default search action
7th BigDataSecurity/HPSC/IDS 2021: New York City, NY, USA
- 7th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021, New York City, NY, USA, May 15-17, 2021. IEEE 2021, ISBN 978-1-6654-3927-5
- Aidong Xu, Tao Wu, Yunan Zhang, Zhiwei Hu, Yixin Jiang:
Graph-Based Time Series Edge Anomaly Detection in Smart Grid. 1-6 - Dae-young Kim, Karuna P. Joshi:
A Semantically Rich Knowledge Graph to Automate HIPAA Regulations for Cloud Health IT Services. 7-12 - Wei Peng, Yonglu Li, Huifang Liu, Xiuping Ouyang, Min Lin, Lixia Li, Ying Wang, Zhijie Chen, Haining Ye, Ziwen Peng:
Community Detection of Mobile Internet Delivery Users. 13-19 - Zhuoyi Wang, Yu Lin, Yifan Li, Feng Mi, Zachary Tian, Latifur Khan, Bhavani Thuraisingham:
Unsupervised Perturbation based Self-Supervised Adversarial Training. 20-25 - Shuang Xie, Yujie Hong, Xiangdie Wang, Jie Shen:
Research on Data Security Technology Based on Blockchain Technology. 26-31 - Shuyu Chen, Mingyue Xie, Jun Liu, Yunan Zhang:
Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTS. 32-37 - Ankur Nagar, Lavanya Elluri, Karuna Pande Joshi:
Automated Compliance of Mobile Wallet Payments for Cloud Services. 38-45 - Xiaoyan Chen, Jiangling Ge, Wei Huang:
Research on Big Data Value Creation System Applied to CPS. 46-51 - Ziheng Zhou, Lin Li, Xu Zhao:
Webshell Detection Technology Based on Deep Learning. 52-56 - Wenyi Yang, Wenhui Hu, Yingjie Liu, Yu Huang, Xueyang Liu, Shikun Zhang:
Research on Bootstrapping Algorithm for Health Insurance Data Fraud Detection Based on Decision Tree. 57-62 - Hong Guo, Yining Li, Fang Liu, Wei Hu:
Machine-Learning based MOOC learning data analysis. 63-68 - Sherifdeen Lawal, Ram Krishnan:
Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study. 69-74 - Zhijun Wu, Weihang Cui, Pan Gao:
Filtration method of DDoS attacks based on time-frequency analysis. 75-80 - Fatema Rashid, Ali Miri:
User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection. 81-86 - Qiang Wang, Jiawei Jiang, Yongxin Zhao, Weipeng Cao, Chunjiang Wang, Shengdong Li:
Algorithm selection for software verification based on adversarial LSTM. 87-92 - Yi Hua, Zhangbing Li, Hankang Sheng, Baichuan Wang:
A Method for Finding Quasi-identifier of Single Structured Relational Data. 93-98 - Xiaoqi Liao, Hang Li, Xing Li, Pengyu Zhang, Yu Huang, Chunmei Wang:
An Automatic and Unified Consistency Verification Rule and Method of SG-CIM Model. 99-104 - Hong Guo, Tianyi Liu, Fang Liu, Yining Li, Wei Hu:
Chinese Text Classification Model Based On Bert And Capsule Network Structure. 105-110 - Yizhong Liu, Yu Xia, Jianwei Liu, Yiming Hei:
A Secure and Decentralized Reconfiguration Protocol For Sharding Blockchains. 111-116 - Yihang Gao, Peng Su, Hui Zhao, Meikang Qiu, Meiqin Liu:
Research on Sentiment Dictionary Based on Sentiment Analysis in News Domain. 117-122 - Lei Zhang, Meng Ma, Ping Wang:
Zero-shot Question Generation: Accelerate the Development of Domain-specific Dialogue System. 123-128 - Jun Liu, Sule Tang, Chuang Ma, Sishi Qin, Wei Li, Aidong Xu:
A community detection algorithm based on discrete mixed fruit fly optimization. 129-134 - Sudiksha Das:
A Smart Solution with Ignition Interlock Device to Prevent Drunk-Driving Accidents. 135-140 - Qiaohong Wu, Weidong Xiao, Xiaoke Hu, Peiyuan Zhu, Xihua Chen:
A Data Privacy and Authentication Scheme Based on Internet of Vehicles. 141-145 - Xiao Chen:
Energy-efficient Smart Parking for Self-driving Vehicles. 146-150 - Han Deng, Zhechon Wang, Yazhen Zhang:
Overview of Privacy Protection Data Release Anonymity Technology. 151-156 - Jack D'Agostino, Gökhan Kul:
Toward Pinpointing Data Leakage from Advanced Persistent Threats. 157-162 - Xiaoyan Chen, Weidong Xiao, Weijiang Zhang, Qifeng Xie, Sujuan Zhang:
Research on Secret Sharing Scheme in CPS Environment. 163-168 - Alan Hong, Weidong Xiao, Jiangling Ge:
Big Data Analysis System Based on Cloudera Distribution Hadoop. 169-173 - Han Deng, Fei Fang, Juan Chen, Yazhen Zhang:
A Cloud Data Storage Technology for Alliance Blockchain Technology. 174-179 - Zihan Zhang, Jianfei Jiang, Weiguang Sheng, Qin Wang, Zhigang Mao, Naifeng Jing:
A Mapping Method for Reconfigurable Array based on Decoupled DataFlow. 180-185 - Angel Castro, Alexander Perez-Pons:
Virtual Assistant for Forensics Recovery of IoT Devices. 186-190 - Xiyue Liu, Xin Feng, Pan Pan:
GANN: A Graph alignment neural network for video partial copy detection. 191-196 - Daniyar Sultan, Shynar Mussiraliyeva, Aigerim Toktarova, Marat Nurtas, Zhalgasbek Iztayev, Lyazzat Zhaidakbaeva, Lazzat Shaimerdenova, Oxana Akhmetova, Batyrkhan Omarov:
Cyberbullying and Hate Speech Detection on Kazakh-Language Social Networks. 197-201 - Yue Wang, Xinlian Zhou, Shiwen Zhang, Weihong Huang:
Human Mobility Model in Mission-oriented Opportunistic Networks. 202-207 - Griffith Samore, Jonah Bates, Xiao Chen:
Improving Satisfaction in Crowdsourcing Platforms. 208-213
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.