


default search action
8th CSCloud / 7th EdgeCom 2021: Washington, DC, USA
- 8th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2021/7th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2021, Washington, DC, USA, June 26-28, 2021. IEEE 2021, ISBN 978-1-6654-4377-7

- Mahmudul Hassan Ashik

, Tariqul Islam, Kamrul Hasan, Kiho Lim:
A Blockchain-Based Secure Fog-Cloud Architecture for Internet of Things. 1-3 - Bharat S. Rawal, Sai Tarun Gollapudi:

No-Sum IPsec Lite: Simplified and lightweight Internet security protocol for IoT devices. 4-9 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:

Fog Computing and the Internet of Things (IoT): A Review. 10-12 - Aatish Chiniah, Utam Avinash Einstein Mungur

:
Performance Enhancing Secure Erasure Code (PESEC) for Cloud Storage using Random N Blocks Encryption. 13-17 - Xiaoqing Wen, Zhenyu Guan, Dawei Li, Hanzheng Lyu, Huimin Li:

A Blockchain-based Framework for Information Management in Internet of Vehicles. 18-23 - Feiyan Guo, Bing Tang, Mingdong Tang, Hui Zhao, Wei Liang

:
Microservice Selection in Edge-Cloud Collaborative Environment: A Deep Reinforcement Learning Approach. 24-29 - Li Zheng, Xu Zhang, Sujuan Zhang, Xuhui Chen:

Research on Multi-path Network in Cloud Computing Based on SCTP. 30-35 - Xinxin Liu, Xi En Cheng, Chenyang Liao, Jiaren Chen, Xinyu Li, Kexin Liu:

Ceramic Anti-Counterfeiting Technology Identification Method Based on Blockchain. 36-41 - Tarik Eltaeib, Nazrul Islam:

Taxonomy of Challenges in Cloud Security. 42-46 - Zoe Lin Jiang, Hui Guo, Yijian Pan, Yang Liu

, Xuan Wang, Jun Zhang:
Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys. 47-52 - Yash Patel, Bharat S. Rawal, Yunkai Liu, Md Tajmilur Rahman:

Security and Privacy Challenges in 5G-enabled Technology. 53-58 - Zijun Xu, Meng Li, Yiming Hei, Peiran Li, Jianwei Liu

:
A Malicious Android Malware Detection System based on Implicit Relationship Mining. 59-64 - Shuyu Chen, Wei Li, Jun Liu

, Haoyu Jin, Xuehui Yin:
Network Intrusion Detection Based on Subspace Clustering and BP Neural Network. 65-70 - Angel Vazquez-Salazar, Ali Ahmadinia

:
Partially Homomorphic Encryption Scheme for Real-Time Image Stream. 71-76 - Md. Ahsan Ayub

, Steven Smith, Ambareen Siraj, Paul Tinker:
Domain Generating Algorithm based Malicious Domains Detection. 77-82 - Yang Li, Liyun Bai, Mingqi Zhang, Siyuan Wang, Jing Wu, Hao Jiang

:
Network Protocol Reverse Parsing Based on Bit Stream. 83-90 - Xiaoli Wan, Wenli Li, Zhihui Lu, Xiaohua Xuan, Jie Cheng:

One WS-Management Based CoT System Management Model in Edge Computing Environment. 91-96 - Naveen Naik Sapavath

, Eric Muhati, Danda B. Rawat
:
Prediction and Detection of Cyberattacks using AI Model in Virtualized Wireless Networks. 97-102 - Xiangcong Kong

, Xiaoying Zheng, Yongxin Zhu, Qinrun Zhang, Ying Huang:
Custom Computing Design and Implementation for Multiple Dedispersion with GPU. 103-108 - Yun Su, Zenghui Yang, Naiwang Guo:

Research on Load-balancing Index Algorithm for Smart Grid System. 109-114 - Chuang Ma, Sishi Qin, Jinhao Hu, Li Yan:

Subway Flow Prediction Based on Improved Support Vector Machine. 115-120 - Qunchao Bi, Taibin Zhou, Huanhuan Lai, Jiajia Huang, Duxi Zhang, Yinqiang Huang, Bo Li:

A Smart and Safe Robot System for Electric Monitoring. 121-126 - Yizhong Liu, Meikang Qiu, Jianwei Liu, Meiqin Liu:

Blockchain-Based Access Control Approaches. 127-132 - Ripon Patgiri:

Whisper: A Curious Case of Valid and Employed Mallory in Cloud Computing. 133-138 - Manoj Muniswamaiah, Tilak Agerwala, Charles C. Tappert:

A Survey on Cloudlets, Mobile Edge, and Fog Computing. 139-142 - Keith Massey, Nadia Moazen, Talal Halabi

:
Optimizing the Allocation of Secure Fog Resources based on QoS Requirements. 143-148 - Xiangyu Gao, Meikang Qiu, Meiqin Liu:

Machine Learning Based Network Censorship. 149-154 - Wenxiu Sui, Zhaobin Liu, Haoze Lv, Zhiyang Li, Weijiang Liu:

Random Partition Region for Location Privacy Protection on Edge Computing. 155-160 - Yongqiang Lu, Zhaobin Liu, Yiming Huang:

Parameters Compressed Mechanism in Federated Learning for Edge Computing. 161-166 - Pengcheng Zhou, Yun Liu, Lei Guo, Ningning Lu, Jing Wu, Hao Jiang

:
Handoff of Satellite Network for High-Speed Mobile Terminals Based on Edge Computing. 167-175 - Haoqiang Liu, Hongbo Zhao, Liwei Geng, Yujie Wang, Wenquan Feng:

A Distributed Dependency-Aware Offloading Scheme for Vehicular Edge Computing Based on Policy Gradient. 176-181 - Bin Zhang, Chong Wang, Yumin Chen, Jian Fu, Yangjun Zhou:

An edge data access control scheme suitable for wireless smart grid environment. 182-187 - Lijun Xiao, Jiahong Cai, Meikang Qiu, Meiqin Liu:

A Secure Identity Authentication Protocol for Edge Data in Smart Grid Environment. 188-193 - Junhai Zhou, Haihan Wu, Yaping Lin, Wei Liang

, Qin Liu:
Multi-community Opportunistic Routing Algorithm Based on Machine Learning In the Internet of Vehicles. 194-199 - Liwei Geng, Hongbo Zhao, Haoqiang Liu, Yujie Wang, Wenquan Feng, Lu Bai:

Deep Reinforcement Learning-based Computation Offloading in Vehicular Networks. 200-206 - Shaofei Lu

, Xiaolin Tang, Yajun Zhu, Jingke She
:
A Cloud-Edge Collaborative Intelligent Fault Diagnosis Method Based on LSTM-VAE Hybrid Model. 207-212 - Jinjing Ma, Yongkang Peng, Wenfang Cheng, Meikang Qiu, Yu Nie:

Identification Method of Ancient Ceramics Revision. 213-218 - Guangxian Lyu, Peng Liu, Yiming Lu, Tianyou Wang, Xianguo Kang:

A Data Middle Platform Architecture Based on Microservice Serving Power Grid Business. 219-224 - Chuang Ma, Xinting Hu, Shuaiwu Liu, Lei Liu:

Attention Based Multi-Unit Spatial-Temporal Network for Traffic Flow Forecasting. 225-230

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














