default search action
14th BigDataSE 2020: Guangzhou, China
- Guojun Wang, Carlos Becker Westphall, Arcangelo Castiglione:
14th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-0-7381-1114-8 - Kungan Zeng, Incheon Paik:
Web Service Composition Sequence Learning Based on Neural Language Networks. 1-8 - Sheheeda Manakkadu, Sourav Dutta, Sam R. Thangiah:
Profiling of Disease-Associated Proteins Neighborhood Networks. 9-13 - Carson K. Leung, Yubo Chen, Siyuan Shang, Deyu Deng:
Big Data Science on COVID-19 Data. 14-21 - Michael Alicea, Arlen P. McDonald, Chunyang Tang, Jeong Yang:
Exploring the Application of Machine Learning Algorithms to the City Public Bus Transport. 22-27 - Nisha Verma, Sangaralingam Kajanan, Anindya Datta:
Goal-driven Look-alike Modelingfor Mobile Consumers. 28-35 - Ryan Yixiang Wang, Tim Qinsong Guo, Leo Guanhua Li, Julia Yutian Jiao:
Using GWAS SNPs to Determine Association between COVID-19 and Comorbid Diseases. 36-40 - Ahmed Ahmet, Tariq Abdullah:
Real-Time Social Media Analytics with Deep Transformer Language Models: A Big Data Approach. 41-48 - Lulu Ning, Jian Wang:
A Novel Bilateral Oblivious Transfer Protocol Based on Cut-and-Choose Technique. 49-56 - Jie Yan, Claude Turner, Dwight H. Richards:
Animated Commentator Enhanced Network Monitoring and Visualization Application for Cyber Security Competition. 57-64 - Rong Zhu, Xiaoxi He, Jiahong Xie, Zongjie Zhang, Ping Wang:
An Improved RFID-based Authentication Protocol for Rail Transit. 65-72 - Hanbo Cai, Jinyan Wang, Xiaohong Liu, Xianxian Li:
DP-AP: Differential Privacy-Preserving Affinity Propagation Clustering. 73-79 - Chinguun Purevdagva, Rui Zhao, Pei-Chi Huang, William Mahoney:
A machine-learning based framework for detection of fake political speech. 80-87 - Yulin Fan, Yang Li, Mengqi Zhan, Huajun Cui, Yan Zhang:
IoTDefender: A Federated Transfer Learning Intrusion Detection Framework for 5G IoT. 88-95 - Taifeng Hu, Liji Wu, Xiangmin Zhang, Zhaopo Liao:
Hardware Trojan Detection Combines with Machine Learning: an Isolation Forest-based Detection Method. 96-103 - Xin Zhou, Reginald Cushing, Ralph Koning, Adam Belloum, Paola Grosso, Sander Klous, Tom M. van Engers, Cees de Laat:
Policy Enforcement for Secure and Trustworthy Data Sharing in Multi-domain Infrastructures. 104-113 - Ioanna Angeliki Kapetanidou, Muhammad Hassan, Christos-Alexandros Sarros, Mauro Conti, Vassilis Tsaoussidis:
Reputation-based Trust: A robust mechanism for Dynamic Adaptive Streaming over Named Data Networking. 114-121 - Syed Ghazanfar Abbas, Shahzaib Zahid, Faisal Bashir Hussain, Ghalib A. Shah, Muhammad Husnain:
A Threat Modelling Approach to Analyze and Mitigate Botnet Attacks in Smart Home Use Case. 122-129 - Anni Jia, Wei Yang, Gongxuan Zhang:
Side Channel Leakage Alignment Based on Longest Common Subsequence. 130-137 - Fangjiao Zhang, Xiang Cui, Zhi Wang, Shaomian Chen, Qixu Liu, Chaoge Liu:
A Systematic Study of AI Applications in Cybersecurity Competitions. 138-146 - Yan Tong, Huanguo Zhang, Zhengwei Ren, Shiwei Xu:
Invariance of Algebraic Immunity of Vectorial Boolean Functions under Equivalence Relations. 147-154 - Achref Haddaji, Samiha Ayed, Lamia Chaari Fourati:
Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks. 155-163
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.