


default search action
7th CSCloud / 6th EdgeCom 2020: New York City, NY, USA
- 7th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2020 / 6th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2020, New York City, NY, USA, August 1-3, 2020. IEEE 2020, ISBN 978-1-7281-6550-9

- Albert Y. Zomaya, Ziliang Zong, Keke Gai:

Message from the Program Chairs EdgeCom 2020 CSCloud-EdgeCom 2020. XV - Meikang Qiu:

Message from the General Chair CSCloud-EdgeCom 2020. 1 - Zakirul Alam, Zonghua Zhang, Haibo Zhang

:
Message from the Program Chairs CSCloud 2020 CSCloud-EdgeCom 2020. 1 - Yohn Jairo Parra Bautista, Richard A. Aló, Ningning Wang:

Deep Learning, Cloud Computing for Credit/Debit Industry Analysis of Consumer Behavior. 1-7 - Bhavani Thuraisingham:

Cyber Security and Artificial Intelligence for Cloud-based Internet of Transportation Systems. 8-10 - Wei Liu, Jian Su, Zhenyu Mao, Peipei Jin, Yu Huang, Chengfeng Dou, Limei Zhou, Yuwei Shang:

Research on Text Classification Method of Distribution Network Equipment Fault based on Deep Learning. 11-16 - Pei-heng Hong, Meikang Qiu, Yuehua Wang:

Autonomous Driving and Control: Case Studies with Self-Driving Platforms. 17-22 - Shulan Wang, Yuan Li, Haiyan Wang

, Xi Zhang, Jianyong Chen:
Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing. 23-28 - Yepeng Ding

, Hiroyuki Sato:
Derepo: A Distributed Privacy-Preserving Data Repository with Decentralized Access Control for Smart Health. 29-35 - Mohammed S. Alshehri, Brajendra Panda:

Minimizing Data Breach by a Malicious Fog Node within a Fog Federation. 36-43 - Atheer Almogbil, Abdullah Alghofaili, Chelsea Deane, Timothy R. Leschke:

Digital Forensic Analysis of Fitbit Wearable Technology: An Investigator's Guide. 44-49 - Wonjun Lee, Mohammad Nadim

:
Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers. 50-55 - Saikat Das, Deepak Venugopal, Sajjan G. Shiva, Frederick T. Sheldon:

Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack. 56-61 - Md Delwar Hossain

, Hideya Ochiai, Doudou Fall, Youki Kadobayashi:
LSTM-based Network Attack Detection: Performance Comparison by Hyper-parameter Values Tuning. 62-69 - Md. Shohel Rana

, Andrew H. Sung
:
DeepfakeStack: A Deep Ensemble-based Learning Technique for Deepfake Detection. 70-75 - Zhixiong Chen, Zhihui Lu, Abhishek Sane, Anthony Bhimsain:

Trustworthy When Human and Bots Are Mingled. 76-81 - Yuki Iuchi, Yong Jin, Hikaru Ichise, Katsuyoshi Iida

, Yoshiaki Takai:
Detection and Blocking of DGA-based Bot Infected Computers by Monitoring NXDOMAIN Responses. 82-87 - Khalid Albulayhi

, Predrag T. Tosic, Frederick T. Sheldon:
G-Model: A Novel Approach to Privacy-Preserving 1: M Microdata Publication. 88-99 - Oluwaseyi Ajayi, Tarek N. Saadawi:

Blockchain-Based Architecture for Secured Cyber-Attack Features Exchange. 100-107 - Desheng Xu, Junyi Zhai:

Research on Aviation Man-made Error Detection and Its Impact on Flight Safety. 108-112 - Wenting Wang, Xingxing Zhou, Minmin Zhang:

An Analytical Framework to Control the Synchronization on Networks. 113-119 - Zhongwu Xie, Weipeng Cao, Xizhao Wang, Zhong Ming, Jingjing Zhang, Jiyong Zhang:

A Biologically Inspired Feature Enhancement Framework for Zero-Shot Learning. 120-125 - Yingyan Wu, Yulin He, Joshua Zhexue Huang:

Clustering Ensembles Based on Probability Density Function Estimation. 126-131 - Jingjing Zhang

, Lin Yang, Xianming Gao, Qiang Wang:
Formal analysis of QUIC handshake protocol using ProVerif. 132-138 - Shengsheng Xu, Yulin He, Joshua Zhexue Huang:

Observation Points-Based Particle Swarm Optimization Algorithm. 139-144 - Wentao Zhang, Hua Huang, Meikang Qiu:

Design and Implementation of Virtual Pottery Space Based on Ceramic Cloud Service Platform. 145-150 - Xinxin Liu, Hua Huang, Meikang Qiu:

Intelligent Algorithm for Ceramic Decorative Pattern Style Transfer Based on CycleGAN. 151-156 - Song Wen, Donghong Qin, Ting Lv, Lina Ge, Xiaodong Yang:

Traffic identification algorithm based on improved LRU. 157-159 - Junwei Zhou

, Junjiong Li, Emmanouil Panaousis
, Kaitai Liang
:
Deep Binarized Convolutional Neural Network Inferences over Encrypted Data. 160-167 - Grace Peng, Meikang Qiu:

Cost Minimization for Music Uploading to a Cloudlet. 168-173 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:

Energy Consumption for IoT Streaming Applications. 174-177 - Sahba Bahizad:

Risks of Increase in the IoT Devices. 178-181 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:

Green computing for Internet of Things. 182-185 - Atheer Almogbil, Abdullah Alghofaili, Chelsea Deane, Timothy R. Leschke:

The Accuracy of GPS-Enabled Fitbit Activities as Evidence: A Digital Forensics Study. 186-189 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:

Performance of databases in IoT applications. 190-192 - Xintong Chen, Yongxin Zhu, Xiaoying Zheng, Si Miao, Tianhao Nan, Wanyi Li:

Parallel Multi-threaded Gridrec Algorithm for Computer Tomography on GPU for Edge Computing. 193-198 - Weibin Ma, Lena Mashayekhy:

Truthful Computation Offloading Mechanisms for Edge Computing. 199-206 - Saadallah Kassir, Gustavo de Veciana, Nannan Wang, Xi Wang, Paparao Palacharla:

Service Placement for Real-Time Applications: Rate-Adaptation and Load-Balancing at the Network Edge. 207-215 - Zainab Rashid Alkindi, Mohamed Sarrab, Nasser Alzidi:

CUPA: A Configurable User Privacy Approach For Android Mobile Application. 216-221 - Zheyuan Hu, Jianwei Niu

, Tao Ren, Huiyong Li, Ye Rui, Yuan Qiu, Liang Bai:
A Resource Management Model for Real-time Edge System of Multiple Robots. 222-227 - Lei Chen, Huihua Yu, Li Tong, Xu Huai, Peipei Jin, Yu Huang, Chengfeng Dou:

Research on Load Forecasting Method of Distribution Transformer based on Deep Learning. 228-233 - Wanyi Li, Yongxin Zhu, Li Tian, Tianhao Nan, Xintong Chen:

FPGA-based Hardware Acceleration for Image Copyright Protection Syetem Based on Blockchain. 234-239 - Liuqing Yang, Xiao-Yang Liu, Jeong Soo Kim:

Cloud-based Livestock Monitoring System Using RFID and Blockchain Technology. 240-245 - Qun Ma, Jianwei Niu

, Zhenchao Ouyang
, Mo Li, Tao Ren, Qingfeng Li
:
Edge Computing-based 3D Pose Estimation and Calibration for Robot Arms. 246-251 - Cody Blakeney

, Xiaomin Li, Yan Yan, Ziliang Zong:
Craft Distillation: Layer-wise Convolutional Neural Network Distillation. 252-257 - Zheng Zhu, Yingjie Tian, Fan Li, Hongshan Yang, Zheng Ma

, Guoping Rong:
Research on Edge Intelligence-based Security Analysis Method for Power Operation System. 258-263 - Xiaowei Wang

, Gefan Ren, Huajian Zhou, Guotao Xie, Yougang Bian
, Biao Xu:
Assessing the Reliability of Hybrid Clouds with Monte Carlo Simulation. 264-269 - Yuehua Wang, Anuhya Kotha, Pei-heng Hong, Meikang Qiu:

Automated Student Engagement Monitoring and Evaluation during Learning in the Wild. 270-275 - Mohammed A. Aleisa, Abdullah Abuhussein, Faisal Alsubaei

, Frederick T. Sheldon:
Performance Analysis of Two Cloud-Based IoT Implementations: Empirical Study. 276-280 - Chuangchuang Dai, Haijing Luan

, Qingbing Yu, Xiaoyu He, Yunhao Wang, Bincheng Shuai, Xiaobing Guo, Zhonghua Lu
, Beifang Niu:
Change-Encryption: Encryption Using Spatiotemporal Information as a Function Model. 281-287

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














