default search action
DASC/PiCom/CBDCom/CyberSciTech 2020: Calgary, AB, Canada
- IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress, DASC/PiCom/CBDCom/CyberSciTech 2020, Calgary, AB, Canada, August 17-22, 2020. IEEE 2020, ISBN 978-1-7281-6609-4
IEEE 5th Cyber Science and Technology Congress (CyberSciTech 2020)
CyberSciTech 2020 Regular Papers
- Abdullah, Eleni Stroulia, Faiza Nawaz:
Efficiency Optimization in Supply Chain Using RFID Technology. 1-6 - Tale Saeidi, Sarmad Nozad Mahmood, Sameer Alani, Shahid M. Ali, Idris Ismail, Adam Reda Hasan Alhawari:
Sub-6G Metamaterial-Based Flexible Wearable UWB Antenna for IoT and WBAN. 7-13 - Tale Saeidi, Idris Ismail, Sarmad Nozad Mahmood, Sameer Alani, Shahid M. Ali, Adam Reda Hasan Alhawari:
Metamatrial-based Antipodal Vivaldi Wearable UWB Antenna for IoT and 5G Applications. 14-20 - Hansong Xu, Wei Yu, Xing Liu, David W. Griffith, Nada Golmie:
On Data Integrity Attacks against Industrial Internet of Things. 21-28 - Minghui Yang, Junqi Guo, Ludi Bai:
A Data Privacy-preserving Method for Students' Physical Health Monitoring by Using Smart Wearable Devices. 29-34 - Fehmi Jaafar, Florent Avellaneda, El Hachemi Alikacem:
Demystifying the Cyber Attribution: An Exploratory Study. 35-40 - Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. 41-48 - Mohammad Amiri-Zarandi, Rozita A. Dara:
Blockchain-based Trust Management in Social Internet of Things. 49-54 - Gurdip Kaur, Arash Habibi Lashkari, Abir Rahali:
Intrusion Traffic Detection and Characterization using Deep Image Learning. 55-62 - Mohammadreza MontazeriShatoori, Logan Davidson, Gurdip Kaur, Arash Habibi Lashkari:
Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic. 63-70 - Debora Irene Christine, Mamello Thinyane:
Comparative Analysis of Cyber Resilience Strategy in Asia-Pacific Countries. 71-78 - Ruchi Mishra, Sergey Butakov, Fehmi Jaafar, Neelam Memon:
Behavioral Study of Malware Affecting Financial Institutions and Clients. 79-86 - Chandralekha Yenugunti, Stephen S. Yau:
A Blockchain Approach to Identifying Compromised Nodes in Collaborative Intrusion Detection Systems. 87-93 - Emmanuel Onu, Michael Mireku Kwakye, Ken Barker:
Contextual Privacy Policy Modeling in IoT. 94-102 - Jinkai Zi, Feng Jin, Jun Zhao, Wei Wang, Quanli Liu:
A Multi-objective Simulated Annealing Algorithm-based Coal Blending Optimization Approach in Coking Process. 103-109 - Kai Su, Chowdhury Md Intisar, Qiangfu Zhao, Yoichi Tomioka:
Knowledge Distillation for Real-time On-Road Risk Detection. 110-117 - Huei-Wen Ferng, Michael Poernomo, Mingfu Li:
An Authentication Scheme Designed for the Lightweight Precision Time Protocol in IoT. 118-123 - Ming-Can Geng, Sheng Bi, Zhi-xuan Wei, Quan-fa Yan:
Segmentation of 3D Point Clouds for Weak Texture Ground Plane. 124-129 - Bi Li, Chen Kui:
Research on FJSP with transportation time constraint based on Improved Particle Swarm Optimization. 130-137 - Mohammed Yahya Alghamdi:
A Study of Social Network Applications in University Education. 138-145 - Qingxian Pan, Tingwei Pan, Hongbin Dong, Zhaolong Gao, Yingjie Wang:
Research on Task Assignment to Minimize Travel Cost for Spatio-temporal Crowdsourcing. 146-153 - Chunjie Zhou, Ali Li, Zhenxing Zhang, Zhiwang Zhang:
Cyber-based Intelligent Route Planning with Multi-constraints. 154-159 - Jie Pan, Yiwen Zhang, Qingren Wang, Dengcheng Yan, Wenming Zhang:
A Novel Fog Node Aggregation Approach for Users in Fog Computing Environment. 160-167 - Xiangwu Ding, Ziqi Yang:
Research on Scenario Classification of Burglary Cases via BERT. 168-173 - Zhibin Liu, Ziang Liu, Yuanyuan Huang, Xin Liu, Xiaokang Zhou, Rui Zhou:
A Research of Distributed Security and QoS Testing Framework. 174-181 - Xiaohui Li, Hongbin Dong, Shuang Han:
Multiple Linear Regression with Kalman Filter for Predicting End Prices of Online Auctions. 182-191 - Katashi Nagao, Yuto Yokoyama:
Cyber Trainground: Building-Scale Virtual Reality for Immersive Presentation Training. 192-200 - Jian Lu, Wei Li, Qingren Wang, Yiwen Zhang:
Research on Data Quality Control of Crowdsourcing Annotation: A Survey. 201-208 - Liyun Gong, Jing Li, Miao Yu, Ming Zhu, Ross Clifford:
A novel computer vision based gait analysis technique for normal and Parkinson's gaits classification. 209-215 - Jiayao Wang, Qianmin Zhang, Qilin Wu, Bo Liu, Yiwen Zhang:
An Energy Balance-aware Event Query Algorithm based on Chinese Remainder Theorem. 216-221 - Da Xiao, Meiyi Jiang:
Malicious Mail Filtering and Tracing System Based on KNN and Improved LSTM Algorithm. 222-229 - Zelei Cheng, Zuotian Li, Bowen Sun, Shuhan Zhang, Yuanrong Shao:
Reputation-based Q-Routing for Robust Inter-committee Routing in the Sharding-based Blockchain. 230-236 - Shengshi Li Zhuhai, Yujuan Si, Dunwei Wen, Weiyi Yang, Gong Zhang, Peiyu Zhu:
Automatic recognition of arrhythmia using a CNN-based broad learning system. 237-244 - Yirui Wu, Pengyu Yu:
User Portrait Technology Based on Stacking Mode. 245-250 - Wenbo Fang, Linlin Zhang, Chenyue Wang, Yingjie Hu, Yuaner Yu, Kai Zhao:
AMC-MDL: A Novel Approach of Android Malware Classification using Multimodel Deep Learning. 251-256 - Nadia Kanwal, Mamoona Naveed Asghar, Mohammad Samar Ansari, Brian Lee, Martin Fleury, Marco Herbst, Yuansong Qiao:
Chain-of-Evidence in Secured Surveillance Videos using Steganography and Hashing. 257-264 - Yan Xu, Qingbo Hao, Li-Juan Qiao, Shaoyong Wang:
Study on classification of maize disease image based on fast k-nearest neighbor support. 265-270 - Qi Guo, Jinhui Li:
A learning based 3D reconstruction method for point cloud. 271-276 - Zou Zhou, Nan Duan, Tingting Li, Miao Ye, Fei Zheng, Guoli Zhang, Ruonan Wang, Kaixuan Wang:
Human Moving Behavior Recognition Based on the D-S Evidence Theory and SVM utilizing Smartphone. 277-283 - Bo Wu, Shoji Nishimura, Qun Jin, Yishui Zhu:
Analyzing Pre-braking Behaviors of Drivers with Varying Experience. 284-289 - Hongyu Jiang, Ao Guo, Jianhua Ma:
Genre-based Emoji Usage Analysis and Prediction in Video Comments. 290-299 - Ao Guo, Hongyu Jiang, Jianhua Ma:
Multi-Scenario Fusion for More Accurate Classifications of Personal Characteristics. 300-305 - Ruichao Xu, Zhigang Gao, Bo Wu, Wenjie Diao, Yucai Huang, Wei Zhao:
Mobile Book Reader Based on Reading Behavior Characteristics. 306-311
CyberSciTech'19 Work-in-Progress Papers
- Philip Kirkbride, M. Ali Akber Dewan, Fuhua Oscar Lin:
Game-Like Captchas for Intrusion Detection. 312-315 - Muath Obaidat, Joseph Brown, Abdullah Al Hayajneh:
Web Browser Extension User-Script XSS Vulnerabilities. 316-321
The 4th International Workshop on Applications of AI, Cyber Security and Economics Big Data (ACE 2020)
- Junke Xu:
Legal Regulation of Cyberbullying - From a Chinese perspective. 322-327 - Xiaohua Feng, Yunzhong Feng, Edward Swarlat Dawam:
Artificial Intelligence Cyber Security Strategy. 328-333 - Edward Swarlat Dawam, Xiaohua Feng:
Smart City Lane Detection for Autonomous Vehicle. 334-338 - Chen Huang, Zhongyuan Gan, Feng Ye, Pan Wang, Moxuan Zhang:
KNCR: Knowledge-Aware Neural Collaborative Ranking for Recommender Systems. 339-344
International Workshop on Adaptive Cyber Learning 2020 (ACL 2020)
- Arta Farahmand, M. Ali Akber Dewan, Fuhua Oscar Lin:
Student-Facing Educational Dashboard Design for Online Learners. 345-349 - Yang Yan, Dunwei Wan, Wen-Bo Huang, Ke Wang:
A comparative analysis of the STEM education in Chinese primary and secondary schools. 350-354
The 2nd International Workshop on Big Data Analytics for Cyber Security and Defence (BigCyberSecurity 2020)
- Xiaoming Fan, Chenxu Wang, Xiao Liang:
Extracting Advertisements from Content Marketing Articles based on TopicCNN. 355-360 - Long Chen, Nuo Xu, Yue Wang:
Legal Judgment Prediction with Label Dependencies. 361-365 - Peng Yang, Yong Wu, Tenglang Cheng, Xinyuan Lyu, Zhuang Wang:
Segment-Level Sentiment Classification for Online Comments of Legal Cases. 366-370 - Yu Su, Jian Zhou, Zhinuan Guo:
A Trust-Based Security Scheme for 5G UAV Communication Systems. 371-374
The 5th International Workshop on Cyber Social Computing and Cyber-Enabled Applications (CSC&CEA)
- Wei Huang, Jin Li:
Using Agent Solutions and Visualization Techniques to Manage Cloud-based Education System. 375-379 - Pengzhan Nie, Jiulei Jiang, Zhanyou Ma:
CTL Symbolic Model Checking Based on Fuzzy Logic. 380-385 - Tian Liang, Xiaofeng Wang, Shuai Wang, Xingkai Wang:
An Improved ID3 classification algorithm for solving the backbone of proposition formulae. 386-391 - Juan Li, Xiaofeng Wang, Wanjing Feng:
A Recommendation Algorithm Based on Belief Propagation and Probability Matrix Factorization. 392-398
Special Session on Artificial Intelligence for Securing Cyber-Physical System (AI4SCPS)
- Shubhangi Upadhyay, Ali A. Ghorbani:
Feature Extraction Approach to Unearth Domain Generating Algorithms (DGAs). 399-405 - Bo Wu, Yuan Wu, Yoko Aoki, Shoji Nishimura, Masayuki Kashiwagi:
Analyzing Mowing Behaviors on Sloping Land via Motion Capture Device. 406-409 - Xiangyue Yang, Shu Fu, Bibo Wu, Meng Zhang:
A Survey of Key Issues in UAV Data Collection in the Internet of Things. 410-413
The 18th IEEE International Conference on Pervasive Intelligence & Computing (PICom 2020)
PICom 2020 Regular Papers
- Kalpesh Lad, M. Ali Akber Dewan, Fuhua Oscar Lin:
Trust Management for Multi-Agent Systems Using Smart Contracts. 414-419 - Shakir Mahmood, Raghav H. Venkatnarayan, Muhammad Shahzad:
Recognizing Human Gestures Using Ambient Light. 420-428 - Saeed Khan, Ash Rahimi, Neil Bergmann:
Urban Mobility Prediction Using Twitter. 429-436 - David Nam, Jerin Yasmin, Farhana H. Zulkernine:
Effects of Pre-trained Word Embeddings on Text-based Deception Detection. 437-443 - Yifei Yin, Farhana H. Zulkernine, Samuel Dahan:
Determining Worker Type from Legal Text Data using Machine Learning. 444-450 - Zhikui Chen, Meng Wang, Jing Gao, Peng Li:
Image Annotation based on Semantic Structure and Graph Learning. 451-456 - Guoming Chen, Qiang Chen, Yiqun Chen, Xiongyong Zhu:
Historical Document Image Denoising by Ising Model. 457-461 - Arash Sattari, Rouhollah Ehsani, Teemu Leppänen, Susanna Pirttikangas, Jukka Riekki:
Edge-supported Microservice-based Resource Discovery for Mist Computing. 462-468
The 18th IEEE International Conference on Dependable, Autonomic & Secure Comp (DASC 2020)
DASC 2020 Regular Papers
- Zhuolin Li, Hao Zhang, Hossain Shahriar, Dan Lo, Kai Qian, Michael E. Whitman, Fan Wu:
Denial of Service (DoS) Attack Detection: Performance Comparison of Supervised Machine Learning Algorithms. 469-474 - Cheng Qian, Weichao Gao, William G. Hatcher, Weixian Liao, Chao Lu, Wei Yu:
Search Engine for Heterogeneous Internet of Things Systems and Optimization. 475-482 - P. Renee Carnley, Pam Rowland, Dave Bishop, Sikha Bagui, Matt Miller:
Trusted Digital Identities for Mobile Devices. 483-490 - Syed Wasif Abbas Hamdani, Abdul Waheed Khan, Naima Iltaf, Waseem Iqbal:
DTMSim-IoT: A Distributed Trust Management Simulator for IoT Networks. 491-498 - Edoardo Bompiani, Umberto Ferraro Petrillo, Giovanna Jona-Lasinio, Francesco Palini:
High-Performance Computing with TeraStat. 499-506 - Zicong Zhu, Tran Phuong Thao, Hoang-Quoc Nguyen-Son, Rie Shigetomi Yamaguchi, Toshiyuki Nakata:
Enhancing A New Classification for IDN Homograph Attack Detection. 507-514 - Samaneh Mahdavifar, Andi Fitriah Abdul Kadir, Rasool Fatemi, Dima Alhadidi, Ali A. Ghorbani:
Dynamic Android Malware Category Classification using Semi-Supervised Deep Learning. 515-522 - Martina Saletta, Claudio Ferretti:
A Neural Embedding for Source Code: Security Analysis and CWE Lists. 523-530 - Loredana Caruccio, Ornella Piazza, Giuseppe Polese, Genoveffa Tortora:
Enhancing IoT-based critical diagnosis in emergency rooms through intelligent video surveillance. 531-538 - Andrea F. Abate, Carmen Bisogni, Lucia Cascone, Aniello Castiglione, Gerardo Costabile, Ilenia Mercuri:
Social Robot Interactions for Social Engineering: Opportunities and Open Issues. 539-547 - Md Safiur Rahman Mahdi, Md. Nazmus Sadat, Noman Mohammed, Xiaoqian Jiang:
Secure Count Query on Encrypted Heterogeneous Data. 548-555 - Anthony Melaragno:
Would an Object Representation Invariant Provide Sufficient State Based Knowledge to Adapt Network Intrusion Detection System Rules With Minimal Impact to System Resources? 556-561 - Zihan Wang, Bo Yang:
Attention-based Bidirectional Long Short-Term Memory Networks for Relation Classification Using Knowledge Distillation from BERT. 562-568 - Zhanwen Chen, Jiageng Chen, Weizhi Meng:
A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud Storage and Sharing. 569-576 - Alistair Robinson, Frederick Brown, Nathan Hall, Alex Jackson, Graham Kemp, Matthew Leeke:
CASTLEGUARD: Anonymised Data Streams with Guaranteed Differential Privacy. 577-584 - Syed Imran Akhtar, Abdul Rauf, Haider Abbas, Muhammad Faisal Amjad:
Inter Cloud Interoperability Use Cases and Gaps in Corresponding Standards. 585-592 - Haissam Badih, Yasamin Alagrash, Julian L. Rrushi:
A Blockchain and Defensive Deception Co-design for Webcam Spyware Detection. 593-600 - Andrea F. Abate, Lucia Cimmino, Fabio Narducci, Chiara Pero:
Biometric Face Recognition Based on Landmark Dynamics. 601-605
DASC 2020 Work-in-Progress Papers
- Yasamin Alagrash, Haissam Badih, Julian L. Rrushi:
Malware Detection via Machine Learning and Recognition of Non Stationary Tasks. 606-611
The 6th IEEE International Conference on Cloud and Big Data Computing (CBDCom 2020)
CBDCom 2020 Regular Papers
- Md Yeakub Hassan, Ullash Saha, Noman Mohammed, Stephane Durocher, Avery Miller:
Efficient Privacy-Preserving Approaches for Trajectory Datasets. 612-619 - Shuteng Niu, Jian Wang, Yongxin Liu, Houbing Song:
Transfer Learning based Data-Efficient Machine Learning Enabled Classification. 620-626 - Seyed Nima Khezr, Rachid Benlamri, Abdulsalam Yassine:
Blockchain-based Model for Sharing Activities of Daily Living in Healthcare Applications. 627-633 - Kanwal Aalijah, Rabia Irfan:
Scalable Taxonomy Generation and Evolution on Apache Spark. 634-639 - Robert Cordingly, Wen Shu, Wes J. Lloyd:
Predicting Performance and Cost of Serverless Computing Functions with SAAF. 640-649 - Ayman Diyab Alahmar, Rachid Benlamri:
Optimizing Hospital Resources using Big Data Analytics with Standardized e-Clinical Pathways. 650-657 - Shailendra Singh, Abdulsalam Yassine, Rachid Benlamri:
Internet of Energy: Ensemble Learning through Multilevel Stacking for Load Forecasting. 658-664 - Yushan Jiang, Yongxin Liu, Dahai Liu, Houbing Song:
Applying Machine Learning to Aviation Big Data for Flight Delay Prediction. 665-672
CBDCom 2020 Work-in-Progress Papers
- Bannya Chanda, Shikharesh Majumdar:
Filtering and Storing User Preferred Data: an Apache Spark Based Approach. 673-679
CBDCom 2020 Poster Papers
- David Perez, Ling-Hong Hung, Sonia Xu, Ka Yee Yeung, Wes Lloyd:
Characterizing Performance Variation of Genomic Data Analysis Workflows on the Public Cloud. 680-683
CBDCom 2020 Special Session Papers
- Kunchang Li, Runhua Shi, Jingchen Yan, Chenxi Cai, Mingyu Sun, Jianbin Li:
A RMF and AHP-Based Approach to Risk Assessment of Power Internet of Things. 684-689 - Manuel Leibetseder, Marc Kurz, Erik Sonnleitner, Thomas Rittenschober:
Executing Complex Calculations in the Cloud to Enable Real-Time Data Processing. 690-695 - Anshuman Biswas, Biswajit Nandy, Shikharesh Majumdar, Ali El-Haraki:
Auto-scaling Compute and Network Resources in a Data-center. 696-703 - Robert Cordingly, Hanfei Yu, Varik Hoang, David Perez, David Foster, Zohreh Sadeghi, Rashad Hatchett, Wes J. Lloyd:
Implications of Programming Language Selection for Serverless Data Processing Pipelines. 704-711
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.