


default search action
5th DependSys 2019: Guangzhou, China
- Guojun Wang, Md. Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren:

Dependability in Sensor, Cloud, and Big Data Systems and Applications - 5th International Conference, DependSys 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1123, Springer 2019, ISBN 978-981-15-1303-9
Dependability and Security Fundamentals and Technologies
- Kun Tang, Shaowei Liao, Md. Zakirul Alam Bhuiyan, Wei Shi

:
Secrecy Outage Probability of Secondary System for Wireless-Powered Cognitive Radio Networks. 3-17 - Youqiang Deng, Cai Fu, Yang Li:

CodeeGAN: Code Generation via Adversarial Training. 18-30 - Jesús Silva, Ligia Romero, Claudia Fernández, Darwin Solano

, Nataly Orellano Llinás, Carlos Vargas Mercado, Jazmín Flórez Guzmán, Ernesto Joaquín Steffens Sanabria:
Information Consumption Patterns from Big Data. 31-39 - Xingyue Fan, Ting Wu, Qiuhua Zheng, Yuanfang Chen, Xiaodong Xiao:

DHS-Voting: A Distributed Homomorphic Signcryption E-Voting. 40-53 - Hafiz ur Rahman, Guojun Wang

, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems. 54-66 - Soumia Bellaouar, Mohamed Guerroumi

, Samira Moussaoui:
QoS Based Clustering for Vehicular Networks in Smart Cities. 67-79 - Fang Qi

, Xing Chang, Zhe Tang
, Wenbo Wang:
Searchable Attribute-Based Encryption Protocol with Hidden Keywords in Cloud. 80-92
Dependable and Secure Systems
- Haoyu Wang, Bingze Dai, Dequan Yang:

A Comparative Study of Two Different Spam Detection Methods. 95-105 - Abdullah Al Omar

, Rabeya Bosri, Mohammad Shahriar Rahman
, Nasima Begum
, Md. Zakirul Alam Bhuiyan:
Towards Privacy-preserving Recommender System with Blockchains. 106-118 - Sin Yin Tan, Wooi Ping Cheah

, Shing Chiang Tan
:
Integrating Deep Learning and Bayesian Reasoning. 119-130 - Janak Dahal, Elias Ioup, Shaikh Arifuzzaman, Mahdi Abdelguerfi:

Assessing the Dependability of Apache Spark System: Streaming Analytics on Large-Scale Ocean Data. 131-144 - Joseph Imseis, Costain Nachuma, Shaikh Arifuzzaman, Minhaz F. Zibran, Md. Zakirul Alam Bhuiyan:

On the Assessment of Security and Performance Bugs in Chromium Open-Source Project. 145-157 - Muhammad Arif, Guojun Wang

, Oana Geman
, Jianer Chen:
Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition. 158-169 - Karim Alinani

, Deshun Liu, Dong Zhou
, Guojun Wang
:
Recommender System for Decentralized Cloud Manufacturing. 170-179 - Paola Barra

, Carmen Bisogni, Michele Nappi, David Freire-Obregón
, Modesto Castrillón Santana
:
Gait Analysis for Gender Classification in Forensics. 180-190 - Amelec Viloria, Hugo Hernández Palma, Wilmer Cadavid Basto, Alexandra Perdomo Villalobos, Carlos Andrés Uribe de la Cruz, Juan de la Hoz Hernández, Omar Bonerge Pineda Lezama:

Hybrid Cloud Computing Architecture Based on Open Source Technology. 191-200
Dependable and Secure Applications
- Mingchu Li, Tingting Tang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan:

Transportation and Charging Schedule for Autonomous Electric Vehicle Riding-Sharing System Considering Battery Degradation. 203-216 - Xiaolong Xu

, Qingfan Geng, Hao Cao, Ruichao Mo, Shaohua Wan
, Lianyong Qi, Hao Wang
:
Blockchain-Powered Service Migration for Uncertainty-Aware Workflows in Edge Computing. 217-230 - Aniello Castiglione

, Michele Nappi
, Chiara Pero
:
Towards the Design of a Covert Channel by Using Web Tracking Technologies. 231-246 - Aniello Castiglione

, Giampiero Grazioli, Simone Iengo, Michele Nappi
, Stefano Ricciardi
:
Dependable Person Recognition by Means of Local Descriptors of Dynamic Facial Features. 247-261 - Yang Lu

, Shujun Li
, Athina Ioannou, Iis Tussyadiah
:
From Data Disclosure to Privacy Nudges: A Privacy-Aware and User-Centric Personal Data Management Framework. 262-276 - Tasmina Islam

, Ingolf Becker
, Rebecca Posner
, Paul Ekblom
, Michael McGuire
, Hervé Borrion
, Shujun Li
:
A Socio-Technical and Co-evolutionary Framework for Reducing Human-Related Risks in Cyber Security and Cybercrime Ecosystems. 277-293 - Hekai Zhang, Jibing Gong, Zhiyong Teng, Dan Wang, Hongfei Wang, Linfeng Du, Md. Zakirul Alam Bhuiyan:

Mobile APP User Attribute Prediction by Heterogeneous Information Network Modeling. 294-303 - Daning Huang, Huihe Chen, Shiyong Huang, Yuchang Lin, Ying Ma:

Application of Internet of Things and GIS in Power Grid Emergency Command System. 304-313 - Renxin Yu, Qinghuang Yao, Tianrong Zhong, Wei Li, Ying Ma:

Visualized Panoramic Display Platform for Transmission Cable Based on Space-Time Big Data. 314-323
Dependability and Security Measures and Assessments
- Mingchu Li, Xian Yang, Yuanfang Chen, Md. Zakirul Alam Bhuiyan:

Optimal Personalized DDoS Attacks Detection Strategy in Network Systems. 327-340 - Haroon Elahi, Guojun Wang

, Tao Peng, Jianer Chen
:
AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant. 341-355 - Boya Li, Guojun Wang

, Haroon Elahi, Guihua Duan
:
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores. 356-368 - Kehinde O. Babaagba

, Zhiyuan Tan
, Emma Hart
:
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. 369-382 - Amelec Viloria, Luisa Fernanda Arrieta Matos, Mercedes Gaitán, Hugo Hernández Palma, Yasmin Flórez Guzmán

, Luis Cabas Vásquez, Carlos Vargas Mercado, Omar Bonerge Pineda Lezama:
Demand Forecasting Method Using Artificial Neural Networks. 383-391 - Amelec Viloria, Ronald Prieto Pulido, Jesús García Guiliany, Jairo Martínez Ventura, Hugo Hernández Palma, José Jinete Torres, Osman Redondo Bilbao, Omar Bonerge Pineda Lezama:

Analyzing and Predicting Power Consumption Profiles Using Big Data. 392-401
Explainable Artificial Intelligence for Cyberspace
- Jian Hou, Fangai Liu, Xuqiang Zhuang:

A New Intrusion Detection Model Based on GRU and Salient Feature Approach. 405-415 - Honghao Wu:

Research on Electronic Evidence Management System Based on Knowledge Graph. 416-425 - Honghao Wu:

Research on Security Supervision on Wireless Network Space in Key Sites. 426-434 - Yu Zhang, Xiangtao Liu, Tianle Zhang, Zhaoquan Gu:

Review of the Electric Vehicle Charging Station Location Problem. 435-445 - Minzhen Zheng, Shudong Li

, Danna Lu, Wei Wang, Xiaobo Wu, Dawei Zhao:
Structural Vulnerability of Power Grid Under Malicious Node-Based Attacks. 446-453 - Yixia Li, Shudong Li

, Yanshan Chen, Peiyan He, Xiaobo Wu, Weihong Han:
Electric Power Grid Invulnerability Under Intentional Edge-Based Attacks. 454-461 - Ihn-Han Bae:

Design and Evaluation of a Quorum-Based Hierarchical Dissemination Algorithm for Critical Event Data in Massive IoTs. 462-476 - Syifak Izhar Hisham, Mohamad Nazmi Nasir, Nasrul Hadi Johari:

Comparative Analysis on Raster, Spiral, Hilbert, and Peano Mapping Pattern of Fragile Watermarking to Address the Authentication Issue in Healthcare System. 477-486

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














