


default search action
8th BigDataSecurity/HPSC/IDS 2022: Jinan, China
- 8th IEEE Intl Conference on Big Data Security on Cloud, IEEE Intl Conference on High Performance and Smart Computing and IEEE Intl Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS, Jinan, China, May 6-8, 2022. IEEE 2022, ISBN 978-1-6654-8069-7

- Hongjun Dai:

Message from the General Chairs. 1 - Yonghao Wang, Shui Yu, Yongxin Zhu:

Message from the Program Chairs BigDataSecurity 2022. 1 - Cheng Zhang, Keke Gai, Jihe Wang:

Message from the Program Chairs HPSC 2022. 1 - Han Qiu, Luna Li, Linghe Kong:

Message from the Program Chairs IDS 2022. 1 - Sharad Dixit, Karuna Pande Joshi, Seung Geol Choi, Lavanya Elluri

:
Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE. 1-10 - Chaofan Zheng, Wenhui Hu, Tianci Li, Xueyang Liu, Jinchan Zhang, Litian Wang:

An Insider Threat Detection Method Based on Heterogeneous Graph Embedding. 11-16 - Pengyu Zhang, Yufei Li, Xinliang Ge, Wenhui Hu, Lizhuang Sun, Xueyang Liu:

Predicting Relations in SG-CIM Model Based on Graph Structure and Semantic Information. 17-22 - Xingrun Yan, Shuo Wang, Keke Gai:

A Semantic Analysis-Based Method for Smart Contract Vulnerability. 23-28 - Shijun Ding, An Wang, Shaofei Sun, Yaoling Ding, Xintian Hou, Dong Han:

Correlation Power Analysis and Protected Implementation on Lightweight Block Cipher FESH. 29-34 - Feng Yang, Liao Lei, Hangyu Zhu:

Overview of Blockchain and Cloud Service Integration. 35-40 - Xin Wen, Yulan Wang, Kai Wang, Ran Sui:

A Russian Hate Speech Corpus for Cybersecurity Applications. 41-47 - Fang Liu, Zimeng Fan, Feihu Huang, Yining Li, Yanxiang He, Wei Hu:

Modeling Learner Behavior Analysis Based on Educational Big Data and Dynamic Bayesian Network. 48-53 - Chenjun Liang, Li Deng, Jincan Zhu, Zhen Cao, Chao Li:

Cloud Storage I/O Load Prediction Based on XB-IOPS Feature Engineering. 54-60 - Dawei Li, Yingpeng Zhang, Jian Cui, Di Liu, Yu Sun, Zhenyu Guan, Xu Wang:

Remote Audit Scheme of Embedded Device Software Based on TPM. 61-66 - Xunwu Gong, Bin Hu, Yunqiang Xiong, Xiaofang Zhao:

Practical Verifiable Computation on Encrypted Data. 67-74 - Guoqing Wang, Yiming Lu, Peng Liu, Wang Zhou:

High-performance Distributed Feature Storage and Consumption Services in Power Grid Scenarios. 75-80 - Fangjun Li, Runzhen Yan, Rui Su, Yating Wang, Xueyang Liu, Kehui Xu:

An Automatic Model Table Entity Alignment Framework for SG-CIM Model. 81-86 - Xiao Chen:

Job Scheduling on Edge and Cloud Servers. 87-91 - Joshua Smith, Yingying Zhu, Zheng Li:

Public Transit Prediction During COVID-19 Pandemic. 92-94 - Chenjun Liang, Li Deng, Jincan Zhu, Zhen Cao, Chao Li:

Disk Failure Prediction Based on SW-Disk Feature Engineering. 95-100 - Feng Yang, Liao Lei, Lin Chen:

Method of Interaction between Blockchain and the World outside the Chain based on Oracle Machine. 101-106 - Ming Wu, Lei Zhou, Fujin Huang:

EVCS: An Edge-assisted Virtual Computing and Storage Approach for Heterogeneous Desktop Deployment. 107-112 - Xiangyu Gao, Meikang Qiu:

Efficient Process Scheduling for Multi-core Systems. 113-118 - Gang Qiu, Yanli Guo, Changjun Song:

TANN: Text-based Attention Neural Network Recommendation Model. 119-124 - Haixia Hou, Zijun Di, Mingqiang Zhang, Dongfeng Yuan:

An Intrusion Detection Method for Cyber Monintoring Using Attention based Hierarchical LSTM. 125-130 - Tengfei Lei, Haiyan Fu, Lili Huang, Hongyan Zang, You Zhou, Tingyang Yan:

Prediction of CNC Machine Tool Wear Stat Based on LSTM. 131-136 - Rahul Kale, Zhi Lu, Kar-Wai Fok, Vrizlynn L. L. Thing:

A Hybrid Deep Learning Anomaly Detection Framework for Intrusion Detection. 137-142 - Luoyifan Zhong, Na Li, Yi Sun:

Research and Application of Image Style Transfer Method. 143-147 - Yi Sun, Luoyifan Zhong, Hao Yue, Tao Mi:

Identification and Analysis of Tool Wear State Based on Deep Learning. 148-153 - Chenyang Yan, Hongshuo Wang, Songsong Yan:

An identity-based message authentication scheme for Internet of vehicles. 154-156 - Feng Cao, Min Su:

Research on Face Recognition Algorithm Based on CNN and Image Super-resolution Reconstruction. 157-161 - Tao Mi, Luoyifan Zhong, Xin He, Yi Sun, Chenyang Yan, Hao Yue:

Fault Prediction of Process Industry Based on Fuzzy Clustering. 162-167 - Ying Yu:

New Method of Song Sentiment Classification Based on Neural Network. 168-173 - Litian Wang, Wenhui Hu, Tong Zheng, Shanshan Yin, Xiaoya Zhang, Xueyang Liu:

Node Similarity-based Search Method for Medical Insurance Heterogeneous Information Network. 174-179 - Sukun Li, Xiaoxing Liu:

Toward a BCI-Based Personalized Recommender System Using Deep Learning. 180-185 - Luoyifan Zhong:

Optimization and Prediction of Intelligent Tourism Data. 186-188 - Art Sedighi, Thomas Daniels, Doug Jacobson

:
On the Feasibility of T-PKI as an Anonymization Protocol for TPMs in Trusted Computing Environments. 189-193 - Zhi Lu, Vrizlynn L. L. Thing:

"How Does It Detect A Malicious App?" Explaining the Predictions of AI-based Malware Detector. 194-199 - Jinchan Zhang, Xueyang Liu, Wenyu Shao, Wenhui Hu, Wenmo Zhang, Chaofan Zheng:

Civil Servant Position Recommendation Algorithm Based on Model Fusion. 200-205 - Wenmo Zhang, Xueyang Liu, Xiaoya Zhang, Wenhui Hu, Jinchan Zhang, Wenyu Shao:

Medicare Fraud Gang Discovery Based on Community Discovery Algorithms. 206-211 - Ce Yang, Juan Chen, Bin Zeng, Lei Liao:

Overview of Blockchain Privacy Protection. 212-217 - Sadaf Md. Halim, Latifur Khan, Kevin W. Hamlen, Bhavani Thuraisingham, Md Delwar Hossain

:
A Federated Approach for Learning from Electronic Health Records. 218-223 - Saquib Irtiza

, Latifur Khan, Kevin W. Hamlen:
SentMod: Hidden Backdoor Attack on Unstructured Textual Data. 224-231

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














