


default search action
CCCI 2023: Chongqing, China
- Mohammad S. Obaidat, Zhaolong Ning, Kuei-Fang Hsiao, Petros Nicopolitidis, Yu Guo:

International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2023, Chongqing, China, October 18-20, 2023. IEEE 2023, ISBN 979-8-3503-0256-1 - Guifeng Zheng, Qi Guo, Juan Xi, Shouze Tang, Ziyi Liu, Xuanrui Xiong:

A Novel Collaborative Representation Method for Hyperspectral Image Classification. 1-6 - Anastasios Valkanis, Georgia A. Beletsioti, Konstantinos F. Kantelis, Petros Nicopolitidis, Georgios Papadimitriou, Malamati D. Louta:

Developing Energy Autonomous and Cable-less Multi-gateway LoRa Networks. 1-8 - Bhairvi Pant, Mohammad S. Obaidat, Shreya Singh, Mudita Pant, Mohammad Wazid, Ashok Kumar Das, Kuei-Fang Hsiao:

SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications. 1-7 - Xiaojie Wang, Xin Wan, Zhaolong Ning, Zihan Qie, Jiameng Li

, Yulong Xiao:
A Multimodal Fusion Depression Recognition Assisted Decision-Making System Based on EEG and Speech Signals. 1-8 - Hui-Jun Cheng, Sheng-Fu Zeng, Chun-Yuan Lin:

Platform Construction to Protect Portraits of Others. 1-4 - Pankaj Kumar, Mohammad S. Obaidat, Piyush Pandey, Mohammad Wazid, Ashok Kumar Das, Devesh Pratap Singh:

Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme. 1-8 - Yi Xiang Marcus Tan, Koh Ting Yew, Joon Sern Lee:

MalwareCLIP: Towards a Scalable and Explainable Image-Based Malware Classification. 1-8 - Di Wang

:
Out-of-Distribution Detection with Confidence Deep Reinforcement Learning. 1-7 - Yosra Bouchoucha, Dorsaf Omri, Taoufik Aguili:

Efficient ISM Band Rectenna for RF Energy Harvesting in IoT Healthcare Devices. 1-8 - Lina Yang, Peng Zhao, Yong Zhang:

Deep Reinforcement Learning based Joint Optimization for Energy-efficient ITE and Cooling Units in Data Centers. 1-8 - Yogi Patel, Shivang Patel, Rajesh Gupta, Mohammad S. Obaidat, Riya Kakkar, Nilesh Kumar Jadav, Sudeep Tanwar:

Blockchain and AI-based Engine Fault Detection Scheme for Autonomous Vehicles. 1-8 - Xiu-Ru Liang, Huei-Tang Li, Chiung-Ying Huang, Wei-An Chen, Yi-Feng Chen, Zhi-Jia Gao, Meng-Wei Sun, Hao-Cheng Chia:

Outlier-based Anomaly Detection in Firewall Logs. 1-10 - Sunhwa Annie Nam, Hyokyung Bahn:

Adaptive Swapping for Variable Workloads in Real-time Task Scheduling. 1-6 - Mohammad S. Obaidat, Chandrashekhar Meshram, Deepak Kartikey, Kuei-Fang Hsiao, Agbotiname Lucky Imoize, Sharad Kumar Barve:

A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications. 1-6 - Hongbo Cheng, Lin Zhang, Kunyu Wang:

A Dynamic Evolution Method for Digital Twins Based on RDD-RNN. 1-4 - Haiwei Fu:

A Graph-Based Network with Attention for Stock Price Prediction. 1-8 - Mohammad Abdussami

, Sanjeev Kumar Dwivedi
, Mohammad S. Obaidat, Ruhul Amin
, Satyanarayana Vollala, Balqies Sadoun:
Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of Vehicles. 1-6 - Sachi Chaudhary, Riya Kakkar, Mohammad S. Obaidat, Rajesh Gupta, Sudeep Tanwar, Balqies Sadoun:

Blockchain-Based Energy Trading Scheme for EVs Coordination: A Smart Contract Approach. 1-8 - Chenglong Lin, Tianli Xiao, Yizhong Ma, Chen Du:

Predicted Improvement Aggregation Adjustment Search for Parallel Multi-Objective Bayesian Optimization. 1-6 - Jiafeng Xu, Tao Zhang:

Research on Routing Algorithm Based on Low Orbit Satellite Link Handover. 1-5 - Abuzar B. M. Adam

, Mohammed A. M. Elhassan:
Enhancing Secrecy in UAV RSMA Networks: Deep Unfolding Meets Deep Reinforcement Learning. 1-5 - Jieui Kang, Jaehyeong Sim

, Hyokyung Bahn:
Optimization of the Modified Gaussian Filter for Mobile GPU Usage in Game Workloads. 1-8 - Helen D. Karatza

:
Scheduling Different Types of Linear Workflows with Partial Computations in a Distributed System. 1-7 - Yan Zhang, Ying Zhao, Yang He, Guangmiao Jiang:

The Influence of Gray Scale on Image Recognition Under Simulated Prosthetic Vision. 1-5

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














