


default search action
ISPA/BDCloud/SocialCom/SustainCom 2022: Melbourne, Australia
- IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, ISPA/BDCloud/SocialCom/SustainCom 2022, Melbourne, Australia, December 17-19, 2022. IEEE 2022, ISBN 978-1-6654-6497-0

- Willy Susilo:

Keynote Speech. xxv - Ana Carolina Costa César, Gabriela da Gama Pivetta, Fabiana Freitas Mendes:

GreenGame: Solving the climate crisis in a Game to actually take action in real life. 1-8 - Liang Liu, Silin Peng:

Detection of A Novel Dual Attack in Named Data Networking. 1-8 - Baoke Li, Cong Cao

, Fangfang Yuan
, Yanbing Liu
, Baohui Li, Binxing Fang:
EPGraph: An Efficient Graph Computing Model in Persistent Memory System. 9-17 - Baoming Zhang, Ming Xu, Mingcai Chen, Mingyuan Chen, Chongjun Wang:

CopGAT: Co-propagation Self-supervised Graph Attention Network. 18-25 - Ikuo Otani, Kei Fujimoto

, Akinori Shiraga:
Fair DMA Scheduler for Low-Latency Accelerator Offloading. 26-32 - Guangzheng Liu, Xingang Wang:

Multi-attribute decision-making method based on interval intuitionistic trapezoidal fuzzy number to determine the expert weight: * Note: Sub-titles are not captured in Xplore and should not be used. 33-39 - Menghang Yu, Zhenzhe Zheng, Qinya Li, Fan Wu, Jiaqi Zheng:

A Comprehensive Study on Personalized Federated Learning with Non-IID Data. 40-49 - Zhijie Zhang

, Liwei Chen, Haolai Wei, Guochao Dong, Yuantong Zhang, Xiaofan Nie, Gang Shi:
Binary-level Directed Symbolic Execution Through Pattern Learning. 50-57 - Haolai Wei, Liwei Chen, Xiaofan Nie, Zhijie Zhang, Yuantong Zhang, Gang Shi:

An Efficient Metric-Based Approach for Static Use-After-Free Detection. 58-65 - Kexiong Fei, Jiang Zhou, Lin Su

, Weiping Wang
, Yong Chen, Fan Zhang:
A Graph Convolution Neural Network Based Method for Insider Threat Detection. 66-73 - Wentao Hu

, Dawei Jiang, Sai Wu, Ke Chen, Gang Chen:
IceBerg: Deep Generative Modeling for Constraint Discovery and Anomaly Detection. 74-81 - Wen Wang, Junchao Fan, Xiaofeng Peng, Ye Yang, Chun Xiao, Shuai Yang, Mingcai Wang, Lingfei Wang, Hongyue Kang, Xiaolin Chang:

Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL Approach. 82-89 - Yueiia Wu, Jian-tao Zhou:

GK: A Graphormer Architecture Based Knowledge Graph Reasoning Model for Link Prediction. 90-97 - Chuan Zhang, Mingyang Zhao, Tong Wu, Weiting Zhang, Qing Fan, Liehuang Zhu:

Towards Secure Bilateral Friend Query with Conjunctive Policy Matching in Social Networks. 98-105 - Yuqi He, Zhiquan Lai, Zhejiang Ran, Lizhi Zhang, Dongsheng Li:

SCGraph: Accelerating Sample-based GNN Training by Staged Caching of Features on GPUs. 106-113 - Dongwei Zhu, Peng Zhang, Wenhao Zhu, Minghao Tang, Wenyu Zang, Hongbo Xu:

Structure-Noise-Aware Anchor Link Prediction Across Social Networks. 114-120 - Nianxin Li, Xiumin Zhu, Yumei Li, LingLing Wang, Linbo Zhai:

Service Caching and Task Offloading of Internet of Things Devices Guided by Lyapunov Optimization. 121-128 - Jingle Xu, Jiayu Fu, Lin Gan, Yaojian Chen

, Zhenchun Huang
, Guangwen Yang:
Accelerating cryo-EM Reconstruction of RELION on the New Sunway Supercomputer. 129-138 - Hui Zhao, Xiaodong Zhang

, Ru Li:
NFT-basedAccess Control in Named Data Networks. 139-146 - Hasan M. Jamil

, Kallol Naha
:
Mapping Declarative Queries to Heterogeneous Biological Databases using Schema Graphs for Intelligent Responses. 147-154 - Kensho Yamamoto, Toshio Hirotsu:

File system to support secure cloud-based sharing. 155-162 - Rob H. Bemthuis

, Sanja Lazarova-Molnar
:
Discovering Agent Models using Process Mining: Initial Approach and a Case Study. 163-172 - Ruhollah Jamali

, Sanja Lazarova-Molnar
:
Towards Agent-based Simulation of the Parallel Trading Market of Pharmaceuticals. 173-181 - Alexander Lercher, Nishant Saurabh

, Radu Prodan:
Context-aware Community Evolution Prediction in Online Social Networks. 182-189 - Xin Su, Guifu Zhang, Minxue Zhang, Baoliu Ye, Hongyan Xing:

Intrusion Detection for Marine Meteorological Sensor Network. 190-196 - Xin Su, Tian Tian, Lei Cai, Baoliu Ye, Hongyan Xing:

A CVAE-GAN-based Approach to Process Imbalanced Datasets for Intrusion Detection in Marine Meteorological Sensor Networks. 197-203 - Shaswot Shresthamali, Yuan He

, Masaaki Kondo:
FAWS: Fault-Aware Weight Scheduler for DNN Computations in Heterogeneous and Faulty Hardware. 204-212 - Qing Wang, Lizhe Zhang, Xin Lu, Kenian Wang:

A Multi-authority CP-ABE Scheme based on Cloud-Chain Fusion for SWIM. 213-219 - Hualei Yu, Yirong Yao, Jinliang Yuan, Chongjun Wang:

DIPool: Degree-Induced Pooling for Hierarchical Graph Representation Learning. 220-227 - Hongwei Liu, Haojun Xia, Bibo Tu, Da Zhang, Xiaotong Wang:

A Secure and Efficient USB-based In-band Communication Interface between Host and BMC. 228-237 - Ningning Cui, Liwei Chen, Gewangzi Du, Tongshuai Wu, Chenguang Zhu, Gang Shi:

BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection. 238-245 - Chen Lv, Fuxin Zhang, Xiang Gao, Chen Zhu:

LA-vIOMMU: An Efficient Hardware-Software Co-design of IOMMU Virtualization. 246-253 - Wenjia Wang

, Seyed Masoud Sadjadi, Naphtali Rishe
:
Curse of Feature Selection: a Comparison Experiment of DDoS Detection Using Classification Techniques. 262-269 - Azhar Talha Syed, Shikharesh Majumdar:

Parallel Processing Techniques for Analyzing Large Video Files: a Deep Learning Based Approach. 270-279 - Yongqiang Gao, Shunyi Feng, Zhenkun Li:

A Distributed Cache Mechanism of HDFS to Improve Learning Performance for Deep Reinforcement Learning. 280-285 - Jia Li, Gang Xu, Yuan Cheng, Baoqi Huang:

Short-Time Traffic Flow Prediction Based on K-means++ and LSTM. 286-293 - Yang Dai, Shunmei Meng, Qiyan Liu, Xiao Liu:

Knowledge-aware Graph Attention Network with Distributed & Cross Learning for Collaborative Recommendation. 294-301 - Zhijun Wu, Zhenghang You, Peng Wang:

Attribute encryption based access control methods under airborne networks. 302-306 - Moustafa Faheem, Adrian Murphy

, Vishal Sharma
, Carlos Reaño
:
Discrete Event Simulation in Cloud-Edge Manufacturing Environments: Performance, Energy and Cost Trade-offs. 307-314 - Chenjing Gao, Junli Wang, Chungang Yan:

A Dual-stage Attention Based SDN Traffic Prediction Method. 315-322 - Jinchao Feng, Runbo Zhao, Jianguo Jiang:

A Large Scale Document-Term Matching Method Based on Information Retrieval. 323-330 - Deshi Deng, Yanying Lin, Kejiang Ye:

System-level Implications of Serverless: Workload Characterizing and Performance Understanding. 331-338 - Mengwei Wu, Qin Lu, Yingxue Wang, Yichao Wang, Huanyu Chen, Weixiao Li:

A Hybrid Model for QoS Prediction based on Improved Conditional Variational Autoencoder. 339-346 - Yingxue Wang, Qin Lu, Yichao Wang, Mengwei Wu, Weixiao Li:

Dynamic QoS Prediction Based on Attention Mechanism and Recurrent Neural Network. 347-354 - Yuting Zhu, Hongxu Jiang, Runhua Zhang, Yonghua Zhang, Dong Dong:

CNNBooster: Accelerating CNN Inference with Latency-aware Channel Pruning for GPU. 355-362 - Jinyu Cheng, Ruyi Qian, Qinwen Shi, Gaomei Hu, Mengjuan Gao, Qirun Huo, Yuanchao Xu:

Towards Efficient Elastic Parallelism for Deep Learning Processor. 363-370 - Feiyu Wang, Jian-tao Zhou, Hao Wang, Xu Guo:

A Blockchain-Based Multi-Cloud Storage Data Consistency Verification Scheme. 371-377 - Yansong Zhang, Xiao Liu, Jia Xu, Dong Yuan, Xuejun Li:

A Novel Adaptive Computation Offloading Strategy for Collaborative DNN Inference over Edge Devices. 378-385 - Xiaofan Nie, Haolai Wei, Liwei Chen, Zhijie Zhang, Yuantong Zhang, Gang Shi:

MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection. 386-393 - Xuzhen Jiang, Miao Cai, Baoliu Ye:

Improving Write Performance for LSM-tree-based Key-Value Stores with NV-Cache. 394-401 - Jintao Peng, Jie Liu, Yi Dai, Min Xie, Chunye Gong:

Optimizing All-to-All Collective Communication on Tianhe Supercomputer. 402-409 - Yongqiang Gao, Zhigang Wang, Zemin Li, Zhenkun Li:

Task Migration Based on Deep Reinforcement Learning in Mobile Crowdsourcing. 410-417 - George Vlahavas, Anna-Valentini Michailidou

, Theodoros Toliopoulos
, Vasileios G. Psomiadis, Anastasios Gounaris, Athena Vakali:
Performance comparison of distributed in memory databases in dynamic fog environments. 418-425 - Abhishek Dhankar, An Bui, Jeremy Costello, Manpreet Kaur, Osmar R. Zaïane, François Bolduc:

Automated Fact-Checking of Articles Related to Neurodevelopmental Disorders. 426-434 - Rafael S. Medina Ferreira, Ana Paula Couto da Silva

, Fabricio Murai
:
Risk Perception and Misinformation in Brazilian Twitter during COVID-19 Infodemic. 435-442 - Mayur Patil

:
Learning to Process Topic Aware Queries on Geo-Textual Streaming Data. 443-450 - Futo Yamamoto, Tadahiko Kumamoto, Akiyo Nadamoto:

Analysis of Behavioral Facilitation Tweets Considering the Emotion of Disaster Victims. 451-457 - Nikhil Sambhus, Tarek S. Abdelrahman:

Reuse-Aware Partitioning of Dataflow Graphs on a Tightly-Coupled CGRA. 458-467 - Shuqin Zhang, Peiyu Shi, Tianhui Du, Xinyu Su, Yunfei Han, Peng Chen:

Threat Modeling and Reasoning for Industrial Control System Assets. 468-475 - Na Guo, Pei-Wei Tsai

, Hongwang Xiao, Chang Wu, Wenjuan Duan:
Collar Data Synthesis and Its Application for Generating Virtual Collar 3D Novel View from a Single-View. 476-481 - Xinyi Cai, Jiao Tian, Ke Yu, Hongwang Xiao, Kai Zhang, Pei-Wei Tsai

:
Zero-shot Topic Classification via Automatic Tagging on Chinese Text Datasets. 482-488 - Xinbiao Gan, Peilin Guo, Guang Wu, Tiejun Li:

GreenBFS: Space-Efficient BFS Engine for Power-aware Graph Processing. 489-496 - Manikya Swathi Vallabhajosyula, Rajiv Ramnath:

Establishing a Generalizable Framework for Generating Cost-Aware Training Data and Building Unique Context-Aware Walltime Prediction Regression Models. 497-506 - Chuanxin Zhou, Chao Dong, Xiaojun Zhu, Lei Zhang:

Multi-Antenna Based Fast Routing Recovery Protocol for Dynamic UAV Networks. 507-514 - Jiao Tian, Xinyi Cai, Kai Zhang, Hongwang Xiao, Ke Yu, Pei-Wei Tsai

:
Sliding Focal Loss for Class Imbalance Classification in Federated XGBoost. 515-522 - Yu Ke, Junli Wang, Chungang Yan, Jiamin Yao

:
Routing Strategy for SDN Large Flow Based on Deep Reinforcement Learning. 523-530 - Zhihao Zhang, Haipeng Du, Shouqin Huang, Weizhan Zhang, Qinghua Zheng:

VRFormer: 360-Degree Video Streaming with FoV Combined Prediction and Super resolution. 531-538 - Rolden Fereira, Chathurika Ranaweera, Jean-Guy Schneider, Kevin Lee

:
Optimal Node Selection in Communication and Computation Converged IoT Network. 539-547 - Hangyu Cheng

, Guosheng Kang, Jianxun Liu, Yiping Wen, Buqing Cao, Zhen Wang:
BPMN++: Comprehensive Business Process Modeling for Industrial Internet Application. 548-555 - Ming Chen, Peichang Shi, Xiang Fu, Feng Jiang, Fei Gao, Penghui Ma, Jinzhu Kong:

PPSS: A Privacy-Preserving Supervision Scheme Based on Blockchain. 556-561 - Mehul Warade, Kevin Lee

, Chathurika Ranaweera, Jean-Guy Schneider:
Energy Aware Adaptive Scheduling of Workflows. 562-570 - Zhibin Xu, Jiang Zhaoxue, Tong Li, Junling You, Bingzhen Wu, Liangxiong Li:

OpenLog: Incremental Anomaly Classification with Changing, Unbalanced and Unknown Logs. 571-580 - Ruli Xu, Ryan Wen Liu, Jiangtian Nie

, Xianjun Deng, Zehui Xiong
, Wenchao Jiang, Han Yu, Dusit Niyato:
AIS Data-Based Efficient Ship Trajectory Clustering. 581-588 - Yutian Zhang, Bing Tang, Qing Yang, Xiaoyuan Zhang, Jincheng Luo:

Blockchain-based Distributed Storage System for Task Offloading in Vehicular Edge Computing. 589-596 - Shili Yan, Bing Tang, Qing Yang, Yijia He, Xiaoyuan Zhang:

Robust and Unsupervised KPI Anomaly Detection Based on Highly Sensitive Conditional Variational Auto-Encoders. 597-604 - Xiaolong Xu, Yiming Fei, Xiaokang Zhou, Xiaoyong Li, Yong Cheng, Lianyong Qi, Wanchun Dou:

Non-Cooperative Game for Edge Server Placement in Wireless Body Area Network. 605-612 - Zhenyu Zhang, Hongjun Dai:

Protection of Location Private Privacy with Recommendation from a Decision Tree Algorithm. 613-620 - Zijun Huang, Junhang Wu, Lingfei Ren, Ruimin Hu, Dengshi Li:

Learning Dynamic Behavior Patterns for Fraud Detection. 621-627 - Kaiwen Ning, Hao Wang, Zhiheng Zhang, Zhou Xu, Xiaowei Shu:

Parallel Deployment of VNFs in Service Function Chain: Benefit or Not? 628-635 - Ou Wu, Shanshan Li, He Zhang, Liwen Liu, Yanze Wang, Haoming Li:

An Optimized Scheduling Algorithm for the Multi-channel Hyperledger Fabric. 636-643 - Zhaorong Qian, Guoju Gao, Yang Du:

Per-Flow Size Measurement by Combining Sketch and Flow Table in Software-Defined Networks. 644-651 - Hui Qi, Hang Li, Shuwen Huang, Peipei Li, Weiyi Dai, Chunbo Wang:

Integrity Audit Method for Cloud Data Based on Blockchain. 652-659 - Yongqiang Gao, Jixiao Li:

Location-aware Task Offloading in Mobile Edge Computing. 660-667 - Yaru Ding, Yintan Ai, Xiaomin Zhang, Hua Li, Xianrong Wang, Hongwei Ruan:

Design and Implementation of SFC Monitoring and Alerting Based on YANG Data Model. 668-675 - Yi Xu, Ruyi Guo, Xiao Liu, Haoyu Luo, Chengzu Dong, Aiting Yao, Xuejun Li:

Efficient Face Recognition via Multi-UAV-Edge Collaboration in UAV Delivery Service. 676-683 - Yuantong Zhang, Liwei Chen, Xiaofan Nie, Gang Shi:

An Effective Buffer Overflow Detection With Super Data-Flow Graphs. 684-691 - Jianbin Ye, Fuqiang Lin, Xiaoyuan Liu, Bo Liu:

Your Voice is Not Yours? Black-Box Adversarial Attacks Against Speaker Recognition Systems. 692-699 - Xiaohan Ma, Chen Li, Bibo Tu:

An Unsupervised Approach For Detecting Lateral Movement Logins Based On Knowledge Graph. 700-707 - Xiaodong Dong, Binlei Cai:

Whether Cache Advertisement is Necessary for Content Providers in CDNs? Model and Analysis. 708-714 - Tao Sun, Kangshuai Zuo, Wenjie Zhong:

An Automatic Modeling Method for Web Service Business Processes towards CPN Model Checking. 715-721 - Zeyu Zhang, Yongmei Lei, Dongxia Wang, Guozheng Wang:

Distributed ADMM Based on Sparse Computation and Allreduce Communication. 722-729 - Zihan Wang

, Mengying Zhao, Lei Gong, Chao Wang:
WGeod: A General and Efficient FPGA Accelerator for Object Detection. 730-738 - Can Jiang, Duanyang Liu, Xiaoli Zhang, Kun Zhou, Hongbing Cheng:

Accelerating State Synchronization in Bitcoin Combining Secure Snapshot with IPFS. 739-746 - Huan Wang, Lijuan Wang, Jun Shen

:
Distributional Knowledge Transfer for Heterogeneous Federated Learning. 747-754 - Toru Kato, Masahiro Higuchi, Hiroshi Ohyama, Yoshiaki Kawamura, Ryotaro Ohno:

Container Shipping Route Recommendation System by Modeling Logistics System with the Ambient Calculus. 755-763 - Chuanyu Zong, Wenlu Wu, Tao Qiu, Anzhen Zhang, Xiufeng Xia:

Best Community Discovery on Dynamic Social Networks. 764-773 - Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:

SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. 774-781 - Huan Wang, Lijuan Wang, Jun Shen

:
Logit Calibration for Non-IID and Long-Tailed Data in Federated Learning. 782-789 - Lisheng Chen, Buqing Cao, Xiang Xie, Yueying Qing, Guosheng Kang, Jianxun Liu:

Knowledge Graph-based Intent Network-Enhanced Web Services Recommendation. 790-797 - Tai Cai, Jianfei Da, Deiiao Niu, Lei Li, Jianchong Shi, Ranzhuo Li:

A New NVM Storage System with High Throughput Device Driver. 798-805 - Liu Yang, Guohui Li, Meihong Xiao, Shuai Luo, Yangying Tan, Ziqiang Tang, Shuai Mu:

MultiAddIntent: Efficient RDF Data-Oriented Incremental Construction Concept Lattice Algorithm. 806-814 - Lizhe Zhang, Tong Wang, Zhijun Wu:

Access control method for air ticket distribution system based on blockchain. 815-821 - Chenlin Huang, Keming Wang

, Yun Li, Jiajian Li, Qing Liao:
ASPGen-D: Automatically Generating Fine-grained Apparmor Policies for Docker. 822-829 - Tao Sun, Xiaoyu Qi, Wenjie Zhong:

An Automatic Coarse-Fine-Granularity Modeling Method for IoT System toward THCPN model checking. 830-837 - Fengkun Gao, Chunbo Wang, Xiaoqiang Di, Jinhui Cao, Xu Liu, Hui Qi:

Secure deduplication method based on tag clustering. 838-844 - Hanen Ochi, Kais Klai:

Checking Composition-Aware Service Substitutability. 845-853 - Nour Elhouda Souid, Kais Klai, Chiheb Ameur Abid, Samir Ben Ahmed:

Optimal Supervisory Control of Opacity for Modular Systems. 854-861 - Huaisheng Ye, Haibo Luo:

Indoor Intelligent IoT Datasets for Behavioral Learning and Autonomous Decision Making. 862-869 - Hiroki Aikawa, Toshio Endo, Tomoya Yuki, Takahiro Hirofuchi, Tsutomu Ikegami:

Efficient Stencil Computation with Temporal Blocking by Halide DSL. 870-877 - Wenjie Chen, Ruixin Sun, Zhilei Chai:

An acceleration method of optical flow calculation for automotive ADAS. 878-887 - Xiangyu Kong

, Xuesong Gao, Shibao Pan, Yizhi Zhou, Yanan Yang, Laiping Zhao, Heng Qi:
TailCmp - A Tail Latency Evaluation Solution of Public Cloud and Labeled von Neumann Architecture based Cloud Prototype. 888-895 - Liu Yang, Xin Yin, Jun Long, Tingxuan Chen, Jie Zhao, Wenti Huang:

Spatio-Temporal Aware Knowledge Graph Embedding for Recommender Systems. 896-902 - Kai Zhang, Wei Zhang, Libin Liu, Lizhuang Tan, Ye Zhang, Wei Gao:

Hawkeye: Efficient In-band Network Telemetry with Hybrid Proactive-Passive Mechanism. 903-912 - Liangliang Chang, Joshua Mack

, Benjamin R. Willis, Xing Chen, John S. Brunhaver, Ali Akoglu
, Chaitali Chakrabarti:
Profile-Guided Parallel Task Extraction and Execution for Domain Specific Heterogeneous SoC. 913-920 - Junguo Liao, Yixun Zhou, Qiangqiang Qin:

An adaptive traffic sign recognition scheme based on deep learning in complex environment. 921-928 - Wenhao Zhao, Xin Lin, Yuxin Chen, Yue Hong, Wei Zheng:

A Blockchain- Based Copyright Protection System for Short Videos. 929-936 - Minghao Fu, Haoran Zhu

, Jelena V. Misic, Vojislav B. Misic, Jing Bai, Xiaolin Chang:
Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain. 937-944 - Guanghui Feng, Guojun Wang, Tao Peng, Xiaofei Xing, Shuhong Chen, Peiqiang Li:

A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm. 945-952 - Zheqi Feng, Tao Peng, Guo-Jun Wang, Kejian Guan:

Personalized Privacy-Preserving Information Fusion in Mobile Crowdsensing. 953-960

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














