default search action
19th EUC 2021: Shenyang, China
- Shaohua Wan, Xiaochun Cheng, Celimuge Wu:
19th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2021, Shenyang, China, October 20-22, 2021. IEEE 2021, ISBN 978-1-6654-0036-7 - Chengyi Yang, Feng Liu, Siyuan Shen, Jiayin Qi:
An Energy-aware Approach with Spectrum Detection in Wireless Sensor Networks. 1-7 - Benze Wu, Yirui Wu, Shaohua Wan:
An Image Enhancement Method for Few-shot Classification. 1-7 - Hongyu Wang, Xiaolei Tang, Liming Sheng, Wenqiang Li, Jun Shen, Jun Tao:
scList: A PCRAM-based Hybrid Memory Management Scheme. 1-7 - Qiran Kong, Yirui Wu, Shaohua Wan:
PolarText: Single-stage Scene Text Detection with Polar Representation. 1-8 - Marouene Boubakri, Fausto Chiatante, Belhassen Zouari:
Open Portable Trusted Execution Environment framework for RISC-V. 1-8 - Qi Tang, Jiachen Shen, Zhenfu Cao, Xiaolei Dong:
PSSBP: A Privacy-preserving Scope-query Searchable Encryption Scheme Based on Blockchain for Parking Lots Sharing in Vehicular Networks. 1-8 - Jonathan Oliver, Josiah Hagen:
Designing the Elements of a Fuzzy Hashing Scheme. 1-6 - Xiao Li, Yufeng Wang, Jianhua Ma, Qun Jin:
VFAT: A Personalized HAR Scheme Through Exploiting Virtual Feature Adaptation Based on Transfer Learning. 1-8 - Haining Meng, Wei Li, Wenjiang Ji, Yi Zheng, Xinyu Tong, Xinhong Hei:
Forecasting the Track Irregularity of High-speed Railway based on a WT-GA-GRU Model. 8-14 - Ryota Shimomura, Hiroshi Oyama, Takuya Azumi:
Dynamically Interchangeable Framework for Component Behavior of Embedded Component Systems. 15-22 - Xiaotong Wu, Xiaolong Xu, Shaohua Wan, Lianyong Qi:
Private Estimation of Symptom Distribution for Infectious Disease Analysis in Edge Computing. 31-38 - Nang Hung Nguyen, Phi Le Nguyen, Hieu Dinh, Thanh-Hung Nguyen, Kien Nguyen:
Multi-Agent Multi-Armed Bandit Learning for Offloading Delay Minimization in V2X Networks. 47-55 - Weihui Qiu, Xin Yang, Ming Wei, Wei Ren, Tianqing Zhu:
A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks. 56-63 - Zhijun Wu, Jia Nie, Yue Yin, Hui Wang:
Verified CSAC-Based CP-ABE Access Control of Cloud Storage in SWIM. 72-78 - Cong Wang, Yunhe Cui, Qing Qian, Guowei Shen, Hongfeng Gao, Saifei Li:
METER: An Ensemble DWT-based Method for Identifying Low-rate DDoS Attack in SDN. 79-86 - Bahman A. Sassani Sarrafpour, Abdulaziz Alomirah, Shaning Pang, Soshian Sarrafpour:
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks. 87-94 - Waleed Bin Shahid, Haider Abbas, Baber Aslam, Hammad Afzal, Saad Bin Khalid:
A Framework to Optimize Deep Learning based Web Attack Detection Using Attacker Categorization. 95-101 - Hendrik Meyer zum Felde, Mathias Morbitzer, Julian Schütte:
Securing Remote Policy Enforcement by a Multi-Enclave based Attestation Architecture. 102-108 - Bahman A. Sassani Sarrafpour, Reem A. Alomirah, Soshian Sarrafpour, Hamid Sharifzadeh:
An Adaptive Edge-Based Steganography Algorithm for Hiding Text into Images. 109-116 - Muhammad Zia, Muhammad Faisal Amjad, Haider Abbas, Zafar Iqbal, Anique Azhar, Ahsan Yasin, Hasan Iesar:
A Systematic Evaluation of Android Anti-Malware Tools for Detection of Contemporary Malware. 117-124 - Lin Yao, Jia Li, Guowei Wu, Bin Wu:
New Dynamic Switch Migration Technique Based on Deep Q-learning. 125-130 - Yunting Tao, Fanyu Kong, Jia Yu, Qiuliang Xu:
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem. 131-136 - Yupeng Wang, Xin Zhou, Xinyue Fan:
A Q- Learning based Routing Optimization Model in a Software Defined Network. 143-150 - Xuebiao Yuchi, Zhiwei Yan, Kejun Dong, Hongtao Li, Guanggang Geng, Sachin Shetty:
Dealing with the Domain Name Abuse: Issues and Approaches. 166-173 - Samar Ben Ammar, Mario G. C. A. Cimino, Pierfrancesco Foglia, Federico A. Galatolo, Issam Nouiri:
Multi-objective optimization of water distribution networks via NSGA-II and Pseudo-Weights. 181-186 - Asif Raza Kazmi, Mehreen Afzal, Haider Abbas, Shahzaib Tahir, Abdul Rauf:
Is Blockchain Overrated? 187-192 - Junwei Tang, Ruixuan Li, Zhiqiang Xiong, Hongmu Han, Xiwu Gu:
Detecting Privacy Leaks in Android Hybrid Applications Based on Dynamic Taint Tracking. 193-200 - Benze Wu, Yirui Wu, Shaohua Wan:
A Image Enhancement Method for Few-shot Classification. 201-207
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.