


default search action
10th CSCloud / 9th EdgeCom 2023: Xiangtan, Hunan, China
- 10th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2023 / IEEE 9th International Conference on Edge Computing and Scalable Cloud, EdgeCom 2023, Xiangtan, Hunan, China, July 1-3, 2023. IEEE 2023, ISBN 979-8-3503-1246-1

- Xiaoliang Wang, Hao Yue, Qing Yang:

Multimodal Data Trajectory Prediction: A Review. 1-5 - Yuchen Nie, Xiangling Ding, Wenyi Zhu, Yulin Zhao:

A Systematic Review on Detection of Manipulated Satellite Images. 6-11 - Lin Wu, Guogui Yang, Jintao Yan, Shuguang Ran, Baokang Zhao, Huan Zhou:

Simulation for urban computing scenarios: An overview and research challenges. 12-17 - Yena Zhu, Min Liu, Dongyao Jin:

A Short Review of Truck and Drone Collaborative Delivery Problem. 18-23 - Zisang Xu, Ruirui Zhang, Peng Huang, Jianbo Xu:

An Aggregation Protocol Resisting Collusion Attacks in the Internet of Vehicles Environment. 24-29 - Huan Zhang, Rui Xie, Kuan-Ching Li, Weihong Huang, Chaoyi Yang, Jingnian Liu:

Anomaly Detection Based on Deep Learning: Insights and Opportunities. 30-36 - Sihui Jia, Saiqin Long, Zhirun Zheng, Qingyong Deng, Ping Wang, Shujuan Tian:

Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System. 37-45 - Marc Titus Trifan, Alexandru Nicolau, Alexander V. Veidenbaum:

Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE. 46-52 - Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu:

An Efficient and Privacy preserving Computation Framework for Tibetan medicine. 53-58 - Zhiqiang Ruan, Yuchen Yang, Lejia Chen:

Near-Source Attack for Isolated Networks with Covert Channel Transmission. 59-64 - Qinyang Chen, Keming Wang

, Tao Xie:
A Traceable Location Privacy Preserving Scheme for Data Collection in Vehicular Fog Computing. 65-71 - Zhaohui Ma, Jie Zhang, Mingdong Tang:

Optimized Random Forest for DDoS Attack Detection in SDN Environment. 72-77 - Zhixue Li, Shiwen Zhang, Naixue Xiong, Wei Liang

:
Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd Sensing. 78-84 - Gengming Zhu, Jiyong Zhang, Shaobo Zhang, Yijie Yin:

Federated Learning Privacy-preserving Method Based on Bregman Optimization. 85-90 - Yan Li, Xin Su, Xin Liu, He Yi Mu, Yi Zheng, Shuping Wang:

Research on Risk Assessment Model for Social High-Risk Individuals Based on Graph Attention Network. 91-95 - Zhenyu Yang, Xinghui Zhu, Yangcong Zhang, Peng Nie, Xinbo Liu:

A Housing Price Prediction Method Based on Stacking Ensemble Learning Optimization Method. 96-101 - Feng Li, Yaqin Liu

, Wei Liang
, Songyou Xie, Yang Yang, Yuhui Li
:
An Efficient Virtual Channel Scheme Based on Multi-hop Payment Channel. 102-107 - Jigang Wen, Yuxiang Chen, Kai Jin, Chuda Liu:

Revolutionizing Network Performance: The Active and Passive Service Path Performance Monitoring Analysis Method. 108-113 - Kai Zhu, Baokang Zhao, Qin Xin:

Predictable Track-based Routing in Flying Ad hoc Networks. 114-119 - Xiangwei Meng, Qingchun Yu, Wei Liang

, Yufeng Liang, Zisang Xu, Kuanching Li:
An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System. 120-125 - Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang

, Yuan Fan, Yachao Zhou:
NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery. 126-131 - Peng Che, Zhenlian Peng, Buqing Cao, Jianxun Liu, Tieping Chen, Runqing Fan:

A missing physical fitness test data classification method based on MLP. 132-137 - Shao-Jie Sun, Lin-Shu Chen, Ben-Xia Mei, Tao Li, Xue-Qi Ye, Min Shi:

A Weighted k-Medoids Clustering Algorithm Based on Granular Computing. 138-143 - Xiai Yan, Shengkai Ding, Weiqi Shi:

MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection. 144-149 - Miaolei Deng, Haonan Zhai, Kai Yang:

Social engineering in metaverse environment. 150-154 - Peiyuan Zhu, Lijun Xiao, Shu Tan, Jiahong Cai, Yingzi Huo, Ronglin Zhang:

5G Spectrum Research. 155-160 - Jing Long, Cuiting Luo, Ruxin Chen:

Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based Model. 161-166 - Bing Xia, Yunxiang Ge, Ruinan Yang, Jiabin Yin, Jianmin Pang, Chongjun Tang:

BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks. 167-172 - Chenying Xu, Yanfei Yin, Yingwen Chen:

A Secret and Traceable Approach for Cloud Data Sharing. 173-180 - Rui-Ding Gao, Lei Jiang, Zi-Wei Zou, Yuan Li, Yu-Rong Hu:

A Sentiment-Support Graph Convolutional Network for Aspect-Level Sentiment Analysis. 181-185 - Lantao Zheng, Wenxin Kuang, Qizhuang Liang, Wei Liang

, Qiao Hu, Wei Fu, Xiashu Ding, Bijiang Xu, Yupeng Hu:
Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training. 186-191 - Zuoting Ning, Zihua Ouyang, Xiangcheng Deng:

An Improved Apriori Algorithm Based on Transaction Sequence Counting. 192-196 - Wenyu Tang, Mingdong Tang, Fenfang Xie:

Temporal-aware QoS Prediction based on Tensor Factorization and Self-Attention for Cloud Services. 197-202 - Souradip Roy, Juan Li, Yan Bai:

Federated Learning-Based Intrusion Detection System for IoT Environments with Locally Adapted Model. 203-209 - Han Deng, Yuhui Li

, Songyou Xie, Yang Yang, Yaqin Liu:
Data Augmentation for Tensor Completion via Embedding Gradient Tracking. 210-216 - Yang Liang, Changsong Ding, Zhigang Hu:

Data Placement Strategy of Data-Intensive Workflows in Collaborative Cloud-Edge Environment. 217-222 - Runqing Fan, Zhenlian Peng, Buqing Cao, Jianxun Liu, Peng Che, Tieping Chen:

A One-Dimensional Residual Network and Physical Fitness-Based Exercise Prescription Recommendation Method. 223-228 - Shuping Wang, Chongze Lin, Yi Zheng:

Using User-Item Sub-Block to Improve Recommendation Systems. 229-234 - Ben-Xia Mei, Lin-Shu Chen, Shao-Jie Sun, Pan-Yu Chen, Wei-Liang Huang:

A New Multi-Feature Recommendation Model Based on Recurrent Neural Network. 235-240 - Yang Yang, Kai Jin, Wei Liang

, Yaqin Liu, Yuhui Li
, Osama Hosam
:
A Review of Blockchain-based Privacy Computing Research. 241-246 - Yihan Kong, Qinyang Chen, Jing Li, Ting Xiong, Tao Xie:

EVONChain: A Public Blockchain Architecture with Bi-tiered Network for Edge Computing. 247-253 - Jun Guo, Liming Zhong, Yuxia Dong, Junjie Wu:

Security sharing of smart city communication data based on blockchain technology. 254-258 - Peilin Zheng, Bowei Su, Zigui Jiang, Changlin Yang, Jiachi Chen

, Jiajing Wu:
Exploring Heterogeneous Decentralized Markets in DeFi and NFT on Ethereum Blockchain. 259-267 - Mirza Kamrul Bashar Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal H. Bappy

, Kamrul Hasan
, Carlos Caicedo
:
Quarks: A Secure and Decentralized Blockchain-Based Messaging Network. 268-274 - Yufeng Xiao, Yuqin Bo, Zhiling Zheng:

Speech Emotion Recognition based on Semi-Supervised Adversarial Variational Autoencoder. 275-280 - Yuelong Liu, Zhuo Xu, Jian Lin, Jianlong Xu, Lingru Cai:

MSA-Fed: Model Similarity Aware Federated Learning for Data Heterogeneous QoS Prediction. 281-286 - YinE Zhang, XiaoWen Ye, Qi Zhou:

Research on Application of Generative Adversarial Neural Network in Image Restoration. 287-291 - Zhenzhen Wang, Jia Zhang, Zhihuan Liu

, Shaomiao Chen, Danqing Lu:
An improved U-Net network for medical image segmentation. 292-297 - Baofeng Qi, Shaojiang Sun, Yihui Tong, Jie Zhang, Zhehe Wang, Xianchao Wang:

Algorithm-based Study on Transformation Combination for Carry-free Modified Signed Digit(MSD) Addition. 298-304 - Shuai Zhang, Xiang Chen

, Li Peng:
scIAMC:Single-Cell Imputation via adaptive matrix completion. 305-310 - Wei Li, Yongwei Fan, Xi Xiao, Fang Xie, Ping Zeng, Zhigang Liu, Yanwei Fu, Jing Long, Xiao Wang:

Incremental Multivariate State Estimation Technique-Based Fault Estimation Method for Motor-driven High-Voltage Circuit Breakers. 311-317 - Chongjing Huang, Qi Fu, Chaoliang Wang, Zhaohui Li:

Joint Task Offloading and Scheduling Algorithm in Vehicular Edge Computing Networks. 318-323 - Yiwen Liu, Zhirong Zhu, Tangyan, Wenkan Wen, Xiaoning Peng, Yuanquan Shi

:
Research on Fast Adaptive Transmission Models for International Inland Port Based on Edge Intelligence. 324-329 - Peiyuan Guan

, Yushuai Li
, Amir Taherkordi:
A Prediction Based Resource Reservation Algorithm for Service Handover in Edge Computing. 330-335 - Jing Huang, Wenyu Wu, Weihong Huang, Yufeng Xiao, Li Lisi, Jinxi Sun:

A Survey on Task Partitioning and Scheduling for Vehicular Edge Computing. 336-342 - Junjie Wu, Xueting Huang, Jingnian Liu, Yingzi Huo, Gaojing Yuan, Ronglin Zhang:

NLP Research Based on Transformer Model. 343-348 - Vikram Pandey, Juan Li, Yan Bai:

A Secure Semantics-enhanced Decentralized Open IoT Service Platform. 349-356 - Weidong Xiao, Wenjin Tan, Naixue Xiong, Ce Yang, Lin Chen, Rui Xie:

Deep Learning Emotion Recognition Method. 357-362 - MeiJiao Zhang, Jiacheng Pang, Jiahong Cai, Yingzi Huo, Ce Yang, Huixuan Xiong:

DPCNN-based Models for Text Classification. 363-368 - Chengjun Yang, Jansheng Peng, Jiahong Cai, Yuna Tang, Ling Zhou, YaoSheng Yang:

Research and design of a machine vision-based silk cocoon quality inspection system. 369-374 - Jing Liao, Xiande Su, Cheng Peng:

A Simple Completely Adjacency List Oriented Relational Extraction Model. 375-380 - Gejing Xu, Wei Liang

, Jiahong Cai, Jiahong Xiao, Xingyu Chen, Yinyan Gong:
Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key Technologies. 381-386 - Lan Yang, Chaoyi Yang, Rui Xie, Jingnian Liu, Huan Zhang, Wenjin Tan:

3D Reconstruction From Traditional Methods to Deep Learning. 387-392 - Qinyang Chen, Yihan Kong, Lianglun Cheng:

A Digital Copyright Protection System Based on Blockchain and with Sharding Network. 393-398 - Lijun Xiao, Dezhi Han, Sisi Zhou, Nengxiang Xu, Lin Chen, Siqi Xie:

A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance. 399-404 - Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang:

Privacy Protection Technology for Internet of Vehicles. 405-410 - Ying Wang, Lei Cheng, Jianbo Xu, Shaobo Zhang:

A Terminal Device Authentication Scheme Based on Blockchain Technology in WBAN. 411-416 - Yihua Ma, Jing Liao, Jianliang Gao:

Enhanced Feature Extraction Method for EEG Based on Empirical Mode Decomposition. 417-422 - Haoyu Wu

, Jun Qi, Yong Yue:
Machine Learning-based EEG Signal Classification of Parkinson's Disease. 423-428 - Tao Huang, Xiang Chen

, Li Peng:
ESR: Optimizing Gene Feature Selection for scRNA-seq Data. 429-433 - Xiaojun Zhang, Weiyu Zhong, Ce Yang, Lin Chen, Jing Liao, Naixue Xiong:

BFT Consensus Algorithms. 434-439 - Honglong Chen, Mindong Liu, Jing Huang, Zhiling Zheng, Weihong Huang, Yufeng Xiao:

A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks. 440-445 - Osama Hosam

, Rasha Abou Samra, Ahmed Ghonim, Khaled Shaalan:
Utilizing Machine Learning to Develop Cloud-Based Apprenticeship Programs Aligned with Labor Market Demands. 446-451 - Weihong Huang, Kuan Jiang, Jing Huang, Li Lisi, Yufeng Xiao, Zihao Deng:

Energy-saving Processors Two-phases Frequency Reduction Algorithm on Heterogeneous Embedded Systems. 452-457 - Jigang Wen, Yuxiang Chen, Chuda Liu:

Incentive Aware Computation Resource Sharing and Partition in Pervasive Mobile Cloud. 458-463 - Anxing Xie, Yonghua Hu, Aobo Cheng, Zhuoyou Tang, Peng Liu, Xin Zhang:

Advancing Matrix Decomposition Efficiency: A Study on FT-Matrix DSP Based SVD Optimization. 464-469 - Wenmin Zeng, Dezhi Han, Mingming Cui, Zhongdai Wu, Bing Han, Hongxu Zhou:

IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT. 470-475

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














