default search action
10th CSCloud / 9th EdgeCom 2023: Xiangtan, Hunan, China
- 10th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2023 / IEEE 9th International Conference on Edge Computing and Scalable Cloud, EdgeCom 2023, Xiangtan, Hunan, China, July 1-3, 2023. IEEE 2023, ISBN 979-8-3503-1246-1
- Xiaoliang Wang, Hao Yue, Qing Yang:
Multimodal Data Trajectory Prediction: A Review. 1-5 - Yuchen Nie, Xiangling Ding, Wenyi Zhu, Yulin Zhao:
A Systematic Review on Detection of Manipulated Satellite Images. 6-11 - Lin Wu, Guogui Yang, Jintao Yan, Shuguang Ran, Baokang Zhao, Huan Zhou:
Simulation for urban computing scenarios: An overview and research challenges. 12-17 - Yena Zhu, Min Liu, Dongyao Jin:
A Short Review of Truck and Drone Collaborative Delivery Problem. 18-23 - Zisang Xu, Ruirui Zhang, Peng Huang, Jianbo Xu:
An Aggregation Protocol Resisting Collusion Attacks in the Internet of Vehicles Environment. 24-29 - Huan Zhang, Rui Xie, Kuan-Ching Li, Weihong Huang, Chaoyi Yang, Jingnian Liu:
Anomaly Detection Based on Deep Learning: Insights and Opportunities. 30-36 - Sihui Jia, Saiqin Long, Zhirun Zheng, Qingyong Deng, Ping Wang, Shujuan Tian:
Trajectory Privacy Protection with Pricing Awareness on Ride-on-Demand System. 37-45 - Marc Titus Trifan, Alexandru Nicolau, Alexander V. Veidenbaum:
Enhancing the Privacy of Machine Learning via faster arithmetic over Torus FHE. 46-52 - Ruoli Zhao, Yong Xie, Lijun Zhang, Haiyan Cao, Ping Liu:
An Efficient and Privacy preserving Computation Framework for Tibetan medicine. 53-58 - Zhiqiang Ruan, Yuchen Yang, Lejia Chen:
Near-Source Attack for Isolated Networks with Covert Channel Transmission. 59-64 - Qinyang Chen, Keming Wang, Tao Xie:
A Traceable Location Privacy Preserving Scheme for Data Collection in Vehicular Fog Computing. 65-71 - Zhaohui Ma, Jie Zhang, Mingdong Tang:
Optimized Random Forest for DDoS Attack Detection in SDN Environment. 72-77 - Zhixue Li, Shiwen Zhang, Naixue Xiong, Wei Liang:
Achieving Efficient and Secure Task Allocation Scheme in Mobile Crowd Sensing. 78-84 - Gengming Zhu, Jiyong Zhang, Shaobo Zhang, Yijie Yin:
Federated Learning Privacy-preserving Method Based on Bregman Optimization. 85-90 - Yan Li, Xin Su, Xin Liu, He Yi Mu, Yi Zheng, Shuping Wang:
Research on Risk Assessment Model for Social High-Risk Individuals Based on Graph Attention Network. 91-95 - Zhenyu Yang, Xinghui Zhu, Yangcong Zhang, Peng Nie, Xinbo Liu:
A Housing Price Prediction Method Based on Stacking Ensemble Learning Optimization Method. 96-101 - Feng Li, Yaqin Liu, Wei Liang, Songyou Xie, Yang Yang, Yuhui Li:
An Efficient Virtual Channel Scheme Based on Multi-hop Payment Channel. 102-107 - Jigang Wen, Yuxiang Chen, Kai Jin, Chuda Liu:
Revolutionizing Network Performance: The Active and Passive Service Path Performance Monitoring Analysis Method. 108-113 - Zhu Kai, Baokang Zhao, Qin Xin:
Predictable Track-based Routing in Flying Ad hoc Networks. 114-119 - Xiangwei Meng, Qingchun Yu, Wei Lang, Yufeng Liang, Zisang Xu, Kuanching Li:
An Efficient Authentication Protocol for Brand Cosmetics Anti-Counterfeiting System. 120-125 - Hao Wang, Dezhi Han, Zhongdai Wu, Junxiang Wang, Yuan Fan, Yachao Zhou:
NAS-YOLOX: ship detection based on improved YOLOX for SAR imagery. 126-131 - Peng Che, Zhenlian Peng, Buqing Cao, Jianxun Liu, Tieping Chen, Runqing Fan:
A missing physical fitness test data classification method based on MLP. 132-137 - Shao-Jie Sun, Lin-Shu Chen, Ben-Xia Mei, Tao Li, Xue-Qi Ye, Min Shi:
A Weighted k-Medoids Clustering Algorithm Based on Granular Computing. 138-143 - Xiai Yan, Shengkai Ding, Weiqi Shi:
MobileNetV3-YOLOv5-based Network Model for Pedestrian Detection. 144-149 - Miaolei Deng, Haonan Zhai, Kai Yang:
Social engineering in metaverse environment. 150-154 - Peiyuan Zhu, Lijun Xiao, Shu Tan, Jiahong Cai, Yingzi Huo, Ronglin Zhang:
5G Spectrum Research. 155-160 - Jing Long, Cuiting Luo, Ruxin Chen:
Multivariate Time Series Anomaly Detection with Improved Encoder-Decoder Based Model. 161-166 - Bing Xia, Yunxiang Ge, Ruinan Yang, Jiabin Yin, Jianmin Pang, Chongjun Tang:
BContext2Name: Naming Functions in Stripped Binaries with Multi-Label Learning and Neural Networks. 167-172 - Chenying Xu, Yanfei Yin, Yingwen Chen:
A Secret and Traceable Approach for Cloud Data Sharing. 173-180 - Rui-Ding Gao, Lei Jiang, Zi-Wei Zou, Yuan Li, Yu-Rong Hu:
A Sentiment-Support Graph Convolutional Network for Aspect-Level Sentiment Analysis. 181-185 - Lantao Zheng, Wenxin Kuang, Qizhuang Liang, Wei Liang, Qiao Hu, Wei Fu, Xiashu Ding, Bijiang Xu, Yupeng Hu:
Reducing the Length Divergence Bias for Textual Matching Models via Alternating Adversarial Training. 186-191 - Zuoting Ning, Zihua Ouyang, Xiangcheng Deng:
An Improved Apriori Algorithm Based on Transaction Sequence Counting. 192-196 - Wenyu Tang, Mingdong Tang, Fenfang Xie:
Temporal-aware QoS Prediction based on Tensor Factorization and Self-Attention for Cloud Services. 197-202 - Souradip Roy, Juan Li, Yan Bai:
Federated Learning-Based Intrusion Detection System for IoT Environments with Locally Adapted Model. 203-209 - Han Deng, Yuhui Li, Songyou Xie, Yang Yang, Yaqin Liu:
Data Augmentation for Tensor Completion via Embedding Gradient Tracking. 210-216 - Yang Liang, Changsong Ding, Zhigang Hu:
Data Placement Strategy of Data-Intensive Workflows in Collaborative Cloud-Edge Environment. 217-222 - Runqing Fan, Zhenlian Peng, Buqing Cao, Jianxun Liu, Peng Che, Tieping Chen:
A One-Dimensional Residual Network and Physical Fitness-Based Exercise Prescription Recommendation Method. 223-228 - Shuping Wang, Chongze Lin, Yi Zheng:
Using User-Item Sub-Block to Improve Recommendation Systems. 229-234 - Ben-Xia Mei, Lin-Shu Chen, Shao-Jie Sun, Pan-Yu Chen, Wei-Liang Huang:
A New Multi-Feature Recommendation Model Based on Recurrent Neural Network. 235-240 - Yang Yang, Kai Jin, Wei Liang, Yaqin Liu, Yuhui Li, Osama Hosam:
A Review of Blockchain-based Privacy Computing Research. 241-246 - Yihan Kong, Qinyang Chen, Jing Li, Ting Xiong, Tao Xie:
EVONChain: A Public Blockchain Architecture with Bi-tiered Network for Edge Computing. 247-253 - Jun Guo, Liming Zhong, Yuxia Dong, Junjie Wu:
Security sharing of smart city communication data based on blockchain technology. 254-258 - Peilin Zheng, Bowei Su, Zigui Jiang, Changlin Yang, Jiachi Chen, Jiajing Wu:
Exploring Heterogeneous Decentralized Markets in DeFi and NFT on Ethereum Blockchain. 259-267 - Mirza Kamrul Bashar Shuhan, Tariqul Islam, Enam A. Shuvo, Faisal H. Bappy, Kamrul Hasan, Carlos Caicedo:
Quarks: A Secure and Decentralized Blockchain-Based Messaging Network. 268-274 - Yufeng Xiao, Yuqin Bo, Zhiling Zheng:
Speech Emotion Recognition based on Semi-Supervised Adversarial Variational Autoencoder. 275-280 - Yuelong Liu, Zhuo Xu, Jian Lin, Jianlong Xu, Lingru Cai:
MSA-Fed: Model Similarity Aware Federated Learning for Data Heterogeneous QoS Prediction. 281-286 - YinE Zhang, XiaoWen Ye, Qi Zhou:
Research on Application of Generative Adversarial Neural Network in Image Restoration. 287-291 - Zhenzhen Wang, Jia Zhang, Zhihuan Liu, Shaomiao Chen, Danqing Lu:
An improved U-Net network for medical image segmentation. 292-297 - Baofeng Qi, Shaojiang Sun, Yihui Tong, Jie Zhang, Zhehe Wang, Xianchao Wang:
Algorithm-based Study on Transformation Combination for Carry-free Modified Signed Digit(MSD) Addition. 298-304 - Shuai Zhang, Xiang Chen, Li Peng:
scIAMC:Single-Cell Imputation via adaptive matrix completion. 305-310 - Wei Li, Yongwei Fan, Xi Xiao, Fang Xie, Ping Zeng, Zhigang Liu, Yanwei Fu, Jing Long, Xiao Wang:
Incremental Multivariate State Estimation Technique-Based Fault Estimation Method for Motor-driven High-Voltage Circuit Breakers. 311-317 - Chongjing Huang, Qi Fu, Chaoliang Wang, Zhaohui Li:
Joint Task Offloading and Scheduling Algorithm in Vehicular Edge Computing Networks. 318-323 - Yiwen Liu, Zhirong Zhu, Tangyan, Wenkan Wen, Xiaoning Peng, Yuanquan Shi:
Research on Fast Adaptive Transmission Models for International Inland Port Based on Edge Intelligence. 324-329 - Peiyuan Guan, Yushuai Li, Amir Taherkordi:
A Prediction Based Resource Reservation Algorithm for Service Handover in Edge Computing. 330-335 - Jing Huang, Wenyu Wu, Weihong Huang, Yufeng Xiao, Li Lisi, Jinxi Sun:
A Survey on Task Partitioning and Scheduling for Vehicular Edge Computing. 336-342 - Junjie Wu, Xueting Huang, Jingnian Liu, Yingzi Huo, Gaojing Yuan, Ronglin Zhang:
NLP Research Based on Transformer Model. 343-348 - Vikram Pandey, Juan Li, Yan Bai:
A Secure Semantics-enhanced Decentralized Open IoT Service Platform. 349-356 - Weidong Xiao, Wenjin Tan, Naixue Xiong, Ce Yang, Lin Chen, Rui Xie:
Deep Learning Emotion Recognition Method. 357-362 - MeiJiao Zhang, Jiacheng Pang, Jiahong Cai, Yingzi Huo, Ce Yang, Huixuan Xiong:
DPCNN-based Models for Text Classification. 363-368 - Chengjun Yang, Jansheng Peng, Jiahong Cai, Yuna Tang, Ling Zhou, YaoSheng Yang:
Research and design of a machine vision-based silk cocoon quality inspection system. 369-374 - Jing Liao, Xiande Su, Cheng Peng:
A Simple Completely Adjacency List Oriented Relational Extraction Model. 375-380 - Gejing Xu, Wei Liang, Jiahong Cai, Jiahong Xiao, Xingyu Chen, Yinyan Gong:
Automotive Lightweight Design Modeling And Intelligent Optimization Learn Key Technologies. 381-386 - Lan Yang, Chaoyi Yang, Rui Xie, Jingnian Liu, Huan Zhang, Wenjin Tan:
3D Reconstruction From Traditional Methods to Deep Learning. 387-392 - Qinyang Chen, Yihan Kong, Lianglun Cheng:
A Digital Copyright Protection System Based on Blockchain and with Sharding Network. 393-398 - Lijun Xiao, Dezhi Han, Sisi Zhou, Nengxiang Xu, Lin Chen, Siqi Xie:
A Blockchain-empowered Federated Learning Framework Supprting GDPR-compliance. 399-404 - Mo Wang, Yi Zheng, Chongze Lin, Yan Cui, Yuxin Wu, Shuping Wang:
Privacy Protection Technology for Internet of Vehicles. 405-410 - Ying Wang, Lei Cheng, Jianbo Xu, Shaobo Zhang:
A Terminal Device Authentication Scheme Based on Blockchain Technology in WBAN. 411-416 - Yihua Ma, Jing Liao, Jianliang Gao:
Enhanced Feature Extraction Method for EEG Based on Empirical Mode Decomposition. 417-422 - Haoyu Wu, Jun Qi, Yong Yue:
Machine Learning-based EEG Signal Classification of Parkinson's Disease. 423-428 - Tao Huang, Xiang Chen, Li Peng:
ESR: Optimizing Gene Feature Selection for scRNA-seq Data. 429-433 - Xiaojun Zhang, Weiyu Zhong, Ce Yang, Lin Chen, Jing Liao, Naixue Xiong:
BFT Consensus Algorithms. 434-439 - Honglong Chen, Mindong Liu, Jing Huang, Zhiling Zheng, Weihong Huang, Yufeng Xiao:
A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks. 440-445 - Osama Hosam, Rasha Abou Samra, Ahmed Ghonim, Khaled Shaalan:
Utilizing Machine Learning to Develop Cloud-Based Apprenticeship Programs Aligned with Labor Market Demands. 446-451 - Weihong Huang, Kuan Jiang, Jing Huang, Li Lisi, Yufeng Xiao, Zihao Deng:
Energy-saving Processors Two-phases Frequency Reduction Algorithm on Heterogeneous Embedded Systems. 452-457 - Jigang Wen, Yuxiang Chen, Chuda Liu:
Incentive Aware Computation Resource Sharing and Partition in Pervasive Mobile Cloud. 458-463 - Anxing Xie, Yonghua Hu, Aobo Cheng, Zhuoyou Tang, Peng Liu, Xin Zhang:
Advancing Matrix Decomposition Efficiency: A Study on FT-Matrix DSP Based SVD Optimization. 464-469 - Wenmin Zeng, Dezhi Han, Mingming Cui, Zhongdai Wu, Bing Han, Hongxu Zhou:
IFLV: Wireless network intrusion detection model integrating FCN, LSTM, and ViT. 470-475
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.