


default search action
CCCI 2022: Dalian, China
- Mohammad S. Obaidat, Qiang Zhang, Guowei Wu, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:

International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2022, Dalian, China, October 17-19, 2022. IEEE 2022, ISBN 978-1-6654-8617-0 - Wenjieline Chen, Pinghui Wu, Weichao Xu, Kewen Xia:

Research on CNN-SVM method for gastroscopic image detection. 1-6 - Abdelrahman Ahmed AlHammadi

, Mohammed Lataifeh:
Examining the influence of national digital identity and smart pass platform on accelerating the processes of digital transformation. 1-6 - Pronaya Bhattacharya

, Chandan Trivedi, Mohammad S. Obaidat, Kartik Patel, Sudeep Tanwar, Kuei-Fang Hsiao:
BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0. 1-5 - Arash Hadadi, Alireza Shameli-Sendi:

A Quality of Service Aware VM Placement for User Applications in Cloud Data Center. 1-6 - Pronaya Bhattacharya

, Mohammad S. Obaidat, Sakshi Sanghavi, Vatsal Sakariya, Sudeep Tanwar, Kuei-Fang Hsiao:
Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production Ecosystem. 1-5 - Mahbuba Yesmin Turaba

, Mehedi Hasan, Nazrul Islam Khan, Hafiz Abdur Rahman:
Fraud Detection During Financial Transactions Using Machine Learning and Deep Learning Techniques. 1-8 - Yuanyuan Han

, Zhong Wang, Xin Han, Xiaoya Fan
:
GaitPretreatment: Robust Pretreatment Strategy for Gait Recognition. 1-6 - Xianyu Zhang, Tao Liang, Kang An, Xiaoqiang Qiao, Xiaoyu Wang:

Secure Transmission in Cell-Free Massive MIMO Network with Phase Noise. 1-6 - Shuo Yang, Jiahao Yang, Xianshi Ge, Xiaoting Wang:

Medium and Short-Term Prediction of Power System Load Based on Improved LSTM Algorithm. 1-7 - Georgios L. Stavrinides, Helen D. Karatza

:
Scheduling Tightly Coupled Parallel Jobs With Runtime-Extended Tasks on Distributed Resources. 1-7 - Abdelrahim Alzarooni, Mohammed Lataifeh:

Exploring the relationship between IT competence and digital transformation within government projects in the UAE. 1-5 - Abhijit Kasi, Mohammad S. Obaidat, Purva Rewal, Dheerendra Mishra

, Kuei-Fang Hsiao:
On the security of authenticated key agreement schemes for e-healthcare. 1-6 - Yikuan Chen, Li Liang, Wei Gao:

FedADSN: Anomaly detection for social networks under decentralized federated learning. 111-117 - Nafi Ahmad, Abdul Wahab, John A. Schormans, Ali Adib Arnab:

A Novel Objective Video Quality Assessment Metric For Cloud Gaming Applications. 1-8 - Zijun Song, Qiwei Wang:

A Rotation Speed Measurement System based on Millimeter Wave. 1-8 - Chandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali

, Akshaykumar Meshram, Kuei-Fang Hsiao:
An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments. 1-6 - Abdulmonem Alshahrani

, John A. Clark:
Transfer Learning Approach to Discover IDS Configurations Using Deep Neural Networks. 1-8 - Purva Rewal, Abhijit Kasi, Mohammad S. Obaidat, Dheerendra Mishra

, Ankita Mishra
, Kuei-Fang Hsiao:
On the Security of Content key Distribution Framework for DRM systems. 1-7 - Chandrashekhar Meshram, Mohammad S. Obaidat, Agbotiname Lucky Imoize, Ismail Bahkali

, Parkash Tambare, Kuei-Fang Hsiao:
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














