


default search action
15th IMIS 2021: Asan, Korea
- Leonard Barolli, Kangbin Yim, Hsing-Chung Chen:

Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), Asan, Korea, 1-3 July, 2021. Lecture Notes in Networks and Systems 279, Springer 2022, ISBN 978-3-030-79727-0 - Tomoyuki Ishida, Kyosuke Sakuma:

Implementation of a VR Preview Simulation System by Capturing the Human Body Movements. 1-9 - Yukang Zhao, Nan Guo, Xinbei Jiang:

Projection Region Detection Model Based on BASNet. 10-19 - Kang Xie, Tao Yang, Rourong Fan, Guoqing Jiang:

Analysis of Epidemic Events Based on Event Evolutionary Graph. 20-29 - Masahiro Fujita, Yasuoki Iida, Mitsuhiro Hattori, Tadakazu Yamanaka, Nori Matsuda, Satoshi Ito, Hiroaki Kikuchi:

Proposal and Development of Anonymization Dictionary Using Public Information Disclosed by Anonymously Processed Information Handling Business Operators. 30-39 - Shuai Zhou, Tianhan Gao:

VANETs Road Condition Warning and Vehicle Incentive Mechanism Based on Blockchain. 40-49 - Cong Zhao, Nan Guo, Tianhan Gao, Jiayu Qi, Xinyang Deng:

An Authentication Scheme for Car-Home Connectivity Services in Vehicular Ad-Hoc Networks. 50-58 - Jaehyuk Lee

, Kangbin Yim, Kyungroul Lee:
Vulnerability Analysis of Software Piracy and Reverse Engineering: Based on Software C. 59-66 - Hua Yang, Jingling Zhao, Baojiang Cui:

PtPeach: Improved Design and Implementation of Peach Fuzzing Test for File Format. 67-75 - Syed Minhal Abbas, Nadeem Javaid, Muhammad Usman

, Shakira Musa Baig, Arsalan Malik, Anees Ur Rehman:
An Efficient Approach to Enhance the Robustness of Scale-Free Networks. 76-86 - Usman Aziz, Muhammad Usman Gurmani, Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Nadeem Javaid:

A Blockchain Based Secure Authentication and Routing Mechanism for Wireless Sensor Networks. 87-95 - Saba Awan, Maimoona Bint E. Sajid, Sana Amjad, Usman Aziz, Muhammad Usman Gurmani, Nadeem Javaid:

Blockchain Based Authentication and Trust Evaluation Mechanism for Secure Routing in Wireless Sensor Networks. 96-107 - Muhammad Asif

, Benish Kabir, Pamir, Ashraf Ullah, Shoaib Munawar, Nadeem Javaid:
Towards Energy Efficient Smart Grids: Data Augmentation Through BiWGAN, Feature Extraction and Classification Using Hybrid 2DCNN and BiLSTM. 108-119 - Faisal Shehzad, Muhammad Asif, Zeeshan Aslam, Shahzaib Anwar, Hamza Rashid, Muhammad Ilyas, Nadeem Javaid:

Comparative Study of Data Driven Approaches Towards Efficient Electricity Theft Detection in Micro Grids. 120-131 - Qiang Gao, Tetsuya Shigeyasu, Chunxiang Chen:

Routing Strategy for Avoiding Obstacles During Message Forwarding in Mobile Ad-Hoc Network. 132-143 - Yang Hu, Wenchuan Yang, Baojiang Cui, Xiaohui Zhou, Zhijie Mao, Ying Wang:

Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol. 144-155 - Nobuki Saito, Tetsuya Oda, Aoto Hirata, Kyohei Toyoshima, Masaharu Hirota, Leonard Barolli:

Simulation Results of a DQN Based AAV Testbed in Corner Environment: A Comparison Study for Normal DQN and TLS-DQN. 156-167 - Yunli Li, Young Jin Chun

:
Stochastic Geometric Analysis of IRS-aided Wireless Networks Using Mixture Gamma Model. 168-178 - Shinji Sakamoto, Yi Liu, Leonard Barolli, Shusuke Okamoto:

Performance Evaluation of CM and RIWM Router Replacement Methods for WMNs by WMN-PSOHC Hybrid Intelligent Simulation System Considering Chi-square Distribution of Mesh Clients. 179-187 - Tao Guo, Baojiang Cui:

Web Page Classification Based on Graph Neural Network. 188-198 - Kunlin Li, Baojiang Cui:

Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning. 199-208 - Wenyu Zhang, Tianhan Gao:

Improved Optimal Reciprocal Collision Avoidance Algorithm in Racing Games. 209-220 - Kyungmin Lee, Mincheol Shin, Yongho Kim, Hae-Duck J. Jeong:

An Intelligent Travel Application Using CNN-Based Deep Learning Technologies. 221-231 - Jiha Kim, Hyunhee Park:

Reduced CNN Model for Face Image Detection with GAN Oversampling. 232-241 - Feng Zhai, Lingda Kong, Yongjin Yu, Xin Ye:

Power Meter Software Quality Analysis Based on Dynamic Binary Instrumentation. 242-252 - Marco Lapegna

, Silvia Stranieri:
DClu: A Direction-Based Clustering Algorithm for VANETs Management. 253-262 - Khan Reaz

, Gerhard Wunder:
ComPass: Proximity Aware Common Passphrase Agreement Protocol for Wi-Fi Devices Using Physical Layer Security. 263-275 - Han Xu, Baojiang Cui, Chen Chen:

Fuzzing with Multi-dimensional Control of Mutation Strategy. 276-284 - Zheng Wang, Baojiang Cui, Yang Zhang:

An ELF Recovery Method for Linux Malicious Process Detection. 285-294 - Jiatong Wu, Baojiang Cui, Chen Chen, Xiang Long:

A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification. 295-303 - Fanglei Zhang, Baojiang Cui, Chen Chen, Yiqi Sun, Kairui Gong, Jinxin Ma:

Simulation-Based Fuzzing for Smart IoT Devices. 304-313 - Tzu-Liang Kung, Cheng-Kuan Lin, Chun-Nan Hung:

On the Neighborhood-Connectivity of Locally Twisted Cube Networks. 314-321 - Yuan-Hsiang Teng, Tzu-Liang Kung:

Assessing the Super Pk-Connectedness of Crossed Cubes. 322-329 - Hsing-Chung Chen, Eko Prasetyo, Prayitno, Sri Suning Kusumawardani, Shian-Shyong Tseng, Tzu-Liang Kung, Kuei-Yuan Wang:

Learning Performance Prediction with Imbalanced Virtual Learning Environment Students' Interactions Data. 330-340 - Anthony Y. H. Liao:

An APP-Based E-Learning Platform for Artificial Intelligence Cross-Domain Application Practices. 341-351 - Hsing-Chung Chen, Galang Wicaksana, Agung Mulyo Widodo, Andika Wisnujati

, Tzu-Liang Kung, Wen-Yen Lin:
Automatic Control System for Venetian Blind in Home Based on Fuzzy Sugeno Method. 352-361 - Sen-Tarng Lai, Heru Susanto, Fang-Yie Leu:

Combining Pipeline Quality with Automation to CI/CD Process for Improving Quality and Efficiency of Software Maintenance. 362-372 - Lung-Pin Chen, Fang-Yie Leu, Hsin-Ta Chiao, Hung-Jr Shiu

:
Efficient Adaptive Resource Management for Spot Workers in Cloud Computing Environment. 373-382 - Li-Gang Jiang, Yi-Hong Chan, Yao-Chung Fan

, Fang-Yie Leu:
You Draft We Complete: A BERT-Based Article Generation by Keyword Supplement. 383-392 - Zhi-Qian Hong, Heru Susanto, Fang-Yie Leu:

A Q-Learning Based Downlink Scheduling Algorithm for Multiple Traffics in 5G NR Systems. 393-402 - Yung-Shun Tsai, Chun-Ping Chang, Shyh-Weir Tzang:

Study on the Relationship Between Dividend, Business Cycle, Institutional Investor and Stock Risk. 403-411 - Chun-Ping Chang, Yung-Shun Tsai, Khunshagai Batjargal, Hong Nhung Nguyen, Shyh-Weir Tzang:

The Choice Between FDI and Selling Out with Externality and Exchange Rate. 412-419 - Shyh-Weir Tzang, Chun-Ping Chang, Tsatsral Ochirbal, Bolor Sukhbaatar, Yung-Shun Tsai:

Performance of the Initial Public Offering in the Taiwan Stock Market. 420-430 - Ying-Li Lin, Kuei-Yuan Wang, Jia-Yu Chen:

Analysis of the Causal Relationship Among Diversification Strategies, Financial Performance and Market Values by the Three-Stage Least Squares (3SLS). 431-437 - Mei-Hua Liao, Chun-Min Wang, Ya-Lan Chan:

Macroeconomic Variables and Investor Sentiment. 438-443 - Tin-Chang Chang, I-Tien Chu, Pei-Shih Chen:

College Students' Learning Motivation and Learning Effectiveness by Integrating Knowledge Sharing, Action Research and Cooperative Learning in Statistics. 444-463 - Kuei-Yuan Wang, Ying-Li Lin, Chien-Kuo Han, Shu-Tzu Shih:

A Feasibility Study of the Introduction of Service Apartment Operation Model on Long-Term Care Institutions. 464-471 - Ya-Lan Chan, Pei-Fang Lu, Sue-Ming Hsu, Mei-Hua Liao:

Research on the Integration of Information Technology into Aesthetic Teaching in Kindergartens. 472-477 - Mitsuki Tsuneyoshi, Masahiro Miwata, Daisuke Nishii, Makoto Ikeda, Leonard Barolli:

A Simulation System for Analyzing Attack Methods in Controller Area Network Using Fuzzing Methods. 478-484 - Lei Zhao, Tianhan Gao:

Combination of Pseudonym Changing with Blockchain-Based Data Credibility for Verifying Accuracy of Latest Vehicle Information in VANETs. 485-493 - Wontae Jung, Kangbin Yim, Kyungroul Lee:

Vulnerability Analysis of Intellectual Property Rights Using Reverse Engineering: Based on Software D. 494-500 - Hiroaki Kikuchi, Atsuki Ono, Satoshi Ito, Masahiro Fujita, Tadakazu Yamanaka:

Web Crawler for an Anonymously Processed Information Database. 501-510 - Yunxuan Su, Xu An Wang, Yu Ge:

A Scheme for Checking Similarity and Its Application in Outsourced Image Processing. 511-517

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














