


default search action
18th CollaborateCom 2022: Hangzhou, China - Part II
- Honghao Gao, Xinheng Wang, Wei Wei, Tasos Dagiuklas:

Collaborative Computing: Networking, Applications and Worksharing - 18th EAI International Conference, CollaborateCom 2022, Hangzhou, China, October 15-16, 2022, Proceedings, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 461, Springer 2022, ISBN 978-3-031-24385-1
Security and Privacy Protection
- Yenan Chen, Tinghui Lu, Linsen Li, Han Zhang:

A Novel Risk Assessment Method Based on Hybrid Algorithm for SCADA. 3-17 - Fengzhou Liang, Fang Liu, Tongqing Zhou:

A Visual Tool for Interactively Privacy Analysis and Preservation on Order-Dynamic Tabular Data. 18-38 - Hongbo Cao, Yongsheng Zhu

, Yuange Ren, Bin Wang, Mingqing Hu, Wanqi Wang, Wei Wang:
Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning. 39-54 - Zhefeng Nan, Changbo Tian, Yafei Sang, Guangze Zhao:

ACS: An Efficient Messaging System with Strong Tracking-Resistance. 55-74 - Yue Feng, Weiqing Huang, Siye Wang, Yanfang Zhang, Shang Jiang, Ziwen Cao:

Anti-Clone: A Lightweight Approach for RFID Cloning Attacks Detection. 75-90 - Xinyang Li, Yujue Wang, Yong Ding

, Shiye Ma, Bei Xiao, Zhihong Guo, Xiaorui Kang, Xiaohui Ma, Jia Mai:
A Privacy-Preserving Lightweight Energy Data Sharing Scheme Based on Blockchain for Smart Grid. 91-110 - Huiqun Yu, Qifeng Tang, Zhiqing Shao, Yiming Yue, Guisheng Fan, Liqiong Chen:

Dynamic Trust-Based Resource Allocation Mechanism for Secure Edge Computing. 111-132 - Yupeng Deng, Xiong Li

, Jiabei He, Yuzhen Liu, Wei Liang
:
A Stochastic Gradient Descent Algorithm Based on Adaptive Differential Privacy. 133-152 - Hanwu Sun, Chengwei Peng, Yafei Sang, Shuhao Li, Yongzheng Zhang, Yujia Zhu:

Evading Encrypted Traffic Classifiers by Transferable Adversarial Traffic. 153-173 - Dan Li, Tong Liu, Chengfan Li:

A Secure Auction Mechanism for Task Allocation in Mobile Crowdsensing. 174-193
Deep Learning and Application
- Wenwen Liu, Sinong Zhao, Zhaoyang Yu, Gang Wang, Xiaoguang Liu:

A Pareto-Efficient Task-Allocation Framework Based on Deep Reinforcement Learning Algorithm in MEC. 197-213 - Jingrun Ma, Yafei Sang, Yongzheng Zhang, Xiaolin Xu, Beibei Feng, Yuwei Zeng

:
An Adaptive Ensembled Neural Network-Based Approach to IoT Device Identification. 214-230 - Jin Chen, Huahu Xu, Minjie Bian, Jiangang Shi, Yuzhe Huang, Chen Cheng

:
Fine-Grained Head Pose Estimation Based on a 6D Rotation Representation with Multiregression Loss. 231-249 - Yingtian Mei, Yucong Duan, Lei Yu, Haoyang Che:

Purpose Driven Biological Lawsuit Modeling and Analysis Based on DIKWP. 250-267 - Hao Zhang, Pengfei Yi, Rui Liu, Jing Dong, Qiang Zhang, Dongsheng Zhou:

Research on Depth-Adaptive Dual-Arm Collaborative Grasping Method. 268-285
Collaborative Working
- Zhenchao Ouyang

, Changjie Zhang, Jiahe Cui
:
Semantic SLAM for Mobile Robot with Human-in-the-Loop. 289-305 - Yili Fang, Zhaoqi Pei, Xinyi Ding, Wentao Xu, Tao Han:

Incorporating Feature Labeling into Crowdsourcing for More Accurate Aggregation Labels. 306-324 - Dandan Li, Hongyue Wu, Shizhan Chen, Lei Dong, Zhuofeng Zhao, Zhiyong Feng:

Cost Performance Driven Multi-request Allocation in D2D Service Provision Systems. 325-344 - Yuanzhe Li, Ao Zhou, Xiao Ma, Shangguang Wang:

Collaborative Mobile Edge Computing Through UPF Selection. 345-362 - Yating Zhou, Dianxi Shi, Huanhuan Yang, Haomeng Hu, Shaowu Yang, Yongjun Zhang:

Deep Reinforcement Learning for Multi-UAV Exploration Under Energy Constraints. 363-379 - Lingyun Cui, Tenglong Ren, Xiaowang Zhang

, Zhiyong Feng:
Optimization of Large-Scale Knowledge Forward Reasoning Based on OWL 2 DL Ontology. 380-399 - Ziwen Cao, Siye Wang, Degang Sun, Yanfang Zhang, Yue Feng, Shang Jiang:

ITAR: A Method for Indoor RFID Trajectory Automatic Recovery. 400-418 - Binglai Wang, Yafei Sang, Yongzheng Zhang, Shuhao Li, Ruihai Ge, Yong Ding:

A Longitudinal Measurement and Analysis of Pink, a Hybrid P2P IoT Botnet. 419-436 - Hongbo Xu, Shuhao Li, Zhenyu Cheng, Rui Qin, Jiang Xie, Peishuai Sun:

VT-GAT: A Novel VPN Encrypted Traffic Classification Model Based on Graph Attention Neural Network. 437-456
Images Processing and Recognition
- Zhao Huang

, Stefan Poslad, Qingquan Li, Jianping Li, Chi Chen:
Landmark Detection Based on Human Activity Recognition for Automatic Floor Plan Construction. 459-477 - Mengke Tian, Hengliang Zhu, Yong Wang, Yimao Cai, Feng Liu, Pengrong Lin, Yingzhuo Huang, Xiaochen Xie:

Facial Action Unit Detection by Exploring the Weak Relationships Between AU Labels. 478-495 - Zhongqin Bi, Kaian Deng, Wei Zhong, Meijing Shan:

An Improved Dual-Subnet Lane Line Detection Model with a Channel Attention Mechanism for Complex Environments. 496-515 - Shuqin Li, Xiangwei Zheng, Xia Zhang, Xuanchi Chen, Wei Li:

Facial Expression Recognition Based on Deep Spatio-Temporal Attention Network. 516-532

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














