default search action
CyberC 2019: Guilin, China
- 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019, Guilin, China, October 17-19, 2019. IEEE 2019, ISBN 978-1-7281-2542-8
Session 1: Blockchain Design and Applications
- Chunhua Deng, Jia Fan, Zhen Wang, Yili Luo, Yue Zheng, Yixin Li, Jianwei Ding:
A Survey on Range Proof and Its Applications on Blockchain. 1-8 - Yili Luo, Jia Fan, Chunhua Deng, Yixin Li, Yue Zheng, Jianwei Ding:
Accountable Data Sharing Scheme Based on Blockchain and SGX. 9-16 - Yixin Li, Zhen Wang, Jia Fan, Yue Zheng, Yili Luo, Chunhua Deng, Jianwei Ding:
An Extensible Consensus Algorithm Based on PBFT. 17-23 - Xiaowei He, Yiju Cui, Yunchao Jiang:
An Improved Gossip Algorithm Based on Semi-Distributed Blockchain Network. 24-27 - Fernando Vidal, Feliz Gouveia, Christophe Soares:
Analysis of Blockchain Technology for Higher Education. 28-33 - Xinming Wang, Zhijian Xie, Jiahao He, Gansen Zhao, Ruihua Nie:
Basis Path Coverage Criteria for Smart Contract Application Testing. 34-41 - Yue Zheng, Yarong Li, Zhen Wang, Chunhua Deng, Yili Luo, Yixin Li, Jianwei Ding:
Blockchain-Based Privacy Protection Unified Identity Authentication. 42-49 - Ismael Martinez, Sreya Francis, Abdelhakim Senhaji Hafid:
Record and Reward Federated Learning Contributions with Blockchain. 50-57
Session 2: Security
- Qingsheng Hu, Xiangning Fan, Qiaowei Zhang:
An Effective Differential Power Attack Method for Advanced Encryption Standard. 58-61 - Tangda Yu, Futai Zou, Linsen Li, Ping Yi:
An Encrypted Malicious Traffic Detection System Based on Neural Network. 62-70 - Lin Li, Linfeng Wei:
Automatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation. 71-76 - Weifeng Lu, Mingji Wang, Jia Xu, Siguang Chen, Lijun Yang, Jian Xu:
Distributed Node Selection Algorithm for Physical Layer Security in D2D Network. 77-80 - Sonali Chandel, Yu Sun, Yitian Tang, Zhili Zhou, Yusheng Huang:
Endpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat. 81-89 - Shuaipeng Zhang, Hong Liu:
Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing. 90-96 - Mingxin Ma, Xiaotong Yang, Guozhen Shi, Fenghua Li:
Hierarchical Key Management Scheme with Multilevel Secure Access. 97-102 - Yuxiang Chen, Guishan Dong, Jian Bai, Yao Hao, Feng Li, Haiyang Peng:
Trust Enhancement Scheme for Cross Domain Authentication of PKI System. 103-110 - Sonali Chandel, Zang Jingji, Yu Yunnan, Sun Jingyao, Zhipeng Zhang:
The Golden Shield Project of China: A Decade Later - An in-Depth Study of the Great Firewall. 111-119 - Ming-Yuan Xia, Lingyuan Yin:
A Generic Construction of Puncturable Encryption. 120-124
Session 3: Image and Video Processing
- Wenwen Chen, Zhibin Zhang, Hui Li, Shuaimin Hou:
A New Method for Error Analysis of Binocular Stereo Vision System. 125-130 - Wenkao Yang, Xiangwei Zhai:
Contrast Limited Adaptive Histogram Equalization for an Advanced Stereo Visual SLAM System. 131-134 - Yongfu Zhou, Zhi Zeng:
Info-Retrieval with Relevance Feedback using Hybrid Learning Scheme for RS Image. 135-138 - Lanfei Wang, Jun Guo:
Cascaded Algorithm Representation for Purifying Face Dataset with Labeled Noise. 139-142 - Yu Liu, Chunling Cheng, Yulong Li, Lei Wang:
Network Coding for Reliable Video Distribution in Device-to-Device Communications. 143-146
Session 4: Data Mining and Machine Learning
- Yaohui Jia, Feng Chen, Peng Wu, Qiang Liu, Yamin Chen, Yun Liu:
A Study of Online Function Approximation System Based on BP Neural Network. 147-150 - Jiangpeng Lin, Yu Wu, Li Wang, Weidong Ai, Yan Zeng:
A User Influence Rank Algorithm Based on Interaction Behaviors in Cyber Group Events. 151-157 - Dongjie Zhu, Yundong Sun, Ning Cao, Xueming Qiao, Ming Xu, Jinlin Li, Junzhou Yang:
BDNE: A Method of Bi-Directional Distance Network Embedding. 158-161 - Changpeng Zou, Chenggong Ni, Qing Lin, Kaiqiang Feng, Yuxi Wang:
Face Recognition in Complex Lighting Environment. 162-165 - Xia Liu, Yi-Nan Chen, Zhao Qiu, Mingrui Chen:
Forecast of the Tourist Volume of Sanya City by XGBoost Model and GM Model. 166-173 - Shuai Jiang, Xiaolong Xu:
Impact of Feature Selection Methods on Data Classification for IDS. 174-180 - Wenxin Wang, Ruilin Zhang:
Mixed Attribute Clustering Algorithm Based on Filtering Mechanism. 181-189
Session 5: Blockchain Protocols
- Haiyong Wang, Kaixuan Guo:
Byzantine Fault Tolerant Algorithm Based on Vote. 190-196 - Kirsten Cremona, Donald Tabone, Clifford De Raffaele:
Cybersecurity and the Blockchain: Preventing the Insertion of Child Pornography Images. 197-204 - Lin Zhong, Xihua Duan, Yujue Wang, Jingyan Chen, Jidong Liu, Xiaoguang Wang:
eRoc: A Distributed Blockchain System with Fast Consensus. 205-214 - Bin Cao, Shouming Huang, Daquan Feng, Lei Zhang, Shengli Zhang, Mugen Peng:
Impact of Network Load on Direct Acyclic Graph Based Blockchain for Internet of Things. 215-218 - Haihui Huang, Jing Cai, Shaoci Xie:
Implementing an Asset Trading System Based on Blockchain and Game Theory. 219-226 - Xuefeng Liu, Gansen Zhao, Xinming Wang, Yixing Lin, Ziheng Zhou, Hua Tang, Bingchuan Chen:
MDP-Based Quantitative Analysis Framework for Proof of Authority. 227-236 - Guoliang Qiu, Qiwen Zheng, Xing Hu:
Multi-terminal Collaborative Control Decision-Making Mechanism Based on Blockchain. 237-244
Session 6: Machine Learning and Analytics
- Bo Jiao:
A Method for Extracting Topological Features of Internet Testbeds Oriented to Equivalent Deduction. 245-248 - Congyu Shi, Gaoyuan Zhang, Congzheng Han, Baofeng Ji, Ping Xie:
A Non-Coherent Detection Scheme of O-QPSK Receiver for Perfect-Communication Establishment in Blockchain Technology. 249-252 - Lulu Sun, Ruilin Zhang:
Density Clustering Algorithm Based on the Dynamic Selection of Cluster Center. 253-260 - Hua Cheng, Yiquan Fang, Lihuang Chen, Jing Cai:
Detecting Domain Generation Algorithms Based on Reinforcement Learning. 261-264 - Yingjuan Tao, Jinsheng Deng, Xingshen Song:
Drug Audit Based on Bisecting K-Means Clustering Algorithm. 265-270 - Quansheng Dou, Panpan Cui:
Slot Filling Using En-Training. 271-276 - Chuang Ma, Yanming Liang, Xiaofei Lyu:
Weather Analysis to Predict Rice Pest Using Neural Network and D-S Evidential Theory. 277-283
Session 7: 5G and Wireless Communications
- Xiaoying Shuai:
A Greedy Approach for TDMA Based on Matrix Operation. 284-287 - Jun Zou, Chen Xu:
High Precision Timing Based on Parabola Curve Fitting in Narrowband System. 288-291 - Shun-Ping Chen:
Near Field Beam Forming Characteristics of Conformal Antenna Arrays. 292-297 - Chen Xie, Xiaokai Zhang, Daoxing Guo:
Oblique Projection Polarization Filter-Based Self-Interference Cancellation Scheme in In-Band Full-Duplex Systems. 298-303 - Chunfeng Wang, Naijin Liu:
Research on Simultaneous Wireless Information and Power Transmission Based on OFDM for Space System. 304-307 - Charlie Chen-Yui Yang, Guangzhi Li, Xiang Liu, Zonghuan Wu, Kaiyu Zhang:
The Future of Broadband Access Network Architecture and Intelligent Operations. 308-316 - Nannan Wang, Dalong Zhang, Gangtao Han, Jiayao Chen:
A Dynamic Weighting Fusion Positioning Method Based on Opportunity Correction for INS and UWB. 317-321 - Pengxue Liu, Dalong Zhang, Yitong Li, Shijie Shi, Cuiping Kong:
A Reliable Broadcast Algorithm with Multiple-Opportunity Acknowledgement in Internet of Vehicles. 322-328 - Xiaolan Xie, Zhihong Guo:
A CNN Approach of Activity Recognition via Channel State Information (CSI). 329-336
Session 8: Robot IOT Smart Sensor Networks
- Elena Basan, Alexander S. Basan, Oleg B. Makarevich:
Detection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence. 337-340 - Yanbing Xiao, Yingzhou Zhang, Yuxin Sun, Junyan Qian:
Multi-UAV Formation Transformation Based on Improved Heuristically-Accelerated Reinforcement Learning. 341-347 - Yao Sun, Lei Zhang, Gang Feng, Bowen Yang, Bin Cao, Muhammad Ali Imran:
Performance Analysis for Blockchain Driven Wireless IoT Systems Based on Tempo-Spatial Model. 348-353 - Annv Liu, An Wang, Yongyin Dong, Ying Shi, Caisen Chen, Guoshuang Zhang:
Power Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card. 354-359 - Sinan Chen, Sachio Saiki, Masahide Nakamura:
Recognizing Fine-Grained Home Contexts Using Multiple Cognitive APIs. 360-366 - Qiong Liu, Pengxiang Hua, Awais Sultan, Longzhang Shen, Egon Müller, Frank Boerner:
Study of the Integration of Robot in Cyber-Physical Production Systems. 367-370 - Ge Gao, Yingzhou Zhang, Junyan Qian, Yuxin Sun:
The Lightweight System for UAV Cooperative Mission Planning Simulation. 371-374
Session 9: Optimization Theory and Applications
- Yu Pan, Qianqian Ren, Jinbao Li, Hu Jin:
Dynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor Networks. 375-378 - Jingtong Ge:
Generalization of Quantum Strassen Theorem. 379-382 - Yuxin Sun, Yingzhou Zhang, Junyan Qian:
Program Slicing Method of LLVM IR Based on Information-Flow Analysis. 383-390 - Emilio Nakamura, Sérgio Ribeiro:
Risk-Based Attributed Access Control Modelling in a Health Platform: Results from Project CityZen. 391-398 - Zailong Zhang, Zhiwei Chen:
Supply-Demand Collaborative Energy Internet for Smart City: A Three-Stage Stackelberg Game Approach. 399-404 - Mingchang Xu, Zhenbing Liu, Zimin Wang, Long Sun, Zhibin Liang:
The Diagnosis of Alzheimer's Disease Based on Enhanced Residual Neutral Network. 405-411 - Wei Ma, Hongzhi Yu, Kun Zhao, Deshun Zhao, Jun Yang, Jing Ma:
Tibetan Location Name Recognition Based on BiLSTM-CRF Model. 412-416 - Tinghui Huang, Yong Ding, Zhen Wang, Huijiao Wang:
Ultralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption. 417-423 - Huifang Wang, Zhihong Zhang:
A TSGP-Based Tip Search Optimization Algorithm. 424-427
Session 10: Big Data, Analytics, Quality and Performance
- Sandro Passarelli, Cem Gündogan, Lars Stiemert, Matthias Schopp, Peter Hillmann:
NERD: Neural Network for Edict of Risky Data Streams. 428-435 - Yinna Ye, Li Chen, Feng Xue:
Passenger Flow Prediction in Bus Transportation System using ARIMA Models with Big Data. 436-443 - Yuhao Sun, Bo Liu:
Translational Bit-by-Bit Multi-bit Quantization for CRNN on Keyword Spotting. 444-451 - Chengchang Wan, Xinghui Cao, Wei Wu:
Vertical Stratification of Seawater in the Southern South China Sea in Winter Based on Cluster Analysis. 452-455 - Chuang Ma, Linfeng Li, Daiqi Zhou:
Water Quality Prediction of Small Watershed Based on Wavelet Neural Network. 456-463 - Haoyan Xu, Xiaolong Xu:
Lightweight EEG Classification Model Based on EEG-sensor with Few Channels. 464-473 - Guosheng Xu, Chunhao Qi, Hai Yu, Shengwei Xu, Chunlu Zhao, Jing Yuan:
Detecting Sensitive Information of Unstructured Text Using Convolutional Neural Network. 474-479
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.