default search action
13th SpaCCS Workshops 2020: Nanjing, China
- Guojun Wang, Bing Chen, Wei Li, Roberto Di Pietro, Xuefeng Yan, Hao Han:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12383, Springer 2021, ISBN 978-3-030-68883-7
The 11th International Workshop on Trust, Security and Privacy for Big Data (TrustData 2020)
- Lei Wei, Weiwei Miao, Zeng Zeng, Hesheng Sun, Zhuzhong Qian:
EDC: An Edge-Oriented Dynamic Resource Configuration Strategy. 3-14 - Muhammad Sohaib Yousaf, Shazia Riaz, Saqib Ali, Shuhong Chen, Guojun Wang:
The Future Prospects of Adversarial Nets. 15-26 - Manchao Zhang, Hong Zhu, Kai Jiang:
Secure Cross-Domain Data Sharing Technology Based on Blockchain. 27-38
The 10th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2020)
- Yang Dai, Songyun Wang, Xilong Wang, Xin Li:
Microservice-Oriented Edge Server Deployment in Cloud-Edge System. 41-52 - Kaidi Wu, Lei Wang, Huijie Li, Xin Li:
QoS-Aware Dynamical Resource Scheduling in Cloud Data Centers. 53-64 - Ruizhe Qin, Hao Han:
BinSEAL: Linux Binary Obfuscation Against Symbolic Execution. 65-76 - Muhammad Arif, Jianer Chen, Pin Liu, Guojun Wang:
Location Based Communication Privacy in Internet of Vehicles Using Fog Computing. 77-90
The 9th International Symposium on Security and Privacy on Internet of Things (SPIoT 2020)
- Norbert Tihanyi, Bertalan Borsos:
The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments. 93-107 - Abdelrhman Hassan, Rashad Elhabob, Umar Ibrahim, Yong Wang:
Efficient Public Key Cryptography Scheme with Equality Test for Heterogeneous Systems in IIoT. 108-121 - Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt:
The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services. 122-136 - Yongzhong Li, Shipeng Zhang, Yi Li:
Study of Transparent File Encryption Technology on Android Platform. 137-145 - Tong Ye, Yi Zhuang:
SCPAC: An Access Control Framework for Diverse IoT Platforms Based on OAuth2.0. 146-157
The 6th International Symposium on Sensor-Cloud Systems (SCS 2020)
- Xiaotian Gong, Lijuan Sun, Jian Zhou, Juan Wang, Fu Xiao:
Adaptive Routing Strategy Based on Improved Q-learning for Satellite Internet of Things. 161-172 - Zhe Wang, Mingxia Zhu, Hongda Zhao:
Reliability Evaluation of Sensor Network Based on Information Entropy in Power Grid Planning. 173-180 - Hongda Zhao, Zhe Wang, Mingxia Zhu, Zhongmin Shi, Zhen Wang, Xianli Wu:
Intelligent Fault Diagnosis and Response Method Based on GIS and IoT in Power Grid Planning. 181-190 - Yong Ding, Hui Xu, Yujue Wang:
Group Authentication for Sensors in Wireless Body Area Network. 191-199 - Qingli Hu, Jianqiang Hu, Xiaoyan Yu, Yang Liu:
Automatic Heart Sound Classification Using One Dimension Deep Neural Network. 200-208 - Jingbo Xia, Yaoxiang Wu, Xiaofu Du:
Indoor Positioning Technology Based on the Fusion of UWB and BLE. 209-221 - Mande Xie, Xiaowei Sheng, Jun Shao, Guoping Zhang, Yingying Ruan:
A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms. 222-232 - Liang Song, Haibin Chen, Hejiao Huang, Hongwei Du:
Multi-echelon Vehicle Routing Problem in Sensor-Cloud Architecture with Mobile Sinks. 233-244 - Jingyao Liu, Guangsheng Feng, Liying Zheng, Zihan Gao:
Joint Optimization of Transmission Source Selection and RSU Cache for Vehicular Video Streaming. 245-256 - Tianpeng Deng, Xuan Li, Biao Jin, Jinbo Xiong:
Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection. 257-268 - Feichou Kou, Fan Zhang:
Stepwise-Refined Interval for Deep Learning to Process Sensor-Cloud Data with Noises. 269-280 - Gaocai Wang, Hengyi Huang, Ruijie Pan:
Data Prediction Service Model Based on Sequential Pattern Mining in Sensor-Cloud. 281-293 - Yubing Qiu, Jianping Cai, Lan Sun, Zhenzhen Zhang, Yingjie Wu:
Statistical Method of Space Distribution for Riding Based on R-Tree Under Differential Privacy. 294-309 - Chongben Tao, Kangliang Lu, Feng Cao:
Multi-target Tracking with EmbedMask and LSTM Model Fusion. 310-320 - Xiaolin Jiang, Yu Xiang:
Face Detection Using Improved Multi-task Cascaded Convolutional Networks. 321-333 - Weijin Jiang, Sijian Lv:
Access Control Method Based on a Mutual Trust Mechanism in the Edge Computing Environment. 334-344 - Zengwei Zheng, Pengquan Yan, Yuanyi Chen, Jianping Cai, Fengle Zhu:
Increasing Crop Yield Using Agriculture Sensing Data in Smart Plant Factory. 345-356 - Gangqi Shu, Haibo Hong, Mande Xie, Jun Shao:
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment. 357-371 - Yuanyi Chen, Pengquan Yan, Zengwei Zheng, Dan Chen:
Identifying Traffic Bottleneck in Urban Road Networks via Causal Inference. 372-383 - Xiaohan Li, Ziyan Xie, Taotao Lai, Fusheng Zhao, Haiyin Xu, Riqing Chen:
NAS-WFPN: Neural Architecture Search Weighted Feature Pyramid Networks for Object Detection. 384-394 - Kai Qian, Yinqiu Liu, Yamin Han, Kun Wang:
Performance Benchmarking and Optimization for IIoT-oriented Blockchain. 395-406
The 2nd International Workshop on Communication, Computing, Informatics and Security (CCIS 2020)
- Dawei Liang, Meng Wu:
A Multi-patch Deep Learning System for Text-Independent Writer Identification. 409-419 - Qingmin Meng, Hao Zheng, Haiyan Guo:
Classification of Abnormal Traces in a Collaborative Fog Computing Architecture. 420-429 - Quan Sun, Yonghong Chen, Tian Wang:
A Muti-detection Method of Covert Timing Channel Based on Perceptual Hashing. 430-443 - Md Noman Bin Khalid:
Deep Learning-Based Dew Computing with Novel Offloading Strategy. 444-453 - Qi Zhang:
Detecting Credential Stuffing Between Servers. 454-464
The 1st International Workshop on Intelligence and Security in Next Generation Networks (ISNGN 2020)
- Lingxiao Zhang, Xuefeng Yan:
A Critical Node Detection Algorithm Based Node Interplay Model. 467-479 - Zheren Sun, Yuhua Huang, Wanlin Sun, Zhiyuan Chen:
A Posteriori Preference Multi-objective Optimization Using Machine Learning. 480-491 - Yuhua Huang, Shen Li, Wanlin Sun, Xuejun Dai, Wei Zhu:
HVH: A Lightweight Hash Function Based on Dual Pseudo-Random Transformation. 492-505 - Yuhua Huang, Wei Zhu, Wanlin Sun, Xuejun Dai, Shen Li:
SVHF: A Lightweight Stream Cipher Based on Feistel and OFB. 506-518 - Ting Yan, Dan Li:
A Novel Quantum Color Image Encryption Scheme Based on Controlled Alternate Quantum Walks. 519-530
The 1st International Symposium on Emerging Information Security and Applications (EISA 2020)
- Min Xiao, Zhe Xia:
Security Analysis of a Multi-secret Sharing Scheme with Unconditional Security. 533-544 - Stephan Marais, Marijke Coetzee, Frans F. Blauw:
Simultaneous Deauthentication of Equals Attack. 545-556 - Thomas Hanka, Matthias Niedermaier, Florian Fischer, Susanne Kießling, Peter Knauer, Dominik Merli:
Impact of Active Scanning Tools for Device Discovery in Industrial Networks. 557-572 - Wenjuan Li, Jiao Tan, Nan Zhu, Yu Wang:
Designing Double-Click-Based Unlocking Mechanism on Smartphones. 573-585 - Weijian Zhang, Chao Lin, Zhuo Lyu, Chen Cen, Min Luo:
An Efficient Blind Signature Scheme with Untraceability for Data Privacy in Smart Grid. 586-597
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.