


default search action
CyberC 2022: Suzhou, China
- International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2022, Suzhou, China, October 14-16, 2022. IEEE 2022, ISBN 979-8-3503-3154-7

- Huancheng Lin, Zhehan Wang, Tong Xu, Shanyue Zhou, Yang Hong, Jun Huang:

Analysis of Zero-Key Authentication and Zero-Knowledge Proof. 1-8 - Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han:

On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid. 9-11 - Thejavathy Vengappa Raja, Zoheir Ezziane, Jun He, Xiaoqi Ma

, Asmau Wali-Zubai Kazaure:
Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models. 12-18 - Zhao Yang, Fengyang Deng, Linxi Han:

Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor. 19-28 - Jing Wang, Fengheng Wu, Tingbo Zhang, Xiaohua Wu

:
DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption. 29-32 - Qian Zhang, Lishen Chen, Qiao Yan:

Adversarial Attack and Defense for Webshell Detection on Machine Learning Models. 33-41 - Abdou Romaric Tapsoba

, Frédéric Tounwendyam Ouédraogo, Arnold Elvis Ouédraogo:
Relevance of the Gaussian classification on the Detection of DDoS Attacks. 42-49 - Tongpo Zhang, Yuxin Wan, Miguel López-Benítez

, Enggee Lim, Fei Ma, Limin Yu:
Big data encrypting transmission framework for a multi-AGV system. 50-56 - Yishan Wei, Xiaomei Cao:

Blockchain-based Multi-layer Data Security Sharing Model. 57-65 - Zhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li:

A Privacy-Preserving Blockchain-based Energy Supply Chain System Supporting Supervision. 66-75 - Hui Jiang:

BIM Credibility: A Framework of Blockchain-enabled BIM Data. 76-79 - Fangze Qiu, Huaxiao Huang, Yuji Dong

:
A Re-configurable Interaction Model in Distributed IoT Environment. 80-86 - Xinguang Xie, Junjian Ye, Lifa Wu, Rong Li:

RTOSExtracter: Extracting user-defined functions in stripped RTOS-based firmware. 87-96 - Qinghua Wang

:
Machine Learning Model Design for IoT-Based Flooding Forecast. 97-103 - Jiashun Duan, Xin Zhang, Chi Xu:

LwF4IEE: An Incremental Learning Method for Interactive Event Extraction. 104-113 - Haoyu Wu, Zhibin Lin, Borong Lin, Zhenhao Li, Nanlin Jin

, Xiaohui Zhu:
Deep Learning To Model The Complexity Of Algal Bloom. 114-122 - Huang Huang, Yi Yang, Liang Tang, Zhang Zhang, Nailong Liu, Mou Li, Liang Wang:

A Multimodal Off-Road Terrain Classification Benchmark for Extraterrestrial Traversability Analysis. 123-126 - Soha Alrajjou, Edward Kwadwo Boahen, Chunyun Meng, Keyang Cheng:

An enhanced interpretable deep learning approach for diabetic retinopathy detection. 127-135 - Xuting Yang, Ruoyu Sun, Xiaotian Ren, Angelos Stefanidis

, Fengchen Gu, Jionglong Su:
Ghost Expectation Point with Deep Reinforcement Learning in Financial Portfolio Management. 136-142 - Ruiyu Zhang, Xiaotian Ren, Fengchen Gu, Angelos Stefanidis

, Ruoyu Sun, Jionglong Su:
MDAEN: Multi-Dimensional Attention-based Ensemble Network in Deep Reinforcement Learning Framework for Portfolio Management. 143-151 - Karim H. Moussa

, Marwa H. El-Sherif:
A New Hybrid Steganography Scheme Employing A Time-Varying Delayed Chaotic Neural Network. 152-157 - Ruoyi Gao, Fengchen Gu, Ruoyu Sun, Angelos Stefanidis

, Xiaotian Ren, Jionglong Su:
A Novel DenseNet-based Deep Reinforcement Framework for Portfolio Management. 158-165 - Xuan Low, Dequan Yang, Dengpan Yang:

Design and Implementation of Industrial Control Cyber Range System. 166-170 - Zuping Zhang

:
Study on fast convergence method of IIR low pass filter. 171-176 - Jie Wang

:
Modeling and Accelerating of Mobile Advertisement Dissemination in Vehicular Networks. 177-180 - Xuesong Wang, Lu Lu:

Deep Neural Networks Enhanced Phase Asynchronous Physical-Layer Network Coding. 181-184 - Jie Yu, Jian Gao, Ning Wang, Panpan Feng, Bing Zhou

, Zongmin Wang:
QT-STNet: A Spatial and Temporal Network Combined with QT Segment for MI Detection and Location. 185-188 - Jian Gao, Jie Yu, Ning Wang, Panpan Feng, Huiqing Cheng, Bing Zhou, Zongmin Wang:

A CVD Critical Level-aware Scheduling Model Based on Reinforcement Learning for ECG Service Request. 189-192 - Jianjun Yuan, Shifeng Li:

Sparse coding based on L2,1-norm and manifold regularization for remote sensing images. 193-197 - Qiwei Li, Chen Li, Chenggong Yan, Xiaomei Li, Haixia Li, Tianjing Zhang, Hui Song, Roman Schaffert, Weimin Yu, Yu Fan, Jianwei Ye, Hao Chen:

Ultra-low Dose CT Image Denoising based on Conditional Denoising Diffusion Probabilistic model. 198-205 - Hui He, Qihong Chen, Guoping Xie, Boxiong Yang, Shelei Li, Bo Zhou, Yuye Gu:

A Lightweight Deep Learning Model for Real-time Detection and Recognition of Traffic Signs Images Based on YOLOv5. 206-212 - Haoyu Wu

, Jun Qi, Wei Wang, Jianjun Chen
:
Machine Learning-based Gesture Recognition Using Wearable Devices. 213-221 - Hu Jin, Juan Wang, Zuli Wang, Dan Long:

Improved YOLOv5s algorithm for small item detection of wheelhouse. 222-225 - Minkang Zhang, Ding Chen, Yongxin Huang:

Research on Multiple Targets Pedestrian Reidentification with Night Scene Image Enhancement. 226-229 - Qi Qing:

A Fusion Network for Non-Uniform Deblurring*. 230-239 - Pengyao Yi, Ruifang Liu:

A Relation Enhanced Model For Abstractive Dialogue Summarization. 240-246 - Yang Xiao

:
A Task Allocation Method in Edge Computing Based on Multi-Objective Optimization. 247-251 - Nan Yang, Cen Chen, Tao Yuan, Yujie Wang, Xiaofan Gu, Dan Yang:

Security hardening solution for docker container. 252-257 - Shengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang:

Dangerous Action Recognition for Ship Sailing to Limited Resource Environment. 258-262 - Zhimin Guo, Zhuo Lv, Nuannuan Li, Tao Yuan, Xue Gao, Zekun Yuan:

Comprehensive defense scheme against container escape related to container management procedure. 263-266 - Junfeng Ding, Hao Chen, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang:

Point cloud objective recognition method combining SHOT features and ESF features. 267-274 - Junfeng Ding, Haonan Zong, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang:

Study on the automatic modeling method of 3D information model for substations. 275-283 - Jie Zhang, Pengcheng Wen, Ai Xiong:

Multi-task Assignment Research for Heterogeneous UAVs based on Improved Simulated Annealing Particle Swarm Optimization Algorithm. 284-288 - Huanran Zhang, Lingfeng Shen, Ning Wang, Xiaomin Mu:

UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers. 289-293 - Changyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai, Yutao Yue

:
Causal Unstructured Pruning in Linear Networks Using Effective Information. 294-302 - Juntuo Wang, Qiaochu Zhao, Dongheng Lin, Erick Purwanto, Ka Lok Man:

Conditional Metadata Embedding Data Preprocessing Method for Semantic Segmentation. 303-311 - Ling Li:

A Personalized Recommendation Fusing Tag Feature and Temporal Context. 312-317 - Yuan-hui Li, Zhao Wen, Hai-yun Han, Zhipeng Ou, Liu Xia:

Comparison of ARIMA Model and GM(1,1) Model in Passenger Flow Prediction of Sanya Airport. 318-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














