


default search action
7th SmartCom 2022: New York City, NY, USA
- Meikang Qiu

, Zhihui Lu, Cheng Zhang:
Smart Computing and Communication - 7th International Conference, SmartCom 2022, New York City, NY, USA, November 18-20, 2022, Proceedings. Lecture Notes in Computer Science 13828, Springer 2023, ISBN 978-3-031-28123-5 - Qiming Zhao, Jing Wu, Xiang Wu, Jie Fan, Linhao Wang, Fengling Wu:

Design and Implementation of Deep Learning Real-Time Streaming Video Data Processing System. 1-10 - Haolei Wang, Yong Chen, Chao Zhang, Jian Li, Chun Gan, Yinxian Zhang, Xiao Chen:

GenGLAD: A Generated Graph Based Log Anomaly Detection Framework. 11-22 - Wei-Tek Tsai, Weijing Xiang, Shuai Wang, Enyan Deng:

A New Digital-Currency Model Based on Certificates. 23-34 - Chengjun Yang, Ling zhou, Ce Yang:

Meter Location System Base on Jetson NX. 35-44 - Baoquan Ma, YeJian Cheng, Ni Zhang, Peng Wang, XuHua Lei, XiaoYong Huai, JiaXin Li, ShuJuan Jia, ChunXia Wang:

Research on Cross-Domain Heterogeneous Information Interaction System in Complex Environment Based on Blockchain Technology. 45-54 - Wei-Tek Tsai, Zimu Hu, Rong Wang, Enyan Deng, Dong Yang:

A New Blockchain Design Decoupling Consensus Mechanisms from Transaction Management. 55-65 - Rong Wang, Wei-Tek Tsai, Feng Zhang, Le Yu, Hongyang Zhang, Yaowei Zhang:

Adaptive Byzantine Fault-Tolerant ConsensusProtocol. 66-75 - Wei-Tek Tsai, Dong Yang, Zizheng Fan, Feng Zhang, Le Yu, Hongyang Zhang, Yaowei Zhang:

A Multi-level Corporate Wallet with Governance. 76-84 - Wei-Tek Tsai, Dong Yang, Feng Zhang, Le Yu, Hongyang Zhang, Yaowei Zhang:

Blockchains with Five Merkle Trees to Support Financial Transactions. 85-94 - Canwei Liu, Tingqin He, Hangyu Zhu, Yanlu Li, Songyou Xie, Osama Hosam

:
A Survey of Recommender Systems Based on Hypergraph Neural Networks. 95-106 - Jian Li, Xiao Chen, Chao Zhang, Hao Wu, Xin Yu, Shiqi Liu, Haolei Wang:

Equipment Health Assessment Based on Node Embedding. 107-119 - Jie Wan, Yiren Qi:

Improvement of ERP Cost Accounting System with Big Data. 120-130 - Meng Wan

, Rongqiang Cao, Yangang Wang, Jue Wang, Kai Li, Xiaoguang Wang, Qinmeng Yang:
OpenVenus: An Open Service Interface for HPC Environment Based on SLURM. 131-141 - Xin Liu

, Xiaomeng Liu
, Xiaofen Tu
, Neil N. Xiong
:
Design and Analysis of Two Efficient Socialist Millionaires' Protocols for Privacy Protection. 142-151 - Zhirui Luo

, Ruobin Qi
, Qingqing Li
, Jun Zheng
, Sihua Shao
:
ABODE-Net: An Attention-based Deep Learning Model for Non-intrusive Building Occupancy Detection Using Smart Meter Data. 152-164 - Xiaofen Tu

, Xin Liu
, Xiangyu Hu
, Baoshan Li
, Neal N. Xiong
:
Confidentially Computing DNA Matching Against Malicious Adversaries. 165-174 - Hui Zhao, Jiacheng Tan, Jiajia Duan:

Research on Action Recognition Based on Zero-shot Learning. 175-187 - Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi:

DPSD: Dynamic Private Spatial Decomposition Based on Spatial and Temporal Correlations. 188-202 - Xun Liu, Hui Zhao:

Scheduling Algorithm for Low Energy Consumable Parallel Task Application Based on DVFS. 203-212 - Dansheng Rao, Lingfeng Bian, Hui Zhao:

Research of Duplicate Requirement Detection Method. 213-225 - Yu Zhang, Lintao Yang, Fuhao Liu, Lei Zhang, Jingjing Zheng, Chongxi Zhao:

Bayesian Causal Mediation Analysis with Longitudinal Data. 226-235 - Caiwu Lu, Fan Ji, Naixue Xiong, Song Jiang, Di Liu, Sai Zhang:

Track Obstacle Real-Time Detection of Underground Electric Locomotive Based on Improved YOLOX. 236-246 - Jun Liu, Xu Shen, Mingyue Xie, Qi Zhang:

Research on Sharding Strategy of Blockchain Based on TOPSIS. 247-257 - Zikang Chen, Xiangcong Kong

, Xiaoying Zheng, Yongxin Zhu, Tom Trigano:
Parallel Pileup Correction for Nuclear Spectrometric Data on Many-Core Accelerators. 258-267 - Xiangyu Gao, Meikang Qiu, Hui Zhao:

Component Extraction for Deep Learning Through Progressive Method. 268-279 - Neal N. Xiong, Wenyong He, Mingming Lu:

LowFreqAttack: An Frequency Attack Method in Time Series Prediction. 280-289 - Hui Zhao, Peng Su, Meikang Qiu:

A Novel Machine Learning-Based Model for Reentrant Vulnerabilities Detection. 290-299 - Jingnian Liu, Weihong Huang, Lijun Xiao, Yingzi Huo, Huixuan Xiong, Xiong Li, Weidong Xiao:

Deep Learning Object Detection. 300-309 - Jun Liu

, Qi Zhang
, Mingyue Xie, Ming-Peng Chen:
A Decision-Making Method for Blockchain Platforms Using Axiomatic Design. 310-318 - Yue Zhang

, Keke Gai
, Liehuang Zhu
, Meikang Qiu
:
An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial Network. 319-328 - Shan Jin

, Yong Li
, Xi Chen
, Ruxian Li, Zhibin Shen:
Blockchain-Based Fairness-Enhanced Federated Learning Scheme Against Data Poisoning Attack. 329-339 - Ying Long, Yinyan Gong, Weihong Huang, Jiahong Cai, Nengxiang Xu, Kuan-Ching Li:

Cryptography of Blockchain. 340-349 - Yuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:

An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities. 350-359 - An Wang, Shulin He, Congming Wei, Shaofei Sun, Yaoling Ding, Jiayao Wang:

Using Convolutional Neural Network to Redress Outliers in Clustering Based Side-Channel Analysis on Cryptosystem. 360-370 - Xuan You, Changsong Zhou, Zeng Chen, Yu Gu, Rui Han, Guozi Sun:

Secure File Outsourcing Method Based on Consortium Blockchain. 371-380 - Feixiang Ren, Sujuan Qin:

Fabric Smart Contract Read-After-Write Risk Detection Method Based on Key Methods and Call Chains. 381-392 - Hui Zhao, Jiacheng Tan:

A Critical-Path-Based Vulnerability Detection Method for tx.origin Dependency of Smart Contract. 393-402 - Hui Zhao, Xing Li, Keke Gai:

A Dynamic Taint Analysis-Based Smart Contract Testing Approach. 403-413 - Xiaoli Huang, Andi Liu, Yizhong Liu, Li Li, Zhenglin Lv, Fan Wang:

Construction Practice of Cloud Billing Message Based on Stream Native. 414-427 - Jiasheng Cui, Li Duan, Mengchen Li, Wei Wang:

A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology. 428-438 - Wenyu Shao, Xueyang Liu, Wenhui Hu, Xiankui Zhang, Xiaodong Zeng:

Research on Diabetes Disease Development Prediction Algorithm Based on Model Fusion. 439-449 - Zimu Hu, Wei-Tek Tsai, Li Zhang:

Smart-Contract Vulnerability Detection Method Based on Deep Learning. 450-460 - Peiyun Ran, Mingsheng Liu, Jianwu Zheng, Md. Zakirul Alam Bhuiyan, Jianhua Li, Gang Li, Shiyuan Yu, Lifeng Wang, Song Tang, Peng Zhao:

Automatic Smart Contract Generation with Knowledge Extraction and Unified Modeling Language. 461-474 - Nengxiang Xu, Jiahong Cai, Yinyan Gong, Huan Zhang, Weihong Huang, Kuan-Ching Li:

Blockchain Scalability Technologies. 475-484 - Shuo Wang, Zhiqi Lei, Zijun Wang, Dongjue Wang, Mohan Wang, Gangqiang Yang, Keke Gai:

Blockchain Applications in Smart City: A Survey. 485-494 - Chunyan Tong, Zhanwei Xuan, Song Yang, Zheng Zhang, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Hao Sun:

Topic-Aware Model for Early Cascade Population Prediction. 495-504 - Xiangyang Cui, Zhou Yan, Song Yang, Zheng Zhang, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Qi Nie:

GeoNet: Artificial Neural Network Based on Geometric Network. 505-514 - Hongze Wang, Qinying Zhang:

Research on Blockchain-Based Smart Contract Technology. 515-524 - Tianxiu Xie, Hong Zhang, Yiwei Feng, Jing Qi, Chennan Guo, Gangqiang Yang, Keke Gai:

Cross-Chain-Based Distributed Digital Identity: A Survey. 525-534 - Chen Zhang, Dong Mao, Lin Cui, Jiasai Sun, Fan Yang, Cong Cao:

Research on Power Border Firewall Policy Import and Optimization Tool. 535-545 - Tao Li, Haolong Wang, Yaozheng Fang, Zhaolong Jian, Zichun Wang, Xueshuo Xie:

Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection. 546-557 - Renjie Niu, Zixiao Jia, Yizhong Liu, Jianhong Lin, Xiaoli Huang, Min Sun:

Enhanced 4A Identity Authentication Center Based on Super SIM Technology. 558-569 - Jiayi Li, Xinsheng Lei, Jieyu Su, Hui Zhao, Zhenyu Guan, Dawei Li:

Verifiable, Fair and Privacy-Preserving Outsourced Computation Based on Blockchain and PUF. 570-580 - Xiangyu Gao, Meikang Qiu, Hui Zhao:

Architecture Search for Deep Neural Network. 581-596 - Siqi Xie, Jiahong Cai, Hangyu Zhu, Ce Yang, Lin Chen, Weidong Xiao:

Blockchain Development. 597-606 - Qinying Zhang, Hongze Wang:

Research on Blockchain-Based Food Safety Traceability Technology. 607-616 - Xiaodong Zeng, Wenhui Hu, Xueyang Liu, Yuhang Chen, Wenyu Shao, Lizhuang Sun:

Few-Shot Learning for Medical Numerical Understanding Based on Machine Reading Comprehension. 617-628 - Yawei Li, Yanli Liu, Heng Zhang, Neal Naixue Xiong:

A Feature Extraction Algorithm Based on Blockchain Storage that Combines ORB Feature Points and Quadtree Division. 629-638 - Weijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:

Smart Contract Vulnerability Detection Model Based on Siamese Network. 639-648 - Chunyan Tong, Kai Zhang, Yang Song, Zhang Zheng, Hongfeng Zhang, Hao Wang, Xinzhuo Shuang, Liu Yerui:

Context-User Dependent Model for Cascade Retweeter Prediction. 649-658 - Ni Zhang, Baoquan Ma, Peng Wang, XuHua Lei, YeJian Cheng, JiaXin Li, XiaoYong Huai, ZhiWei Shen, Ningning Song, Long Wang:

Heterogeneous System Data Storage and Retrieval Scheme Based on Blockchain. 659-668 - Dylan Yu, Ethan Yang, Alissa Shen, Dan E. Tamir, Naphtali Rishe

:
Fbereum: A Novel Distributed Ledger Technology System. 669-684 - Pengyong Ding, Zian Jin, Yizhong Liu, Min Sun, Hong Liu, Li Li, Xin Zhang:

Indistinguishable Obfuscated Encryption and Decryption Based on Transformer Model. 685-694 - Jiahong Xiao, Wei Liang

, Jiahong Cai, Hangyu Zhu, Xiong Li, Songyou Xie:
An Investigation of Blockchain-Based Sharding. 695-704

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














