default search action
ICA3PP 2020: New York City, NY, USA
- Meikang Qiu:
Algorithms and Architectures for Parallel Processing - 20th International Conference, ICA3PP 2020, New York City, NY, USA, October 2-4, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12454, Springer 2020, ISBN 978-3-030-60247-5
Parallel Computing with Cybersecurity and Blockchain (PCB)
- Yue Zhang, Keke Gai, Meikang Qiu, Kai Ding:
Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies. 3-18 - Zhengkang Fang, Keke Gai, Liehuang Zhu, Lei Xu:
LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network. 19-34 - Haochen Li, Keke Gai, Liehuang Zhu, Peng Jiang, Meikang Qiu:
Reputation-Based Trustworthy Supply Chain Management Using Smart Contract. 35-49 - Zhong Li, Xiaolong Jin, Chuanzhi Zhuang, Zhi Sun:
Content-Aware Anomaly Detection with Network Representation Learning. 50-64 - Kai He, Jiaoli Shi, Chunxiao Huang, Xinrong Hu:
Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree. 65-80 - Anyuan Deng, Jiaoli Shi, Kai He, Fang Xu:
IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System. 81-92 - Hao Jin, Chen Xu, Yan Luo, Peilong Li:
Blockchain-Based Secure and Privacy-Preserving Clinical Data Sharing and Integration. 93-109 - Keke Gai, Ziyue Hu, Liehuang Zhu, Ruili Wang, Zijian Zhang:
Blockchain Meets DAG: A BlockDAG Consensus Mechanism. 110-125 - Zhe Wang, Yi Ren, Jianbo Guan, Ziqi You, Saqing Yang, Yusong Tan:
Dynamic Co-located VM Detection and Membership Update for Residency Aware Inter-VM Communication in Virtualized Clouds. 126-143 - Dongxu Cheng, Jianwei Liu, Zhenyu Guan, Jiale Hu:
An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal. 144-154 - Shubin Cai, Huaifeng Zhou, Ningsheng Yang, Zhong Ming:
A Simulation Study on Block Generation Algorithm Based on TPS Model. 155-169 - Pengpeng Shao, Feng Ye, Zihao Liu, Xiwen Wang, Ming Lu, Yupeng Mao:
Improving iForest for Hydrological Time Series Anomaly Detection. 170-183 - Ningwei Li, Hang Gao, Liang Liu, Jianfei Peng:
Machine Learning-Based Attack Detection Method in Hadoop. 184-196 - Qianwen Ye, Chase Q. Wu, Wuji Liu, Aiqin Hou, Wei Shen:
Profiling-Based Big Data Workflow Optimization in a Cross-layer Coupled Design Framework. 197-217 - Jiawei Li, Hua Dai, Yiyang Liu, Jianqiu Xu, Jie Sun, Geng Yang:
Detection of Loose Tracking Behavior over Trajectory Data. 218-230 - Xudong Tang, Qiang Wang, Weikai Miao:
Behavioral Fault Modelling and Analysis with BIP: A Wheel Brake System Case Study. 231-250 - Tianbo Wang, Chunhe Xia:
H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks. 251-269 - Chenyang Liao, Jiahao Huang, Fangkai Zhou, Yang Lin:
Design of Six-Rotor Drone Based on Target Detection for Intelligent Agriculture. 270-281 - Hao Yin, Yihang Wei, Yuwen Li, Liehuang Zhu, Jiakang Shi, Keke Gai:
Consensus in Lens of Consortium Blockchain: An Empirical Study. 282-296 - Yu Nie, Yu Liu, Chao Li, Hua Huang, Fubao He, Meikang Qiu:
Collaborative Design Service System Based on Ceramic Cloud Service Platform. 297-308 - Soultana Ellinidou, Gaurav Sharma, Olivier Markowitch, Jean-Michel Dricot, Guy Gogniat:
Towards NoC Protection of HT-Greyhole Attack. 309-323 - Yizhong Liu, Jianwei Liu, Jiayuan Yin, Geng Li, Hui Yu, Qianhong Wu:
Cross-shard Transaction Processing in Sharding Blockchains. 324-339 - Jingying Yang, Xianghua Fu, Shuxin Wang, Wenhao Xie:
Lexicon-Enhanced Transformer with Pointing for Domains Specific Generative Question Answering. 340-354 - Qiangfei Ma, Hua Huang, Wentao Zhang, Meikang Qiu:
Design of Smart Home System Based on Collaborative Edge Computing and Cloud Computing. 355-366 - Lijuan Duan, Hongli Liu, Huifeng Duan, Yuanhua Qiao, Changming Wang:
Classification of Depression Based on Local Binary Pattern and Singular Spectrum Analysis. 367-380 - Tarek Menouer, Amina Khedimi, Christophe Cérin, Congfeng Jiang:
Cloud Allocation and Consolidation Based on a Scalability Metric. 381-395 - Jia Ding, Zhiwu Xu:
Adversarial Attacks on Deep Learning Models of Computer Vision: A Survey. 396-408 - Yizhong Liu, Jianwei Liu, Dawei Li, Hui Yu, Qianhong Wu:
FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding. 409-425 - Yuan Liu, Zhengpeng Ai, Mengmeng Tian, Guibing Guo, Linying Jiang:
DSBFT: A Delegation Based Scalable Byzantine False Tolerance Consensus Mechanism. 426-440 - Mengjie Zhang, Xingsheng Zhang, Zhijun Chen, Dunhui Yu:
A Privacy-Preserving Approach for Continuous Data Publication. 441-458 - Yunyi Zhang, Jintian Lu, Shuyuan Jin:
Web Attack Detection Based on User Behaviour Semantics. 459-474 - Wenhao Dai, Xiaozhuo Gu, Yajun Teng:
A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on Blockchain. 475-493 - Yafei Sang, Mao Tian, Yongzheng Zhang, Peng Chang, Shuyuan Zhao:
IncreAIBMF: Incremental Learning for Encrypted Mobile Application Identification. 494-508 - Xingfeng Lv, Jinbao Li:
A Multi-level Features Fusion Network for Detecting Obstructive Sleep Apnea Hypopnea Syndrome. 509-519 - Zhen Lin, Yuchuan Luo, Shaojing Fu, Tao Xie:
BIMP: Blockchain-Based Incentive Mechanism with Privacy Preserving in Location Proof. 520-536 - Yufei Liu, Xuqi Fang, Fengyuan Lu, Xuxin Chen, Xinli Huang:
Indoor Positioning and Prediction in Smart Elderly Care: Model, System and Applications. 537-548 - Xinxin Liu, Hua Huang, Meikang Qiu, Meiqin Liu:
Research on Stylization Algorithm of Ceramic Decorative Pattern Based on Ceramic Cloud Design Service Platform. 549-563 - Yujuan Wen, Fengyuan Lu, Yufei Liu, Peijin Cong, Xinli Huang:
Blockchain Consensus Mechanisms and Their Applications in IoT: A Literature Survey. 564-579 - Bismark Tei Asare, Kester Quist-Aphetsi, Laurent Nana:
Towards a Secure Communication of Data in IoT Networks: A Technical Research Report. 580-591 - Vishwas Rajashekar, Ishaan Lagwankar, Durga Prasad S. N, Rahul Nagpal:
Efficient Thermography Guided Learning for Breast Cancer Detection. 592-600 - Ashish Christopher Victor, Akhilarka Jayanthi, Atul Anand Gopalakrishnan, Rahul Nagpal:
PTangle: A Parallel Detector for Unverified Blockchain Transactions. 601-608 - Hongtao Guan, Xingkong Ma, Siqi Shen:
DOS-GAN: A Distributed Over-Sampling Method Based on Generative Adversarial Networks for Distributed Class-Imbalance Learning. 609-622 - Peiquan Jin, Jianchuan Li, Lin Mu, Jingren Zhou, Jie Zhao:
Effective Sentiment Analysis for Multimodal Review Data on the Web. 623-638 - Danghui Wang, Chen Yue, Ze Tian, Ru Han, Lu Zhang:
An Energy-Efficient AES Encryption Algorithm Based on Memristor Switch. 639-653 - Chuangchuang Dai, Xueying Yang, Meikang Qiu, Xiaobing Guo, Zhonghua Lu, Beifang Niu:
Digital Currency Investment Strategy Framework Based on Ranking. 654-662 - Sukun Li, Meikang Qiu:
Authentication Study for Brain-Based Computer Interfaces Using Music Stimulations. 663-675 - Lin Chen, Huahui Lv, Kai Fan, Hang Yang, Xiaoyun Kuang, Aidong Xu, Siliang Suo:
An Ensemble Learning Approach to Detect Malwares Based on Static Information. 676-686 - Shaokang Yang, Jianwei Niu, Jiyan Wu, Xuefeng Liu:
Automatic Medical Image Report Generation with Multi-view and Multi-modal Attention Mechanism. 687-699
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.