


default search action
7th BigDataSecurity/HPSC/IDS 2021: New York City, NY, USA
- 7th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021, New York City, NY, USA, May 15-17, 2021. IEEE 2021, ISBN 978-1-6654-3927-5

- Aidong Xu, Tao Wu, Yunan Zhang, Zhiwei Hu, Yixin Jiang:

Graph-Based Time Series Edge Anomaly Detection in Smart Grid. 1-6 - Dae-young Kim

, Karuna P. Joshi:
A Semantically Rich Knowledge Graph to Automate HIPAA Regulations for Cloud Health IT Services. 7-12 - Wei Peng, Yonglu Li, Huifang Liu, Xiuping Ouyang, Min Lin, Lixia Li, Ying Wang, Zhijie Chen, Haining Ye, Ziwen Peng:

Community Detection of Mobile Internet Delivery Users. 13-19 - Zhuoyi Wang, Yu Lin, Yifan Li, Feng Mi, Zachary Tian, Latifur Khan, Bhavani Thuraisingham:

Unsupervised Perturbation based Self-Supervised Adversarial Training. 20-25 - Shuang Xie, Yujie Hong, Xiangdie Wang, Jie Shen:

Research on Data Security Technology Based on Blockchain Technology. 26-31 - Shuyu Chen, Mingyue Xie, Jun Liu

, Yunan Zhang:
Improvement of the DPoS Consensus Mechanism in Blockchain Based on PLTS. 32-37 - Ankur Nagar, Lavanya Elluri

, Karuna Pande Joshi:
Automated Compliance of Mobile Wallet Payments for Cloud Services. 38-45 - Xiaoyan Chen, Jiangling Ge, Wei Huang:

Research on Big Data Value Creation System Applied to CPS. 46-51 - Ziheng Zhou, Lin Li, Xu Zhao:

Webshell Detection Technology Based on Deep Learning. 52-56 - Wenyi Yang, Wenhui Hu, Yingjie Liu, Yu Huang, Xueyang Liu, Shikun Zhang:

Research on Bootstrapping Algorithm for Health Insurance Data Fraud Detection Based on Decision Tree. 57-62 - Hong Guo, Yining Li, Fang Liu, Wei Hu:

Machine-Learning based MOOC learning data analysis. 63-68 - Sherifdeen Lawal, Ram Krishnan:

Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study. 69-74 - Zhijun Wu, Weihang Cui, Pan Gao:

Filtration method of DDoS attacks based on time-frequency analysis. 75-80 - Fatema Rashid, Ali Miri:

User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection. 81-86 - Qiang Wang, Jiawei Jiang, Yongxin Zhao, Weipeng Cao, Chunjiang Wang, Shengdong Li:

Algorithm selection for software verification based on adversarial LSTM. 87-92 - Yi Hua, Zhangbing Li, Hankang Sheng, Baichuan Wang:

A Method for Finding Quasi-identifier of Single Structured Relational Data. 93-98 - Xiaoqi Liao, Hang Li, Xing Li, Pengyu Zhang, Yu Huang, Chunmei Wang:

An Automatic and Unified Consistency Verification Rule and Method of SG-CIM Model. 99-104 - Hong Guo, Tianyi Liu, Fang Liu, Yining Li, Wei Hu:

Chinese Text Classification Model Based On Bert And Capsule Network Structure. 105-110 - Yizhong Liu, Yu Xia, Jianwei Liu, Yiming Hei:

A Secure and Decentralized Reconfiguration Protocol For Sharding Blockchains. 111-116 - Yihang Gao, Peng Su, Hui Zhao, Meikang Qiu, Meiqin Liu:

Research on Sentiment Dictionary Based on Sentiment Analysis in News Domain. 117-122 - Lei Zhang, Meng Ma, Ping Wang:

Zero-shot Question Generation: Accelerate the Development of Domain-specific Dialogue System. 123-128 - Jun Liu

, Sule Tang, Chuang Ma, Sishi Qin, Wei Li, Aidong Xu:
A community detection algorithm based on discrete mixed fruit fly optimization. 129-134 - Sudiksha Das:

A Smart Solution with Ignition Interlock Device to Prevent Drunk-Driving Accidents. 135-140 - Qiaohong Wu, Weidong Xiao, Xiaoke Hu, Peiyuan Zhu, Xihua Chen:

A Data Privacy and Authentication Scheme Based on Internet of Vehicles. 141-145 - Xiao Chen:

Energy-efficient Smart Parking for Self-driving Vehicles. 146-150 - Han Deng, Zhechon Wang, Yazhen Zhang:

Overview of Privacy Protection Data Release Anonymity Technology. 151-156 - Jack D'Agostino, Gökhan Kul:

Toward Pinpointing Data Leakage from Advanced Persistent Threats. 157-162 - Xiaoyan Chen, Weidong Xiao, Weijiang Zhang, Qifeng Xie, Sujuan Zhang:

Research on Secret Sharing Scheme in CPS Environment. 163-168 - Alan Hong, Weidong Xiao, Jiangling Ge:

Big Data Analysis System Based on Cloudera Distribution Hadoop. 169-173 - Han Deng, Fei Fang, Juan Chen, Yazhen Zhang:

A Cloud Data Storage Technology for Alliance Blockchain Technology. 174-179 - Zihan Zhang, Jianfei Jiang, Weiguang Sheng, Qin Wang, Zhigang Mao, Naifeng Jing:

A Mapping Method for Reconfigurable Array based on Decoupled DataFlow. 180-185 - Angel Castro, Alexander Perez-Pons

:
Virtual Assistant for Forensics Recovery of IoT Devices. 186-190 - Xiyue Liu, Xin Feng, Pan Pan:

GANN: A Graph alignment neural network for video partial copy detection. 191-196 - Daniyar Sultan

, Shynar Mussiraliyeva
, Aigerim Toktarova, Marat Nurtas, Zhalgasbek Iztayev, Lyazzat Zhaidakbaeva
, Lazzat Shaimerdenova, Oxana Akhmetova
, Batyrkhan Omarov
:
Cyberbullying and Hate Speech Detection on Kazakh-Language Social Networks. 197-201 - Yue Wang, Xinlian Zhou, Shiwen Zhang, Weihong Huang:

Human Mobility Model in Mission-oriented Opportunistic Networks. 202-207 - Griffith Samore, Jonah Bates, Xiao Chen:

Improving Satisfaction in Crowdsourcing Platforms. 208-213

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














