based Identity Control Scheme for Cross-Organizational Data Sharing. 156-160 - Chuangchuang Dai, Haodong Li, Lei Guan, Mingbo Chi:

Industrial Internet of Things (IIoT) Identity Resolution Techniques: A Review. 161-166 - Qianqian Pan, Jun Wu:

AI-Finger: From Physical Unclonable Function to AI-Hardware Fingerprint. 167-172 - Ranyue Xu, Wei Yu, Hao Huang, Yongchun Pan, Chen Zhou, Gang Zheng:

Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence Platform. 173-178

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














