default search action
CyberC 2020: Chongqing, China
- International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2020, Chongqing, China, October 29-30, 2020. IEEE 2020, ISBN 978-1-7281-8448-7
- Changxiang Shen, Lei Zhang, David Mitchel Perry, Guangyi Liu:
Establish a scientific concept of network security and build a strong defense line of network security. xxix-xxxi - Yuxiang Chen, Jian Bai, Yao Hao, Sijie Liao, Zhongqiang Yi, Hao Zhang:
Blockchain-based Dynamic Group Management for Multiple Keywords Searchable Encryption Technology. 1-6 - Yang Tan, Wei Li, Juan Yin, Yun Deng:
A universal decentralized authentication and authorization protocol based on Blockchain. 7-14 - Dominik Welte, Axel Sikora, Daniel Schönle, Jan Stodt, Christoph Reich:
Blockchain at the Shop Floor for Maintenance. 15-22 - Haochen Yang, Guanghui Wang, Zhonghao Zhai, Xin He:
Towards Decentralized Trust Management Using Blockchain in Crowdsourcing Networks. 23-28 - Yassin M. Thibodeau Hafid, Dimitrios Makrakis, Etienne Elie:
An Ethereum-based Energy Trading Protocol (EETP). 29-34 - Siyuan Zhang, Chaoming Du:
Semi-Supervised Deep Learning based Network Intrusion Detection. 35-40 - Guohang Lu, Yi Liu, Yifei Chen, Chengwei Zhang, Yayu Gao, Guohui Zhong:
A Comprehensive Detection Approach of Wannacry: Principles, Rules and Experiments. 41-49 - Jingzhong Wang, Yue Zhang, Haibin Li:
Electronic voting protocol based on ring signature and secure multi-party computing. 50-55 - Yuxin Sun, Yingzhou Zhang, Linlin Zhu:
An Anti-Collusion Fingerprinting based on CFF Code and RS Code. 56-63 - Si Liao, Chenming Zhou, Yonghui Zhao, Zhiyu Zhang, Chengwei Zhang, Yayu Gao, Guohui Zhong:
A Comprehensive Detection Approach of Nmap: Principles, Rules and Experiments. 64-71 - Meng Zhao, Yong Ding, Yujue Wang, Huiyong Wang, Bo Han:
Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications. 72-75 - Chuang Ma, Haisheng You, Li Wang, Jiajun Zhang:
Intelligent Cybersecurity Situational Awareness Model Based on Deep Neural Network. 76-83 - Chuang Ma, Jiajun Zhang, Li Wang, Haisheng You:
Network Attack Detection Based on Kernel Principal Component Analysis and Decision Tree. 84-91 - Jianbo Huang, Liang Chang, Long Li, Xuguang Bao:
An Adaptive Dummy-based Mechanism to Protect Location Privacy in Smart Health Care System. 92-97 - Ying Fang, Tianlong Gu, Liang Chang, Long Li:
Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast Decryption. 98-106 - Jinlong Chen, Lei Huang:
Single High-Value Region Detection Based on Image Equal-Segmentation. 107-113 - Xia Huang:
An Image Data Query Algorithm Based on Ontology and Singular Value Decomposition. 114-119 - Haini Zeng, Deli Chen:
Image encryption algorithm based on Logistic-Sine compound chaos. 120-123 - Yang Tao:
A VR/AR-based Display System for Arts and Crafts Museum. 124-129 - Yanru Zhong, Leixian Zhao, Chaohao Jiang, Zhaorong He, Xiaonan Luo:
A Semi-Supervised Feature Fusion Method for Sentence Similarity Matching. 130-137 - Zhaorong He, Xiaonan Luo, Yanru Zhong, Chaohao Jiang, Leixian Zhao:
Information Extraction Method based on Dilated Convolution and Character-Enhanced Word Embedding. 138-143 - Li Zhen, Yang Zengchun:
Open Entity Semantic Relation Extraction in Big Data Environment. 144-151 - Yu Wu, Zhenni Zhao, Jie Yang, Yijun Lin:
Weibo Sentiment Classification Based on Two Channels Text Convolution Neural Network with Multi-Feature. 152-160 - Li Zhen:
Research on Open Entity Semantic Relation Extraction in Big Data Environment. 161-168 - Fulian Yin, Xueying Shao, Yifan Zhang, Xiaowei Zhu:
Classification and Characteristics analysis with Dynamic Model on Public Opinion in the Chinese Sina-microblog. 169-175 - Fengcai Qiao, Jinsheng Deng, Li Wei:
An Online Framework for Temporal Social Unrest Event Prediction Using News Stream. 176-182 - Fulian Yin, Sitong Li, Xiaowei Liu, Lingyao Zhu, Wenhui Yu:
A Hierarchical Participant Classification Model of Hot Events in Chinese Microblog. 183-189 - Jindan Tan, Liang Chang, Tieyuan Liu, Xuemei Zhao:
Attentional Autoencoder for Course Recommendation in MOOC with Course Relevance. 190-196 - Yan Zhang, Liang Chang, Tieyuan Liu:
MOOCs Dropout Prediction Based on Hybrid Deep Neural Network. 197-203 - Zelu Kang, Nong Xiao, Zhiguang Chen, Yang Ou, Xinming Li:
An Improved Parallel SVM Algorithm on Distributed System. 204-209 - Muhammad Mufti Ramadhan, Budhi Irawan, Casi Setianingsih:
Translation Russian Cyrillic to Latin Alphabet using Random Forest Algorithm. 210-213 - Robert Kelley, Antara Debnath Antu, Anup Kumar, Bin Xie:
Choosing the Right Compute Resources in the Cloud: An analysis of the compute services offered by Amazon, Microsoft and Google. 214-223 - Xi Shen, Yingzhou Zhang, Tianqi Wang, Yuxin Sun:
Relational Database Watermarking for Data Tracing. 224-231 - Chonghui Ge, Yunlong Di, Yuxin Sun, Yongjin Zhu, Linfeng Xie, Yingzhou Zhang:
A Database Collusion Detection and Measurement Based on Bloom Filter. 232-238 - Chonghui Ge, Jian Sun, Yuxin Sun, Yunlong Di, Yongjin Zhu, Linfeng Xie, Yingzhou Zhang:
Reversible Database Watermarking Based on Random Forest and Genetic Algorithm. 239-247 - Xiaowen Feng, Pengcheng Deng, Yanzi Yi, Qi Yu, Decun Luo, Hua Deng, Yujue Wang:
Verifiable Decentralized Access Control for Distributed Databases. 248-253 - Maolin Shen, Yingzhou Zhang, Yunlong Di, Yuxin Sun:
Database Traceability Algorithm Based On Zero Watermark. 254-259 - Wei Wei:
Research on Index Scheme of Encrypted XML Data Structure. 260-263 - Kou Lu, Jiajing Zhao, Jianming Zhang, Cheng Qin:
Multiple Kernel Learning via Ensemble Artifice in Reproducing Kernel Hilbert Space. 264-267 - Junliang Wang, Kaiyou Yuan, Zehan Shi:
Multi-grained rough set in job guidance for college graduates. 268-271 - Jinrui Gan, Peng Wu, Guoliang Zhang, Shiwen Dong, Zhaogang Han, Weiwei Liu:
Intelligent Fault Diagnosis with Deep Architecture. 272-275 - Tinghui Huang, Sijun Li, Xinyu Gao:
Computing Resource Allocation and Offloading Method based on Simulated Annealing Algorithm. 276-282 - Bo Jiao:
Evaluating the Structural Model using Internet Interdomain Topological Datasets. 283-286 - Wei Wang, Tieyuan Liu, Liang Chang, Tianlong Gu, Xuemei Zhao:
Convolutional Recurrent Neural Networks for Knowledge Tracing. 287-290 - Yingchen Su, Yinna Ye:
Daily Passenger Volume Prediction in the Bus Transportation System using ARIMAX Model with Big Data. 291-300 - Jin Dai, Jiayao Li:
News Influence Model Based on Neural Network. 301-308 - Jin Dai, Haichuan Liu, Qirui Zhang:
One Class Support Vector Machine Active Learning Method for Unbalanced Data. 309-315 - Xia Sun, Chen Yin:
Utility Function based Power Control Scheme in Femtocell Network. 316-320 - Weifeng Lu, Zhihao Ren, Jia Xu, Siguang Chen:
Cooperative Jamming Algorithm Based on Trust Update. 321-324 - Runze Dong, Buhong Wang, Tianhao Cheng:
Security Performance Analysis of Physical Layer for UAV Swarm Networks. 325-330 - Shengnan Chen, Liang Qian:
A Reliable and Efficient Distributed Semantic Discovery Mechanism for Mobile P2P Networks. 331-334 - Milembolo Miantezila, Bin Guo, Chenjie Zhang, Xuemei Bai:
Primary User Channel State Prediction Based on Channel Allocation and DBHMM. 335-338 - Jin Dai, Xianjing Zhao, Xingxing Zhou, Qirui Zhang:
Research on Data Fusion Scheme of WSNs Based on DGM Prediction Model. 339-347 - Bobo Yin, Ning Wang, Yajun Fan, Xiaofang Sun, Danping He, Wenhao Liu:
Evaluation of TDM-based Integrated Access and Backhaul Schemes for 5G and Beyond at mmWave Band. 348-353 - Wenkao Yang, Wei Zhang:
Real-time Traffic Signs Detection Based on YOLO Network Model. 354-357 - Chengchang Wan, Xinghui Cao, Wei Wu, Chen Wang:
Ocean Sound Velocity Estimation Based on RBF Neural Networks. 358-361 - Xiaosu Tan, Qingqin Luo, Shuang Yang, Yulian Jiang:
Hand-assisted rehabilitation robot based on human-machine master-slave motion mode. 362-365 - Hanzhong Tan:
Line inspection logistics robot delivery system based on machine vision and wireless communication. 366-374 - Hung-Chang Chang, Chen-Yi Lin, Da-Jyun Liao, Tung-Ming Koo:
The Modbus Protocol Vulnerability Test in Industrial Control Systems. 375-378 - Yanbin Sun, Jianmei Zhou, Shanshan Chen, Xiangkai Zeng, Xia Sun:
Signal processing for extracting velocity information from spatial filtering signals. 379-383
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.