default search action
CyberC 2022: Suzhou, China
- International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2022, Suzhou, China, October 14-16, 2022. IEEE 2022, ISBN 979-8-3503-3154-7
- Huancheng Lin, Zhehan Wang, Tong Xu, Shanyue Zhou, Yang Hong, Jun Huang:
Analysis of Zero-Key Authentication and Zero-Knowledge Proof. 1-8 - Jianhong Zhang, Chenghe Dong, Ziang Li, Sentian Yin, Lidong Han:
On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid. 9-11 - Thejavathy Vengappa Raja, Zoheir Ezziane, Jun He, Xiaoqi Ma, Asmau Wali-Zubai Kazaure:
Detection of DDoS Attack on Smart Home Infrastructure Using Artificial Intelligence Models. 12-18 - Zhao Yang, Fengyang Deng, Linxi Han:
Flexible Android Malware Detection Model based on Generative Adversarial Networks with Code Tensor. 19-28 - Jing Wang, Fengheng Wu, Tingbo Zhang, Xiaohua Wu:
DPP: Data Privacy-Preserving for Cloud Computing based on Homomorphic Encryption. 29-32 - Qian Zhang, Lishen Chen, Qiao Yan:
Adversarial Attack and Defense for Webshell Detection on Machine Learning Models. 33-41 - Abdou Romaric Tapsoba, Frédéric Tounwendyam Ouédraogo, Arnold Elvis Ouédraogo:
Relevance of the Gaussian classification on the Detection of DDoS Attacks. 42-49 - Tongpo Zhang, Yuxin Wan, Miguel López-Benítez, Enggee Lim, Fei Ma, Limin Yu:
Big data encrypting transmission framework for a multi-AGV system. 50-56 - Yishan Wei, Xiaomei Cao:
Blockchain-based Multi-layer Data Security Sharing Model. 57-65 - Zhihu Li, Bing Zhao, Hongxia Guo, Feng Zhai, Lin Li:
A Privacy-Preserving Blockchain-based Energy Supply Chain System Supporting Supervision. 66-75 - Hui Jiang:
BIM Credibility: A Framework of Blockchain-enabled BIM Data. 76-79 - Fangze Qiu, Huaxiao Huang, Yuji Dong:
A Re-configurable Interaction Model in Distributed IoT Environment. 80-86 - Xinguang Xie, Junjian Ye, Lifa Wu, Rong Li:
RTOSExtracter: Extracting user-defined functions in stripped RTOS-based firmware. 87-96 - Qinghua Wang:
Machine Learning Model Design for IoT-Based Flooding Forecast. 97-103 - Jiashun Duan, Xin Zhang, Chi Xu:
LwF4IEE: An Incremental Learning Method for Interactive Event Extraction. 104-113 - Haoyu Wu, Zhibin Lin, Borong Lin, Zhenhao Li, Nanlin Jin, Xiaohui Zhu:
Deep Learning To Model The Complexity Of Algal Bloom. 114-122 - Huang Huang, Yi Yang, Liang Tang, Zhang Zhang, Nailong Liu, Mou Li, Liang Wang:
A Multimodal Off-Road Terrain Classification Benchmark for Extraterrestrial Traversability Analysis. 123-126 - Soha Alrajjou, Edward Kwadwo Boahen, Chunyun Meng, Keyang Cheng:
An enhanced interpretable deep learning approach for diabetic retinopathy detection. 127-135 - Xuting Yang, Ruoyu Sun, Xiaotian Ren, Angelos Stefanidis, Fengchen Gu, Jionglong Su:
Ghost Expectation Point with Deep Reinforcement Learning in Financial Portfolio Management. 136-142 - Ruiyu Zhang, Xiaotian Ren, Fengchen Gu, Angelos Stefanidis, Ruoyu Sun, Jionglong Su:
MDAEN: Multi-Dimensional Attention-based Ensemble Network in Deep Reinforcement Learning Framework for Portfolio Management. 143-151 - Karim H. Moussa, Marwa H. El-Sherif:
A New Hybrid Steganography Scheme Employing A Time-Varying Delayed Chaotic Neural Network. 152-157 - Ruoyi Gao, Fengchen Gu, Ruoyu Sun, Angelos Stefanidis, Xiaotian Ren, Jionglong Su:
A Novel DenseNet-based Deep Reinforcement Framework for Portfolio Management. 158-165 - Xuan Low, Dequan Yang, Dengpan Yang:
Design and Implementation of Industrial Control Cyber Range System. 166-170 - Zuping Zhang:
Study on fast convergence method of IIR low pass filter. 171-176 - Jie Wang:
Modeling and Accelerating of Mobile Advertisement Dissemination in Vehicular Networks. 177-180 - Xuesong Wang, Lu Lu:
Deep Neural Networks Enhanced Phase Asynchronous Physical-Layer Network Coding. 181-184 - Jie Yu, Jian Gao, Ning Wang, Panpan Feng, Bing Zhou, Zongmin Wang:
QT-STNet: A Spatial and Temporal Network Combined with QT Segment for MI Detection and Location. 185-188 - Jian Gao, Jie Yu, Ning Wang, Panpan Feng, Huiqing Cheng, Bing Zhou, Zongmin Wang:
A CVD Critical Level-aware Scheduling Model Based on Reinforcement Learning for ECG Service Request. 189-192 - Jianjun Yuan, Shifeng Li:
Sparse coding based on L2,1-norm and manifold regularization for remote sensing images. 193-197 - Qiwei Li, Chen Li, Chenggong Yan, Xiaomei Li, Haixia Li, Tianjing Zhang, Hui Song, Roman Schaffert, Weimin Yu, Yu Fan, Jianwei Ye, Hao Chen:
Ultra-low Dose CT Image Denoising based on Conditional Denoising Diffusion Probabilistic model. 198-205 - Hui He, Qihong Chen, Guoping Xie, Boxiong Yang, Shelei Li, Bo Zhou, Yuye Gu:
A Lightweight Deep Learning Model for Real-time Detection and Recognition of Traffic Signs Images Based on YOLOv5. 206-212 - Haoyu Wu, Jun Qi, Wei Wang, Jianjun Chen:
Machine Learning-based Gesture Recognition Using Wearable Devices. 213-221 - Jin Hu, Wang Juan, Wang Zuli, Long Dan:
Improved YOLOv5s algorithm for small item detection of wheelhouse. 222-225 - Minkang Zhang, Ding Chen, Yongxin Huang:
Research on Multiple Targets Pedestrian Reidentification with Night Scene Image Enhancement. 226-229 - Qi Qing:
A Fusion Network for Non-Uniform Deblurring*. 230-239 - Pengyao Yi, Ruifang Liu:
A Relation Enhanced Model For Abstractive Dialogue Summarization. 240-246 - Yang Xiao:
A Task Allocation Method in Edge Computing Based on Multi-Objective Optimization. 247-251 - Nan Yang, Cen Chen, Tao Yuan, Yujie Wang, Xiaofan Gu, Dan Yang:
Security hardening solution for docker container. 252-257 - Shengchao Yuan, Yimin Zhou, Lei Shi, Yongxin Huang:
Dangerous Action Recognition for Ship Sailing to Limited Resource Environment. 258-262 - Zhimin Guo, Zhuo Lv, Nuannuan Li, Tao Yuan, Xue Gao, Zekun Yuan:
Comprehensive defense scheme against container escape related to container management procedure. 263-266 - Junfeng Ding, Hao Chen, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang:
Point cloud objective recognition method combining SHOT features and ESF features. 267-274 - Junfeng Ding, Haonan Zong, Jian Zhou, Deyong Wu, Xuan Chen, Lei Wang:
Study on the automatic modeling method of 3D information model for substations. 275-283 - Jie Zhang, Pengcheng Wen, Ai Xiong:
Multi-task Assignment Research for Heterogeneous UAVs based on Improved Simulated Annealing Particle Swarm Optimization Algorithm. 284-288 - Huanran Zhang, Lingfeng Shen, Ning Wang, Xiaomin Mu:
UAV Trajectory Optimization for PHY Secure Communication Against Cooperative Eavesdroppers. 289-293 - Changyu Zeng, Li Liu, Haocheng Zhao, Yu Zhang, Wei Wang, Ning Cai, Yutao Yue:
Causal Unstructured Pruning in Linear Networks Using Effective Information. 294-302 - Juntuo Wang, Qiaochu Zhao, Dongheng Lin, Erick Purwanto, Ka Lok Man:
Conditional Metadata Embedding Data Preprocessing Method for Semantic Segmentation. 303-311 - Ling Li:
A Personalized Recommendation Fusing Tag Feature and Temporal Context. 312-317 - Yuan-hui Li, Zhao Wen, Hai-yun Han, Zhipeng Ou, Liu Xia:
Comparison of ARIMA Model and GM(1,1) Model in Passenger Flow Prediction of Sanya Airport. 318-323
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.