default search action
7th CSCloud / 6th EdgeCom 2020: New York City, NY, USA
- 7th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2020 / 6th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2020, New York City, NY, USA, August 1-3, 2020. IEEE 2020, ISBN 978-1-7281-6550-9
- Albert Y. Zomaya, Ziliang Zong, Keke Gai:
Message from the Program Chairs EdgeCom 2020 CSCloud-EdgeCom 2020. XV - Meikang Qiu:
Message from the General Chair CSCloud-EdgeCom 2020. 1 - Zakirul Alam, Zonghua Zhang, Haibo Zhang:
Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020. 1 - Yohn Jairo Parra Bautista, Richard A. Aló, Ningning Wang:
Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer Behavior. 1-7 - Bhavani Thuraisingham:
Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems. 8-10 - Wei Liu, Jian Su, Zhenyu Mao, Peipei Jin, Yu Huang, Chengfeng Dou, Limei Zhou, Yuwei Shang:
Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning. 11-16 - Pei-heng Hong, Meikang Qiu, Yuehua Wang:
Autonomous Driving and Control: Case Studies with Self-Driving Platforms. 17-22 - Shulan Wang, Yuan Li, Haiyan Wang, Xi Zhang, Jianyong Chen:
Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing. 23-28 - Yepeng Ding, Hiroyuki Sato:
Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health. 29-35 - Mohammed S. Alshehri, Brajendra Panda:
Minimizing Data Breach by a Malicious Fog Node within a Fog Federation. 36-43 - Atheer Almogbil, Abdullah Alghofaili, Chelsea Deane, Timothy R. Leschke:
Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's Guide. 44-49 - Wonjun Lee, Mohammad Nadim:
Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers. 50-55 - Saikat Das, Deepak Venugopal, Sajjan G. Shiva, Frederick T. Sheldon:
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack. 56-61 - Md Delwar Hossain, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. 62-69 - Md. Shohel Rana, Andrew H. Sung:
DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection. 70-75 - Zhixiong Chen, Zhihui Lu, Abhishek Sane, Anthony Bhimsain:
Trustworthy When Human and Bots Are Mingled. 76-81 - Yuki Iuchi, Yong Jin, Hikaru Ichise, Katsuyoshi Iida, Yoshiaki Takai:
Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses. 82-87 - Khalid Albulayhi, Predrag T. Tosic, Frederick T. Sheldon:
G-Model: A Novel Approach to Privacy-Preserving 1: M Microdata Publication. 88-99 - Oluwaseyi Ajayi, Tarek N. Saadawi:
Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange. 100-107 - Desheng Xu, Junyi Zhai:
Research on Aviation Man-made Error Detection and Its Impact on Flight Safety. 108-112 - Wenting Wang, Xingxing Zhou, Minmin Zhang:
An Analytical Framework to Control the Synchronization on Networks. 113-119 - Zhongwu Xie, Weipeng Cao, Xizhao Wang, Zhong Ming, Jingjing Zhang, Jiyong Zhang:
A Biologically Inspired Feature Enhancement Framework for Zero-Shot Learning. 120-125 - Yingyan Wu, Yulin He, Joshua Zhexue Huang:
Clustering Ensembles Based on Probability Density Function Estimation. 126-131 - Jingjing Zhang, Lin Yang, Xianming Gao, Qiang Wang:
Formal analysis of QUIC handshake protocol using ProVerif. 132-138 - Shengsheng Xu, Yulin He, Joshua Zhexue Huang:
Observation Points-Based Particle Swarm Optimization Algorithm. 139-144 - Wentao Zhang, Hua Huang, Meikang Qiu:
Design and Implementation of Virtual Pottery Space Based on Ceramic Cloud Service Platform. 145-150 - Xinxin Liu, Hua Huang, Meikang Qiu:
Intelligent Algorithm for Ceramic Decorative Pattern Style Transfer Based on CycleGAN. 151-156 - Song Wen, Donghong Qin, Ting Lv, Lina Ge, Xiaodong Yang:
Traffic identification algorithm based on improved LRU. 157-159 - Junwei Zhou, Junjiong Li, Emmanouil Panaousis, Kaitai Liang:
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data. 160-167 - Grace Peng, Meikang Qiu:
Cost Minimization for Music Uploading to a Cloudlet. 168-173 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:
Energy Consumption for IoT Streaming Applications. 174-177 - Sahba Bahizad:
Risks of Increase in the IoT Devices. 178-181 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:
Green computing for Internet of Things. 182-185 - Atheer Almogbil, Abdullah Alghofaili, Chelsea Deane, Timothy R. Leschke:
The Accuracy of GPS-Enabled Fitbit Activities as Evidence: A Digital Forensics Study. 186-189 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:
Performance of databases in IoT applications. 190-192 - Xintong Chen, Yongxin Zhu, Xiaoying Zheng, Si Miao, Tianhao Nan, Wanyi Li:
Parallel Multi-threaded Gridrec Algorithm for Computer Tomography on GPU for Edge Computing. 193-198 - Weibin Ma, Lena Mashayekhy:
Truthful Computation Offloading Mechanisms for Edge Computing. 199-206 - Saadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla:
Service Placement for Real-Time Applications: Rate-Adaptation and Load-Balancing at the Network Edge. 207-215 - Zainab Rashid Alkindi, Mohamed Sarrab, Nasser Alzidi:
CUPA: A Configurable User Privacy Approach For Android Mobile Application. 216-221 - Zheyuan Hu, Jianwei Niu, Tao Ren, Huiyong Li, Ye Rui, Yuan Qiu, Liang Bai:
A Resource Management Model for Real-time Edge System of Multiple Robots. 222-227 - Lei Chen, Huihua Yu, Li Tong, Xu Huai, Peipei Jin, Yu Huang, Chengfeng Dou:
Research on Load Forecasting Method of Distribution Transformer based on Deep Learning. 228-233 - Wanyi Li, Yongxin Zhu, Li Tian, Tianhao Nan, Xintong Chen:
FPGA-based Hardware Acceleration for Image Copyright Protection Syetem Based on Blockchain. 234-239 - Liuqing Yang, Xiao-Yang Liu, Jeong Soo Kim:
Cloud-based Livestock Monitoring System Using RFID and Blockchain Technology. 240-245 - Qun Ma, Jianwei Niu, Zhenchao Ouyang, Mo Li, Tao Ren, Qingfeng Li:
Edge Computing-based 3D Pose Estimation and Calibration for Robot Arms. 246-251 - Cody Blakeney, Xiaomin Li, Yan Yan, Ziliang Zong:
Craft Distillation: Layer-wise Convolutional Neural Network Distillation. 252-257 - Zheng Zhu, Yingjie Tian, Fan Li, Hongshan Yang, Zheng Ma, Guoping Rong:
Research on Edge Intelligence-based Security Analysis Method for Power Operation System. 258-263 - Xiaowei Wang, Gefan Ren, Huajian Zhou, Guotao Xie, Yougang Bian, Biao Xu:
Assessing the Reliability of Hybrid Clouds with Monte Carlo Simulation. 264-269 - Yuehua Wang, Anuhya Kotha, Pei-heng Hong, Meikang Qiu:
Automated Student Engagement Monitoring and Evaluation during Learning in the Wild. 270-275 - Mohammed A. Aleisa, Abdullah Abuhussein, Faisal Alsubaei, Frederick T. Sheldon:
Performance Analysis of Two Cloud-Based IoT Implementations: Empirical Study. 276-280 - Chuangchuang Dai, Haijing Luan, Qingbing Yu, Xiaoyu He, Yunhao Wang, Bincheng Shuai, Xiaobing Guo, Zhonghua Lu, Beifang Niu:
Change-Encryption: Encryption Using Spatiotemporal Information as a Function Model. 281-287
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.