


default search action
BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA
- 5th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019. IEEE 2019, ISBN 978-1-7281-0006-7

- Arjun Shakdhe, Suyash Agrawal, Baijian Yang

:
Security Vulnerabilities in Consumer IoT Applications. 1-6 - Abdulrahman Abu Elkhail, Tomás Cerný

:
On Relating Code Smells to Security Vulnerabilities. 7-12 - Zeyad A. Al-Odat

, Eman Al-qtiemat, Samee Khan
:
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations. 13-18 - Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi

, Karuna P. Joshi:
Anomaly Detection Models for Smart Home Security. 19-24 - Uttkarsh Goel, Ron Ruhl, Pavol Zavarsky:

Using Healthcare Authority and Patient Blockchains to Develop a Tamper-Proof Record Tracking System. 25-30 - Xiangwei Meng, Jianbo Xu, Wei Liang

, Kuan-Ching Li
:
An Anonymous Mutual Authentication and Key Agreement Scheme in WBAN. 31-36 - Kevin Mayhew, Weifeng Chen:

Blockchain - Can It Solve the Security Issues and Fraud Expenses for Credit Card Commerce? 37-41 - Haibo Wu, Shiliang Shi, Qifeng Nian:

Streaming Machine Learning For Real-Time Gas Concentration Prediction. 42-46 - Arya Renjan, Sandeep Nair Narayanan, Karuna Pande Joshi:

A Policy Based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic. 47-52 - Fatima Zahra Errounda

, Yan Liu:
An Analysis of Differential Privacy Research in Location Data. 53-60 - Xiang Liu, Ziyang Tang

, Baijian Yang
:
Predicting Network Attacks with CNN by Constructing Images from NetFlow Data. 61-66 - Suprateek Kundu

, Shan Suthaharan
:
Privacy-Preserving Predictive Model Using Factor Analysis for Neuroscience Applications. 67-73 - Yongze Sun, Zhonghua Lu

:
Asynchronous Parallel Surrogate Optimization Algorithm Based on Ensemble Surrogating Model and Stochastic Response Surface Method. 74-84 - Shouyan Du, Yongze Sun, Yonghong Hu, Zhonghua Lu

:
Implementation of Markowitz Mean-Variance Model Based on Matrix-Valued Factor Algorithm. 85-89 - Si Liu, Yunxia Liu, Zipei Wang, Cong Feng, Hongguo Zhao:

Privacy Protection Oriented Video Data Hiding Method. 90-95 - Zhijie Han

, Huijuan Zhao, Ruchuan Wang:
Transfer Learning for Speech Emotion Recognition. 96-99 - Biao Wang, Juneui Yu, Shun Li, Guowei Bai:

The Research on Process Model of Automatic Generation of Political News Event Reports. 100-107 - Li-hua Yang, Hua Huang:

A Classification Method of Ancient Ceramics Based on Support Vector Machine in Ceramic Cloud Service Platform. 108-112 - Liehuang Zhu, Hui Dong, Meng Shen, Keke Gai

:
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing. 113-118 - Hai Wang

, Hao Jiang
, Jing Wu:
Data-Driven Uncertain Modeling and Optimization Approach for Heterogeneous Network Systems. 119-125 - Luqi Li, Hao Jiang

, He Nai:
Classification of Base Station Time Series Based on Weighted Adjustable-Parameter LPVG. 126-131 - Angxin Tong, Xiaojun Tang, Feng Zhang, Bin Wang, Wei Qiu, Leilei Xi:

Concentration Determination of Ternary Mixtures in Water using Ultraviolet Spectrophotometry and Artificial Neural Networks. 132-137 - Feng Zhang, Xiaojun Tang, Angxin Tong, Bin Wang, Leilei Xi, Wei Qiu:

Using Least Squares Support Vector Machine and Polynomial Partial Least Squares Method Quantitative Analysis of Gases in Mines. 138-143 - Kaihua Hu, Huang Hua, Yujing Zhang:

Research On 3d Interactive Model Selection And Customization Of Ceramic Products Based On Big Data Cloud Service Platform. 144-148 - Shuang Chen, Wei Hu, Zhenhao Li:

High Performance Data Encryption with AES Implementation on FPGA. 149-153 - Ningwei Li, Hang Gao, Liang Liu, Fan Zhang, Wenxuan Wang:

Attack Models for Big Data Platform Hadoop. 154-159 - Hua Huang, Yilai Zhang, Min Zhang:

Research on Cloud Workflow Engine Supporting Three-Level Isolation and Privacy Protection. 160-165 - Xiaoyun Yu, Xin Li, Jidong Li, Keke Gai

:
A Geographical Behavior-Based Point-of-Interest Recommendation. 166-171 - Anqi Teng, Lizhi Peng, Yuxi Xie, Haibo Zhang

, Zhenxiang Chen:
Imbalanced Data Gravitation Classification Model Using For Internet Video Traffic Identification. 172-177 - Xia Lei, Wei Liang

, Kuan-Ching Li
, Haibo Luo, Jianqiang Hu, Jiahong Cai, Yanting Li:
A New Multilevel Circuit Partitioning Algorithm Based on the Improved KL Algorithm. 178-182 - Huijuan Zhao, Ping Wang:

A Short Review of Age and Gender Recognition Based on Speech. 183-185 - Huijuan Zhao, Zhijie Han, Ruchuan Wang:

Speech Emotion Recognition Based on Multi-Task Learning. 186-188 - Xiaoyu Du

, Zhijie Han
, Yinhe Huangfu:
A Summary of Hamiltonian Based on Data Center Network. 189-191 - Di Ao, Ruisheng Shi, Lina Lan, Yueming Lu:

On the Large-Scale Traffic DDoS Threat of Space Backbone Network. 192-194 - Nandita Sengupta:

Designing Security System for IoT. 195-199 - Sudeep Kumar, Deepak Kumar Vasthimal:

Raw Cardinality Information Discovery for Big Datasets. 200-205 - Shubbhi Taneja, Yi Zhou, Ajit Chavan, Xiao Qin

:
Improving Energy Efficiency of Hadoop Clusters using Approximate Computing. 206-211 - Yu Feng, Yue Pan, Bo Zhu, Yuchuan Deng, Jing Wu, Hao Jiang

:
A New Framework for Network Flow Queuing Delay Prediction Based on Stream Computing. 212-217 - Shuo Li, Zhonghua Lu

, Yongze Sun, Sungen Deng, Beifang Niu:
Distributed Parameter Optimization Scheduling Strategy and System Design Based on Mesos. 218-224 - Gabriel Iuhasz

, Dana Petcu
:
Perspectives on Anomaly and Event Detection in Exascale Systems. 225-229 - Deepak Kumar Vasthimal, Pavan Kumar Srirama, Arun Kumar Akkinapalli:

Scalable Data Reporting Platform for A/B Tests. 230-238 - Grieshma Unnikrishnan, Deepa Mathew, Bijoy Antony Jose, Raju Arvind:

Hybrid Route Recommender System for Smarter Logistics. 239-244 - Zhaojun Wang, Jiaxin Huang, Sisi Gong, Jing Wu, Hao Jiang

:
Handoff Mechanism Considering Growth Benefit for LEO Satellite and Terrestrial Hybrid Network. 245-250 - Shaojie Luo, Lichen Zhang, Nannan Guo:

Architecture of Cyber-Physical Systems Based on Cloud. 251-257 - Erick Skorupa Parolin, Sayeed Salam, Latifur Khan

, Patrick T. Brandt
, Jennifer S. Holmes:
Automated Verbal-Pattern Extraction from Political News Articles using CAMEO Event Coding Ontology. 258-266 - Qais Saif Qassim

, Abdul Rahim Ahmad
, Roslan Ismail, Asmidar Abu Bakar, Fiza Abdul Rahim
, Mohd Zin Mokhtar, Ramona Ramli
, Busyra Mohd Yusof, Mohammed Najah Mahdi
:
An Anomaly Detection Technique for Deception Attacks in Industrial Control Systems. 267-272 - Md Ariful Haque, Sachin Shetty

, Bheshaj Krishnappa:
ICS-CRAT: A Cyber Resilience Assessment Tool for Industrial Control Systems. 273-281 - Abbas M. Al-Ghaili

, Fiza Abdul Rahim
, Feninferina Azman, Hairoladenan Kasim:
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications. 282-287 - Yi Zeng, Meikang Qiu, Dan Zhu, Zhihao Xue, Jian Xiong, Meiqin Liu:

DeepVCM: A Deep Learning Based Intrusion Detection Method in VANET. 288-293 - Yifan Shu, Qian Xu, Peng Ke:

Capturing Real World Derived Information Relevancies In XML. 294-299 - Shizhao Wang, Chunhe Xia, Tianbo Wang:

A Novel Intrusion Detector Based on Deep Learning Hybrid Methods. 300-305 - Suntherasvaran Murthy, Asmidar Abu Bakar, Fiza Abdul Rahim

, Ramona Ramli
:
A Comparative Study of Data Anonymization Techniques. 306-309 - Wajid Hassan

, Te-Shun Chou, Leslie R. Pagliari, John Pickard, Tamer Omar
:
Is Public Cloud Computing Adoption Strategically the Way to Go for All the Enterprises? 310-320 - He Nai, Hao Jiang

:
Time Series Identification Method for Extracting Structural Features. 321-327 - Mohd Alif Erfan Mohd Efendi, Zul-Azri Ibrahim, Md Nabil Ahmad Zawawi, Fiza Abdul Rahim

, Nor' Azuwa Muhamad Pahri, Anuar Ismail:
A Survey on Deception Techniques for Securing Web Application. 328-331

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














