default search action
ISPA/BDCloud/SocialCom/SustainCom 2022: Melbourne, Australia
- IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, ISPA/BDCloud/SocialCom/SustainCom 2022, Melbourne, Australia, December 17-19, 2022. IEEE 2022, ISBN 978-1-6654-6497-0
- Willy Susilo:
Keynote Speech. xxv - Ana Carolina Costa César, Gabriela da Gama Pivetta, Fabiana Freitas Mendes:
GreenGame: Solving the climate crisis in a Game to actually take action in real life. 1-8 - Liang Liu, Silin Peng:
Detection of A Novel Dual Attack in Named Data Networking. 1-8 - Baoke Li, Cong Cao, Fangfang Yuan, Yanbing Liu, Baohui Li, Binxing Fang:
EPGraph: An Efficient Graph Computing Model in Persistent Memory System. 9-17 - Baoming Zhang, Ming Xu, Mingcai Chen, Mingyuan Chen, Chongjun Wang:
CopGAT: Co-propagation Self-supervised Graph Attention Network. 18-25 - Ikuo Otani, Kei Fujimoto, Akinori Shiraga:
Fair DMA Scheduler for Low-Latency Accelerator Offloading. 26-32 - Guangzheng Liu, Xingang Wang:
Multi-attribute decision-making method based on interval intuitionistic trapezoidal fuzzy number to determine the expert weight: * Note: Sub-titles are not captured in Xplore and should not be used. 33-39 - Menghang Yu, Zhenzhe Zheng, Qinya Li, Fan Wu, Jiaqi Zheng:
A Comprehensive Study on Personalized Federated Learning with Non-IID Data. 40-49 - Zhijie Zhang, Liwei Chen, Haolai Wei, Guochao Dong, Yuantong Zhang, Xiaofan Nie, Gang Shi:
Binary-level Directed Symbolic Execution Through Pattern Learning. 50-57 - Haolai Wei, Liwei Chen, Xiaofan Nie, Zhijie Zhang, Yuantong Zhang, Gang Shi:
An Efficient Metric-Based Approach for Static Use-After-Free Detection. 58-65 - Kexiong Fei, Jiang Zhou, Lin Su, Weiping Wang, Yong Chen, Fan Zhang:
A Graph Convolution Neural Network Based Method for Insider Threat Detection. 66-73 - Wentao Hu, Dawei Jiang, Sai Wu, Ke Chen, Gang Chen:
IceBerg: Deep Generative Modeling for Constraint Discovery and Anomaly Detection. 74-81 - Wen Wang, Junchao Fan, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Hongyue Kang, Xiaolin Chang:
Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL Approach. 82-89 - Yueiia Wu, Jian-tao Zhou:
GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link Prediction. 90-97 - Chuan Zhang, Mingyang Zhao, Tong Wu, Weiting Zhang, Qing Fan, Liehuang Zhu:
Towards Secure Bilateral Friend Query with Conjunctive Policy Matching in Social Networks. 98-105 - Yuqi He, Zhiquan Lai, Zhejiang Ran, Lizhi Zhang, Dongsheng Li:
SCGraph: Accelerating Sample-based GNN Training by Staged Caching of Features on GPUs. 106-113 - Dongwei Zhu, Peng Zhang, Wenhao Zhu, Minghao Tang, Wenyu Zang, Hongbo Xu:
Structure-Noise-Aware Anchor Link Prediction Across Social Networks. 114-120 - Nianxin Li, Xiumin Zhu, Yumei Li, LingLing Wang, Linbo Zhai:
Service Caching and Task Offloading of Internet of Things Devices Guided by Lyapunov Optimization. 121-128 - Jingle Xu, Jiayu Fu, Lin Gan, Yaojian Chen, Zhenchun Huang, Guangwen Yang:
Accelerating cryo-EM Reconstruction of RELION on the New Sunway Supercomputer. 129-138 - Hui Zhao, Xiaodong Zhang, Ru Li:
NFT-basedAccess Control in Named Data Networks. 139-146 - Hasan M. Jamil, Kallol Naha:
Mapping Declarative Queries to Heterogeneous Biological Databases using Schema Graphs for Intelligent Responses. 147-154 - Kensho Yamamoto, Toshio Hirotsu:
File system to support secure cloud-based sharing. 155-162 - Rob H. Bemthuis, Sanja Lazarova-Molnar:
Discovering Agent Models using Process Mining: Initial Approach and a Case Study. 163-172 - Ruhollah Jamali, Sanja Lazarova-Molnar:
Towards Agent-based Simulation of the Parallel Trading Market of Pharmaceuticals. 173-181 - Alexander Lercher, Nishant Saurabh, Radu Prodan:
Context-aware Community Evolution Prediction in Online Social Networks. 182-189 - Xin Su, Guifu Zhang, Minxue Zhang, Baoliu Ye, Hongyan Xing:
Intrusion Detection for Marine Meteorological Sensor Network. 190-196 - Xin Su, Tian Tian, Lei Cai, Baoliu Ye, Hongyan Xing:
A CVAE-GAN-based Approach to Process Imbalanced Datasets for Intrusion Detection in Marine Meteorological Sensor Networks. 197-203 - Shaswot Shresthamali, Yuan He, Masaaki Kondo:
FAWS: Fault-Aware Weight Scheduler for DNN Computations in Heterogeneous and Faulty Hardware. 204-212 - Qing Wang, Lizhe Zhang, Xin Lu, Kenian Wang:
A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM. 213-219 - Hualei Yu, Yirong Yao, Jinliang Yuan, Chongjun Wang:
DIPool: Degree-Induced Pooling for Hierarchical Graph Representation Learning. 220-227 - Hongwei Liu, Haojun Xia, Bibo Tu, Da Zhang, Xiaotong Wang:
A Secure and Efficient USB-based In-band Communication Interface between Host and BMC. 228-237 - Ningning Cui, Liwei Chen, Gewangzi Du, Tongshuai Wu, Chenguang Zhu, Gang Shi:
BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection. 238-245 - Chen Lv, Fuxin Zhang, Xiang Gao, Chen Zhu:
LA-vIOMMU: An Efficient Hardware-Software Co-design of IOMMU Virtualization. 246-253 - Wenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe:
Curse of Feature Selection: a Comparison Experiment of DDoS Detection Using Classification Techniques. 262-269 - Azhar Talha Syed, Shikharesh Majumdar:
Parallel Processing Techniques for Analyzing Large Video Files: a Deep Learning Based Approach. 270-279 - Yongqiang Gao, Shunyi Feng, Zhenkun Li:
A Distributed Cache Mechanism of HDFS to Improve Learning Performance for Deep Reinforcement Learning. 280-285 - Jia Li, Gang Xu, Yuan Cheng, Baoqi Huang:
Short-Time Traffic Flow Prediction Based on K-means++ and LSTM. 286-293 - Yang Dai, Shunmei Meng, Qiyan Liu, Xiao Liu:
Knowledge-aware Graph Attention Network with Distributed & Cross Learning for Collaborative Recommendation. 294-301 - Zhijun Wu, Zhenghang You, Peng Wang:
Attribute encryption based access control methods under airborne networks. 302-306 - Moustafa Faheem, Adrian Murphy, Vishal Sharma, Carlos Reaño:
Discrete Event Simulation in Cloud-Edge Manufacturing Environments: Performance, Energy and Cost Trade-offs. 307-314 - Chenjing Gao, Junli Wang, Chungang Yan:
A Dual-stage Attention Based SDN Traffic Prediction Method. 315-322 - Jinchao Feng, Runbo Zhao, Jianguo Jiang:
A Large Scale Document-Term Matching Method Based on Information Retrieval. 323-330 - Deshi Deng, Yanying Lin, Kejiang Ye:
System-level Implications of Serverless: Workload Characterizing and Performance Understanding. 331-338 - Mengwei Wu, Qin Lu, Yingxue Wang, Yichao Wang, Huanyu Chen, Weixiao Li:
A Hybrid Model for QoS Prediction based on Improved Conditional Variational Autoencoder. 339-346 - Yingxue Wang, Qin Lu, Yichao Wang, Mengwei Wu, Weixiao Li:
Dynamic QoS Prediction Based on Attention Mechanism and Recurrent Neural Network. 347-354 - Yuting Zhu, Hongxu Jiang, Runhua Zhang, Yonghua Zhang, Dong Dong:
CNNBooster: Accelerating CNN Inference with Latency-aware Channel Pruning for GPU. 355-362 - Jinyu Cheng, Ruyi Qian, Qinwen Shi, Gaomei Hu, Mengjuan Gao, Qirun Huo, Yuanchao Xu:
Towards Efficient Elastic Parallelism for Deep Learning Processor. 363-370 - Feiyu Wang, Jian-tao Zhou, Hao Wang, Xu Guo:
A Blockchain-Based Multi-Cloud Storage Data Consistency Verification Scheme. 371-377 - Yansong Zhang, Xiao Liu, Jia Xu, Dong Yuan, Xuejun Li:
A Novel Adaptive Computation Offloading Strategy for Collaborative DNN Inference over Edge Devices. 378-385 - Xiaofan Nie, Haolai Wei, Liwei Chen, Zhijie Zhang, Yuantong Zhang, Gang Shi:
MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection. 386-393 - Xuzhen Jiang, Miao Cai, Baoliu Ye:
Improving Write Performance for LSM-tree-based Key-Value Stores with NV-Cache. 394-401 - Jintao Peng, Jie Liu, Yi Dai, Min Xie, Chunye Gong:
Optimizing All-to-All Collective Communication on Tianhe Supercomputer. 402-409 - Yongqiang Gao, Zhigang Wang, Zemin Li, Zhenkun Li:
Task Migration Based on Deep Reinforcement Learning in Mobile Crowdsourcing. 410-417 - George Vlahavas, Anna-Valentini Michailidou, Theodoros Toliopoulos, Vasileios G. Psomiadis, Anastasios Gounaris, Athena Vakali:
Performance comparison of distributed in memory databases in dynamic fog environments. 418-425 - Abhishek Dhankar, An Bui, Jeremy Costello, Manpreet Kaur, Osmar R. Zaïane, François Bolduc:
Automated Fact-Checking of Articles Related to Neurodevelopmental Disorders. 426-434 - Rafael S. Medina Ferreira, Ana Paula Couto da Silva, Fabricio Murai:
Risk Perception and Misinformation in Brazilian Twitter during COVID-19 Infodemic. 435-442 - Mayur Patil:
Learning to Process Topic Aware Queries on Geo-Textual Streaming Data. 443-450 - Futo Yamamoto, Tadahiko Kumamoto, Akiyo Nadamoto:
Analysis of Behavioral Facilitation Tweets Considering the Emotion of Disaster Victims. 451-457 - Nikhil Sambhus, Tarek S. Abdelrahman:
Reuse-Aware Partitioning of Dataflow Graphs on a Tightly-Coupled CGRA. 458-467 - Shuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han, Peng Chen:
Threat Modeling and Reasoning for Industrial Control System Assets. 468-475 - Na Guo, Pei-Wei Tsai, Hongwang Xiao, Chang Wu, Wenjuan Duan:
Collar Data Synthesis and Its Application for Generating Virtual Collar 3D Novel View from a Single-View. 476-481 - Xinyi Cai, Jiao Tian, Ke Yu, Hongwang Xiao, Kai Zhang, Pei-Wei Tsai:
Zero-shot Topic Classification via Automatic Tagging on Chinese Text Datasets. 482-488 - Xinbiao Gan, Peilin Guo, Guang Wu, Tiejun Li:
GreenBFS: Space-Efficient BFS Engine for Power-aware Graph Processing. 489-496 - Manikya Swathi Vallabhajosyula, Rajiv Ramnath:
Establishing a Generalizable Framework for Generating Cost-Aware Training Data and Building Unique Context-Aware Walltime Prediction Regression Models. 497-506 - Chuanxin Zhou, Chao Dong, Xiaojun Zhu, Lei Zhang:
Multi-Antenna Based Fast Routing Recovery Protocol for Dynamic UAV Networks. 507-514 - Jiao Tian, Xinyi Cai, Kai Zhang, Hongwang Xiao, Ke Yu, Pei-Wei Tsai:
Sliding Focal Loss for Class Imbalance Classification in Federated XGBoost. 515-522 - Yu Ke, Junli Wang, Chungang Yan, Jiamin Yao:
Routing Strategy for SDN Large Flow Based on Deep Reinforcement Learning. 523-530 - Zhihao Zhang, Haipeng Du, Shouqin Huang, Weizhan Zhang, Qinghua Zheng:
VRFormer: 360-Degree Video Streaming with FoV Combined Prediction and Super resolution. 531-538 - Rolden Fereira, Chathurika Ranaweera, Jean-Guy Schneider, Kevin Lee:
Optimal Node Selection in Communication and Computation Converged IoT Network. 539-547 - Hangyu Cheng, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Zhen Wang:
BPMN++: Comprehensive Business Process Modeling for Industrial Internet Application. 548-555 - Ming Chen, Peichang Shi, Xiang Fu, Feng Jiang, Fei Gao, Penghui Ma, Jinzhu Kong:
PPSS: A Privacy-Preserving Supervision Scheme Based on Blockchain. 556-561 - Mehul Warade, Kevin Lee, Chathurika Ranaweera, Jean-Guy Schneider:
Energy Aware Adaptive Scheduling of Workflows. 562-570 - Zhibin Xu, Jiang Zhaoxue, Tong Li, Junling You, Bingzhen Wu, Liangxiong Li:
OpenLog: Incremental Anomaly Classification with Changing, Unbalanced and Unknown Logs. 571-580 - Ruli Xu, Ryan Wen Liu, Jiangtian Nie, Xianjun Deng, Zehui Xiong, Wenchao Jiang, Han Yu, Dusit Niyato:
AIS Data-Based Efficient Ship Trajectory Clustering. 581-588 - Yutian Zhang, Bing Tang, Qing Yang, Xiaoyuan Zhang, Jincheng Luo:
Blockchain-based Distributed Storage System for Task Offloading in Vehicular Edge Computing. 589-596 - Shili Yan, Bing Tang, Qing Yang, Yijia He, Xiaoyuan Zhang:
Robust and Unsupervised KPI Anomaly Detection Based on Highly Sensitive Conditional Variational Auto-Encoders. 597-604 - Xiaolong Xu, Yiming Fei, Xiaokang Zhou, Xiaoyong Li, Yong Cheng, Lianyong Qi, Wanchun Dou:
Non-Cooperative Game for Edge Server Placement in Wireless Body Area Network. 605-612 - Zhenyu Zhang, Hongjun Dai:
Protection of Location Private Privacy with Recommendation from a Decision Tree Algorithm. 613-620 - Zijun Huang, Junhang Wu, Lingfei Ren, Ruimin Hu, Dengshi Li:
Learning Dynamic Behavior Patterns for Fraud Detection. 621-627 - Kaiwen Ning, Hao Wang, Zhiheng Zhang, Zhou Xu, Xiaowei Shu:
Parallel Deployment of VNFs in Service Function Chain: Benefit or Not? 628-635 - Ou Wu, Shanshan Li, He Zhang, Liwen Liu, Yanze Wang, Haoming Li:
An Optimized Scheduling Algorithm for the Multi-channel Hyperledger Fabric. 636-643 - Zhaorong Qian, Guoju Gao, Yang Du:
Per-Flow Size Measurement by Combining Sketch and Flow Table in Software-Defined Networks. 644-651 - Hui Qi, Hang Li, Shuwen Huang, Peipei Li, Weiyi Dai, Chunbo Wang:
Integrity Audit Method for Cloud Data Based on Blockchain. 652-659 - Yongqiang Gao, Jixiao Li:
Location-aware Task Offloading in Mobile Edge Computing. 660-667 - Yaru Ding, Yintan Ai, Xiaomin Zhang, Hua Li, Xianrong Wang, Hongwei Ruan:
Design and Implementation of SFC Monitoring and Alerting Based on YANG Data Model. 668-675 - Yi Xu, Ruyi Guo, Xiao Liu, Haoyu Luo, Chengzu Dong, Aiting Yao, Xuejun Li:
Efficient Face Recognition via Multi-UAV-Edge Collaboration in UAV Delivery Service. 676-683 - Yuantong Zhang, Liwei Chen, Xiaofan Nie, Gang Shi:
An Effective Buffer Overflow Detection With Super Data-Flow Graphs. 684-691 - Jianbin Ye, Fuqiang Lin, Xiaoyuan Liu, Bo Liu:
Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems. 692-699 - Xiaohan Ma, Chen Li, Bibo Tu:
An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph. 700-707 - Xiaodong Dong, Binlei Cai:
Whether Cache Advertisement is Necessary for Content Providers in CDNs? Model and Analysis. 708-714 - Tao Sun, Kangshuai Zuo, Wenjie Zhong:
An Automatic Modeling Method for Web Service Business Processes towards CPN Model Checking. 715-721 - Zeyu Zhang, Yongmei Lei, Dongxia Wang, Guozheng Wang:
Distributed ADMM Based on Sparse Computation and Allreduce Communication. 722-729 - Zihan Wang, Mengying Zhao, Lei Gong, Chao Wang:
WGeod: A General and Efficient FPGA Accelerator for Object Detection. 730-738 - Can Jiang, Duanyang Liu, Xiaoli Zhang, Kun Zhou, Hongbing Cheng:
Accelerating State Synchronization in Bitcoin Combining Secure Snapshot with IPFS. 739-746 - Huan Wang, Lijuan Wang, Jun Shen:
Distributional Knowledge Transfer for Heterogeneous Federated Learning. 747-754 - Toru Kato, Masahiro Higuchi, Hiroshi Ohyama, Yoshiaki Kawamura, Ryotaro Ohno:
Container Shipping Route Recommendation System by Modeling Logistics System with the Ambient Calculus. 755-763 - Chuanyu Zong, Wenlu Wu, Tao Qiu, Anzhen Zhang, Xiufeng Xia:
Best Community Discovery on Dynamic Social Networks. 764-773 - Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. 774-781 - Huan Wang, Lijuan Wang, Jun Shen:
Logit Calibration for Non-IID and Long-Tailed Data in Federated Learning. 782-789 - Lisheng Chen, Buqing Cao, Xiang Xie, Yueying Qing, Guosheng Kang, Jianxun Liu:
Knowledge Graph-based Intent Network-Enhanced Web Services Recommendation. 790-797 - Tai Cai, Jianfei Da, Deiiao Niu, Lei Li, Jianchong Shi, Ranzhuo Li:
A New NVM Storage System with High Throughput Device Driver. 798-805 - Liu Yang, Guohui Li, Meihong Xiao, Shuai Luo, Yangying Tan, Ziqiang Tang, Shuai Mu:
MultiAddIntent: Efficient RDF Data-Oriented Incremental Construction Concept Lattice Algorithm. 806-814 - Lizhe Zhang, Tong Wang, Zhijun Wu:
Access control method for air ticket distribution system based on blockchain. 815-821 - Chenlin Huang, Keming Wang, Yun Li, Jiajian Li, Qing Liao:
ASPGen-D: Automatically Generating Fine-grained Apparmor Policies for Docker. 822-829 - Tao Sun, Xiaoyu Qi, Wenjie Zhong:
An Automatic Coarse-Fine-Granularity Modeling Method for IoT System toward THCPN model checking. 830-837 - Fengkun Gao, Chunbo Wang, Xiaoqiang Di, Jinhui Cao, Xu Liu, Hui Qi:
Secure deduplication method based on tag clustering. 838-844 - Hanen Ochi, Kais Klai:
Checking Composition-Aware Service Substitutability. 845-853 - Nour Elhouda Souid, Kais Klai, Chiheb Ameur Abid, Samir Ben Ahmed:
Optimal Supervisory Control of Opacity for Modular Systems. 854-861 - Huaisheng Ye, Haibo Luo:
Indoor Intelligent IoT Datasets for Behavioral Learning and Autonomous Decision Making. 862-869 - Hiroki Aikawa, Toshio Endo, Tomoya Yuki, Takahiro Hirofuchi, Tsutomu Ikegami:
Efficient Stencil Computation with Temporal Blocking by Halide DSL. 870-877 - Wenjie Chen, Ruixin Sun, Zhilei Chai:
An acceleration method of optical flow calculation for automotive ADAS. 878-887 - Xiangyu Kong, Xuesong Gao, Shibao Pan, Yizhi Zhou, Yanan Yang, Laiping Zhao, Heng Qi:
TailCmp - A Tail Latency Evaluation Solution of Public Cloud and Labeled von Neumann Architecture based Cloud Prototype. 888-895 - Liu Yang, Xin Yin, Jun Long, Tingxuan Chen, Jie Zhao, Wenti Huang:
Spatio-Temporal Aware Knowledge Graph Embedding for Recommender Systems. 896-902 - Kai Zhang, Wei Zhang, Libin Liu, Lizhuang Tan, Ye Zhang, Wei Gao:
Hawkeye: Efficient In-band Network Telemetry with Hybrid Proactive-Passive Mechanism. 903-912 - Liangliang Chang, Joshua Mack, Benjamin R. Willis, Xing Chen, John S. Brunhaver, Ali Akoglu, Chaitali Chakrabarti:
Profile-Guided Parallel Task Extraction and Execution for Domain Specific Heterogeneous SoC. 913-920 - Junguo Liao, Yixun Zhou, Qiangqiang Qin:
An adaptive traffic sign recognition scheme based on deep learning in complex environment. 921-928 - Wenhao Zhao, Xin Lin, Yuxin Chen, Yue Hong, Wei Zheng:
A Blockchain- Based Copyright Protection System for Short Videos. 929-936 - Minghao Fu, Haoran Zhu, Jelena V. Misic, Vojislav B. Misic, Jing Bai, Xiaolin Chang:
Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain. 937-944 - Guanghui Feng, Guojun Wang, Tao Peng, Xiaofei Xing, Shuhong Chen, Peiqiang Li:
A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm. 945-952 - Zheqi Feng, Tao Peng, Guo-Jun Wang, Kejian Guan:
Personalized Privacy-Preserving Information Fusion in Mobile Crowdsensing. 953-960
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.