


default search action
CyberC 2020: Chongqing, China
- International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2020, Chongqing, China, October 29-30, 2020. IEEE 2020, ISBN 978-1-7281-8448-7

- Changxiang Shen, Lei Zhang, David Mitchel Perry, Guangyi Liu:

Establish a scientific concept of network security and build a strong defense line of network security. xxix-xxxi - Yuxiang Chen, Jian Bai, Yao Hao, Sijie Liao, Zhongqiang Yi, Hao Zhang:

Blockchain-based Dynamic Group Management for Multiple Keywords Searchable Encryption Technology. 1-6 - Yang Tan

, Wei Li, Juan Yin, Yun Deng:
A universal decentralized authentication and authorization protocol based on Blockchain. 7-14 - Dominik Welte, Axel Sikora, Daniel Schönle

, Jan Stodt
, Christoph Reich
:
Blockchain at the Shop Floor for Maintenance. 15-22 - Haochen Yang

, Guanghui Wang, Zhonghao Zhai, Xin He:
Towards Decentralized Trust Management Using Blockchain in Crowdsourcing Networks. 23-28 - Yassin M. Thibodeau Hafid, Dimitrios Makrakis, Etienne Elie:

An Ethereum-based Energy Trading Protocol (EETP). 29-34 - Siyuan Zhang, Chaoming Du:

Semi-Supervised Deep Learning based Network Intrusion Detection. 35-40 - Guohang Lu, Yi Liu, Yifei Chen, Chengwei Zhang, Yayu Gao, Guohui Zhong:

A Comprehensive Detection Approach of Wannacry: Principles, Rules and Experiments. 41-49 - Jingzhong Wang, Yue Zhang, Haibin Li:

Electronic voting protocol based on ring signature and secure multi-party computing. 50-55 - Yuxin Sun, Yingzhou Zhang, Linlin Zhu:

An Anti-Collusion Fingerprinting based on CFF Code and RS Code. 56-63 - Si Liao, Chenming Zhou, Yonghui Zhao, Zhiyu Zhang, Chengwei Zhang, Yayu Gao, Guohui Zhong:

A Comprehensive Detection Approach of Nmap: Principles, Rules and Experiments. 64-71 - Meng Zhao, Yong Ding, Yujue Wang, Huiyong Wang, Bo Han:

Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications. 72-75 - Chuang Ma, Haisheng You, Li Wang, Jiajun Zhang:

Intelligent Cybersecurity Situational Awareness Model Based on Deep Neural Network. 76-83 - Chuang Ma, Jiajun Zhang, Li Wang, Haisheng You:

Network Attack Detection Based on Kernel Principal Component Analysis and Decision Tree. 84-91 - Jianbo Huang, Liang Chang, Long Li, Xuguang Bao:

An Adaptive Dummy-based Mechanism to Protect Location Privacy in Smart Health Care System. 92-97 - Ying Fang, Tianlong Gu, Liang Chang, Long Li:

Algebraic Decision Diagram-Based CP-ABE with Constant Secret and Fast Decryption. 98-106 - Jinlong Chen, Lei Huang:

Single High-Value Region Detection Based on Image Equal-Segmentation. 107-113 - Xia Huang:

An Image Data Query Algorithm Based on Ontology and Singular Value Decomposition. 114-119 - Haini Zeng, Deli Chen:

Image encryption algorithm based on Logistic-Sine compound chaos. 120-123 - Yang Tao:

A VR/AR-based Display System for Arts and Crafts Museum. 124-129 - Yanru Zhong, Leixian Zhao, Chaohao Jiang, Zhaorong He, Xiaonan Luo:

A Semi-Supervised Feature Fusion Method for Sentence Similarity Matching. 130-137 - Zhaorong He, Xiaonan Luo, Yanru Zhong, Chaohao Jiang, Leixian Zhao:

Information Extraction Method based on Dilated Convolution and Character-Enhanced Word Embedding. 138-143 - Li Zhen, Yang Zengchun:

Open Entity Semantic Relation Extraction in Big Data Environment. 144-151 - Yu Wu, Zhenni Zhao, Jie Yang, Yijun Lin:

Weibo Sentiment Classification Based on Two Channels Text Convolution Neural Network with Multi-Feature. 152-160 - Li Zhen:

Research on Open Entity Semantic Relation Extraction in Big Data Environment. 161-168 - Fulian Yin, Xueying Shao, Yifan Zhang, Xiaowei Zhu:

Classification and Characteristics analysis with Dynamic Model on Public Opinion in the Chinese Sina-microblog. 169-175 - Fengcai Qiao, Jinsheng Deng, Li Wei:

An Online Framework for Temporal Social Unrest Event Prediction Using News Stream. 176-182 - Fulian Yin, Sitong Li, Xiaowei Liu, Lingyao Zhu, Wenhui Yu:

A Hierarchical Participant Classification Model of Hot Events in Chinese Microblog. 183-189 - Jindan Tan, Liang Chang, Tieyuan Liu, Xuemei Zhao:

Attentional Autoencoder for Course Recommendation in MOOC with Course Relevance. 190-196 - Yan Zhang, Liang Chang, Tieyuan Liu:

MOOCs Dropout Prediction Based on Hybrid Deep Neural Network. 197-203 - Zelu Kang, Nong Xiao, Zhiguang Chen, Yang Ou, Xinming Li:

An Improved Parallel SVM Algorithm on Distributed System. 204-209 - Muhammad Mufti Ramadhan, Budhi Irawan, Casi Setianingsih:

Translation Russian Cyrillic to Latin Alphabet using Random Forest Algorithm. 210-213 - Robert Kelley, Antara Debnath Antu, Anup Kumar, Bin Xie:

Choosing the Right Compute Resources in the Cloud: An analysis of the compute services offered by Amazon, Microsoft and Google. 214-223 - Xi Shen, Yingzhou Zhang, Tianqi Wang, Yuxin Sun:

Relational Database Watermarking for Data Tracing. 224-231 - Chonghui Ge, Yunlong Di, Yuxin Sun, Yongjin Zhu, Linfeng Xie, Yingzhou Zhang:

A Database Collusion Detection and Measurement Based on Bloom Filter. 232-238 - Chonghui Ge, Jian Sun, Yuxin Sun, Yunlong Di, Yongjin Zhu, Linfeng Xie, Yingzhou Zhang:

Reversible Database Watermarking Based on Random Forest and Genetic Algorithm. 239-247 - Xiaowen Feng, Pengcheng Deng, Yanzi Yi, Qi Yu, Decun Luo, Hua Deng, Yujue Wang:

Verifiable Decentralized Access Control for Distributed Databases. 248-253 - Maolin Shen, Yingzhou Zhang, Yunlong Di, Yuxin Sun:

Database Traceability Algorithm Based On Zero Watermark. 254-259 - Wei Wei:

Research on Index Scheme of Encrypted XML Data Structure. 260-263 - Kou Lu, Jiajing Zhao, Jianming Zhang, Cheng Qin:

Multiple Kernel Learning via Ensemble Artifice in Reproducing Kernel Hilbert Space. 264-267 - Junliang Wang, Kaiyou Yuan, Zehan Shi:

Multi-grained rough set in job guidance for college graduates. 268-271 - Jinrui Gan, Peng Wu, Guoliang Zhang, Shiwen Dong, Zhaogang Han, Weiwei Liu:

Intelligent Fault Diagnosis with Deep Architecture. 272-275 - Tinghui Huang, Sijun Li, Xinyu Gao:

Computing Resource Allocation and Offloading Method based on Simulated Annealing Algorithm. 276-282 - Bo Jiao:

Evaluating the Structural Model using Internet Interdomain Topological Datasets. 283-286 - Wei Wang, Tieyuan Liu, Liang Chang, Tianlong Gu, Xuemei Zhao:

Convolutional Recurrent Neural Networks for Knowledge Tracing. 287-290 - Yingchen Su, Yinna Ye

:
Daily Passenger Volume Prediction in the Bus Transportation System using ARIMAX Model with Big Data. 291-300 - Jin Dai, Jiayao Li:

News Influence Model Based on Neural Network. 301-308 - Jin Dai, Haichuan Liu, Qirui Zhang:

One Class Support Vector Machine Active Learning Method for Unbalanced Data. 309-315 - Xia Sun, Chen Yin:

Utility Function based Power Control Scheme in Femtocell Network. 316-320 - Weifeng Lu, Zhihao Ren, Jia Xu, Siguang Chen:

Cooperative Jamming Algorithm Based on Trust Update. 321-324 - Runze Dong, Buhong Wang, Tianhao Cheng:

Security Performance Analysis of Physical Layer for UAV Swarm Networks. 325-330 - Shengnan Chen, Liang Qian:

A Reliable and Efficient Distributed Semantic Discovery Mechanism for Mobile P2P Networks. 331-334 - Milembolo Miantezila

, Bin Guo, Chenjie Zhang, Xuemei Bai:
Primary User Channel State Prediction Based on Channel Allocation and DBHMM. 335-338 - Jin Dai, Xianjing Zhao, Xingxing Zhou, Qirui Zhang:

Research on Data Fusion Scheme of WSNs Based on DGM Prediction Model. 339-347 - Bobo Yin, Ning Wang, Yajun Fan, Xiaofang Sun, Danping He, Wenhao Liu:

Evaluation of TDM-based Integrated Access and Backhaul Schemes for 5G and Beyond at mmWave Band. 348-353 - Wenkao Yang, Wei Zhang:

Real-time Traffic Signs Detection Based on YOLO Network Model. 354-357 - Chengchang Wan, Xinghui Cao, Wei Wu, Chen Wang:

Ocean Sound Velocity Estimation Based on RBF Neural Networks. 358-361 - Xiaosu Tan, Qingqin Luo, Shuang Yang, Yulian Jiang:

Hand-assisted rehabilitation robot based on human-machine master-slave motion mode. 362-365 - Hanzhong Tan:

Line inspection logistics robot delivery system based on machine vision and wireless communication. 366-374 - Hung-Chang Chang, Chen-Yi Lin, Da-Jyun Liao, Tung-Ming Koo:

The Modbus Protocol Vulnerability Test in Industrial Control Systems. 375-378 - Yanbin Sun, Jianmei Zhou, Shanshan Chen, Xiangkai Zeng, Xia Sun:

Signal processing for extracting velocity information from spatial filtering signals. 379-383

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














