:facetid:toc:\"db/conf/cyberc/cyberc2019.bht\"OK:facetid:toc:db/conf/cyberc/cyberc2019.bhtBin Cao 0002Shouming HuangDaquan FengLei Zhang 0035Shengli ZhangMugen PengImpact of Network Load on Direct Acyclic Graph Based Blockchain for Internet of Things.CyberC215-2182019Conference and Workshop Papersclosedconf/cyberc/0002HF0ZP1910.1109/CYBERC.2019.00044https://doi.org/10.1109/CyberC.2019.00044https://dblp.org/rec/conf/cyberc/0002HF0ZP19URL#2150332Elena BasanAlexander S. BasanOleg B. MakarevichDetection of Anomalies in the Robotic System Based on the Calculation of Kullback-Leibler Divergence.CyberC337-3402019Conference and Workshop Papersclosedconf/cyberc/BasanBM1910.1109/CYBERC.2019.00064https://doi.org/10.1109/CyberC.2019.00064https://dblp.org/rec/conf/cyberc/BasanBM19URL#2150333Sonali ChandelZang JingjiYu YunnanSun JingyaoZhipeng ZhangThe Golden Shield Project of China: A Decade Later - An in-Depth Study of the Great Firewall.CyberC111-1192019Conference and Workshop Papersclosedconf/cyberc/ChandelJYJZ1910.1109/CYBERC.2019.00027https://doi.org/10.1109/CyberC.2019.00027https://dblp.org/rec/conf/cyberc/ChandelJYJZ19URL#2150334Sonali ChandelYu SunYitian TangZhili ZhouYusheng HuangEndpoint Protection: Measuring the Effectiveness of Remediation Technologies and Methodologies for Insider Threat.CyberC81-892019Conference and Workshop Papersclosedconf/cyberc/ChandelSTZH1910.1109/CYBERC.2019.00023https://doi.org/10.1109/CyberC.2019.00023https://dblp.org/rec/conf/cyberc/ChandelSTZH19URL#2150335Shun-Ping ChenNear Field Beam Forming Characteristics of Conformal Antenna Arrays.CyberC292-2972019Conference and Workshop Papersclosedconf/cyberc/Chen1910.1109/CYBERC.2019.00057https://doi.org/10.1109/CyberC.2019.00057https://dblp.org/rec/conf/cyberc/Chen19URL#2150336Yuxiang ChenGuishan DongJian BaiYao HaoFeng LiHaiyang PengTrust Enhancement Scheme for Cross Domain Authentication of PKI System.CyberC103-1102019Conference and Workshop Papersclosedconf/cyberc/ChenDBHLP1910.1109/CYBERC.2019.00026https://doi.org/10.1109/CyberC.2019.00026https://dblp.org/rec/conf/cyberc/ChenDBHLP19URL#2150337Sinan ChenSachio SaikiMasahide NakamuraRecognizing Fine-Grained Home Contexts Using Multiple Cognitive APIs.CyberC360-3662019Conference and Workshop Papersclosedconf/cyberc/ChenSN1910.1109/CYBERC.2019.00068https://doi.org/10.1109/CyberC.2019.00068https://dblp.org/rec/conf/cyberc/ChenSN19URL#2150338Wenwen ChenZhibin ZhangHui LiShuaimin HouA New Method for Error Analysis of Binocular Stereo Vision System.CyberC125-1302019Conference and Workshop Papersclosedconf/cyberc/ChenZLH1910.1109/CYBERC.2019.00029https://doi.org/10.1109/CyberC.2019.00029https://dblp.org/rec/conf/cyberc/ChenZLH19URL#2150339Hua ChengYiquan FangLihuang ChenJing CaiDetecting Domain Generation Algorithms Based on Reinforcement Learning.CyberC261-2642019Conference and Workshop Papersclosedconf/cyberc/ChengFCC1910.1109/CYBERC.2019.00051https://doi.org/10.1109/CyberC.2019.00051https://dblp.org/rec/conf/cyberc/ChengFCC19URL#2150340Kirsten CremonaDonald TaboneClifford De RaffaeleCybersecurity and the Blockchain: Preventing the Insertion of Child Pornography Images.CyberC197-2042019Conference and Workshop Papersclosedconf/cyberc/CremonaTR1910.1109/CYBERC.2019.00042https://doi.org/10.1109/CyberC.2019.00042https://dblp.org/rec/conf/cyberc/CremonaTR19URL#2150341Chunhua DengJia FanZhen WangYili LuoYue ZhengYixin LiJianwei DingA Survey on Range Proof and Its Applications on Blockchain.CyberC1-82019Conference and Workshop Papersclosedconf/cyberc/DengFWLZLD1910.1109/CYBERC.2019.00011https://doi.org/10.1109/CyberC.2019.00011https://dblp.org/rec/conf/cyberc/DengFWLZLD19URL#2150342Quansheng DouPanpan CuiSlot Filling Using En-Training.CyberC271-2762019Conference and Workshop Papersclosedconf/cyberc/DouC1910.1109/CYBERC.2019.00053https://doi.org/10.1109/CyberC.2019.00053https://dblp.org/rec/conf/cyberc/DouC19URL#2150343Ge GaoYingzhou ZhangJunyan QianYuxin SunThe Lightweight System for UAV Cooperative Mission Planning Simulation.CyberC371-3742019Conference and Workshop Papersclosedconf/cyberc/GaoZQS1910.1109/CYBERC.2019.00070https://doi.org/10.1109/CyberC.2019.00070https://dblp.org/rec/conf/cyberc/GaoZQS19URL#2150344Jingtong GeGeneralization of Quantum Strassen Theorem.CyberC379-3822019Conference and Workshop Papersclosedconf/cyberc/Ge1910.1109/CYBERC.2019.00072https://doi.org/10.1109/CyberC.2019.00072https://dblp.org/rec/conf/cyberc/Ge19URL#2150345Xiaowei HeYiju CuiYunchao JiangAn Improved Gossip Algorithm Based on Semi-Distributed Blockchain Network.CyberC24-272019Conference and Workshop Papersclosedconf/cyberc/HeCJ1910.1109/CYBERC.2019.00014https://doi.org/10.1109/CyberC.2019.00014https://dblp.org/rec/conf/cyberc/HeCJ19URL#2150346Qingsheng HuXiangning FanQiaowei ZhangAn Effective Differential Power Attack Method for Advanced Encryption Standard.CyberC58-612019Conference and Workshop Papersclosedconf/cyberc/HuFZ1910.1109/CYBERC.2019.00019https://doi.org/10.1109/CyberC.2019.00019https://dblp.org/rec/conf/cyberc/HuFZ19URL#2150347Haihui HuangJing CaiShaoci XieImplementing an Asset Trading System Based on Blockchain and Game Theory.CyberC219-2262019Conference and Workshop Papersclosedconf/cyberc/HuangCX1910.1109/CYBERC.2019.00045https://doi.org/10.1109/CyberC.2019.00045https://dblp.org/rec/conf/cyberc/HuangCX19URL#2150348Tinghui HuangYong Ding 0005Zhen WangHuijiao WangUltralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption.CyberC417-4232019Conference and Workshop Papersclosedconf/cyberc/HuangDWW1910.1109/CYBERC.2019.00078https://doi.org/10.1109/CyberC.2019.00078https://dblp.org/rec/conf/cyberc/HuangDWW19URL#2150349Yaohui JiaFeng ChenPeng WuQiang LiuYamin ChenYun LiuA Study of Online Function Approximation System Based on BP Neural Network.CyberC147-1502019Conference and Workshop Papersclosedconf/cyberc/JiaCWLCL1910.1109/CYBERC.2019.00034https://doi.org/10.1109/CyberC.2019.00034https://dblp.org/rec/conf/cyberc/JiaCWLCL19URL#2150350Shuai JiangXiaolong Xu 0002Impact of Feature Selection Methods on Data Classification for IDS.CyberC174-1802019Conference and Workshop Papersclosedconf/cyberc/JiangX1910.1109/CYBERC.2019.00039https://doi.org/10.1109/CyberC.2019.00039https://dblp.org/rec/conf/cyberc/JiangX19URL#2150351Bo JiaoA Method for Extracting Topological Features of Internet Testbeds Oriented to Equivalent Deduction.CyberC245-2482019Conference and Workshop Papersclosedconf/cyberc/Jiao1910.1109/CYBERC.2019.00048https://doi.org/10.1109/CyberC.2019.00048https://dblp.org/rec/conf/cyberc/Jiao19URL#2150352Lin LiLinfeng WeiAutomatic XSS Detection and Automatic Anti-Anti-Virus Payload Generation.CyberC71-762019Conference and Workshop Papersclosedconf/cyberc/LiW1910.1109/CYBERC.2019.00021https://doi.org/10.1109/CyberC.2019.00021https://dblp.org/rec/conf/cyberc/LiW19URL#2150353Yixin LiZhen WangJia FanYue ZhengYili LuoChunhua DengJianwei DingAn Extensible Consensus Algorithm Based on PBFT.CyberC17-232019Conference and Workshop Papersclosedconf/cyberc/LiWFZLDD1910.1109/CYBERC.2019.00013https://doi.org/10.1109/CyberC.2019.00013https://dblp.org/rec/conf/cyberc/LiWFZLDD19URL#2150354Jiangpeng LinYu WuLi WangWeidong AiYan ZengA User Influence Rank Algorithm Based on Interaction Behaviors in Cyber Group Events.CyberC151-1572019Conference and Workshop Papersclosedconf/cyberc/LinWWAZ1910.1109/CYBERC.2019.00035https://doi.org/10.1109/CyberC.2019.00035https://dblp.org/rec/conf/cyberc/LinWWAZ19URL#2150355Annv LiuAn Wang 0001Yongyin DongYing ShiCaisen ChenGuoshuang ZhangPower Attack and Evaluation on Elliptic Curve Cryptosystem in a Commercial Smart Card.CyberC354-3592019Conference and Workshop Papersclosedconf/cyberc/Liu0DSCZ1910.1109/CYBERC.2019.00067https://doi.org/10.1109/CyberC.2019.00067https://dblp.org/rec/conf/cyberc/Liu0DSCZ19URL#2150356Yu LiuChunling ChengYulong LiLei WangNetwork Coding for Reliable Video Distribution in Device-to-Device Communications.CyberC143-1462019Conference and Workshop Papersclosedconf/cyberc/LiuCLW1910.1109/CYBERC.2019.00033https://doi.org/10.1109/CyberC.2019.00033https://dblp.org/rec/conf/cyberc/LiuCLW19URL#2150357Xia LiuYi-Nan ChenZhao QiuMingrui ChenForecast of the Tourist Volume of Sanya City by XGBoost Model and GM Model.CyberC166-1732019Conference and Workshop Papersclosedconf/cyberc/LiuCQC1910.1109/CYBERC.2019.00038https://doi.org/10.1109/CyberC.2019.00038https://dblp.org/rec/conf/cyberc/LiuCQC19URL#2150358Qiong LiuPengxiang HuaAwais SultanLongzhang ShenEgon MüllerFrank BoernerStudy of the Integration of Robot in Cyber-Physical Production Systems.CyberC367-3702019Conference and Workshop Papersclosedconf/cyberc/LiuHSSMB1910.1109/CYBERC.2019.00069https://doi.org/10.1109/CyberC.2019.00069https://dblp.org/rec/conf/cyberc/LiuHSSMB19URL#2150359Pengxue LiuDalong ZhangYitong LiShijie ShiCuiping KongA Reliable Broadcast Algorithm with Multiple-Opportunity Acknowledgement in Internet of Vehicles.CyberC322-3282019Conference and Workshop Papersclosedconf/cyberc/LiuZLSK1910.1109/CYBERC.2019.00062https://doi.org/10.1109/CyberC.2019.00062https://dblp.org/rec/conf/cyberc/LiuZLSK19URL#2150360Xuefeng LiuGansen ZhaoXinming WangYixing LinZiheng ZhouHua TangBingchuan ChenMDP-Based Quantitative Analysis Framework for Proof of Authority.CyberC227-2362019Conference and Workshop Papersclosedconf/cyberc/LiuZWLZTC1910.1109/CYBERC.2019.00046https://doi.org/10.1109/CyberC.2019.00046https://dblp.org/rec/conf/cyberc/LiuZWLZTC19URL#2150361Weifeng LuMingji WangJia Xu 0003Siguang ChenLijun YangJian XuDistributed Node Selection Algorithm for Physical Layer Security in D2D Network.CyberC77-802019Conference and Workshop Papersclosedconf/cyberc/LuWXCYX1910.1109/CYBERC.2019.00022https://doi.org/10.1109/CyberC.2019.00022https://dblp.org/rec/conf/cyberc/LuWXCYX19URL#2150362Yili LuoJia FanChunhua DengYixin LiYue ZhengJianwei DingAccountable Data Sharing Scheme Based on Blockchain and SGX.CyberC9-162019Conference and Workshop Papersclosedconf/cyberc/LuoFDLZD1910.1109/CYBERC.2019.00012https://doi.org/10.1109/CyberC.2019.00012https://dblp.org/rec/conf/cyberc/LuoFDLZD19URL#2150363Chuang MaYanming LiangXiaofei LyuWeather Analysis to Predict Rice Pest Using Neural Network and D-S Evidential Theory.CyberC277-2832019Conference and Workshop Papersclosedconf/cyberc/MaLL1910.1109/CYBERC.2019.00054https://doi.org/10.1109/CyberC.2019.00054https://dblp.org/rec/conf/cyberc/MaLL19URL#2150364Chuang MaLinfeng LiDaiqi ZhouWater Quality Prediction of Small Watershed Based on Wavelet Neural Network.CyberC456-4632019Conference and Workshop Papersclosedconf/cyberc/MaLZ1910.1109/CYBERC.2019.00084https://doi.org/10.1109/CyberC.2019.00084https://dblp.org/rec/conf/cyberc/MaLZ19URL#2150365Mingxin MaXiaotong YangGuozhen ShiFenghua LiHierarchical Key Management Scheme with Multilevel Secure Access.CyberC97-1022019Conference and Workshop Papersclosedconf/cyberc/MaYSL1910.1109/CYBERC.2019.00025https://doi.org/10.1109/CyberC.2019.00025https://dblp.org/rec/conf/cyberc/MaYSL19URL#2150366Wei MaHongzhi YuKun ZhaoDeshun ZhaoJun YangJing MaTibetan Location Name Recognition Based on BiLSTM-CRF Model.CyberC412-4162019Conference and Workshop Papersclosedconf/cyberc/MaYZZYM1910.1109/CYBERC.2019.00077https://doi.org/10.1109/CyberC.2019.00077https://dblp.org/rec/conf/cyberc/MaYZZYM19URL#2150367Ismael MartinezSreya FrancisAbdelhakim Senhaji HafidRecord and Reward Federated Learning Contributions with Blockchain.CyberC50-572019Conference and Workshop Papersclosedconf/cyberc/MartinezFH1910.1109/CYBERC.2019.00018https://doi.org/10.1109/CyberC.2019.00018https://dblp.org/rec/conf/cyberc/MartinezFH19URL#2150368Emilio NakamuraSérgio RibeiroRisk-Based Attributed Access Control Modelling in a Health Platform: Results from Project CityZen.CyberC391-3982019Conference and Workshop Papersclosedconf/cyberc/NakamuraR1910.1109/CYBERC.2019.00074https://doi.org/10.1109/CyberC.2019.00074https://dblp.org/rec/conf/cyberc/NakamuraR19URL#2150369Yu PanQianqian RenJinbao LiHu JinDynamic Ring Structure Based Target Localization Algorithm in Wireless Sensor Networks.CyberC375-3782019Conference and Workshop Papersclosedconf/cyberc/PanRLJ1910.1109/CYBERC.2019.00071https://doi.org/10.1109/CyberC.2019.00071https://dblp.org/rec/conf/cyberc/PanRLJ19URL#2150370Sandro PassarelliCem GündoganLars StiemertMatthias SchoppPeter HillmannNERD: Neural Network for Edict of Risky Data Streams.CyberC428-4352019Conference and Workshop Papersclosedconf/cyberc/PassarelliGSSH1910.1109/CYBERC.2019.00080https://doi.org/10.1109/CyberC.2019.00080https://dblp.org/rec/conf/cyberc/PassarelliGSSH19URL#2150371Guoliang Qiu 0002Qiwen ZhengXing HuMulti-terminal Collaborative Control Decision-Making Mechanism Based on Blockchain.CyberC237-2442019Conference and Workshop Papersclosedconf/cyberc/QiuZH1910.1109/CYBERC.2019.00047https://doi.org/10.1109/CyberC.2019.00047https://dblp.org/rec/conf/cyberc/QiuZH19URL#2150372Congyu ShiGaoyuan ZhangCongzheng HanBaofeng JiPing XieA Non-Coherent Detection Scheme of O-QPSK Receiver for Perfect-Communication Establishment in Blockchain Technology.CyberC249-2522019Conference and Workshop Papersclosedconf/cyberc/ShiZHJX1910.1109/CYBERC.2019.00049https://doi.org/10.1109/CyberC.2019.00049https://dblp.org/rec/conf/cyberc/ShiZHJX19URL#2150373Xiaoying ShuaiA Greedy Approach for TDMA Based on Matrix Operation.CyberC284-2872019Conference and Workshop Papersclosedconf/cyberc/Shuai1910.1109/CYBERC.2019.00055https://doi.org/10.1109/CyberC.2019.00055https://dblp.org/rec/conf/cyberc/Shuai19URL#2150374Yuhao SunBo LiuTranslational Bit-by-Bit Multi-bit Quantization for CRNN on Keyword Spotting.CyberC444-4512019Conference and Workshop Papersclosedconf/cyberc/SunL1910.1109/CYBERC.2019.00082https://doi.org/10.1109/CyberC.2019.00082https://dblp.org/rec/conf/cyberc/SunL19URL#2150375Yao Sun 0002Lei Zhang 0035Gang Feng 0004Bowen YangBin Cao 0002Muhammad Ali Imran 0001Performance Analysis for Blockchain Driven Wireless IoT Systems Based on Tempo-Spatial Model.CyberC348-3532019Conference and Workshop Papersclosedconf/cyberc/SunZ0Y0I1910.1109/CYBERC.2019.00066https://doi.org/10.1109/CyberC.2019.00066https://dblp.org/rec/conf/cyberc/SunZ0Y0I19URL#2150376Lulu SunRuilin ZhangDensity Clustering Algorithm Based on the Dynamic Selection of Cluster Center.CyberC253-2602019Conference and Workshop Papersclosedconf/cyberc/SunZ1910.1109/CYBERC.2019.00050https://doi.org/10.1109/CyberC.2019.00050https://dblp.org/rec/conf/cyberc/SunZ19URL#2150377Yuxin SunYingzhou ZhangJunyan QianProgram Slicing Method of LLVM IR Based on Information-Flow Analysis.CyberC383-3902019Conference and Workshop Papersclosedconf/cyberc/SunZQ1910.1109/CYBERC.2019.00073https://doi.org/10.1109/CyberC.2019.00073https://dblp.org/rec/conf/cyberc/SunZQ19URL#2150378Yingjuan TaoJinsheng DengXingshen SongDrug Audit Based on Bisecting K-Means Clustering Algorithm.CyberC265-2702019Conference and Workshop Papersclosedconf/cyberc/TaoDS1910.1109/CYBERC.2019.00052https://doi.org/10.1109/CyberC.2019.00052https://dblp.org/rec/conf/cyberc/TaoDS19URL#2150379Fernando VidalFeliz GouveiaChristophe SoaresAnalysis of Blockchain Technology for Higher Education.CyberC28-332019Conference and Workshop Papersclosedconf/cyberc/VidalGS1910.1109/CYBERC.2019.00015https://doi.org/10.1109/CyberC.2019.00015https://dblp.org/rec/conf/cyberc/VidalGS19URL#2150380Chengchang WanXinghui CaoWei Wu 0007Vertical Stratification of Seawater in the Southern South China Sea in Winter Based on Cluster Analysis.CyberC452-4552019Conference and Workshop Papersclosedconf/cyberc/WanCW1910.1109/CYBERC.2019.00083https://doi.org/10.1109/CyberC.2019.00083https://dblp.org/rec/conf/cyberc/WanCW19URL#2150381Lanfei WangJun Guo 0002Cascaded Algorithm Representation for Purifying Face Dataset with Labeled Noise.CyberC139-1422019Conference and Workshop Papersclosedconf/cyberc/WangG1910.1109/CYBERC.2019.00032https://doi.org/10.1109/CyberC.2019.00032https://dblp.org/rec/conf/cyberc/WangG19URL#2150382Haiyong WangKaixuan GuoByzantine Fault Tolerant Algorithm Based on Vote.CyberC190-1962019Conference and Workshop Papersclosedconf/cyberc/WangG19a10.1109/CYBERC.2019.00041https://doi.org/10.1109/CyberC.2019.00041https://dblp.org/rec/conf/cyberc/WangG19aURL#2150383Chunfeng WangNaijin LiuResearch on Simultaneous Wireless Information and Power Transmission Based on OFDM for Space System.CyberC304-3072019Conference and Workshop Papersclosedconf/cyberc/WangL1910.1109/CYBERC.2019.00059https://doi.org/10.1109/CyberC.2019.00059https://dblp.org/rec/conf/cyberc/WangL19URL#2150384Xinming WangZhijian XieJiahao HeGansen ZhaoRuihua NieBasis Path Coverage Criteria for Smart Contract Application Testing.CyberC34-412019Conference and Workshop Papersclosedconf/cyberc/WangXHZN1910.1109/CYBERC.2019.00016https://doi.org/10.1109/CyberC.2019.00016https://dblp.org/rec/conf/cyberc/WangXHZN19URL#2150385Wenxin WangRuilin ZhangMixed Attribute Clustering Algorithm Based on Filtering Mechanism.CyberC181-1892019Conference and Workshop Papersclosedconf/cyberc/WangZ1910.1109/CYBERC.2019.00040https://doi.org/10.1109/CyberC.2019.00040https://dblp.org/rec/conf/cyberc/WangZ19URL#2150386Huifang WangZhihong ZhangA TSGP-Based Tip Search Optimization Algorithm.CyberC424-4272019Conference and Workshop Papersclosedconf/cyberc/WangZ19a10.1109/CYBERC.2019.00079https://doi.org/10.1109/CyberC.2019.00079https://dblp.org/rec/conf/cyberc/WangZ19aURL#2150387Nannan WangDalong ZhangGangtao HanJiayao ChenA Dynamic Weighting Fusion Positioning Method Based on Opportunity Correction for INS and UWB.CyberC317-3212019Conference and Workshop Papersclosedconf/cyberc/WangZHC1910.1109/CYBERC.2019.00061https://doi.org/10.1109/CyberC.2019.00061https://dblp.org/rec/conf/cyberc/WangZHC19URL#2150388Mingyuan XiaLingyuan YinA Generic Construction of Puncturable Encryption.CyberC120-1242019Conference and Workshop Papersclosedconf/cyberc/XiaY1910.1109/CYBERC.2019.00028https://doi.org/10.1109/CyberC.2019.00028https://dblp.org/rec/conf/cyberc/XiaY19URL#2150389Yanbing XiaoYingzhou ZhangYuxin SunJunyan QianMulti-UAV Formation Transformation Based on Improved Heuristically-Accelerated Reinforcement Learning.CyberC341-3472019Conference and Workshop Papersclosedconf/cyberc/XiaoZSQ1910.1109/CYBERC.2019.00065https://doi.org/10.1109/CyberC.2019.00065https://dblp.org/rec/conf/cyberc/XiaoZSQ19URL#2150390Xiaolan XieZhihong GuoA CNN Approach of Activity Recognition via Channel State Information (CSI).CyberC329-3362019Conference and Workshop Papersclosedconf/cyberc/XieG1910.1109/CYBERC.2019.00063https://doi.org/10.1109/CyberC.2019.00063https://dblp.org/rec/conf/cyberc/XieG19URL#2150391Chen XieXiaokai ZhangDaoxing GuoOblique Projection Polarization Filter-Based Self-Interference Cancellation Scheme in In-Band Full-Duplex Systems.CyberC298-3032019Conference and Workshop Papersclosedconf/cyberc/XieZG1910.1109/CYBERC.2019.00058https://doi.org/10.1109/CyberC.2019.00058https://dblp.org/rec/conf/cyberc/XieZG19URL#2150392Mingchang XuZhenbing LiuZimin WangLong SunZhibin LiangThe Diagnosis of Alzheimer's Disease Based on Enhanced Residual Neutral Network.CyberC405-4112019Conference and Workshop Papersclosedconf/cyberc/XuLWSL1910.1109/CYBERC.2019.00076https://doi.org/10.1109/CyberC.2019.00076https://dblp.org/rec/conf/cyberc/XuLWSL19URL#2150393Guosheng Xu 0001Chunhao QiHai YuShengwei XuChunlu ZhaoJing YuanDetecting Sensitive Information of Unstructured Text Using Convolutional Neural Network.CyberC474-4792019Conference and Workshop Papersclosedconf/cyberc/XuQYXZY1910.1109/CYBERC.2019.00087https://doi.org/10.1109/CyberC.2019.00087https://dblp.org/rec/conf/cyberc/XuQYXZY19URL#2150394Haoyan XuXiaolong Xu 0002Lightweight EEG Classification Model Based on EEG-sensor with Few Channels.CyberC464-4732019Conference and Workshop Papersclosedconf/cyberc/XuX1910.1109/CYBERC.2019.00086https://doi.org/10.1109/CyberC.2019.00086https://dblp.org/rec/conf/cyberc/XuX19URL#2150395Charlie Chen-Yui YangGuangzhi LiXiang LiuZonghuan WuKaiyu ZhangThe Future of Broadband Access Network Architecture and Intelligent Operations.CyberC308-3162019Conference and Workshop Papersclosedconf/cyberc/YangLLWZ1910.1109/CYBERC.2019.00060https://doi.org/10.1109/CyberC.2019.00060https://dblp.org/rec/conf/cyberc/YangLLWZ19URL#2150396Wenkao YangXiangwei ZhaiContrast Limited Adaptive Histogram Equalization for an Advanced Stereo Visual SLAM System.CyberC131-1342019Conference and Workshop Papersclosedconf/cyberc/YangZ1910.1109/CYBERC.2019.00030https://doi.org/10.1109/CyberC.2019.00030https://dblp.org/rec/conf/cyberc/YangZ19URL#2150397Yinna YeLi ChenFeng XuePassenger Flow Prediction in Bus Transportation System using ARIMA Models with Big Data.CyberC436-4432019Conference and Workshop Papersclosedconf/cyberc/YeCX1910.1109/CYBERC.2019.00081https://doi.org/10.1109/CyberC.2019.00081https://dblp.org/rec/conf/cyberc/YeCX19URL#2150398Tangda YuFutai ZouLinsen LiPing YiAn Encrypted Malicious Traffic Detection System Based on Neural Network.CyberC62-702019Conference and Workshop Papersclosedconf/cyberc/YuZLY1910.1109/CYBERC.2019.00020https://doi.org/10.1109/CyberC.2019.00020https://dblp.org/rec/conf/cyberc/YuZLY19URL#2150399Zailong ZhangZhiwei ChenSupply-Demand Collaborative Energy Internet for Smart City: A Three-Stage Stackelberg Game Approach.CyberC399-4042019Conference and Workshop Papersclosedconf/cyberc/ZhangC1910.1109/CYBERC.2019.00075https://doi.org/10.1109/CyberC.2019.00075https://dblp.org/rec/conf/cyberc/ZhangC19URL#2150400Shuaipeng ZhangHong Liu 0006Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing.CyberC90-962019Conference and Workshop Papersclosedconf/cyberc/ZhangL1910.1109/CYBERC.2019.00024https://doi.org/10.1109/CyberC.2019.00024https://dblp.org/rec/conf/cyberc/ZhangL19URL#2150401Yue ZhengYarong LiZhen WangChunhua DengYili LuoYixin LiJianwei DingBlockchain-Based Privacy Protection Unified Identity Authentication.CyberC42-492019Conference and Workshop Papersclosedconf/cyberc/ZhengLWDLLD1910.1109/CYBERC.2019.00017https://doi.org/10.1109/CyberC.2019.00017https://dblp.org/rec/conf/cyberc/ZhengLWDLLD19URL#2150402Lin ZhongXihua DuanYujue WangJingyan ChenJidong LiuXiaoguang WangeRoc: A Distributed Blockchain System with Fast Consensus.CyberC205-2142019Conference and Workshop Papersclosedconf/cyberc/ZhongDWCLW1910.1109/CYBERC.2019.00043https://doi.org/10.1109/CyberC.2019.00043https://dblp.org/rec/conf/cyberc/ZhongDWCLW19URL#2150403Yongfu ZhouZhi ZengInfo-Retrieval with Relevance Feedback using Hybrid Learning Scheme for RS Image.CyberC135-1382019Conference and Workshop Papersclosedconf/cyberc/ZhouZ1910.1109/CYBERC.2019.00031https://doi.org/10.1109/CyberC.2019.00031https://dblp.org/rec/conf/cyberc/ZhouZ19URL#2150404Dongjie ZhuYundong SunNing CaoXueming QiaoMing XuJinlin LiJunzhou YangBDNE: A Method of Bi-Directional Distance Network Embedding.CyberC158-1612019Conference and Workshop Papersclosedconf/cyberc/ZhuSCQXLY1910.1109/CYBERC.2019.00036https://doi.org/10.1109/CyberC.2019.00036https://dblp.org/rec/conf/cyberc/ZhuSCQXLY19URL#2150405Changpeng ZouChenggong NiQing LinKaiqiang FengYuxi WangFace Recognition in Complex Lighting Environment.CyberC162-1652019Conference and Workshop Papersclosedconf/cyberc/ZouNLFW1910.1109/CYBERC.2019.00037https://doi.org/10.1109/CyberC.2019.00037https://dblp.org/rec/conf/cyberc/ZouNLFW19URL#2150406Jun ZouChen XuHigh Precision Timing Based on Parabola Curve Fitting in Narrowband System.CyberC288-2912019Conference and Workshop Papersclosedconf/cyberc/ZouX1910.1109/CYBERC.2019.00056https://doi.org/10.1109/CyberC.2019.00056https://dblp.org/rec/conf/cyberc/ZouX19URL#21504072019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2019, Guilin, China, October 17-19, 2019CyberCIEEE2019Editorshipconf/cyberc/2019https://ieeexplore.ieee.org/xpl/conhome/8942180/proceedinghttps://dblp.org/rec/conf/cyberc/2019URL#2296990