default search action
10th BigDataSecurity 2024: New York, NY, USA
- 10th IEEE Conference on Big Data Security on Cloud, BigDataSecurity 2024, New York City, NY, USA, May 10-12, 2024. IEEE 2024, ISBN 979-8-3503-8952-4
- Bhavani Thuraisingham, Kim Nimon, Latifur Khan:
An Education Program for Big Data Security and Privacy. 1-4 - Dongfeng Lv, Manman Ma, Hanxia Dong, Yishan Shang, Kuo Bao:
Anomaly Detection in Multivariate Time Series with Contaminated Training Data Using VAE. 5-10 - Zhouji Wang, Xinyue Lu, Kui Li, Wei Gong:
A Low-Cost Positioning Beacon in Rail Transit System. 11-16 - Shuyi Li, Pengyu Zhang, Xueyang Liu, Wenhui Hu:
Test Case Recommendation for Blockchain Systems Based on Graph Convolutional Networks. 17-22 - Wenjia Wang, Seyed Masoud Sadjadi, Naphtali Rishe:
A Survey of Major Cybersecurity Compliance Frameworks. 23-34 - Yingying Cai, Wenhui Hu, Xueyang Liu, Haoxuan Wang, Xiankui Zhang, Jiaxi Wang:
User Dual Intents Graph Modeling for Information Diffusion Prediction. 35-40 - Luxiu Yin, Qihui Huang, Xuanya Wang, Wei Liang, Chun Wang:
Towards Privacy Protection: A Non-Invasive Human Detection Method via Edge-Cloud Collaboration. 41-46 - Beihu Wu, Hao Tian, Xueyang Liu, Wenhui Hu, Chen Yang, Shuyi Li:
Sarcasm Detection in Chinese and English Text with Fine-Tuned Large Language Models. 47-51 - Xinyi Yang, Kaipei Li, Jie Tian:
A Dance Emotion Recognition Method Based on Movement Analysis and Federated Learning in Edge-Cloud Hybrid Environments. 52-57 - Yong Lin, Peng Jiang, Keke Gai, Liehuang Zhu:
Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification. 58-65 - Chen Yang, Xueyang Liu, Shuyi Li, Wenhui Hu, Beihu Wu, Hao Tian:
Temporal Analysis and Prediction of Marriage Registration Figures Based on Long-Term Time Series Models. 66-70 - Taolei Shi, Wei Gong:
A Survey of Bluetooth Indoor Localization. 71-77 - Fangming Jing, Chen Yang, Shuyi Li, Xueyang Liu, Wenhui Hu:
Precision Assistance for Residents with Subsistence Allowance: Cluster Analysis of Mixed-Type Data Based on K-Prototypes. 78-83 - Xiaohui Wei, Mengting Zhou, Nan Jiang, Hengshan Yue:
Evaluating the Soft Error Resilience of Graph Applications on GPGPUs. 84-89 - Shizhong Li, Wei Zhang, Ruonan Chen, Dawei Li:
A Distributed Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in IoT. 90-95 - Jingnian Liu, Wei Liang, Yuxiang Chen, Kai Jin:
SyNet: Medical image anomaly detection with noise synthesis network. 96-100 - Xiangyun Qian, Rui Zhang, Zi Kang, Hui Xia:
An Invisible Backdoor Attack on Cloud Computing in the Internet of Things. 101-106 - Ming Chen, Sen Yang, Wenbo Dai, Zisheng Wang, Jun Xu:
A Method for Anomaly Detection in Power Energy Topology Graph Data Based on Domain Knowledge Graph and Graph Neural Networks. 107-112 - Wei Yu, Jianguo Qian, Ranyue Xu, Chenxing Jin, Haina Fang, Xianhai Shi:
Improving Substation Network Security with DevSecOps and AIOps. 113-118 - Zijun Wang, Hongchen Guo, Keke Gai:
Decision Tree-based Privacy Protection in Federated Learning: A Survey. 119-124 - Chen Jiang, Mengxian Chen, Huasen Xie, Hua Wang, Jun Xu:
A Method for Anomaly Detection in Power Time Series Data within Energy Big Data Based on Generative Adversarial Networks. 125-129 - Xintian Ren, Jun Wu, Hansong Xu, Xiuzhen Chen:
Diffusion Model Based Secure Semantic Communications with Adversarial Purification. 130-134 - Mengyuan Zhang, Yingying Zhao, Yingjie Tian:
Research on Production Capacity Utilization Index Based on Electricity Big Data. 135-138 - Haozhe Chai, Jun Wu, Qianqian Pan, Xinzheng Feng:
Sound-LDR Sensors Empowered Secure True Random Number Generator for PoS Consensus in Blockchain. 139-144 - Guohao Cui, Hao Wang, Wentao Hao, Xiaoyi Zhou:
OT24: Optical color image encryption based on Two-dimensional quantum walks and 24-bit-plane permutation. 145-149 - Yanlu Li, Yufeng Xiao, Yinyan Gong, Ronglin Zhang, Yingzi Huo, Yanbing Wu:
Explainable AI: A Way to Achieve Trustworthy AI. 150-155 - Wenjing Xu, Yulun Song, Haochen Liang, Lin Sun, Yunlong Xie:
A Blockchain-Based Identity Control Scheme for Cross-Organizational Data Sharing. 156-160 - Chuangchuang Dai, Haodong Li, Lei Guan, Mingbo Chi:
Industrial Internet of Things (IIoT) Identity Resolution Techniques: A Review. 161-166 - Qianqian Pan, Jun Wu:
AI-Finger: From Physical Unclonable Function to AI-Hardware Fingerprint. 167-172 - Ranyue Xu, Wei Yu, Hao Huang, Yongchun Pan, Chen Zhou, Gang Zheng:
Enhancing Cybersecurity in Power Substations through Active Immune Detection and Low-Load Network Security Risk Intelligence Platform. 173-178
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.